StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Privacy and Internet Policy - Essay Example

Cite this document
Summary
Internet Policy and Identity Theft Customer name Institution Identity theft is starting to become a grave privacy offence in the 21st century. It is considered as one of the major crimes of the century, occurring every three seconds. According to the Federal Trade Commission, identity theft is the most common consumer complaint and is recognized as the most rapidly spreading crime of the US…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.5% of users find it useful
Privacy and Internet Policy
Read Text Preview

Extract of sample "Privacy and Internet Policy"

Download file to see previous pages

Identity theft is not a new happening. It has been around for ages now and have transformed from using the names of deceased people for voting or turning to crime that is against the social welfare. The surge of pre-approved credit cards, pre-approved loans and unsolicited credit card checks along with the ease of accessibility and reach of the Internet has made identity theft a crime that can fool anyone and lead to overwhelming financial costs for the victims (Stanley, 2008). James Moor (2009) observes that a policy vacuum exists regarding the usage of computer technology.

The increased range of opportunities that computers provide also necessitates the development of more comprehensive policies to guide actions. Advancement in technology has given rise to greater vulnerabilities in the security of systems; this has been the case for websites too. Due to the chances of access by unauthorized agents, websites often develop web privacy policies. Internet policies can be used by a number of bodies ranging from companies and schools to web based sellers and vendors.

Regardless of how dedicated or vaguely controlled the web servers, the level of risk that these bodies are exposed to and their adherence to an Internet privacy policy is not the same. If companies do not observe a concrete security system for the protection of information, then the gap between the intended level of security and identity theft protection system is widened and manifests itself when a security breach occurs. It needs to be emphasized that the range of attacks and risks to the system from outside sources is very diverse and complicated.

Web-based attacks such as identity theft, common gateway interface code etc lead to drastic consequences internal intrusion, receipt or dissemination of a malicious code, decrease in the security fortressed by network security procedures and misrepresentation and authentication problems. Moreover if a system is exposed to high levels of internet identity theft, people would not trust the system anymore (Vacca, 2003). There are various measures that are employed to protect the web sources from intrusions and identity theft.

According to Vacca (2003) one of this is the development and effective enforcement of an Internet policy which is meant to cover and develop management, usage and processes associated with configuration in the context of identity theft protection. Internet service providers should take into account the privacy legislation policy and should be able to not only understand it but also comply with it. Vacca argues that one of the best practices for online identity theft protection is openness, for which companies need to make identity theft policies and practices mandating the management of personal information in an open yet responsible manner.

The website of the company should encompass an accurate and comprehensive identity theft policy. In particular, the privacy policy should coherently divest the responsibilities of organization as well as the information practices. The government places great emphasis on the protection of financial businesses, workplaces etc against identity theft. A privacy policy serves three main purposes. It tells the user about the information and security policies of the company. It gives the consumer information about the range of options that he has

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy and Internet Policy Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1409705-privacy-and-internet-policy
(Privacy and Internet Policy Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/environmental-studies/1409705-privacy-and-internet-policy.
“Privacy and Internet Policy Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/environmental-studies/1409705-privacy-and-internet-policy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Privacy and Internet Policy

Role of the State in Internet Privacy Protection

The Course Number 17 June 2012 Role of the State in internet Privacy Protection While the number of internet users is rapidly growing, a number of concerns related to the use of the World Wide Web has multiplied recently.... hellip; At the turn of the 19th century privacy was defined as the “right to be let alone” (Warren & Brandeis 193) Whereas internet users agree that privacy is generally about human dignity as well as protection of private property, in the virtual world, this notion is narrowed....
9 Pages (2250 words) Essay

How media affects to private life

The modes of communication through media abound now with televisions, mobile phones, internet, multimedia interfaces, films, and so on.... Invasion of privacy is a much talked about aspect of media and this is especially the case when it comes to individuals with celebrity status....
5 Pages (1250 words) Research Paper

Public Safety and Privacy Analysis

Some people are molested, harmed and harassed, even if there is no physical contact because of the internet and computer technology.... Supreme Court decision has tackled this issue of public interest vis--vis the privacy concerns of individuals.... Ages and ages of history of the world have witnessed how the public and private divide had been debated attempted to be delineated....
8 Pages (2000 words) Essay

Legal Concerns in the UK Media

I shall further consider issues raised by the internet and the impact of the current legal regulatory framework on media freedom.... The concept of a legally recognised right to privacy under UK law remains the subject of complex debate (Tugendhat & Christie, 2002), compounded by the role of the media as self-proclaimed democratic watchdog, highlighting the tension between defining the parameters of a privacy… Against this backdrop lies a polarised debate regarding the right to media freedom within the UK legal system, with some questioning whether there is true freedom of speech in light of media regulation Moreover, the de-regulation of the media ownership structures implemented by the Communications Act 2003 has led some to argue that whilst ostensibly aiming to take media control out of the public sector, the financial ownership structures within the private sector, further impedes media freedom due to the control of powerful minorities (Frost, 2007)....
25 Pages (6250 words) Essay

E-Mail, Internet Use, and Privacy Policies

internet policy is guidelines and instructions given to the employees regarding the use of internet facilities including surfing of the web, e-mail use, and social media and chatting etc.... The main objective of internet policy is to increase employee productivity and reduce legal liabilities that may happen due to the employee misuse of the internet.... Noonan (2004) emphasized that an internet policy must be able to define who is allowed to access the internet in the workplace and what types of access are permitted (p....
4 Pages (1000 words) Assignment

Role of the State in Internet Privacy Protection

This paper "Role of the State in internet Privacy Protection" discusses a few steps that have been made in providing legal protection for internet users, but this seems to be insufficient given a number of complaints from users and the growing number of cases of security and privacy violation.... Research into the issue found that internet users today are exposed to embarrassment, stalking, cyber-bullying, blackmailing, and identity hacking due to users displaying lots of personal data....
9 Pages (2250 words) Case Study

Software Piracy and Privacy Policy

The author of this paper "Software Piracy and Privacy policy" discusses the benefit of the use of authentic and licensed software protection, the organization policy, the three principles selected for the matrix, software application piracy and dilemma, the factors that attract researchers....
7 Pages (1750 words) Assignment

Role of Privacy in Search Engines

It may be possible that many internet users both old and young can not consciously differentiate between search engines and web browsers.... Search engines allow different internet users to access crucial information through links that direct them to resources online covering a plethora of topics.... The paper "Role of privacy in Search Engines" brings out the right to privacy gained public support, legislations have been passed, but its implementation faced many barriers....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us