StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Summary Report - Electronic Privacy - Essay Example

Cite this document
Summary
While some of us take our privacy seriously apparently, David takes us on a tour that reveals that maybe we are not as private as we would want to think we are. Companies are using advanced technology to monitor our every move, the driving habits are being recorded by travel…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful
Summary Report - Electronic Privacy
Read Text Preview

Extract of sample "Summary Report - Electronic Privacy"

YourFirst YourLast Electronic Privacy: "Big Brother Big Business" While some of us take our privacy seriously apparently, David takes us on a tour that reveals that maybe we are not as private as we would want to think we are. Companies are using advanced technology to monitor our every move, the driving habits are being recorded by travel companies, the phone records are being monitored, browser history is being stored and the government uses as evidence in a court of law. The documentary shows how biometric technology is being used by the FBI, the border patrol and even in schools after the companies collect the data about the people the government is then using it against the people.

David shows the audience how surveillance can be malicious if it lands on the wrong hands. He reveals how a former employer steals his fired employees phone records, a woman who loses his job due to mistaken identity. He also shows how a man discovers that his rental car company was tracking him every move.While most people will take the freedom they enjoy for granted, David utilizes the documentary to remind us that freedom is a precious thing and should not be taken for granted. Many people would want to keep their email conversations to themselves, the text messages we send to remain a conversation between ourselves and the recipient but that is not the case anymore.

The governments super machines sift through all this communication data and archive them.The documentary also introduces to the viewers to the little known department of AOL, which works closely with law enforcement agencies on request for individuals information. These companies are monitoring the employees, shoppers and diners observed and analyzed. Bank records and financial statements, communication trends and patterns, are being monitored stored and archived for future references if need is.

It is clear now that with technology comes with challenges and one of them is the loss of freedom.Works CitedFaber, David . "Big Brother Big Business Part 2." YouTube. YouTube, 7 Sept. 2008. Web. 6 May 2014. .Faber, David . "Big Brother Big Business Part 1." YouTube. YouTube, 7 Sept. 2008. Web. 6 May 2014. .

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Summary Report - Electronic Privacy Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Summary Report - Electronic Privacy Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/english/1643460-summary-report-electronic-privacy
(Summary Report - Electronic Privacy Essay Example | Topics and Well Written Essays - 250 Words)
Summary Report - Electronic Privacy Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/english/1643460-summary-report-electronic-privacy.
“Summary Report - Electronic Privacy Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/english/1643460-summary-report-electronic-privacy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Summary Report - Electronic Privacy

Electronic Credit Checking and Mortgage Approval System

This report "electronic Credit Checking and Mortgage Approval System" presents the architectural model of the computer system that presents the logical arrangement of deploying the software components on the hardware to achieve the goal of the software application.... As the proposed system for 'electronic Credit Checking and Mortgage Approval' is online, therefore, I have chosen the client-server architecture....
3 Pages (750 words) Report

The Use of Law Enforcement Cameras

This paper ''the Use of Law Enforcement Cameras'' aims to show that the use of law enforcement cameras is an invasion of privacy, a fact that should be taken into consideration by legislators and policy makers internationally.... nbsp;… In the context of USA law, privacy is defined as 'a civil liberty, a right to be free of outside interference' (Regan 4).... In 1995, the British government defined privacy as incorporating two rights: 'a) the right to be free from harassment and b) the right to privacy of personal information' (Stanco 3)....
9 Pages (2250 words) Report

Managing Operation And Information

The report on "Managing Operation And Information"  describes  electronic Prescription System 's development and infrastructure requirements, database structure and needs for information for the doctors for the system development and improvement.... hellip; The purpose of this report is description of issues of electronic Prescription System (EPS) developing for the National Health Service (NHS)....
7 Pages (1750 words) Report

Technological Developments in History

This report "Technological Developments in History" discusses the advent of information technology which stands as the next best thing about the Scientific Revolution that has brought about advanced computing methods that revolutionized the communication field.... hellip; Several patterns of thinking have brought about this change in information technology....
5 Pages (1250 words) Report

A Benchmarking Exercise of Local Authority a Library Services

he report then concludes with a summary of the findings as well as recommendations on how best the benchmarking exercise should be undertaken.... This report "A Benchmarking Exercise of Local Authority a Library Services" presents a general overview and background of the factors that necessitated the commencement of a benchmarking process for an imaginary Local Authority (A)....
11 Pages (2750 words) Report

Study of Web Use and E-Mail Based on Ethics, Policy and Law in Information Security

 In this era, the most common issues of privacy are; digital security, identity theft, spyware, phishing, Internet pornography, and spam are very common.... Having the intention of protecting citizens from harm and organizations from economic loss and civil or criminal lawsuits, State and federal privacy and security legislation is evolving.... eople have become more technologically savvy; due to the significantly increased range of information available through the Internet, easy accessibility to information, and an increase in computer literacy; information security and an individual's privacy have become areas of significant concern....
9 Pages (2250 words) Report

Policies InnoSensors Company Should Adopt to Safeguard the Sensitive Information on the Product

This report "Policies InnoSensors Company Should Adopt to Safeguard the Sensitive Information on the Product" presents the InnoSensors top management on the measures they need to put in place to protect their sensitive information about their products.... hellip; A suitable information classification scheme has been developed in the report that categorizes the various classes of information based on their vulnerability and sensitivity....
6 Pages (1500 words) Report

Business Intelligence and Industrial Espionage

This report "Business Intelligence and Industrial Espionage" discusses teamwork that is critical for the organization to achieve success.... This is because effective teamwork makes it easier for team members to achieve organizational objectives, unlike when employees are acting as individuals.... hellip; Teams are also vital in that members have various skills, experiences, and knowledge, which is significant in the smooth operation of the organization....
23 Pages (5750 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us