Computer Privacy

Length: 368 words (1.1 double-spaced pages)
Rating: Excellent
Open Document
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Text Preview

More ↓

Continue reading...

Open Document

Today a profound shift in the privacy equation is under way. Technology brings enormous efficiency to the collection, sorting and distribution of personal information. This efficiency has revolutionized countless organizations but it has also increased opportunities for snooping. The ability of computers to sift though personal information may make much of your life an open book, unless privacy policies are implemented.
In many countries a large number of records are public, available to anyone. In the United States, for example, public records typically include voter registration lists, Department of Motor Vehicle records, federal tax liens, arrest and conviction records, court proceedings and judgments, bankruptcy and probate records, and lists of births, deaths and marriage licenses. Additional information is available in commercial directories and databases, including phone books, city directories, professional directories and newspaper databases. Many records that we think are confidential today such as credit reports, income-tax records, social security records, loan applications, bank account records, credit card records, Telephone Company records, military records and medical records may not be confidential tomorrow. If a curious neighbor wants to know something about you, it takes some expense and effort but with the rise of computer databases and the Internet, it's getting easier to correlate information and develop a profile of somebody.
Already, some companies are beginning to offer services that collect personal information and sell it on CD-ROMs or online. Take police reports, for example, they are public. The Internet will make this kind of information extraordinarily public, unless the rules change.
The way to protect privacy in this age of information technology is to develop respect for the privacy of personal information. We shouldn't ban the collection of legitimate information or deny organizations the benefit of databases. Sharing information can be appropriate in some commercial settings. Many consumers appreciate having products and services tailored to their individual needs or profiles, as long as their privacy isn't unduly compromised. But to protect privacy, access should be denied to people who don't have a legitimate reason for the information they seek. A nosy neighbor shouldn't be able to check your credit rating.

How to Cite this Page

MLA Citation:
"Computer Privacy." 24 Sep 2017
Title Length Color Rating  
Privacy and Ethical issues with Google Glass Essay - ... For example, an animated advertisement on a static web page may increase fixation since the motion will grab the user’s attention throughout the search process. Fixation location involves the part of the visual range that the studied person fixates on. Commonly, the areas that eyes fixate on are the most important due to experience, curiosity, shock, and significance. It has been more than a century that psychologist use eye tracking for psychoanalysis. Complex psychological profiles can be created from people by using eye movement analyzing....   [tags: wearable computer, privacy, secrecy]
:: 8 Works Cited
1733 words
(5 pages)
Term Papers [preview]
Essay about Is Personal Privacy Dead? - Have you ever felt violated. Like somebody knew too much about you that they didn’t need to know. Or have you ever felt like someone was watching you. As if somebody knew your every move. Most people don’t normally feel this way; most people feel safe in their general surroundings. Although with the constant use of technology in today’s era, it’s time to ask: Should we, as American citizens, feel as safe as we do. Personal privacy is such a simple phrase for such a complex idea. The definition given in the Merriam-Webster’s dictionary of privacy is, “the quality or state of being apart from company or observation.” And “personal” meaning, “Relating to the person or body.” In other words: set...   [tags: technology, privacy, hacking, computer] 1024 words
(2.9 pages)
Strong Essays [preview]
Computer Matching Versus Privacy Essay - Computer Matching Versus Privacy Introduction With the advent of new computer technologies, the ease with which new information can be discovered from aggregating data sources is astounding. This technique is called computer matching. When it comes to doing research this can be an incredible source of new ideas and correlations between sets of data. However, this same technique can be applied to information about individual people. Suddenly, by pulling together disparate sources of data, private information can be learned about an individual without their knowledge or consent....   [tags: Private Personal Information Essays]
:: 5 Works Cited
2152 words
(6.1 pages)
Strong Essays [preview]
HIPAA: Privacy and Security Rules The Computer, the Nurse and You Essay - HIPAA: Privacy and Security Rules The Computer, the Nurse and You Introduction How would you like to keep track of your personal health information record in your computer at home. The electronic data exchange was one of the goals of the government to improve the delivery and competence of the U.S. healthcare system. To achieve this plan, the U.S. Congress passed a regulation that will direct its implementation. The Department of Health and Human Services is the branch of the government that was assigned to oversee the HIPAA rules....   [tags: Medical Research ]
:: 11 Works Cited
1452 words
(4.1 pages)
Powerful Essays [preview]
Mythinformation from The Whale and the Reactor: A Search for Limits in an Age of High Technology by Langdon Winner - ... “Is this a movement truly committed to social justice. Does it seek to uphold a valid ideal of human freedom. Does it aspire to a system of democratic rule?” (Page - 99). As we read in the first chapter of this book - just like Socrates says “An unexamined life is not worth living” (Page-5), Dr. Winner argues that there is a need for us to understand the philosophical study of technology. Unfortunately no one, even the creators of these technologies ever wonder what impacts it may create in the long-run....   [tags: computer revolution, privacy, ideology]
:: 1 Works Cited
581 words
(1.7 pages)
Research Papers [preview]
Essay on Privacy Concerns in Information Computer Technology - Information Computer Technology has already played an important role in people’s daily lives. It is widely used in information gathering, communication and mutual operation. Modern people have been benefited from more efficient information flow, less cost and faster communication. However, every coin has both sides. ICT also has brought people’s lives some concerning issues at the same time along with advantages. One of the concerning issues is the personal privacy. In internet age, privacy, as defined by Alan Westin in Privacy and Freedom (1970) is “The claim of individuals, groups or institutions to determine for themselves when, how and to what extent information about them is communicate...   [tags: Technology] 1042 words
(3 pages)
Strong Essays [preview]
The Differences in Laws and Privacy in the United States and the European Union in Computer Security - ... This could be physically or a virtually to gain access to an unauthorized system. Access for fraudulent purposes, this would be to uses a computer system or computer network to falsely gain goods or services. Data theft if you access, copy, damage or alter information that you are not authorized or have permission to uses. And finally; it is a crime to make, possess or transmit any child pornography. This also addresses transmitting harmful material to children. These are what defines what we consider a cybercrime in the Unites States and who we go after....   [tags: hacking, identity theft, fraud] 3070 words
(8.8 pages)
Research Papers [preview]
Who Should Protect Our Data? Essay - ... Our online habits should be properly monitored. We should add a layer of safety from our side to save our precious data. To safeguard against these potential risks of data encroachment the users should apply some precautions. J. Wilson has listed some possible precautions for a user to keep a user safe on the internet. The list suggests that a user should ban sites or functionalities if necessary, educate users, open up, keep control, protect users’ identities, and stay informed (Turner 9). These measures applied from the user’s side provides an additional layer of security on the internet....   [tags: internet, personal privacy, computer engineering] 1351 words
(3.9 pages)
Research Papers [preview]
Edward Snowden: There is no Online Privacy in this Technological Era Essay - ... On release, they can request information on the person who testified against them, and harass them. Some companies sell information to companies who offer specific services. An article titled Privacy Tools: Opting Out from Data Brokers written by Julia Angwin spills the beans on companies using personal data to target groups of people. Angwin speaks on how data brokers sell mailing lists to other companies. “[P]rivacy expert Pam Dixon testified in Congress that she had found data brokers selling lists with titles such as “Rape Sufferers” and “Erectile Dysfunction sufferers.”” (Angwin)....   [tags: nsa, computer networks, information]
:: 5 Works Cited
935 words
(2.7 pages)
Strong Essays [preview]
Essay The Problems that Come with the Gigantic Leaps in Computer Technolgy - ... Early computers had numerous safety hazards. Many consumers were not aware of how necessary it was to clean and manage their personal computer. Dust and hair would get sucked into the computer’s front fan and would stick to the hardware components. This would cause the components to overheat and start a fire or just fry the computer’s motherboard. Another issue is viruses. Whether someone only used their computer either for research, or for ordering items with their credit or debit card, viruses were indiscriminate....   [tags: safety and privacy issues] 572 words
(1.6 pages)
Research Papers [preview]

Related Searches

Society must define the appropriate purposes for specific kinds of information and fashion ways to confine the use of the information to those purposes. It won't be easy, but it is possible. Individuals and organizations can do their part by making the protection of privacy an important objective. As people wake up to how much information about them is stored on computers and how it can be used, the issue of privacy will command more and more the attention from the powers that be.

Return to