Summary Report - Electronic Privacy - Essay Example

Comments (0) Cite this document
While some of us take our privacy seriously apparently, David takes us on a tour that reveals that maybe we are not as private as we would want to think we are. Companies are using advanced technology to monitor our every move, the driving habits are being recorded by travel…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Summary Report - Electronic Privacy
Read TextPreview

Extract of sample "Summary Report - Electronic Privacy"

YourFirst YourLast Electronic Privacy: "Big Brother Big Business" While some of us take our privacy seriously apparently, David takes us on a tour that reveals that maybe we are not as private as we would want to think we are. Companies are using advanced technology to monitor our every move, the driving habits are being recorded by travel companies, the phone records are being monitored, browser history is being stored and the government uses as evidence in a court of law. The documentary shows how biometric technology is being used by the FBI, the border patrol and even in schools after the companies collect the data about the people the government is then using it against the people. David shows the audience how surveillance can be malicious if it lands on the wrong hands. He reveals how a former employer steals his fired employees phone records, a woman who loses his job due to mistaken identity. He also shows how a man discovers that his rental car company was tracking him every move.
While most people will take the freedom they enjoy for granted, David utilizes the documentary to remind us that freedom is a precious thing and should not be taken for granted. Many people would want to keep their email conversations to themselves, the text messages we send to remain a conversation between ourselves and the recipient but that is not the case anymore. The governments super machines sift through all this communication data and archive them.
The documentary also introduces to the viewers to the little known department of AOL, which works closely with law enforcement agencies on request for individuals information. These companies are monitoring the employees, shoppers and diners observed and analyzed. Bank records and financial statements, communication trends and patterns, are being monitored stored and archived for future references if need is. It is clear now that with technology comes with challenges and one of them is the loss of freedom.
Works Cited
Faber, David . "Big Brother Big Business Part 2." YouTube. YouTube, 7 Sept. 2008. Web. 6 May 2014. .
Faber, David . "Big Brother Big Business Part 1." YouTube. YouTube, 7 Sept. 2008. Web. 6 May 2014. . Read More
Cite this document
  • APA
  • MLA
(“Summary Report - Electronic Privacy Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Summary Report - Electronic Privacy Essay Example | Topics and Well Written Essays - 250 words. Retrieved from
(Summary Report - Electronic Privacy Essay Example | Topics and Well Written Essays - 250 Words)
Summary Report - Electronic Privacy Essay Example | Topics and Well Written Essays - 250 Words.
“Summary Report - Electronic Privacy Essay Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Summary Report - Electronic Privacy

Employee Privacy Report

...? ID Lecturer Employee Privacy Report At my workplace, the e-mail use, the Internet use and the privacy policies are in accordance with the laws that govern the business organization. This means that each and every aspect of the technological usage has been covered at length. These privacy policies cover the aspects which are deemed as important for understanding how the organization looks up to the rules and measures in place. These tell the employees exactly what it wants of them and how much liberty the organization is ready to give in return. Then again, this is a significant undertaking that takes place within an organization and my workplace has definitive rules and...
4 Pages(1000 words)Essay

Report of Electronic Commerce

...CONTENTS Introduction 2 An Introduction to E-Commerce 2 E-Commerce Benefits 3 Wider Reach 3 Availability 3 Low Costs 4 Relationship Management 4 E-Commerce Risks 4 Privacy and Confidentiality Issues 5 Theft and Fraud 6 Denial of Service (DOS) Attacks 6 Repudiation Issues 7 E-Commerce Strategy for Glasgow Books 7 Select an E-Commerce Model 7 Website and E-Commerce Application 7 Marketing Strategy 8 Distribution Strategy 8 Information Security 8 Conclusion 9 References 10 Introduction This report presents an analysis of the opportunities and risks that are involved in initiating an online business for a small enterprise like a book shop. The company for which the e-commerce business opportunity will be...
4 Pages(1000 words)Essay

Employee Electronic Privacy

...Employee Electronic Privacy Employee Electronic Privacy Barbara Griffin Axia College Com/120 Effective Persuasive Writing Katherine Mauch, M.A.,M.A., J.D. December 10, 2006 Employee Electronic Privacy 2 As employers install and update more sophisticated ways of monitoring employee-use of the internet and email, workers are also questioning the necessity and legality of this practice. To cite an example, an employee caught looking for another position using the company’s access to the internet purportedly illustrates the potential employer abuse of the system. In this case, we have the employee receiving an email over the...
6 Pages(1500 words)Essay

Summary report

...16 September Summary Report Na chnologies are becoming more popular. The applications of na chnologies are numerous. The pace of nanotechnology development is so fast, that it is difficult to predict where nanotechnologies will be used tomorrow. The current research provides a wealth of information about what nanotechnologies are, how they work, and how they can be used to enhance the efficiency of various manufacturing processes. In brief, the most important research findings can be summarized as follows. Dr. Lvov’s presentation provides the detailed overview of smart nanocontainers, from nanocapsules to clay nanotubes. During the period between 1993 and 2010, Dr. Lvov has published more than 70...
2 Pages(500 words)Essay

Privacy in Electronic Commerce

...Cyber Law Contents Sr. # Topic Pg. # I. Introduction 2 II. Discussion and Analysis 3 2 Data protection and right to privacy 6 2.2. Regulatory environment: An overview 8 2.3. The EU data protection directives 8 2.3.1 The 95/46/ EC Directive 10 2.3.2. The 02/58/EC Directive 14 III. Discussion & Analysis 16 IV. Conclusion 19 References 20 1. INTRODUCTION The technological revolution spearheaded by the invention of the internet, and the subsequent development of electronic commerce has posed a significant threat to the conventional methods of business, transforming the manner in which consumers behave, in the process. There has been a steady rise in the scope and use of ecommerce over the years, leading... regarding...
16 Pages(4000 words)Research Paper

Report Summary

... Report Summary The research question that guides this report is whether the internet or the web is altering the way people think. Some of the social, psychological, intellectual and physiological issues about the internet include claims that the internet either makes people smarter or stupid and that it damages reading and writing skills (Greenblatt 776). Others are concerned about the overload of information that the internet brings. Another vital concern about the internet is that it is addicting especially to kids who are glued to the computer and connected to social networking sites for several hours. There are so many things at stake with regards to the effect of the internet on people. Among others, a person’s social... of...
2 Pages(500 words)Essay

Report Summary

...Report Summary Research Question: Is the web changing the way we think? The controversial issue regarding effect of web on human thinking prompts diverse arguments from both lay people and researchers. People term it as “addition” due to its state of prompting an individual to appear as if glued to the browsing machine. This makes even some neglect duties or delay in accomplishing them because they are always social networking, watching videos, playing games or texting their colleagues online. Conversely, numerous researchers put it a bit confusing as a state of user when online moving “from anticipation to anticipation, and not from satisfaction to satisfaction (Greenblatt 781).” Questions 1. Does...
2 Pages(500 words)Essay

Summary Report

... Education Summary Report The change plan we designed was a multi-stage process that aimed at injecting efficiency in the Gloptech Company. The change plan started with problem identification in we conducted a research to gather information, from the focus work groups. The research helped us to understand the company problem and hence be able to design an action plan to solve the limiting issues. The action plan comprised development of a vision for the company, communicating the vision and creating a sense of urgency in the implementation process. To strengthen the implementation process, we developed a training infrastructure to improve employee skills and to ensure optimal work output. Although we designed this plan carefully... Education...
4 Pages(1000 words)Essay

Electronic Communications Privacy Act

...Electronic Communications Privacy Act Electronic Communications Privacy Act Introduction The cyber space is growing dynamically andat a rapid pace, which has resulted in more features, channels of communication and means of sharing resources within the cyberspace. Nonetheless, the Electronic Communications Privacy Act (ECPA) has been slow in capturing the dynamic changes that are occurring (Electronic Privacy Information Center, 2012). Accordingly, there is no legal framework to guide the use of features such as cloud computing and various forms of virtual computing. The above recent developments have altered the cyber space in various ways, which require a legal framework to manage the workings of the new features created... then, it was...
5 Pages(1250 words)Essay

Data Privacy in Electronic Health Records System

...Data Privacy in Electronic Health Records (EHR) system I chose this topic because of benefits of the EHRs to the health care fraternity and its ability to store records and retrieve information on the patient when required. Electronic Health Record system is a digital collection of patient’s health information that can be shared transversely through a network connection among different health care providers and clinicians (Fetter 408). Patient’s data like age, medical history, the medication and payment information may be stored in the system. Allergies, immunization status, and test results may also be stored in the system. Radiology images for the patient are uploaded in the system,...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Summary Report - Electronic Privacy for FREE!

Contact Us