Preview

ETH 301 Case Module 1

Better Essays
Open Document
Open Document
860 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ETH 301 Case Module 1
Running Head: Email Privacy.

TUI, BUS301
Holly Walker
Case Email Privacy Module #1 27 April 2012 Dr. Johnny Vanneste

Today, social media has changed the world; the world revolves around a collection of digital footprints floating somewhere in cyberspace. So what happens to a digital footprint that has left behind after death? Who gets access to your digital footprints once death occurs? Websites have different policies on transitions of accounts in the event of death. When registering and signing up for certain websites, the user has to agree to certain privacy and policy agreements both for the user and the website company.
Some families are drawn by closure to reveal their loved ones emails and personal information. Usually, a will accompanied by insurance policies and specific documentation are set in place in the event of death. Today as the world changes, technology, social media, email, and websites track and record all movement. The World Wide Web allows the user to search for anything they desire, and communicate anywhere in the world. This also causes issues once death occurs.
Years ago prior to the World Wide Web, people wrote hand written letters, cards and other correspondence. When death occurred, the property of loved ones was divided by specific instructions from a will or by court orders. If the deceased left this type of property behind it was given to the family members. Today these correspondences still continue in a digital format requiring usernames and passwords. Many people have not included usernames and passwords into their wills or instructions in the event of their death.
USA Laws According to (Standler, 1998), “Reading e-mail during storage on a computer system is prohibited by federal statute, 18 U.S.C. § 2701-2711, Title II of the Electronic Communications Privacy Act (ECPA), provided that the system is "providing an electronic communication service to the public." This means, among other



References: Herold, Rebecca (2005), page 2, Is There Privacy Beyond Death? http://www.privacyguidance.com/files/Privacy_Beyond_Death_Herold.pdf Standler, R. (1998). Privacy of E-Mail in the USA, Section II, (1) http://www.rbs2.com/email.htm Yahoo, (2008) Terms of Services, Section 27 NO Right of Survivorship and Non-Transferability, http://info.yahoo.com/legal/us/yahoo/utos/utos-173.html

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Emails can be used to send information to individuals or a whole company, there are many different facilities within email software that can ensure the recipient has read the email this is important if the email contained time critical information. Also as email can be used as a legal form of communication it can be used to send contractual information and purchase orders.…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Eth 301, Module#2

    • 326 Words
    • 2 Pages

    I do not think relatives or anyone else for that matter should have access to information of an individual that supposed to be protected by a company’s privacy act policy unless the member stated in a will that these specific documents should be released to the individuals or if a crime was committed. There is a privacy act statement for a reason. The purpose of the act is to protect the privacy and rights of all people in his email. Although the situation was a sad loss for the family being that they lost a son, policy and privacy acts still apply. Now days prior to establishing accounts with email companies, social networks or any other online corporations they have the individuals read and sign a user agreement in which most if not all talk about how they will protect the individual’s privacy. Privacy is the ability of an individual or group to seclude them or information about themselves and thereby reveal themselves selectively. As being a leader / supervisor in the Army, I have had first-hand experience with this situation. My soldier was killed in vehicle accident and during the Line-of-Duty investigation; the soldier stated to others that he was going to commit suicide. During the investigation, the investigating officer wanted to search the soldier’s computer. The family agreed to it but as the Commander of the soldier, I had to disagree with the family and the investigating officer. If it wasn’t outlined in the last will and testament, the Army didn’t grant his parents access or rights to his email. Even if the soldier is deceased we still have to respect the right of the individual.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Accy 301

    • 2514 Words
    • 19 Pages

    Introduction to the tax system faced by individuals and sole proprietors in the United States with a…

    • 2514 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    Ellsworth V.

    • 1033 Words
    • 5 Pages

    However one exception does exist and that is if the account holder has specified otherwise allowing their next of KIN access in their will. I think that opinions on this topic can pretty much be summed up in a shotgun pattern on a target. There are several directions Yahoo could of took being persuaded by several things such as public opinion, apathy for the family or even the legal holding powers of an appointed next of KIN. However across the board I feel that Yahoo has upheld every policy that they have said to in their policy. Just out of curiosity I googled Yahoo and some other case similar to gather a more solid foundation and see if the Justin Ellsworth case was just a single showing. In all the cases that I have read here and there into Yahoo has held the exact same stand. The case’s of many varying topics such as government warrants for email traffic between criminals and terrorists. All of these case’s only surrendering the email data upon a search warrant or Yahoo is court ordered to turn the information over. So in conclusion I really don’t think that in falls in line with utilitarianism view of seeking a morally correct course of action consists in the greatest good for the greatest number, that is, in maximizing the total benefit resulting, without regard to the distribution of benefits and burdens. If that was so then Yahoo wouldn’t have much information that wouldn’t be available for public view. This course of action would for-go…

    • 1033 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Also in wills things can be giving to close friends. The “will” will often include money, the house or apartment they were staying at, and items in the house or apartment.…

    • 738 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The World Wide Web was created far enough back for me not to care about the specific date. It is a great asset for school, work, and general entertainment. But, with all good things there are some negatives as well. The online, once was a new place of discovery, is now a place of caution with danger lurking around the corner. Lori Andrews writes about the privacy issues of the web in her essay, “George Orwell…Meet Mark Zuckerburg.” Already, in her title she emphasizes Orwell’s rational fear of “Big Brother” is happening now on Zuckerburg’s social media site, Facebook. It is not just Facebook that has fallen to data aggregators invading the privacy of anyone online. Peggy Orenstein also discusses online privacy issues in her essay, “Just between…

    • 235 Words
    • 1 Page
    Good Essays
  • Good Essays

    Unit 4222-301 Answers

    • 1577 Words
    • 7 Pages

    Unit 4222-33 301 Promote communication in health, social care or children’s and young people’s settings…

    • 1577 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Every day, thousands and millions of people flood the world with e-mails. Most youngsters keep online journals and share photos online with friends and family. And each day, many of us die. What happens to the contents of a deceased’s laptops and e-mail accounts? Would a deceased want his or her family to read the e-mails? What would happen if a deceased stored work files on his or her computer that belonged to his or her employer? Could a deceased assign a representative to go through the computer and clean out any files the deceased didn’t want anyone to see? In general, private letters that are used for communication are seen as personal property. When one dies, they form part of the estate as if they were stored in one’s safe deposit box. Over the last decade, however, letter-writing has become less popular while an increasing number of people switch to use e-mails for correspondence. Should the e-mails stored on email providers remote servers be treated similarly as paper correspondence that pass to the heirs, or as something new? Since email has taken over as a major form of communication and almost everyone having an email account, these are questions that will no doubt be debated for some time. I will discuss both the utilitarian and deontological considerations in an attempt to determine the “right” thing to do regarding the legal battle involving Justin Ellsworth.…

    • 818 Words
    • 4 Pages
    Good Essays
  • Good Essays

    * Family backgrounds make a difference and everyone has their own way of communicating together. For example a family member may say a word that will make the rest of the family laugh but a visitor will remain puzzled, or someone may use a ‘slang’ word that the rest of the family understands but not visitors.…

    • 3094 Words
    • 13 Pages
    Good Essays
  • Satisfactory Essays

    A1 301

    • 400 Words
    • 2 Pages

    You need to provide evidence in the form of a written statement to say that you understand:…

    • 400 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    301

    • 483 Words
    • 2 Pages

    1. Conversations, verbally passing on information whether it is one to one, supervision, handover, telephone calls and or team meetings.…

    • 483 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    301

    • 644 Words
    • 2 Pages

    C) It is important for a social worker to use the feedbackto improve their practice because if it is ignored bad practice will continue, the service user will feel ignored and no longer valid, it relates to practice, it will…

    • 644 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    As Facebook Users Die

    • 633 Words
    • 3 Pages

    In Jenna Wortham’s As Facebook Users Die, Ghosts Reach Out, she does a great job of informing casual Facebook users about Facebook’s issue with death by using facts and other people’s personal experiences. In this essay, I will analyze the author’s rhetorical choices and how they address this particular audience, whether it be by the use of ethos, logos, or pathos. I will also offer insight about Facebook’s history and how the author says they have dealt with its users who are dying.…

    • 633 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Exploiting Loss

    • 811 Words
    • 4 Pages

    The Internet is an amazing thing. One can view and put out almost any type of information or material they wish. Because of that, the Internet has become a place for people to share and deal with their experiences with grief and death. This gives researchers alternate means of researching how death and grief is dealt with. However, with these new means of interaction, come new concerns. In the article Exploiting Loss?: Ethical Considerations, Boundaries, and Opportunities for the Study of Death and Grief Online by Heather J. Carmack and Jocelyn M. DeGroot Ph.D, Carmack and DeGroot draw attention on numerous ethical issues that researchers face in the study of grief and death and dying on the internet. The issues Carmack and DeGroot address…

    • 811 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Also, Digital Footprints not only keep up with you do but everything you do on the internet never goes away. Once it’s in the internet…

    • 946 Words
    • 4 Pages
    Good Essays

Related Topics