The transfer and preservation of Information is a major part of the digital age. People try to control their flow of information and the amount of information websites,organisations and even the government has on them. And even with the various ways of protecting information, there are still issues of privacy, freedom of information and the conflict between the public and private domains on who really owns or governs these information.
This essay focuses on information governance, information privacy, and freedom of information. There would be a focus on information governance, its purpose and a description of the ends in which information governance can take us as a society.
This essay will start off by explaining the terms information, governance, and information governance. It will then take a look at the history of information privacy, role that technology has played in the changes of our conceptions of both the private and public sectors use of information. An in-depth look into privacy would take place,and the rights of privacy given to citizens will be discussed. The essay goes further to examine why people value their privacy and how privacy can be protected with different illustrations being used.
Freedom of information will be discussed right after information privacy, it will be well defined and its importance will be stated out, Data breaches of both the public and private sectors will be discussed, how freedom of information can be achieved will be stated, then the essay will concluded by giving recommendations and state to what ends information governance leads.
The definition of the term Information varies, and is said to have no real value, because what one person terms as useful maybe be rendered useles...
... middle of paper ...
...id=3738032&uid=2134&uid=2&uid=70&uid=4&sid=21103570715351 [Accessed: 28 Mar 2014].
Richards, N. (2013). The Dangers of Surveillance. Harvard Law Review, 126 Retrieved from: http://harvardlawreview.org/2013/05/the-dangers-of-surveillance/ [Accessed: 2 Apr 2014].
Smith, H. (2004) Information privacy and its management. MIS Quarterly Executive, 3, 201–213.
Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17(5), 559-596.
Vialumina. (2011). Why information Governance?. [online] Retrieved from: http://mimage.opentext.com/alt_content/binary/pdf/ViaLumina-Information-Governance-Executive-Brief-Why-Information-Governance.pdf [Accessed: 19 Mar 2014].
Whitley, E. A. (2013). Towards Effective, Consent Based Control of Personal Data. Digital Enlightenment Yearbook 2013: The Value of Personal Data, 165.
Taylor, James Stacey. "In Praise of Big Brother: Why We Should Learn to Stop Worrying and Love Government Surveillance." Public Affairs Quarterly July 2005: 227-246.
Richards, Neil M. "The Dangers Of Surveillance." Harvard Law Review 126.7 (2013): 1934-1965. Academic Search Elite. Web. 8 Feb. 2014.
The personal connection Americans have with their phones, tablets, and computers; and the rising popularity of online shopping and social websites due to the massive influence the social media has on Americans, it is clear why this generation is called the Information Age, also known as Digital Age. With the Internet being a huge part of our lives, more and more personal data is being made available, because of our ever-increasing dependence and use of the Internet on our phones, tablets, and computers. Some corporations such as Google, Amazon, and Facebook; governments, and other third parties have been tracking our internet use and acquiring data in order to provide personalized services and advertisements for consumers. Many American such as Nicholas Carr who wrote the article “Tracking Is an Assault on Liberty, With Real Dangers,” Anil Dagar who wrote the article “Internet, Economy and Privacy,” and Grace Nasri who wrote the article “Why Consumers are Increasingly Willing to Trade Data for Personalization,” believe that the continuing loss of personal privacy may lead us as a society to devalue the concept of privacy and see privacy as outdated and unimportant. Privacy is dead and corporations, governments, and third parties murdered it for their personal gain not for the interest of the public as they claim. There are more disadvantages than advantages on letting corporations, governments, and third parties track and acquire data to personalized services and advertisements for us.
Privacy postulates the reservation of a private space for the individual, described as the right to be let alone. The concept is founded on the autonomy of the individual. The ability of an individual to make choices lies at the core of the human personality. The Supreme Court protected the right to privacy of prostitute. The autonomy of the individual is associated over matters which can be kept private. These are concerns over which there is a legitimate expectation of privacy. Privacy has both a normative and descriptive function. At a normative level privacy sub-serves those eternal values upon which the guarantees of life, liberty and freedom are founded. At a descriptive level, privacy postulates a bundle of entitlements and interests
have suggested that until powerful information technologies were applied to the collection and analysis of information about people, there was no general and systematic threat to privacy in public. Privacy, as such, was well-enough protected by a combination of conscious and intentional efforts (including the promulgation of law and moral norms) abetted by inefficiency. It is not surprising, therefore, that theories were not shaped in response to the issue of privacy in public; the issue did not yet exist. (17)
The word “privacy” did not grow up with us throughout history, as it was already a cultural concept by our founding fathers. This term was later solidified in the nineteenth century, when the term “privacy” became a legal lexicon as Louis Brandeis (1890), former Supreme Court justice, wrote in a law review article, that, “privacy was the right to be let alone.” As previously mentioned in the introduction, the Supreme Court is the final authority on all issues between Privacy and Security. We started with the concept of our fore fathers that privacy was an agreed upon concept that became written into our legal vernacular. It is being proven that government access to individual information can intimidate the privacy that is at the very center of the association between the government and the population. The moral in...
Solove, Daniel J. “5 Myths about Privacy” Washington Post: B3. Jun 16 2013. SIRS. Web. 10
Technology has developed in leaps and bounds over the past few decades. The case is that the law always has difficulty keeping pace with new issues and technology and the few laws that are enacted are usually very general and obsucre. The main topic of this paper is to address the effect of technology on privacy in the workplace. We have to have an understanding of privacy before trying to protect it. Based on the Gift of Fire, privacy has three pieces: freedom from intrusion, control of information about one's self, and freedom from surveillance.1 People's rights has always been protected by the constitution such as the Fourth Amendment, which protects people from "unreasonable searches and seizures". As said by Eric Hughes, "Privacy is the power to selectively reveal oneself to the world."2 As written by Supreme Court Justice Louis Brandeis in 1928 is the right most valued by the American people was "the right to be left alone."3
LeRoux, Yves. "Privacy concerns in the digital world." 03 Oct 2013. Computer Weekly. 24 April 2014 .
In deliberation of the topic of the use of individual information, the moral issue of importance is whether public or private sector entities have the right to create individual profiles of consumers and their obligation in protecting the consumer's privacy is in question. The exponential growth of the information age in particular the personal computer has created a situation where economies of the public and private sector are at odds with the privacy of the consumer or citizen. Should data collection agencies use or sell information collected about individuals?
[4] H. Nissenbaum. Toward an Approach to Privacy in Public: Challenges of Information Technology. Ethics & Behavior, 7(3): 207-220, 1997.
The privacy of the individual is the most important right. Without privacy, the democratic system that we know would not exist. Privacy is one of the fundamental values on which our country was founded. There are exceptions to privacy rights that are created by the need for defense and security.
The Internet and computer age has enabled people to work faster and more efficiently, with practically unlimited access to information. As much as the technology boom has made our lives easier, as with most good inventions, there is some negativity that must be dealt with. The dissemination of information on the global network has put personal privacy at risk. Obviously, we are not going to give up new technologies that enrich human life for the sake of maintaining our privacy; however, measures must be taken to keep the public, or government, from abusing the Internet and computer databases for malevolent reasons. Every country in the world has its own policies on human rights to personal privacy and will deal with the threat the Internet has presented. In this paper, we will explore Swedish laws and regulations and its viewpoint on safekeeping privacy in this Internet age.
The consistent use of information and communication technology (ICT) in modern world enables us for countless opportunities for individuals, institutions, business organisations and scientists, but it also raises difficult ethical and legal problems. In particular, ICT helped to make societies more complex and thus even harder to understand. The use of ICT has led to changes in concepts: ownership, buying and selling, right to possession, theft, justice in the distribution of resources and access rights. During the nineties, the internet has grown into all business segments resulting in a large number of questions running. It has been noted that during those time period there has been merging of computers, telecommunications, and media which is further emphasized by the emergence of new issues and strengthening old ones.
Information from across the world is stored on computer systems-most of which are connected, networked, to other computer systems through the Internet. In the ideal situation, this interconnection of information enables others from outside a specific computer network to access that specific computer network and its information. This has created a world in which information is extremely important and extremely easy to access, which in turn has created a government, business, and personal society that is dependant on and successful from the networked information.