StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Law Interview - Essay Example

Cite this document
Summary
In the essay “Cyber Law Interview” the author discusses privacy, which refers to an individual’s, institutional, or group's claim that determines the way and the extent to which their information is distributed. It is an individual’s right to control what goes on with their personal information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Cyber Law Interview
Read Text Preview

Extract of sample "Cyber Law Interview"

Adult 1: Yes am aware that there are many internet sites that record my activities. This is because am employed and I make use of electronic services. Adult 2: Am aware of such activity. By this I mean I use a credit card while purchasing goods and services. Am an employee at a private organization and as we know, all information on private organization employees should be stored online.Me: How concerned are you about security on the internet?Adult 1: Am very concerned about all my information on the internet.

The reason being sometimes the internet may give some personal information that you would otherwise not want the public to know.Adult 2: Am concerned about any information about me on the internet. This is because the information reflected may be hacked and changed to that of another person who could be at loggerheads with the law. This can lead to one facing allegations they do not deserve. Also, it makes it very easy for one to be located by people without your knowledge which can be a threat to someone’s life.

Me: do you consider sites recording your information with your knowledge as a violation of privacy?Adult 1: I do not since am the one who has given them permission to do so.Adult 2: I do not since I have given the information I feel is secure when other people read it. Me: How about those sites that record without your knowledge?Adult 2: I feel angered with such sites because in the first place these sites have violated my privacy rights. Adult 2: Am not happy with such sites since they do give some private information about a person which can sometimes create scandals in their lives.

Also, one cannot control the information such sites are giving unless by use of law and this may cost one a lot of money and time.Me: Are you concerned about personal information transmitted over the internet?Adult 1: Sure I am. This is because there are many cybercrimes taking place in the current years and it is possible for their information to be tainted.Adult 2: I am concerned since I don’t like many people getting to know about me and especially my family.Me: Do you believe that the Federal Government should implement laws dealing with how companies can use your personal information?

Adult 1: Yes the Federal Government should implement laws dealing with the way companies use one's personal information. For example, it should limit the company’s rights on posting their employee’s credit card information, family members’ information as well as social security number.Adult 2: The federal government should implement such laws as by doing so companies will have to consult their employees before posting some personal information. For instance, the government should include that a company should not post any personal information regarding an employee’s financial status.

Me: And who do you think should be held responsible if your personal information is found on the internet?Adult 1: In my opinion, it is the company that should be held responsible. This is due to the fact that it is the company and not the government that posts information about its employees.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Cyber Law Interview Essay Example | Topics and Well Written Essays - 500 words, n.d.)
Cyber Law Interview Essay Example | Topics and Well Written Essays - 500 words. https://studentshare.org/information-technology/1676774-interview-in-cyberlaw
(Cyber Law Interview Essay Example | Topics and Well Written Essays - 500 Words)
Cyber Law Interview Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1676774-interview-in-cyberlaw.
“Cyber Law Interview Essay Example | Topics and Well Written Essays - 500 Words”. https://studentshare.org/information-technology/1676774-interview-in-cyberlaw.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Law Interview

Research Final Project

This has been caused by laxity in the law system manning the US borders and rising poverty among countries of these immigrants.... These illegal immigrants are the main cause of rising crime in most states of America and the law is to blame for not being vigilant to tame their influx.... These people who do not have adequate protection of the American law also scramble for the limited hospital services, public schools and the strained local budget....
7 Pages (1750 words) Essay

Mander Portman Woodward College Business

Running head: Market research data Market research data Name Institution Tutor Course Date Mander Portman Woodward College Business Introduction This is an independent sixth form college group founded in England, with branches in Birmingham, London and Cambridge.... hellip; Rodney Portman, Robert Woodward and Nicholas Mander founded the college in 1973....
5 Pages (1250 words) Coursework

Diversity and Inclusion in Organizations

6 Brian Giuliano Texas A&M University-Commerce Abstract This assignment gathers primary data through a personal interview with a diversity and inclusion (D&I) strategist.... The subject assumes the fictional name Phillip Junginger for the purpose of the interview, in order to preserve the confidentiality of his identity.... An interview with Phillip Junginger*, D&I strategic officer, Human Resources Department Phillip Junginger* is the strategic officer for a four-star international hotel chain based in the U....
4 Pages (1000 words) Essay

Case of Vasiliy Gorshkov and Alexey Ivano

cyber law.... In addition to this, we will also investigate how the FBI used the law to apprehend the cyber criminals and whether their actions should stand scrutiny under the current U.... Analysis of case study The Federal Bureau of Investigation in the case study did not follow any International law in their pursuit of the two cyber criminals however the deceit to get them into America is commendable because it allowed the FBI to exercise the right legal justice system in apprehending them....
4 Pages (1000 words) Essay

Chapter Problems/Criminal Investigation

The four objectives of investigation are; interview, interrogation, importance of listening and documenting the interview (Tong, et al.... It does not matter the amount of preparedness and experience that investigators and interrogators have but the ability to conduct a successful interview highly depends on the listening skills (Lee, et al.... Documenting of the interview is another objective in investigation.... Note taking during the interview should be done in a way that does not distract the witness to extent of refusing to give more information, or making the interviewer look like his or she is inattentive....
5 Pages (1250 words) Assignment

Quality of Nursing Care: the Journal of Advanced Nursing Published Data

The report on Quality of nursing care in the words of nurses entails published data in the Journal of Advanced Nursing and based on a study in the United States, the paper is a report of a study concerning the meaning of quality nursing care as far as practising nurses are… The report also continues to acknowledge that healthcare remains an aspect that is at the centre of intense criticism as well as debate....
10 Pages (2500 words) Essay

The Imminent Dangers of Internet Predators, Cyber Bullying, and Personal Privacy

This annotated bibliography "The Imminent Dangers of Internet Predators, cyber Bullying, and Personal Privacy" refers to the research that will expound on the popularity of social media in a different section of the society, dangers brought about by internet predators.... ccording to the article, cyber-bullying comes in different forms.... Common cyber-bullying forms include; physical violence, death threat, and name-calling, threat to end existing relationships, sexual demands, and threat to incorporate friends and families, and irritating chain of messages....
7 Pages (1750 words) Annotated Bibliography

School and Law Enforcement Efforts to Combat Cyber-Bullying

The bibliography "School and law Enforcement Efforts to Combat Cyber-Bullying" depicts reasons for cyber-bullying.... It suggests law enforcement bodies should conduct more crackdowns to help curb the problem, discuss laws that provide school administrators and law enforcers the ability to intervene.... nbsp;… Cowie and Colliery investigate the cyber-bullying phenomenon.... The article raises awareness of why schools are supposed to be involved in dealing with cyber-bullying....
5 Pages (1250 words) Annotated Bibliography
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us