StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Value of Digital Privacy in an Information Technology Age - Research Paper Example

Cite this document
Summary
The paper “The Value of Digital Privacy in an Information Technology Age” will discuss computer hacking, which has been rampantly used to access sensitive individual information. Hackers access computer networks either legally or illegally…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
The Value of Digital Privacy in an Information Technology Age
Read Text Preview

Extract of sample "The Value of Digital Privacy in an Information Technology Age"

The Value of Digital Privacy in an Information Technology Age Rise in technology has led to increase of information sharing, especially through the internet. In retrospect, technologies used to access individual information have equally increased. Computer hacking has been rampantly used to access sensitive individual information. Hackers access computer networks either legally or illegally by finding out and exploiting the weaknesses in a computer program. Hacking may either be used by computer criminals or computer security experts. In the wrong hands, unauthorized access to information may lead to destruction of vital information or usage of information for destructive purposes. Another way through which individuals can access private information is through phishing. Spear-phishing, in particular, has become increasingly common. It involves hacking individuals’ computers or accounts by sending e-mails to individuals’ accounts. These e-mails often get citizens to provide sensitive information. They are personal, crafty and deceitful messages that easily pass security protections. According to security software maker RSA, about one in every 300 emails in 2011 was a phish. Data cables are also used to access private information. Network cabling companies collect personal and non-personal information. Different cabling companies have different terms of use in regard to privacy. The companies, through their websites, collect information ranging from names, physical address, e-mail address, age, password and other information necessary to conduct business with these companies. This information may then be used to facilitate citizens’ use of web sites, to send information to citizens and to conduct business. Discuss the advantages and disadvantages of public access to this information, both for the researchers and those who are being “investigated”. Data protection is required to prevent improper collection of personal data and improper usage or disclosure of the same. Private data in the hands of criminals may be detrimental, while the same may be of great benefit in the hands of security agents. Access to private information may lead to crimes such as identity theft, fraud, defamation, slandering and discriminatory practices. Also, gaining access to confidential information increases the risks of such information being disclosed. This causes dissatisfaction and encourages mistrust in individuals. In America, identity theft has become increasingly common and it destroys an individual’s financial reputation. Invasion of personal privacy shows inefficiency on the government’s part and other organizations that keep citizens’ records. Access to private citizen information through computer applications has greatly facilitated investigations into financial crimes, drug crimes and sex crimes (Soghoian, 2011, 18-20). Therefore, law enforcers are able to track crimes across borders. Because criminals have established highly complex networks across the globe, computer applications enable law enforcers to deter international crimes. Technological advancements go a great length in facilitating security and policing. Through soliciting “suspicious information”, the police and law enforcers can prevent crimes that threaten humanity and the dignity of humanity such as terrorism and identity theft. Determine what measures citizens can take to protect private information or information they do not want to be disclosed. To guard private information, citizens can implement measures that recognize the dangers of unwarranted access to private information. Preventive measures should be promoted to limit these dangers. Ticher (2001) argues that technical measures are easier to implement such as password systems, back-up systems for computers, locks on filing cabinets, and access control either to the buildings and key parts of the building. Citizens should not share their passwords with family, friends or colleagues. For vital documents such as social security cards that can be used in identity theft, citizens should release them when absolutely necessary. Citizens should update Anti-virus programs, guidelines on social networking services should be promoted and citizens should report violations of security to the relevant authorities. They should also undertake technical measures of monitoring and filtering their systems against hacking, spamming and defamation. Citizens should also push for government laws and regulations that protect their privacy. They should not respond to unsolicited electronic mail messages that require disclosure of vital information such as social security numbers. Citizens should ensure that they only use secure websites that use encryption software and have strong privacy and security policies. In case of infringement on privacy, for example theft of a credit card, citizens should file a police report and file an online complaint with the Federal Trade Commission. Discuss a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public, and whether or not you agree with this law. The Freedom of Information Act (FOIA) is a federal law, codified at 5 U.S.C Section 552, originally enacted by President Lyndon Johnson in 1966. It allows for full or partial disclosure of previously unreleased information and documents controlled by the government of the United States. According to the law, anyone (including U.S citizens, foreign nationals, organizations, association and universities) has the right to access federal agency records and information. The Act outlines agency records subject to disclosure, mandatory disclosure procedures and grants nine exemptions to the statute (FOIA.gov). Agencies of the U.S government are required to disclose that information unless withheld from disclosure under the nine outlined exemptions. However, the Act does not provide access to records held by the US congress, the federal judiciary, state or local government agencies or those held by private organization or individuals. The Act was amended in 1996 to allow greater access to electronic information. FOIA is an important law that allows free flow of information while safeguarding vital information regarding national security, internal personal rules and practices, internal matters that are essentially trivial in nature, information exempt under other laws, confidential business information, inter/intra agency communication subject to deliberative process and personal privacy. Determine whether there are “electronic privacy laws” that can prevent others from having access to “private information” as well as how effective they are. The Gramm-Leach-Bliley (GLB) Act of November 12, 1999 entails privacy provisions relating to consumers’ financial information. The Act consists of three sections: the Financial Privacy Rule, the Safeguards Rule and the Pretexting provisions. It outlines restrictions on when financial institutions may disclose a consumer’s personal financial information to nonaffiliated third parties. Following such disclosures, financial institutions are required to notify their customers about their information collection and information sharing practices. Customers have a right to decide whether or not to share their personal information with third party affiliates. The Act also outlines exceptions under which a financial institution may share customer information with a third party. All financial institutions are required to give customers opt-out opportunities in case they do not feel comfortable with an institution’s terms and conditions. This law has sets a balance on the way financial institutions deal with private information of individuals. It is highly effective in regulating the collection and disclosure of private information; establishing security programs that financial institutions must abide by in their relations with customers; and preventing access of private information using false pretense. By requiring financial institutions to give customers notices explaining the institution’s information sharing practices, this act fosters transparency and accountability in these institutions, and encourages trust between these institutions and their customers. References Freedom of Information Act. 1966. www.foia.gov. Retrieved April 28, 2012 Soghoian, C. (2011). “The Law Enforcement Surveillance Reporting Gap” unpublis- hed report, Center for Applied Cybersecurity Research, Indiana University, Bloomington (April 10, 2011). Available at SSRN: http://ssrn.com/abstract=1806628. Retrieved on April, 9, 2012. Ticher P. (2001). Data Protection for Library and Information Services. London: ASLIB Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Value of Digital Privacy in an Information Technology Age Research Paper”, n.d.)
Retrieved from https://studentshare.org/law/1449886-the-value-of-digital-privacy-in-an-information
(The Value of Digital Privacy in an Information Technology Age Research Paper)
https://studentshare.org/law/1449886-the-value-of-digital-privacy-in-an-information.
“The Value of Digital Privacy in an Information Technology Age Research Paper”, n.d. https://studentshare.org/law/1449886-the-value-of-digital-privacy-in-an-information.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Value of Digital Privacy in an Information Technology Age

The Music Industry and Digital Technology

nbsp; In the music industry, the diffusion of digital music formats allows for the dematerialization and dispersal of music channels as far as music distribution is concerned (Jones 2002).... nbsp; All industry sectors in the digital age are enjoying the grace of computerization over traditional paperwork.... nbsp; Yet, there is a downside to the digital age with regards to the music industry.... This paper ''The Music Industry and Digital technology'' tells that In the boundless ocean of the digital culture, everything should appear as a blessing....
12 Pages (3000 words) Essay

Digital Age: Policy Competence and Economic Growth

With the widespread evolution of information technology, information privacy has also been one of the most controversial issues society faces.... This paper "Digital age: Policy Competence and Economic Growth" discusses laws relating to internet privacy, and describe a case where good computer science techniques could have prevented a privacy disaster.... hellip; We live in a digital age.... Moreover, because technology has been rapidly changing year by year, a long-term approach to internet privacy is still being developed....
9 Pages (2250 words) Term Paper

Ethical, Professional and Cultural Issues of Information and Communication Technology

information technology has had a massive impact on people from all walks of life, all around the world.... The world has been faced with a lot of complex and difficult questions regarding the access to information, freedom of expression, intellectual… Information and Communication technology (ICT) is an instrumental need for everyone in regards to gathering of information and knowledge.... Major developments in ICT has made it possible for a transition of information processing, storage and dissemination, from paper to virtual, which is now setting new heights of speed, accuracy and efficiency in all human activities....
10 Pages (2500 words) Essay

On Questions of Privacy in a Digital Age

The paper "On Questions of privacy in a Digital Age" tells us about information and other personal data.... In terms of the use of computers, or even the Internet, there should be primacy on one's safety especially when it comes to personal information.... hellip; In dealing with complex issue of privacy, there is a need to look at in a theoretical perspective: ethical theory of privacy.... Three – fold premises emerges: something vital and important to defend and something based on individual's preference and the importance of privacy (Moor 1997:28)....
7 Pages (1750 words) Term Paper

Information Privacy in the Digital Age

But with the rampant evolution of information technology, information privacy has also been one of the most controversial issues society has ever faced today.... This paper "Information privacy in the Digital Age" investigates the measures to protect information privacy and intellectual property rights using the examples of famous companies.... Since the birth of the digital age, various technological advances have been developed, particularly the creation of the Internet....
9 Pages (2250 words) Term Paper

Ethical Issue in Information Technology

This paper, Ethical Issue in information technology, stresses that the term information ethics refers to the discipline of applies ethics developed by Luciano Floridi.... This area of ethics examines the concerns arising in the modern world due to the constant development of information technology.... Otherwise, the innovation and invention in information technology will cease.... In his theory of information ethics, he asserted that information ethics should be included under the umbrella of computer ethics....
6 Pages (1500 words) Term Paper

The Growing Problem of Digital Piracy on the Internet

??………………………………………………………………………… 63AbstractWith the rapid growth of internet usage and the increased bandwidth and speed of connection, the frequency and seriousness of digital piracy has mushroomed (Ellacoya, 2007).... ??………………………………………………………………………… 63AbstractWith the rapid growth of internet usage and the increased bandwidth and speed of connection, the frequency and seriousness of digital piracy has mushroomed (Ellacoya, 2007)....
78 Pages (19500 words) Thesis

The Values of Knowledge in the Digital Age

The digital age has contributed to an information economy that is characterized by productivity and competitiveness of informational agents that have the capacity to generate, process, and apply efficiently the knowledge-based economy towards the benefit of the information society.... "The Values of Knowledge in the Digital age" paper adopts a descriptive approach in order to determine the values of knowledge in a digital age.... nbsp;  Knowledge in the digital age is documented to be characterized by the capabilities of individuals to transfer information freely (Wardrip-Fruin et al, 2003)....
10 Pages (2500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us