Privacy Policy Essay

Privacy Policy Essay

Length: 1355 words (3.9 double-spaced pages)

Rating: Strong Essays

Open Document

Essay Preview

It has become a sad fact that in today’s society the truth is that the right to one’s privacy in the information technological world has simply become a joke. The growth of computers and information technology has raised new personal challenges in today’s world. All our personal information be it our health data, financial information, demographic information or our children’s information, has become digitized and is stored in the servers which are beyond our control. The Fourth Amendment to the U.S. Constitution protects the citizens from government intrusion when there is a “reasonable expectation of privacy” (Reynolds, 2010, p.117). According to the Fourth Amendment, the people have a right “to be secure in their persons, houses, papers, and effects, against unreasonable search and seizures” (United States Senate, 1996). And this says nothing about the role of non-governmental institutions or the rights of private citizens in public spaces. With so much information which is collected, stored and analyzed about individuals, both in public and private databases, this topic touches off strong feelings and fears. It is vital that everyone as users of the internet, be it government, internet service providers, or individuals, need take the issue of internet privacy very seriously, while basing all actions towards the issue with the moral statement of, ‘Rights aren’t free, they’re earned’.

Reynolds (2010, p.117) defines information privacy as the combination of communications privacy and data privacy. Reynolds (2010, p. 118-144) further categorizes this discussion into the categories of -- financial data, electronic surveillance, health information, export of personal data, children’s personal data, and access to gover...


... middle of paper ...


...loration and public debate for years to come. The fact that there are people whose job is to ensure my right to privacy is an indication that while it may take some time, ethics related to technology are headed in the right direction.



Works Cited


IFSM304 (n.d.). Ethics in the Information Age. WebTycho Course Content: Module 3,
Retrieved on March 2, 2011 from “http://tychousa12.umuc.edu/cgi-
bin/id/CDI/index.pl?class=1102:IFSM304:5151&module=3&default=M3-
Module_3%2FS1-Overview.html

Moor, J (1985). What is Computer Ethics? Retrieved on March 1, 2010 from
“http://tychong.umuc.edu/tycho/IFSM/304/1102/5151/conference/launchconferencing. Tycho

Reynolds, G. (2010). Ethics in Information Technology, 3rd Edition. Boston: Centage.
Velasquez, M. (1992). Business ethics: Concepts and cases, 3rd Edition. Upper Saddle
River, New Jersey: Prentice Hall.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Privacy Policy for Canadian Constitution Essay

- Privacy Part 1 From my point of view, the Canadian Constitution affords the right to privacy indirectly and it helps to protect privacy in different ways. According to my research of the Canadian Constitution, there are some changes happened to the Constitution in 1982. Before the changes take place, for example, it says “Everyone has the right to be secure against unreasonable search or seizure”. According to this statement, only those actions which really damage people’s property will be considered as illegal....   [tags: property, law, warfare]

Strong Essays
743 words (2.1 pages)

Essay on Hackers Are Criminals

- Hacking is the practice of changing the features of a system, in order to accomplish a goal outside of the maker’s inventive purpose. These actions may result in someone finding information that does not belong to them and using it to access personal accounts. There are three categories of hackers; black hats, white hats, and gray hats. With regard to this, it depends on the job of the hacker. For instance, black hat hackers are well-known for the common cybercrimes. These includes DOS/DDOS attacks that overload internet servers, defacing websites by hijacking control and replacing the main page photos with rude slogans, preforming identity theft, and taking remote control of dozens of perso...   [tags: hacking, privacy, security policy, technology]

Strong Essays
1074 words (3.1 pages)

Essay about Lack of Internet Security and Privacy

- Internet privacy and security has become the concern of many individuals throughout recent years. There are a very limited amount of laws that have been enacted to combat computer or cyber related crimes. This has become an issue because as the internet grows increasingly popular so does the criminal and immoral behavior that abounds on it. With these crimes gaining in impact, effectiveness, and frequency, there needs to be more repercussions for these crimes. The United States government needs to increase restrictions on the amount and type of data on individuals from the internet, to prevent the government from invading privacy of citizens and to prevent companies from storing browser hist...   [tags: cloud usage legislation and policy]

Strong Essays
909 words (2.6 pages)

Social Networking Sites and Privacy Essay

- Introduction What do about ninety percent of us have in common. It’s the social networking sites that everyone is a part of these days, whether it’s your twelve year old nephew or your grandmother. Spending hours and hours connecting with your old friends and making new friends over the social networking sites has become a part of everyone’s daily routine. Nonetheless, recently privacy concerns over the social networking sites have taken its peak. Background It all started several decades back, when information technology developments succeeded but had put personal privacy into danger....   [tags: Information Technology Developments, Privacy]

Strong Essays
1144 words (3.3 pages)

Essay on Employee Privacy Report

- Employee Privacy Report 1 In this report, I will be addressing e-mail, Internet use, and privacy policies in my workplace; the current laws regulating employee e-mail and Internet privacy; the reasons to companies carry out e-mail and Internet use policies; the assumptions employees make about their privacy at work; and how these policies affect employee privacy at work. E-Mail and Internet Use , Privacy Policies The E-mail/Internet usage and privacy policies at my job are part of a system of written decisions established by the organization to support and to build a desire culture through managing risk, regulation, and administration....   [tags: Privacy Report]

Strong Essays
986 words (2.8 pages)

Privacy on Social Networks Essay

- This essay will discuss and critically analyse whether or not existing data protection laws protect the privacy of individuals whose personal information has been disclosed on social networking sites. Over the last decade social networking sites (SNS) have increased their popularity among the people. These SNS are mySpace, facebook, twitter, bebo etc. There are various reasons of people using these sites. However, majority of SNS users are those people who use these sites for social networking e.g....   [tags: Security Privacy Web]

Strong Essays
2327 words (6.6 pages)

Essay on Internet Privacy

- This essay will discuss the way social networking sites affect the nature and limits of privacy. There are various social networking websites e.g. Facebook, MySpace, Youtube, Twitter, Google Buzz, and many others with various privacy settings and in the past several years billions of people have joined these social networking sites. Social networking sites give their users an easy way to share information about themselves. However, many users are quickly finding that the information they intend to share with their friends can all too easily find its way into the hands of the authorities, strangers, the press, and the public at large....   [tags: Internet Web Privacy]

Strong Essays
2426 words (6.9 pages)

Essay on Privacy in a Digital World

- Privacy in a Digital World The history of privacy in the United States is a storied one. The context of the 4 th Amendment to the Constitution has been debated for years to determine if the “right to privacy” is a constitutionally guaranteed right. Additionally, many people are technologically ignorant of what behaviors and activities will put them at risk. The “Carnivore” is a good example of an historic digital technology that generated privacy concerns. The Carnivore was a digital intelligence gathering tool that was supposed to be used by the FBI to fight crime....   [tags: Privacy America]

Strong Essays
855 words (2.4 pages)

HIPPA and the Privacy of Medical Records Essay examples

- HIPPA and the Privacy of Medical Records Previously, healthcare information has been protected by state law. However, since this information crosses state lines, the need for federal protection has been warranted. In 1996, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). HIPAA provides the first federal protection for the privacy of medical records (Burke & Weill, 2005) HIPPA encourages the use of electronic medical record and the sharing of medical records between healthcare providers, because it can aid in saving lives....   [tags: Healthcare Privacy Internet Medical Records]

Strong Essays
1335 words (3.8 pages)

Workplace Privacy Essay

- Workplace Privacy Background As a director for the American Red Cross of Santa Monica, not only am I constantly faced with policy and personnel conflicts, I am also responsible for finding solutions to those conflicts. Recently, I was charged with the task of finding a solution to a problem we (as a chapter) had never dealt with before. The American Red Cross is an apolitical organization. During the recent elections, a supervisor in my office sent out emails to many of our colleagues and her friends stating her opinion regarding Proposition 22 (the proposition referring to the status of gay relationships)....   [tags: Workplace Privacy Essays]

Strong Essays
3092 words (8.8 pages)