Premium Essay

Should Individuals Be Allowed Privacy When Using the Internet

In:

Submitted By JesseJohnson2006
Words 1096
Pages 5
Should individuals be allowed privacy when using the internet?

Jesse Johnson
GE 117
Sept Quarter 2012

Privacy is a term that we have come to understand based on the culture in which we are raised. According to Merriam-Webster the definition of privacy is “the quality or state of being apart from company or observation” ("Merriam-webster.com"). Utilizing privacy within technology is a relatively modern concept Prior to the rise of democracy privacy merely denoted a man's right to be left alone, free from physical harm. The internet, also known to all as the World Wide Web, is a gateway to a vast collection of resources or public and private information. Whether, it’s for educational or recreational use the average American now utilizes the internet just as much or more than their television set. The question is, Should browsing the web be regulated by each country that provides or is it infringing on internet users privacy?
Google CEO and Chairman Eric Schmidt once said, “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it (online) in the first place.” (Hash) Most of us have brought into our lives Facebook , Twitter, MySpace, Flickr and LinkedIn as an easy means of keeping in touch with friends and family and of making business contacts and finding others with shared interests. What we fail to cogitate on is how our perception of making our private lives public reverses those hard-won rights to decide what to make public and what to keep private, as the more we happily put into full public view the less we innately reserve the right to keep private. Undoubtedly, nobody would dispute the fact that the internet have been anything but a revolutionary invention that

Similar Documents

Premium Essay

Employee Privacy Act Report

...Week Five – Employee Privacy Act Report Jessica Jackson COM/285 Timothy Smith June 20, 2012 Employee Privacy Report In this report I will be discussing the current privacy policies at Abacus Technology Corporation. I will be going over the policies that Abacus Technology has in place regarding e-mail use and internet use. As well as reviewing the current laws that the State of Maryland has regarding employee e-mail and internet privacy. I will also be discussing why companies implement e-mail and internet use policies. Lastly, I will be covering what assumptions employees might make about their privacy at work and how the policies that are in place can affect an employee’s privacy at work. At Abacus Technology electronic communication such as e-mail and internet use is encouraged, however, electronic communications are considered company property and their purpose is only to be used for company business. The policy on electronic communication relates to all electronic media and services, which are accessed using company computer equipment, while on company premises, or by company-paid access methods, and used in a manner which identifies the individual with the company. Employees are not supposed to use electronic communications for excessive personal use, soliciting non-company business, and conducting activities that are illegal or contrary to the firm’s best interest. Individuals are also asked not to access criminal websites or transmit...

Words: 1107 - Pages: 5

Premium Essay

Enployee Privacy Report

...want to have a bit of privacy and not have their every sneeze or bathroom break monitored. This is the conflict of workplace monitoring. Technologies today allow employers to monitor almost every aspect of their employee’s job including the time he, or she, arrive to the office, telephone use, Internet use, computer terminals, and voicemail. This kind of monitoring is virtually unregulated, therefore, unless it is stated in the company policy, an employer has the right to listen, watch, and read most an employees workplace communications. The e-mail policy at Dell Services Federal Government (DSFG) is lax, whereas, the company would like the majority of communication to be work-related; employees are allowed to communicate with others for personal use as well. This policy is covered in our handbook, it simply states that if one wishes to keep information private do not store or transmit information on company systems. Private e-mail accounts have been blocked from our server so use of personal e-mail is not permitted. Similar to the e-mail policy, the company wants the internet to be used majority for work-related business. However, short personal business such as paying a bill, making a purchase, locating something, or other small personal business is permitted. During the employees lunch hours, all are allowed to surf the net and visit networking sites such as Facebook, Myspace, and Twitter. There are a few sites blocked that employees are not allowed to access such as Xbox...

Words: 1111 - Pages: 5

Premium Essay

E-Mail and Internet Policy

...E-Mail and Internet Policy Darryn Cooper COM/285 Angie Robert August 24, 2011 E-Mail and Internet Policy The integrity of a business relies on communication, both using internal and external communications. E-mails and the internet are two ways that businesses communicate with shareholders, employees and their customers. In today’s global market, the use of computer guidelines and policies have been implemented to ensure that all employees adhere to those policies. Communication via the internet and use of emails should be carefully considered when using it. This essay will discuss why e-mail and internet policies have been put in place. *1Congress passed the Privacy Act of 1974, as amended, (Privacy Act) to safeguard records of information pertaining to individuals that Federal agencies or components own and maintain. The Department of Defense (DoD) policy regarding e-mail and internet use is very strict. All employees who are employed by the DoD are given a Common Access Card (CAC). The CAC is inserted into the computer and requires that you enter a password. At no time should you leave your CAC in the computer when an individual leaves his or her computer. Ashmore ( 2009), " Many federal laws affect employer regulation of email and internet uses, such as the Federal Wiretap Act; the Electronic Communications Privacy Act; and the Stored Communications Act. In addition, state...

Words: 941 - Pages: 4

Free Essay

Internet Privacy

...subject of internet privacy is a very well-known and explosive subject. Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information (PII) and non-PII information such as a site visitor's behavior on a website. PII refers to any information that can be used to identify an individual. For example, age and physical address alone could identify who an individual is without explicitly disclosing their name, as these two factors are unique enough to typically identify a specific person. People with only a casual concern for Internet privacy need not achieve total anonymity. Internet users may protect their privacy through controlled disclosure of personal information. The revelation of IP addresses, non-personally-identifiable profiling, and similar information might become acceptable trade-offs for the convenience that users could otherwise lose using the workarounds needed to suppress such details rigorously. On the other hand, some people desire much stronger privacy. In that case, they may try to achieve Internet anonymity to ensure privacy — use of the Internet without giving...

Words: 3257 - Pages: 14

Free Essay

Should Employers Be Allowed to Monitor Personal Commuication of Its Employees?

..."Should employers be allowed to monitor personal communication of its employees?"  Ellen Berkeley, Amy Davis, Shawn Molloy, Deborah O’Leary, Karey Raubenheimer BCOM 275 October 31, 2011 Professor Tom Melpolder Although organizations have monitored employees for centuries, a number of developments have greatly expanded the amount and scope of employee monitoring. For example, recent technological advances have dramatically altered the nature of work, the working environment, and employee–employer relationships. As a result, information technology has emerged as an integral part of today’s organizational infrastructure. These new technologies have the potential to improve worker efficiency and effectiveness. However, there are risks associated with any new technology including the potential for employee abuse resulting in negative consequences (Alder, Kuenzi & Schminke, 2008). Private communication such as e-mails and social media in the workplace has emerged as one of the stickiest legal issues of the electronic age” (Cappel, 1995). The debate is divided. One side believes that employers should not have full control over its employee’s personal communication. Their view is that employees should have the ability to communicate with friends and family while on breaks, as long as productivity isn’t affected. Further, they believe that employees have a privacy right and should be allowed to communicate while at work without being monitored...

Words: 1812 - Pages: 8

Premium Essay

Administrative Ethics

...Administrative Ethics As a healthcare administrator, protecting the privacy of patient information is a primary concern, and many organizations have taken additional security measure to protect their patients. With the advancement of technology follows the growing concern of ethical and legal dilemmas. There are several important issues, which are involved when it comes to an individual’s personal information and you add technology. With the Affordable Care Act just around the corner and millions of Americans scrabble to meet the deadlines to gain healthcare, raises the question are Americans information protect on the HealthCare.gov website. Americans are concerned with privacy issues and the government possible using their information. We will review an article related to privacy concerns over personal information submitted on the Obama Care website, determine what issues and the impact on population it affect most. We will explore the arguments and the facts that are used in the article to support the proposed solution. We will examine the ethical and legal issues reported, and explain the managerial responsible related to administrative issue. In addition, we will identify any proposed solutions to the allocations. As the world of technology grows with everything we need at our fingertips, from our tables, smart-phones, and laptops this leave us open to the arising challenges of legal and ethical issues. Technology has eased its way as becoming a part of American...

Words: 1139 - Pages: 5

Premium Essay

Employee Privacy Report

...Employee Privacy Report Introduction Using e-mail, the Internet, and privacy policies at an organization is partially what an employee does daily. Properly using the Internet, e-mail and privacy policies is the responsibility of each staff member. Although staff used e-mails to communicate with employees as well as research the Internet for information related to the job, one would expect for certain information to remain private; however, it does not occur like this all the time. Businesses have in place policies where they have the right to observed employees activities during job. While it is important for employees to be mindful of their companies’ policies, it is more important to know that employers have the responsibility to ensure that their employees have been properly inform and made aware of these policies. When an employer provide an employee with a copy of the companies handbooks, the handbook should address such issues as electronic communication and Internet use while on company computers. Additionally, most companies policies states, whether “internet use and communication … are considered part of the company’s business” and “such communication are not to be considered private or personal to any individual employee.” However, some company’s policy also provides, that “occasional personal use is permitted” (Gavejian). What are the e-mail use, Internet use, and privacy policies at your job? Law allows employing organizations to monitor business...

Words: 1297 - Pages: 6

Premium Essay

Effects of Media

...as making sure they are updating security features too. The lack of care for other people’s personal information it feels like in a sense, have created a few current and potentially fatal future problems for these social networking sites. Unfair and/or undefined privacy laws, the hacking of user profiles, and the lack of technological advancement used within sites by website personnel all pose threats for some social media sites now and as time progresses. The actions they choose to put in play now and over the next few weeks, months, and years will determine how successful some certain sites are and how long we can expect their media presence to play on. Privacy is a state where in an individual can have his/her information in seclusion, resulting in a selective revelation of one’s identity and information and which they choose to reveal it. Privacy can also mean “anonymity” in case any person wants to remain unidentified to all lengths. Privacy can also be related to the security aspect of an individual or information. The definitions of privacy can differ across and among different individuals and cultures. The invasion of privacy can be avoided by the issue of certain privacy laws by our government. The Internet which hosts an enormous information storage base, has...

Words: 2850 - Pages: 12

Premium Essay

Ordina

...2014 Siwar Chihi, Bas Geelen, Konstantin Kraft & Ines Garic Zuyd University of Applied Sciences 2014 Siwar Chihi, Bas Geelen, Konstantin Kraft & Ines Garic Zuyd University of Applied Sciences Table of contents 1.1 Introduction to the research 3 1.2 Problem statement 3 Current 3 Desired 4 Gap 4 1.3 Methodology 5 1.4 Justification of methods 9 Research design 9 Research method 10 Research format 10 Research technique 10 2.1 Ethics 13 Data protection U.S. banks 15 Banks cash in on big data 16 Privacy vs. Security 17 Predicting with privacy 18 Privacy selling 19 Contrast between consumers privacy expectation versus their own online behavior 20 Expectations for growth internet users 2025 20 2.2Technology 22 Online banking approaches by different banks 22 SaaS business models 23 Why cloud computing for banks? 24 Privacy Trends 2014 – privacy trends in the age of technology 25 In-memory computing 27 2.3 Legislation 30 Europe Union 30 2.4 Future 31 Out in the open 31 Future sharing of finances 32 Changing Online ignorance 34 Cyber security trends for financial services 34 2.4 Results in-depth interviews 36 3.1 Basic needs 38 3.2 Drivers of change 39 3.3 Emerging consumer expectations 41 3.4 Inspiration 43 Target 43 Innovation by other banks 44 Luth Research 44 4.1 Technology 46 4.2 Changing user behaviors 46 4.3 Inconsistency 47 4.4 Legislation 47 5.1 Value...

Words: 13422 - Pages: 54

Premium Essay

Privacy and Computer Technology

...Privacy is a valuable interest and is now threatened more than ever by technological advances. Privacy is defined as the ability to control the collection, use, and dissemination of personal information (Fast Trac Course ). At one time people could once feel confident that what others may find out about them would be treated in a way that it would probably do any harm. Information technology has been beneficial for privacy. By having access to ATMs and online banking we rarely have to present ourselves to a teller. Online shopping offers similar benefits such as being able to shop without standing in long lines and being able to compare prices and research products before purchasing. However, since so much of what we do daily is done using a computer, it can pose a serious threat to privacy. This information can then be recreated to create detailed personal profiles that could not have transpired in pre-digital days. Furthermore, this information can be distributed far, wide, and immediately without our consent or even knowledge. Judicial remedies are unlikely to produce a satisfying or sensible balance between companies’ economic prerogatives and customers’ privacy interest. New technologies that has either unconsiously adopted or resourcefully applied privacy practices will continue to threaten personal privacy. Business will have to find ways to address this uneasiness. If companies remain complacent, underestimating the degree to which privacy matters to customers, harsh...

Words: 1944 - Pages: 8

Free Essay

Management

...Employee Privacy Christa Ruiz COM/285 9/14/10 Lanny Shipley Employee Privacy When entering the workplace it can be confusing knowing what is and isn’t allowed to take place during work hours. With a job comes all sorts of rules and policies and procedures that employees are expected to follow. As an employee of a company an individual is expected to uphold the companies values and perform their duties to the best of their abilities. As technology has advanced things such as the internet and use of email have become major resources companies utilize while conducting business. In every company new employees go through a training period where they are briefed on not only how to perform their job duties but what the regulations have been put into effect on use of company property and resources. At K1speed, my current place of work, there are strict policies employees must be aware of while on the clock and management is always on top of this policies making sure they are being followed. Internet use One main concern management has always stressed was employee productivity, when productivity is low our sales numbers are low therefor management isn’t happy. Every employee receives an employee handbook when they are hired and it is their responsibility to know and understand what acceptable behavior in the workplace is. Being in sales the internet is an extremely helpful tool for researching new leads and even researching competitors to make sure our services stay on...

Words: 1087 - Pages: 5

Premium Essay

The Dalai Lama The Visible Man

...even strangers are doing. However, is this eagerness really worth jeopardizing your privacy? This technological advancement has allowed people to interact and have knowledge of what is going on around the world for the price of having no privacy. Once someone posts something online, it never gets completely deleted. In the article, “The Visible Man: Ethics in a World without Secrets,” Peter Singer emphasizes why privacy is so hard to achieve for people in this generation. Even though, technology allows people to be social, there...

Words: 1014 - Pages: 5

Free Essay

Online Privacy: America's New Culture

...Unit 7: Privacy Case Study Zaheera Hakeem MT-459-01 Professor Caldarola March 19th, 2013. Kaplan University A big part of marketing is building a consumer profile: finding out exactly what a person likes and dislikes and offering them goods and services based on this information. While using the internet, one does not have to fill out a questionnaire or answer a survey online for companies to build your profile. Online profiling has truly risen to the occasion now by constantly monitoring every user browsing history. Every single search you make, every link you click on and even the emails you write are used unscrupulously for marketing (Lohr, n.d.). It is even common for search results one receives after searching from a Mac to differ from the results one receives using a PC. Naturally, no one wants to be watched or tracked. It makes the hairs on the back of one’s neck stand just to think about someone knowing one’s every move. This has led to many people choosing search engines that do not track its users or use the information searched for marketing purposes. Search engines like DuckDuckGo and StartPage have gained popularity for these reasons (How To Geek, n.d.). It isn’t even a matter of hiding something, but simply that people feel like their rights are being invaded in this manner. Companies use private information to prey upon the insecurities of people. For example: if an individual makes many searches for diets, calorie counters etc. the most ads he/she would...

Words: 762 - Pages: 4

Premium Essay

Information Systems Intro

...other organizations do have an ethical responsibility when it comes to handling personal informations of individuals. For example of data sharing should be taken seriously when it comes to the organizations above. Sharing data on people is a huge topic and if it does occur it should be protected and used only for the benefit of the individual not for own gain for the business. As for security breaches I feel like individuals should be offered peace of mind, although it's possible for a breach to happen these organization should be held responsible for any lost or stolen data and fix the issue for the individual. Q2. Two companies I picked to compare privacy policies were Facebook and Instagram to compare Acceptable use policy, 
Email privacy policy
, Ethical computer use policy
, Information privacy policy, 
Social media policy
, and Workplace monitoring policy. Some of the stuff are not so surprising because we live in a time where everything we do can be traced and monitored. Facebook for example tracks all your internet movement in order to help the website become more tailored to your personal use. Whether you are logged on or off facebook keeps data on all the websites you visit. Instagram on the other hand had some policies that were surprising they are allowed to delete, alter, display, and sell any pictures that you take. This is surprising because essentially a picture is your own work of art and they are allowed to do whatever they want with it if you use their app...

Words: 745 - Pages: 3

Premium Essay

Privacy and Security at the Digital Age: the Innovation of Business in the Online World

...Privacy and security at the digital age: The innovation of Business in the online world Over the past decade the world has solely relied upon technology and its transformation throughout the years allowing for the revolution of social media to completely change how everyone communicates especially for businesses, allowing them to extend out and provide large opportunities for themselves. According to ISACA (2010), through the use of social media, it allows businesses to gain serious advantages through research and evaluation of their competition, their consumers, and the market. This enables them to not only help develop them to be on top of their issues, but using it as a tool for enhancing a better relational experience with employees and customers. For businesses to be successful with their organisations or products, social media is the key to their communication with their stakeholders through privacy and security, where it strongly impacts business to improve, but can be considered also to be a big risk where that barrier can be invaded, which can cause legal and ethical issues. Privacy and security are known to be the most important issues surrounding social media and the innovation of businesses today. Although it may be argued that users voluntarily sign away their privacy by using these social media when creating accounts and putting their personal data online, it is not clear how consent actually works in these situations (Custers et al. 2014). But overall privacy...

Words: 1757 - Pages: 8