Privacy Case Essay Sample

Privacy. In the past the word privateness was something much simpler than it is today. Privacy meant that information about one’s ego was merely shared with their permission and was normally in done verbally or in written paperss. such as medical records. In today’s society. privateness is a little more complicated due to engineering. Our information is stored in assorted databases that are connected to the Internet and how it is used or shared varies dependent upon the organisation that maintains them. This paper will reply assorted inquiries sing privateness issues.

Privacy Questions
1. The Code of Fair Information Practices applies merely to authorities databases. Discourse the advantages and disadvantages of widening the Code of Fair Information Practices to private databases managed by corporations. Advantages

By widening the Code of Fair Information Practices to private databases that are managed by corporations it will extinguish the loophole of authorities bureaus buying information from the private organisations which houses much more information than authorities databases. With private corporations being held to guidelines of the Code of Information Practices. there will be a big lessening in the information being held in the databases every bit good as being regulated by the individual’s penchant on what information on them can be used or made available every bit good as being able to entree and update such information. As it stands right now information that is held in private corporation databases are non wholly accurate and by widening these guidelines into private corporations will guarantee that the information is accurate and secure. Corporations would hold to stairss in guaranting that the informations collected is accurate by cross-referencing informations with multiple beginnings while supplying the single entree to the information. To guarantee the information is secure. they would hold to protect against unauthorised entree. devastation. usage. or revelation of information by manner of watchwords and encoding ( FTC. 2007 ) .

ALSO READ  Holmesafe Ltd Essay Sample

Like the authorities. private corporations would hold the ability to relieve any database they choose for their ain personal docket. such as concealment or excepting certain information because there is no 1 in charge of implementing the commissariats of the codification. Currently bureaus are able to portion records amongst another every bit long as they are for “routine use” ; nevertheless the term “routine use” can be defined by each corporation. Widening the Code of Fair Information Practices can do misinterpretation of the term “routine use” because each corporation will be able to specify it consequently to suit their corporation’s demands. This can take to improper handling and abuse of the informations ; doing security and privateness concerns ( Quinn. 2011. pgs. 248 -249 ) . 2. A company discovers that some of its proprietary information has been revealed in Internet confab suites. The revelation of this information consequences in a significant bead in the monetary value of the company’s portions. The company provides Internet service suppliers with the screen names of the people who posted the confidential information. It asks the ISPs to unwrap the existent individualities of these people.

Should the ISPs comply with this petition? Explain your logical thinking. The ISPs should non follow with the petition to unwrap the existent individualities of the people associated with the screen names provided to them unless they are given a warrant or subpoena. When people enter treatment boards. confab suites. or message boards their posters are considered a signifier of freedom of address and hence upheld by the First Amendment of the Constitution. “The First Amendment provides that Congress make no jurisprudence esteeming an constitution of faith or forbiding its free exercising. It protects freedom of address. the imperativeness. assembly. and the right to petition the Government for a damages of grudges. ” – Amendment I ( 1791 ) ( U. S. Senate. n. d. ) If any Torahs are broken so the ISPs demand to hold a tribunal subpoena in order to supply the information requested ( O’Brien. 2002 ) . 3. Name two benefits and two injuries that may ensue from the transition of the Real ID Act. Two benefits from the transition of the Real ID Act are: driver’s licences are a more dependable signifier of designation doing it harder for imposter’s to make false designation and the new driver’s licences will be machine clear. Two injuries from the transition of the Real ID Act are: the machine-readable information stored on the licences may be targeted for easier usage of individuality larceny and the cost of execution which is estimated to be more than $ 23 billion ( Quinn. 2011. pgs. 272 -273 ) .

ALSO READ  Risks, Threats and Vulnerabilitites of Social Networks and Web Applications Essay Sample


FTC ( June 25. 2007 ) Fair Information Practice Principles. Federal Trade Commission
Retrieved on September 23. 2012 from
hypertext transfer protocol: //www. Federal Trade Commission. gov/reports/privacy3/fairinfo. shtm
O’Brien. J. ( 2002 ) Puting a Face to a ( Screen ) Name: The First Amendment Implications of Compelling ISPs to Uncover the Identities of Anonymous Internet
Speakers in Online Defamation Cases
Retrieved on September 24. 2012 from
hypertext transfer protocol: //ir. lawnet. fordham. edu/cgi/viewcontent. cgi? article=3847 & A ; context=flr Quinn. M. ( 2011 ) Ethical motives for the Information Age Fourth Edition. Pearson Education. Inc. U. S. Senate ( n. d. ) Fundamental law of the United States

Retrieved on September 24. 2012 from
hypertext transfer protocol: //www. senate. gov/civics/constitution_item/constitution. htm