Invasion of Personal Privacy

1103 Words3 Pages

Technology and the internet are fluid, constantly changing shapes and sizes as time goes on. Comparatively, society has come a very long way with both. Technology and the internet have helped to connect people both near and far, find cures for diseases, have aided in new ways to educate, been a form of entertainment to all that have the leisure of using it, and have both provided an unimaginable amount of jobs. Technology and the internet have helped to mold society into what it is today. Take a look around, it’s everywhere and its users are avid. Technology and the internet play a huge role in the everyday lives of so many. As with all good things, there are also cons. While many people enjoy the everyday use of their technologies with things like cameras, social media, text messaging, and online shopping, they also put themselves at an elevated risk to be invaded. Privacy is a right that everyone has to their personal information. It is vital to protect personal information, especially with so many invasions through technology and the internet, and with this vitality, many steps are being taken to help guard this private information.
What exactly is personal privacy? “Privacy can be defined as an individual condition of life characterized by exclusion from publicity,” (Neetling et al., 1996, p. 36). But with an exceptionally open society that we have today, it is almost taboo to declare privacy and have that remain. Fortunately, privacy is protected by law as it is human right. “As such privacy could be regarded as a natural right which provides the foundation for the legal right. The right to privacy is therefore protected under private law.” (Britz ch. 3) With that being said, it seems that personal privacy is of great import...

... middle of paper ...

...o the Information
Profession. Retrieved from http://web.simmons.edu/~chen/nit/NIT’96/96-025-Britz.hmtl
Murphy, Dylan. 19 May 2013. The Department of Homeland Security (DHS) Routinely Spies upon and Disrupts “occupy” Protests. Retrieved from http://www.globalresearch.ca/the-department-of-homeland-security-dhs-routinely-spes-upon-and-disrupts-occupy-protests/5335715
Mould, John. (2010) ATA Magazine, 91(1), 12-16. Retrieved from http://search.proquest.com/docview/761339749?accountid=40611 Parker, Ian. 6 February 2012. The Story of Suicide. Retrieved from http://www.newyorker.com/reporting/2012/02/06/120206fa_fact_parker Wade, A. E. (2010) A NEW AGE OF PRIVACY PROTECTION: A Proposal for an International
Personal Data Privacy Treaty. The George Washington International Law Review, 42(3), 659-685. Retrieved from http://search.proquest.com/docview/895062538?accountid=40611

More about Invasion of Personal Privacy

Open Document