Monday, April 29, 2019
The Value of Digital Privacy in an Information Technology Age Essay
The Value of Digital Privacy in an Information engine room Age - Essay Exampleanother(prenominal) engine room is the RFID tags. This stands for radio frequency identification and it involves the use of electronic magnets for purposes of tracking and identification of objects attached to the RFID tags. These tags have the capability of storing education in an electronic manner, and these data are read by using magnetic fields. A researcher chamberpot access the data of an soul without his or her knowledge by use of these RFID tags (Keizer, 2012). This is because the tags can be implanted within individuals, and this increases the possibility of education private information of an individual without their consent. The use of these tags has raised privacy concerns in United States of America. Having knowledge of such technology has its advantages and disadvantages. One advantage that the public has if they know this kind of information is that they will take measures of protect their privacy. For instance, people wont just provide their DNA details, names and addresses without confirming on wherefore this persona of information is required. This is in respect to the use of biometric technology in conducting a search for an individual. Another advantage is that the public would seek various measures of complaining to the authorities in case their privacy is get arounded. For instances, marketers can use the cloud computing technology to identify the consumption habits of individuals, and thereafter develop marketing programs that meditate their consumption habits. This usu all(prenominal)y involves perusing through the personal information of individuals without their consent. This practice is unethical, and needs to be condemned (Smith,... fit in to the reportthe cloud computing technology involves a subscription based consumption of technological services. In this type of technology, the software and hardware systems of a computer system are deliver ed through the internet. This type of computer technology involves the design of a cloud that can enable a computer user to focus on what he or she is looking for. On this basis, the user does not need to worry about where the information he or she is looking for is stored.As the paper discusses according to the act, the federal government has the authority to monitor all the computer system used by suspected terrorists, and compels all banking institutions, telecom organization, and libraries to provide tangible information regarding a suspected terrorist. This should be done without their knowledge and consent. In my own opinion, this law is uncalled for, and a breach to the constitutional rights of individuals contained in the due process clause of the 14th amendment, which protects the right of privacy. This law also breaks the provender contained in the fourth amendment of the American constitution, which guarantees the right of an individual against illegal searches and seizu re. For instance, in Katz vs. United States, the Supreme hail denoted that the use of technology in eavesdropping on an individuals private communication amounts to an illegal search, and it is consequently unconstitutional.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.