StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Value of Digital Privacy in an Information Technology Age - Essay Example

Cite this document
Summary
This paper gives an example of a federal privacy law that allows the government an access to any private information of an individual. It identifies electronic laws that protect people privacy. The three technologies that allow individuals to research on a person’s private information are…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.2% of users find it useful
The Value of Digital Privacy in an Information Technology Age
Read Text Preview

Extract of sample "The Value of Digital Privacy in an Information Technology Age"

This paper talks about the importance of digital privacy, and the various laws that affect it. It discusses about the advantages and disadvantages of the public access to an individual’s private information and the measures that citizens should take in order to protect their privacy in regard to information dissemination. This paper gives an example of a federal privacy law that allows the government an access to any private information of an individual. It also identifies electronic laws that protect people privacy, and their effectiveness. The three technologies that allow individuals to research on a person’s private information are (Keizer, 2012); Biometrics Cloud computing. RFID tags. The cloud computing technology involves a subscription based consumption of technological services. In this type of technology, the software and hardware systems of a computer system are delivered through the internet. This type of computer technology involves the design of a cloud that can enable a computer user to focus on what he or she is looking for. On this basis, the user does not need to worry about where the information he or she is looking for is stored (Keizer, 2012). This technology makes it easier for individuals to search and retrieve the information they are looking for in an easier manner. All a person needs to do is to click on the information he or she is looking for, and there it comes. Biometrics technology on the other hand involves the use of behavioral and intrinsic characteristics to identify an individual (Keizer, 2012). This type of technology involves the collection of DNA, fingerprints, iris, and other biological characteristics. These are then combined with the name, gender, social security number and date of birth of an individual. This information is then stored in software which has the capability of matching the contents contained to identify an individual. An algorithm is used to translate these match-points found in the database to a numeric value. Researchers will compare this numeric value, with the biometric input in the data, to either approve or deny the information they are seeking in regard to a specific individual (Keizer, 2012). Security officers can use this type of technology to spy on an individual without their knowledge, this if they use a geolocation tracking device such as a smartphone. Another technology is the RFID tags. This stands for radio frequency identification and it involves the use of electronic magnets for purposes of tracking and identification of objects attached to the RFID tags. These tags have the capability of storing information in an electronic manner, and these data are read by using magnetic fields. A researcher can access the information of an individual without his or her knowledge by use of these RFID tags (Keizer, 2012). This is because the tags can be implanted within individuals, and this increases the possibility of reading private information of an individual without their consent. The use of these tags has raised privacy concerns in United States of America. Having knowledge of such technology has its advantages and disadvantages. One advantage that the public has if they know this kind of information is that they will take measures of protecting their privacy. For instance, people won’t just provide their DNA details, names and addresses without confirming on why this type of information is required. This is in respect to the use of biometric technology in conducting a search for an individual. Another advantage is that the public would seek various measures of complaining to the authorities in case their privacy is breached. For instances, marketers can use the cloud computing technology to identify the consumption habits of individuals, and thereafter develop marketing programs that reflect their consumption habits. This usually involves perusing through the personal information of individuals without their consent. This practice is unethical, and needs to be condemned (Smith, 2013). Those being investigated would know how researchers can identify their private information, and thereby take precaution on the kind of information they make public. Information such as their names, place of birth, and place of residence should be kept private, for purposes of protecting their privacy (Smith, 2013). However, one disadvantage of the public having knowledge on the existence of such kind of technology is that they would be cautious in releasing certain information about themselves. For example, while engaging in social activity over the internet, people might give false information concerning them, undermining the reliability of the social interaction. It would also be difficult for researchers to find information they are investigating regarding a particular individual. For example, if investigators were looking for a terrorist, this person won’t provide accurate details about himself, thereby undermining the work of security agents. However, there are measures that citizens can undertake to protect their privacy. This includes failing to provide certain information they feel uncomfortable to share, and clicking on privacy buttons on social websites they engage in. This is possible because social websites have privacy policies that guide their use. Despite the efforts of an individual to make certain information private, the 2011 Sunset extension Patriots Act frustrates these efforts (Smith, 2013). The act allows the federal government to have an access to any kind of information that would help the government fight crime. According to the act, the federal government has the authority to monitor all the computer system used by suspected terrorists, and compels all banking institutions, telecom organization, and libraries to provide tangible information regarding a suspected terrorist. This should be done without their knowledge and consent. In my own opinion, this law is uncalled for, and a breach to the constitutional rights of individuals contained in the due process clause of the 14th amendment, which protects the right of privacy (Smith, 2013). This law also breaks the provisions contained in the fourth amendment of the American constitution, which guarantees the right of an individual against illegal searches and seizure. For instance, in Katz vs. United States (1967), the Supreme Court denoted that the use of technology in eavesdropping on an individual’s private communication amounts to an illegal search, and it is therefore unconstitutional. On this basis, the use of technology while conducting a search amounts to a breach of the fourth amendment of the American constitution. The court also denoted the fourth amendment protects an individual from a breach of his privacy (Keizer, 2012). On this basis, the Sunset patriot’s expectation act violates the fourth amendment of the American by allowing the use the use of technology to access the private information of suspected criminals. This act violates the principles set up by the judges in the Judges in the Katz vs. USA( 1967) against using technology to breach the privacy of an individual (Smith, 2013). Despite this law that allows a breach of an individual’s privacy, there is a federal law that protects the electronic privacy of an individual. For example the 2002 Information Management Security act protects the information of an individual from an unauthorized access, disclosure, and destruction (Smith, 2013). This act is effective in protecting the privacy of an individual because various government agencies monitor its implementation on a constant basis. For instance, the office of management and budget conducts an annual review on the effectiveness of the law in protecting an individual’s privacy. Where there is a weakness, the institution develops policies aimed at strengthening the law. Another law is the 1988 Video Privacy protection act. This law protects the right of a consumer of an electronic product, against unauthorized collection of his or her personal information. It prevents the disclosure of an individual’s records of video cassettes, and other audio materials. It provides a civil remedy of not less than 2500 dollars, if an individual breaches the law under consideration (Keizer, 2012). Various states in America have electronic laws that can also prevent other people from accessing an individual’s private information. For instance, in California, there is the reader’s privacy act, passed in 2011 (Smith, 2013). This law protects the privacy of an individual by prohibiting an electronic or print book service company from issuing the personal information of an individual, unless authorized by the courts. It also instills punitive measures against an individual found to have breached the law. This is in form of civil damages, and payment of numerous amount of fines. References: Keizer, G. (2012). Privacy. New York: Picador. Smith, R. E. (2013). Compilation of state and federal privacy laws (2013 ed.). Providence, RI: Privacy Journal. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Value of Digital Privacy in an Information Technology Age Essay”, n.d.)
Retrieved from https://studentshare.org/law/1477243-the-value-of-digital-privacy-in-an-information
(The Value of Digital Privacy in an Information Technology Age Essay)
https://studentshare.org/law/1477243-the-value-of-digital-privacy-in-an-information.
“The Value of Digital Privacy in an Information Technology Age Essay”, n.d. https://studentshare.org/law/1477243-the-value-of-digital-privacy-in-an-information.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Value of Digital Privacy in an Information Technology Age

Incompatibility Moral Rights with the New Digital Environment

This discussion will consider Western intellectual property's traditional personality theory and consider whether utilitarian rights can effectively and sufficiently protect intellectual property rights and copyright in the new digital age.... This exploration will also focus on the WIPO treaty because it is the latest in the international legal framework to balance the rights of society (Utilitarian Rights) and the rights of the individual (Personality Theory Rights) in the new digital age....
16 Pages (4000 words) Essay

The Music Industry and Digital Technology

nbsp; In the music industry, the diffusion of digital music formats allows for the dematerialization and dispersal of music channels as far as music distribution is concerned (Jones 2002).... nbsp; All industry sectors in the digital age are enjoying the grace of computerization over traditional paperwork.... nbsp; Yet, there is a downside to the digital age with regards to the music industry.... This paper ''The Music Industry and Digital technology'' tells that In the boundless ocean of the digital culture, everything should appear as a blessing....
12 Pages (3000 words) Essay

Ethical, Professional and Cultural Issues of Information and Communication Technology

information technology has had a massive impact on people from all walks of life, all around the world.... The world has been faced with a lot of complex and difficult questions regarding the access to information, freedom of expression, intellectual… Information and Communication technology (ICT) is an instrumental need for everyone in regards to gathering of information and knowledge.... Major developments in ICT has made it possible for a transition of information processing, storage and dissemination, from paper to virtual, which is now setting new heights of speed, accuracy and efficiency in all human activities....
10 Pages (2500 words) Essay

On Questions of Privacy in a Digital Age

The paper "On Questions of privacy in a Digital Age" tells us about information and other personal data.... In terms of the use of computers, or even the Internet, there should be primacy on one's safety especially when it comes to personal information.... hellip; In dealing with complex issue of privacy, there is a need to look at in a theoretical perspective: ethical theory of privacy.... Three – fold premises emerges: something vital and important to defend and something based on individual's preference and the importance of privacy (Moor 1997:28)....
7 Pages (1750 words) Term Paper

How Social Networks Are Invading Our Privacy

His article is actually a summary of four books describing the reactions of people at various times how technology will impact their lives.... The same critics said that a new technology like the Information Highway and the Internet will destroy home life, prevent people from visiting other people (instead use technology to keep in touch), and create a new nations of slugs too lazy to go out of their homes and offices.... It is technology that had shaped societies in the past and it is the same technological changes that shape society today....
7 Pages (1750 words) Essay

Information Privacy in the Digital Age

But with the rampant evolution of information technology, information privacy has also been one of the most controversial issues society has ever faced today.... This paper "Information privacy in the Digital Age" investigates the measures to protect information privacy and intellectual property rights using the examples of famous companies.... Since the birth of the digital age, various technological advances have been developed, particularly the creation of the Internet....
9 Pages (2250 words) Term Paper

Ethical Issue in Information Technology

This paper, Ethical Issue in information technology, stresses that the term information ethics refers to the discipline of applies ethics developed by Luciano Floridi.... This area of ethics examines the concerns arising in the modern world due to the constant development of information technology.... Otherwise, the innovation and invention in information technology will cease.... In his theory of information ethics, he asserted that information ethics should be included under the umbrella of computer ethics....
6 Pages (1500 words) Term Paper

The Values of Knowledge in the Digital Age

The digital age has contributed to an information economy that is characterized by productivity and competitiveness of informational agents that have the capacity to generate, process, and apply efficiently the knowledge-based economy towards the benefit of the information society.... "The Values of Knowledge in the Digital age" paper adopts a descriptive approach in order to determine the values of knowledge in a digital age.... nbsp;  Knowledge in the digital age is documented to be characterized by the capabilities of individuals to transfer information freely (Wardrip-Fruin et al, 2003)....
10 Pages (2500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us