StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Privacy from the information security perspect - Essay Example

Cite this document
Summary
The purpose of this paper is to analyze and compare privacy issues related to freedom from observation and privacy issues related to information security. Human beings believed that the everyday occurrences which they live are events which nobody is paying attention to. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.2% of users find it useful
Privacy from the information security perspect
Read Text Preview

Extract of sample "Privacy from the information security perspect"

People living in the United s and in different democratic countries across the world have rights which protect their privacy. Privacy can be defined as the state of being free from intrusion or in one’s personal life or affairs (Dictionary, 2007). Privacy can be viewed as a very wide term which covers a lot different rights of persons or institution which all have the same common denominator of protecting people or institutions from revealing information which is secret and that the persons want to protect from others. There are a lot of matters which people want do not want to share with outsiders and they only which to reveal to their personal friends and families. During the last decade the privacy rights of people have been challenged due to different external factors or legislatures which have place privacy at the forefront of public debates. The purpose of this paper is to analyze and compare privacy issues related to freedom from observation and privacy issues related to information security. Human beings believed that the everyday occurrences which they live are events which nobody is paying attention to. To certain extend they realize that there are other humans around them, but they assume that specific details of their daily routine are private matters which no person has a right to closely observe. The general feeling and perspective of people is that they can go about their business without the fear that any particular is concerned about the actions they are performing. The common actions which people know are absolutely private are not limited to their interactions within other members of a society. Humans performed a lot of activities such as paying bills, online activity, private phone call conversations, decisions concerning ones professional future, buying preferences, financial records and many other events which are suppose to be private decisions and occurrences. These general activities are actions which are not suppose to be observed by any particular within our society, but these actions are being challenged by society on a constant basis. The city of London has a complex camera surveillance system which monitors the behavior of the citizens thought the entire city. Somebody is always watching everything occurring in this city. The purpose of this system was to protect the citizens from criminal activity. There are over 200,000 cameras in the UK monitoring public spaces (Gilc). Systems such as the closed circuit television (CCTV) utilized in London completely invade the privacy of its citizens. The government might justify such a system with claims that is there to protect the population, but giving any government such an instrument is dangerous since the information and images can be utilize for other means such as unauthorized social studies, stalking of people within the system, tracking movement of purchasing trends of the citizens and many other actions which intrude into a person’s privacy. People spend a large portion of their time in the workplace. Recently there has been a lot controversy concerning privacy at work. According to the American Bar Association there is a huge culture of corporate monitoring of employees activities which is typically perform without a notice to the employees that such activities are occurring (Are Surveillance Activities Violating People’s Privacy?, 2007). The view of management of the corporate world is that employees give up their right to privacy while at work and an employee should not expect to have any privacy at work since the person is getting paid to be there. To a certain extend the employer has a right to evaluate the performance of its employees and to know if people are in their designated work areas, but there limits. An employee should not have to worry about somebody tracking his every move as if the person was some type of criminal. The personal calls which employees are entitled to deal with family matters are private and the employer has no right to spy or intrude in them. In the United Kingdom the Human Rights Act of 1998 protects the rights of the personal lives of people. Celebrities are humans which many times the media targets and their private lives are intruded upon. A few years ago supermodel Naomi Campbell went to a private meeting of narcotics anonymous to take care of some personal issues. A UK reporter took a picture of her before entering the meeting which he then published in a press article. The reporter had absolutely no right to take such a picture nor did he have a right to make an article based on Naomi’s private life. Naomi took the case to court and the judged ruled in her favor based on breach of confidence and the protections provided by the data protection act of 1998 (ActNow). The United States government created the USA Patriot Act in 2002 after the 9/11 attack in NY supposedly to have more tools to battle terrorist and protect the security of its citizens. Conceptually it was a good ideas and necessary measure which could have helped law enforcement agencies in their efforts to track dangerous individuals and organizations. In reality this is not what occurred with the creation of theUSA Patriot Act. The Patriot Act violates the privacy rights of the citizens and provides governments with powers they are not entitled to. Instead of targeting terrorist threats the act invades the privacy of everyone. The list below illustrates the ways the Patriot Act violates the privacy of American citizens: It allows the government to monitor citizens web surfing record, utilize rover wiretaps to monitor phone calls of both the person being tapped and secondary individuals, access internet service provider record and monitor any type of protest regardless of the issue of the protest. Allows government to add DNA samples to databases of any person convicted of any crime of violence in the past, a measure which is not relevant for terrorism investigative purposes. The government can spy the computer activity on any person without a court order The government can enter the home premises of an individual to realize a search of the premises without a person ever knowing the search was performed. Extends the investigative power of foreign intelligence agencies. These foreign agencies can now intrude in the lives of American citizens. (Eff, 2003). The powers the USA Patriot give the government are anti-constitutional and are a complete violation of basic human rights. Imagine governmental officials going through a person’s home without the person ever knowing someone was there. The legal system stipulates that law enforcement agencies need a warrant before entering a person’s home and the person has the right to be present during the search and has to be notified prior to the entrance of any individual into their premises. The measure the Patriot Act allows is highly illegal and can be misused by corrupt law enforcement agents to frame any innocent person. The Act completely violates the rights of common citizens to realize online activities privately. It is allowing foreigners to perform investigation in territory in which they have no jurisdiction. Privacy is a right which protects the intimate lives of people. Humans need to have their own space and nobody has the right to stalk another person while observing their every move. Security is important for society, but it has to be performed without violating the rights of the common citizen. Measures such as London’s surveillance system are extreme measures which are creating a world in which people can no longer move freely and privately around without being watch by strangers. The USA Patriot Act is also a very bad piece of legislation that provides government with the ability to violate the privacy of people. People have the right to a private life and they can not let technological advances or governments intrude on their lives. References ActNow.org. Naomi Campbell Privacy and Data Collection. 1 Retrieved August 22, 2007 from http://www.actnow.org.uk/upload8.pdf Dictionary.com (2007). Privacy. Retrieved August 23, 2007 from http://dictionary.reference.com/browse/privacy Gilc.org. Privacy and Human Rights. Retrieved August 22, 2007 from http://www.gilc.org/privacy/survey/intro.html Eff.org (2003). The USA Patriot Act. Retrieved August 22, 2007 from http://www.eff.org Are Surveillance Activities Violating People’s Privacy? (2007). HR Focus, 84(8). 9. Retrieved August 21, 2007 from EBSCOhost database. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy from the information security perspect Essay”, n.d.)
Privacy from the information security perspect Essay. Retrieved from https://studentshare.org/technology/1541903-privacy-from-the-information-security-perspect
(Privacy from the Information Security Perspect Essay)
Privacy from the Information Security Perspect Essay. https://studentshare.org/technology/1541903-privacy-from-the-information-security-perspect.
“Privacy from the Information Security Perspect Essay”, n.d. https://studentshare.org/technology/1541903-privacy-from-the-information-security-perspect.
  • Cited: 0 times

CHECK THESE SAMPLES OF Privacy from the information security perspect

Computer Security as an Integral Element of Sound Management

This literature review "Computer security as an Integral Element of Sound Management" discusses computer security principles, cryptology, and its associated applications and secure software engineering.... Digital security basically means the protection of one's digital identity.... hellip; Digital security covers various areas which include computers and internet, telecommunications, retail and financial transactions, travel and transportation, health care, and secure access....
9 Pages (2250 words) Literature review

Security in the Cloud

This literature review "security in the Cloud" presents security in the cloud; it will focus on the issue of security as regards the concept of cloud computing.... It is evidently clear that the security risk of cloud computing is real and needs to be addressed in order to protect customers' data.... However, despite the many benefits that come with cloud computing, there is a thorny issue of privacy and security....
9 Pages (2250 words) Literature review

Biometric Security and Privacy

This essay "Biometric security and Privacy" is being undertaken to analyze how predominant the role of technology happens to be in handling the security issue in general and how biometric technology has helped the security system in dealing with difficult circumstances.... hellip; Biometrics can help during elections, authorized entry into an office, firming up security, preparing a database of the citizens, etc.... While on the one hand we have advanced security gadgets, on the other the acts of sabotage too are being carried out in the most sophisticated manner....
18 Pages (4500 words) Essay

Security, Privacy and Ethical Issues in Information Systems

In addition, many businesses gather and store personal information of the potentially new and existing customers in their systems which give rise to privacy and information security issues.... The most accepted standard for ensuring information security and privacy is the British Standard Institute (BSI) guidelines called ISO27001 information security Management Systems.... This essay discusses that presence of the internet and distributed applications provide a wealth of information and knowledge to users; but at the same time, they contribute towards the development of new and innovative forms of data and personal privacy, ethical and security threats....
7 Pages (1750 words) Essay

The Development of the Internet Protocol Security

The author of the present research paper "The Development of the Internet Protocol security" points out that with the rise of the internet and increased use of technology it became more difficult for the organizations as well as for individuals to maintain their privacy and secure their data.... PSec is considered as a framework of open standards with the major objective of protecting and securing the communication between different networks through encrypting security services....
8 Pages (2000 words) Research Paper

Data Privacy and Security

oreover, the term “computer security” is very commonly used, though; the information and data saved on a computer are in danger to few risks unless the computer is connected to other systems using a network.... However, when the users registering themselves with any internet service or a website they can suffer from having nothing to keep secret, security on the internet is concerning saving someone's data and information, yet if the information does not appear crucial....
8 Pages (2000 words) Essay

Privacy, Trust, and Security

The paper "Privacy, Trust, and security" discusses that since cloud computing is linked to perceptions of its high risk to data sharing, further research should be conducted to gather empirical evidence of security breaches.... nbsp;There is no evidence of security and privacy breaches reported in the literature.... hellip; If evidence is collected from actual security and privacy breaches, then it will be possible for technology developers to create appropriate security and privacy protection software for cloud computing....
15 Pages (3750 words) Coursework

Analysis of Information Security of Health Record Systems

"Analysis of information security of Health Record Systems" paper takes a look at the importance of these technologies how applicable they are in medical institutions and if there are any recommendations that should be kept to ensure security and confidentiality of a patient's records.... This human rights act supports the rights to respect an individual's privacy using eight principles summarised that personal data should be made lawfully and fairly and there should be a lawful reason why individual data should be retrieved from the data banks....
7 Pages (1750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us