Preview

Internet Privacy - Essay

Satisfactory Essays
Open Document
Open Document
354 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Privacy - Essay
Opinion on Internet Privacy

When thinking of internet security, my expectations change depending on where I am accessing the internet from. When I am accessing the web from home I feel some sort of safety because I have lots of different protection on my home computers as well as a secured network site key that cannot be accessed by my neighbors or anyone else unless my password is given to them by me. Although I have all these things that does not mean that hackers cannot get into my computer system so I am still very careful as to which sites I enter information onto.

At work, I expect them to have some of the best internet security because if ever there is a problem they will have so much more too loose than an average person. Most businesses have things such as financial records and information that should not be accessed by outsiders. With there being a lot of business and organizations that compete they should be careful to make sure their private information cannot be stolen or viewed by anyone other than the people that the information is intended for.

In a public setting, I will use my computer but I do understand that when doing so some of my information may be seen or accessed by others. Because of this, I am very careful of the sites that I visit. I do not enter personal information like Credit Card numbers, social security numbers, addresses or any information that I would not want to be in the eyes or hands of a stranger or a computer hacker. In my opinion, I would say that is it not legal or ethical to use your neighbor’s internet signal without their permission. Being a person who pays for internet service, I think that it is unfair to have someone else use your internet service at their convenience and not have to pay anything at all. Also because it is still unclear what information may be able to be seen or accessed by others I would say it is also unsafe to do

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Implications differ form company to company. But many of the companies monitor their employees to make sure that they are not sharing company related information with people out of the company. Some companies monitors to make sure that employees are not using companies’ website during work hours.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    One of the security options that we are going to use is Privacy or confidentiality. This will keep all information secret from all people unless you are authorized to see it. This will help with employee’s not finding things that they should not see like social security numbers, address, and sensitive documents for the company and so on. Having this as a security options is great. I would implement this on all of the networks that I would manage.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    As a result of recent lawsuits against many organizations, companies have developed a policy on proper email practices on company computers. No longer is your personal email regarded as private when accessed on a company's computer. Companies, in order to decrease lawsuits and increase productivity, have purchased email monitoring software to track email usage during work hours. Therefore, with the onslaught of email monitoring, is a private email really private?…

    • 377 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    I believe that they should monitor employee email and internet usage. By allowing the company to monitor such actions it will stop individuals wasting valuable company time. This also allows for restrictions of site access if one is exploring sites they should not be. It is important to watch to be sure that important information about the company is not leaked out to the public. Actions of their employees effect company whether online or not online. Although, the internet makes it easier to incidentally bring hardship to company in which one works the actions can cause lawsuits against the company.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Dirt Bike

    • 1064 Words
    • 5 Pages

    There is also the use of e-mail. There are many applications that can help with the privacy of a company. They also can be monitored to see what is going in and out. This will help the company in case anything illegal happens the company will be protected. It will also save the company money because the employees will not be able to waste time. They will have to do what they are supposed to do. They applications include. Outlook, Lotus note, and MSN.…

    • 1064 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    One security options that can be used is the Privacy or confidentiality. Using this will help keep information confidently from others or outsiders unless you are authorized. This will keep employees from finding things such as SSN (social security numbers), personal home address, and/or documents that may be considered sensitive. Having this as a security option is an all-around good idea. I would implement this on all of the networks/domains that I would manage.…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    Although major part of security issues are from inside, Internet does take external threats. When users connect the Internet, the web browsers might contain breaches that permit scripts to access the system and may cause damages potentially. In addition, when information is transmitting through the public network, the transmission might be captured by someone else. This is known as man-in-the middle attack. (Dean, 2009) Another potential common risk associated with Internet is called reconnaissance threats. Attackers could detect the reachable networks, devices and services through the Internet connection, or even draw an entire network map. Furthermore, DoS attack is another risk users could encounter when using Internet. Hackers attempts to over-whelm the system in order to make it shut down. (Oppenheimer, 2011)…

    • 572 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    When it comes to protecting and saving lives of the American people, private invasion used in order to locate and capture potential terrorist should be unlimited. The 911 attack has provided active proof to the American peoples of the damage that terrorist groups can impose on our society. Therefore, invading the privacy of individuals may prevent future terrorist attacks.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Net neutrality, which affects you every day, is about to be ended—and we need to save it.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Essay On Internet Privacy

    • 611 Words
    • 3 Pages

    With that being said, it is extremely crucial to protect personal information on the internet.…

    • 611 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    As United States citizens, we all have to worry about personal privacy and national security. My name is Caitlin Bickford and I am here today to discuss this topic with you because I am concerned that our nation's people have lost sight of the bigger picture, the privacy of not them, but of the country as a whole. I believe that privacy of the individual should never interfere with the persuit of national security.…

    • 74 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    There is a notion on the rise which is the stealing of WIFI and using it to access internet for several activities. However, then the point up rises is it ethical or unethical. First, tell it is unethical and illegal, to steal the neighbor 's WIFI network. However, if the case is that you want to learn how the systems can find more information on WIFI and avoid the WIFI from being stolen by your neighbors one have to put passwords and visibility options. Moreover, avoiding the unethical notions are very hard and creating the strategy that focuses upon the problems is more sort of a challenge, but the stealing of WIFI is an unethical issue which is seem to be increasing (Rowell, 2006).…

    • 648 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Imagine a place where you had access to any information you needed, at any time. Some might say that this place may not exist, but others could say that this defines the Internet. The Internet gives you access to all sorts of wonderful knowledge and other content, but with good comes some bad. Countries throughout the world have begun, or are trying to begin, censoring the Internet of these bad things. Many countries in the Middle East and North African States have taken to filtering entire websites on religious grounds (Dobby) and just last year, several bills, such as SOPA (Stop Online Piracy Act) and Protect IP (Prevent Real Online Threats to Economic Creativity and Theft of Intellectual Property act) proposed shutting down “rogue” websites that contained copyrighted property, but Internet censorship walks the fine line between protecting the public and preventing free speech. The problem with censorship is that once it starts, there may be no stopping it, and would violate the First Amendment, freedom of speech.…

    • 659 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Information produced in the workplace, during work hours should never be viewed as personal. In recent court ruling, a majority of cases where found in favor of the employer due to the employee having no rights to the expectations of privacy (MontanÞa, May/June 2005). The professional responsibilities…

    • 1531 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Assignment 3 answers

    • 2408 Words
    • 9 Pages

    Personal Security is a prime concern for most employers. By ensuring personal security is acute, other aspects of security for the asset will be enhanced. For instance, my current employer can and does, monitor both my work emails and blackberry, this was clearly stated in my contract and is a basic security enhancement.…

    • 2408 Words
    • 9 Pages
    Powerful Essays