Preview

Digital Privacy

Better Essays
Open Document
Open Document
1125 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Digital Privacy
Assignment 2
The Value of Digital Privacy
Ruben R Roybal Jr
Strayer University – LEG 500 Law, Ethics and Governance
Professor Lori Baggot
November 11, 2012

The Value of Digital Privacy

Introduction In this paper we will discuss three technologies that allow an individual to research citizen’s private data, and the advantages and disadvantages of public access to this information. We will look at what it means for both the researchers and the individual who are being investigated. What steps citizen’s can take from having their private information from being disclosed? We will also discuss what federal law that grants the federal government the legal right to make private information on U.S. citizen’s available to the public. Finally we will determine whether there are electronic privacy laws that can prevent others from having access to private information.
Technologies on Private Data
There are several different sites that offer personal information by the use of your phone number, name and address. One website is called BeenVerified. BeenVerified was founded with the goal of helping consumers build trust online. By giving our users affordable and easy access to public records, individuals can make more informed decisions about those they choose to meet and interact with. In the past, access to public records was confusing and expensive. BeenVerified aims to disrupt this trend by providing not only an affordable pricing model but also helpful customer service along the way (www.beenverified.com). This website claims to help people in making certain decisions on a roommate or information on a prospect employee, but who is to stop a person from stalking another person by using this information they can get from this website to their advantage? The other place where government employee’s information may be disbursed to anyone that may ask for it is the Freedom of Information Act. The Freedom of Information Act (FOIA) is a law that



References: BeenVerified, (n.d.). About Us. Retrieved November 11, 2012 from Website: http://www.beenverified.com/bv-vs-comp FOIA, (n.d.). Retrieved November 11, 2012 from Website: http://www.foia.gov/ IMLS.gov, (n.d.). About Us. Retrieved November 10, 2012 from Website: http://www.imls.gov/about/freedom_of_information_act_foia.aspx OJP.gov, (n.d.). Retrieved November 10, 2012 from Website: http://www.it.ojp.gov/default.aspx?area=privacy&page=1285 Spokeo, (n.d.). About Us. Retrieved from http://www.spokeo.com/about

You May Also Find These Documents Helpful

  • Satisfactory Essays

    What is a security feature you should always look for in any Web site that will ask for personal information to share with others?…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Final

    • 2332 Words
    • 10 Pages

    Employees have the right while being given access to this type of information to also be fully protected. The controls and procedures designated here will also facilitate that. For example leveled access removes temptation to lower level employees and protects them from being accused of infractions not ever in their control.…

    • 2332 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Websites are routinely collecting information about customers and visitors to understand and serve their customers better. Personal information is collected and administrated with integrity, responsibility, and security.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    With the development of digital technology, our data is not only being monitored, but it is being gathered and stored in such a way that makes it searchable. Daniel J. Solove had it right when he wrote, “Until recently, public records were difficult to access—finding information about a person often involved a scavenger hunt through local offices to dig up records. But with the Internet, public records are increasingly being posted online, where anybody anywhere can easily obtain and search them.”[1] Is there a form of protection against this invasion of privacy? Are we to trust these data controllers, the person or persons who control the functions and methods of the processing of our personal data? Are the government regulations decreasing our right to privacy? What is considered private these days?…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    The article “Visible Man” written by Peter Singer discusses the issues that are involved with the topic of privacy. Many people feel that they are comfortable with the actions they are taking but they do not realize the information they are putting out into the real world. Singer explains how government officials use cell phone providers to gain insight on certain individuals. The idea that is stressed in this article is that too much privacy is never good, especially with government officials because the confidential information that gets leaked informs society on what it going on behind the scenes. The more information one can gather about a topic, the more informed they will be; furthermore, being well educated on a topic will allow one…

    • 276 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This website typically collects information either voluntarily-provided by you or automatically collected when you visit our website, which may include cookies, third party tracking technologies and server logs. Voluntarily provided information may include your name, address, email address, billing and credit card information, and are usually obtained when you fill out our contact forms.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Task B Your Work Role

    • 597 Words
    • 3 Pages

    Confidentiality - Not to disclose information about staff, service users or the company. How to pass on information when needed without breaching confidentiality.…

    • 597 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Freedom of Information Act 2000 (FOI) widens the release of unstructured information to third party requests, but on the other hand, access to all personal data (under the Data Protection Act 1998) is an absolute exception under the Freedom of Information Act…

    • 762 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Privacy is a person’s right to control access to his or her personal information. Everybody value the protection of their personal information. No one wants to see some of their personal information made public, especially on the internet. However, the recent evolution of technology has started to threaten every individual’s privacy by reducing the amount of control that they had over their personal data and making it possible for people who do not have the proper authority to access them. According to Zalta (2014), the 21st century has become the century of Big Data and advanced Information Technology allows for the storage and processing of exabytes of data. The combination of increasing power of new technology and the declining clarity and agreement on privacy give…

    • 480 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The author of this article is Daniel J. Solove. He discusses the different perspectives and opinions of various people of the government’s control of viewing personal information. The article demonstrates this through examples of what people say, book references, and the opinion of the article himself. In the article, “The Nothing to Hide Argument”, Daniel J. Solove argues that the information- gathering programs the government uses to track and record information from people are problematic.(739) This still remains the case even if the information gathered from these programs was information people did not mind being uncovered. (739).…

    • 572 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Zaba Search is another online search engine which allows people to research telephone numbers and addresses which are displayed for free. The site advertises information is revealed for free without having to register. The information displayed from Zaba Search is residential listings which can be found in phone directories. Premium searches are also available on the site however, once selected you are directed to other online services. The other online services offer searches by phone numbers, social security numbers and also offer background checks.…

    • 1457 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Due to the technology available today children of all ages have access to the internet. In the 1960’s the internet became a major source of marketing, sales, and distribution of both products and services. Unfortunately many of these services were used by children under the age of 13 years old (Children's Online Privacy Protection Act (COPPA), 2011). Marketers were able to collect personal information from children through chat room and/or discussion board registration to track behavior of web suffers through advertisement and the promise of gifts in exchange for advertisement (Children's Online Privacy Protection Act (COPPA), 2011). These marketers collected this information about children and their families and compiled it into files then sold it to third parties for various commercial purposes (Koby). Also discovered were dangerous list marketing abuses. Investigative reports revealed how easily this list can be purchased and the power that can be exercised over individuals through the use of their personal information. On December 14, 1995 CNN reported that look up services could be used to locate children: “There is no law on the books that prevent a stranger from calling a 900-number and getting information about your children. In fact, until a few weeks ago, a subsidiary of R. Donnelley provided a service that did just that.” A CBS television reporter was able to purchase a list of children’s names using the name of a notorious killer (Children's Online Privacy Protection Act (COPPA), 2011). On May 12, 1996 the San Francisco Examiner reported: “To prove how…

    • 800 Words
    • 4 Pages
    Good Essays
  • Good Essays

    We also collect information from commercially available sources that we consider trustworthy. This is the contact information related to name, address, email address, interest, preferences and other relevant demographic or profile data. The information gathered from credible sources and when you use our services may be used. For instance, we may gather information to compare geographic information that is collected from commercial sources along with IP address to determine the general geographic area.…

    • 1357 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Advances in Technology

    • 527 Words
    • 3 Pages

    In todays time many fraudulent companies have been able to simply purchase this information or tap into a buyer’s online account as for the cause to contact a consumer to solicit sales. With the Do Not Call and Telephone Consumer Protection Act legitimate companies only have the right to call consumers that are not on the do not call list. Companies also have strict guidelines that are to be followed or a large fine and lawsuit will be the result of breaking the law. Not to mention that in an event that a phone call is made to a consumer that is on the do not call list, than the company has to provide evidence that it was…

    • 527 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    100 S C I E N

    • 3543 Words
    • 17 Pages

    100 S C I E N T I F I C A M E R I C A N…

    • 3543 Words
    • 17 Pages
    Good Essays