Privacy in the Information Age Exploratory Essays Research Papers

2762 Words6 Pages

Privacy in the Information Age This is the Information Age, the age of gathering information. People are introduced to all types of information from print and broadcast media, and they themselves are the object of information collected on an increasing scale. Computers have be come so entrenched in people's lives that they have come to take computers for granted, and usually stop to complain on occasions when these machines fail them. Computers collect our paychecks, pay our bills, dispense our cash, send our orders, and save our data. While computers may only contain bits and pieces of our personal information, collectively computers know us better than many of our friends and relatives. The use of the information highway by marketing firms, law enforcement agencies, the me dia, financial and educational institutions to collect and compile personal information is making may consumer advocates and privacy experts uneasy. However, many Americans, even though concerned about privacy invasions, simply accept the loss of their p rivacy as a consequency of the Information Age and are not willing to give up the benefits and conveniences which information technology has provided them (Long 19). British novelist, George Orwell, may have been accurate in his novel, 1984, envisioning a future where citizens are constantly monitored, but he never imagined how or to what degree this would be done. Today, a citizen's personal informatio n is everywhere: processed, manipulated, stored, and sold. In the last 10 years, data collection has escalated (Mossberg B1). There is nothing that doesn't create a pool of data that can be used in creative ways. Computers can collect personal data t o find patterns that reveal a citizen's habits, preferences, and personality. What is particularly surprising is the extent in current years to which this personal data about citizens can be obtained and made available to many interested parties. The is sue, therefore, affects everyone. Privacy and the consumer, privacy and the workplace, and privacy and medical records in the Information Age are all issues of privacy that people must deal with today. In the 1990's, the Internet has virtually changed the lifestyle of the consumer. One-to-one marketing and advertising has become very popular on the Internet, and the personal service it gives a consumer can save him time and effort. A growing nu mber of people, including children, are using digital networks for all kinds of personal transactions, exposing much more of themselves, via E-mail or chat-lines or even Web sites, by completing forms filled with personal data in order to get the service they need. For example, the DoubleClick Netowrk, an ad agency, is very popular with consumers, especially the young. If a consumer clicks onto one of its many Web Sites, like "The Dilbert Zone," the DoubleClick Network records into its private database whatever information it can get about its new shopper: the zip code, area code, business address, even the type of computer the consumer is using. At the same time, DoubleClick can also start collecting information about action the consumer ta kes online (Is 62). For example, if I am a student who likes baseball, I might start seeing on-line ads and offers, receiving e-mail solicitations for the newest state-of -the -art baseball equipment. All I have to do is take advantage of this easy and convenient way to shop, is to fill out a detailed personal questionnaire about myself, so that DoubleClick can target through the Internet. This is customized service for me, the consumer, so I fill out the information which will include my name, address , credit card number, hobbies and interests. Automatically, I have results, as online ads for goods and services, accompanied by order forms, appear on my screen. There is nothing wrong with such one-to-one marketing, and consumers may want to be on the receiving end. But once a consumer puts information about himself on the Web, the threat exists for an invasion of privacy. Often the consumer is not aware that his privacy is being invaded as this personal information is given away, or sold to, other companies. For example, Cybergold, a new and popular on-line marketing company, will continue to make this personal data on the consumer available to more co mpanies on the digital network (Mossberg B1). As the consumer continues to take advantage of these companies; goods and services offered via the Internet, and, as he fills out more questionnaires for them, further information is collected about him in th e database. His credit file, work history, health reports, bank balances, family statistics, and personal lifestyles may now be available. Soon, this bank of information expands the capability of checking up on a consumer's background which becomes publ ic information to anyone, reputable or not, on the Internet. Thus, for the convenience of shopping on-line, the consumer is threatened by the loss of personal privacy. On June 4, 1996, the Federal Trade Commission's Bureau of Consumer Protection sponsor ed a public workshop in Washington called "Consumer Privacy in the Global Information Infrastructure." This government workshop addressed the issue of the emerging on-line marketplace and the various ways that personal data could be protected, allowing consumers to exercise choice about how their personal information could be used (Is 6). The workplace in the Information Age has taken on a new look, especially in the area of high-tech advances. As information technology expands, so does the productivity of businesses. The advanced technology has also allowed employers to monitor t heir employees for "good business." For employers in the workplace, electronic monitoring is one way they can protect their company's interests and prevent employees from taking advantage of them. Companies can monitor for quality control, wor kplace safety, and health care cost containment using sophisticated technology. Dan Yager, general counsel of the Labor Policy Association, a lobbying group that represents business interests, states "To some extent, legitimate electronic monitoring offers an opportunity to detect people whose workplace behavior indicates a serious problem. It is appropriate when it is done to protect work that affects the success or failure of business (Clavin 82)." In the workplace, employers can continue to monitor workers with relatively few restrictions. One form of electronic monitoring, done by computer, may include searches of employee computer files, voicemail, E-mail, and other networking communicati ons. It is estimated that more than 60 million workers currently correspond via E-mail, sending approximately two billion messages every month (Posch 55). A recent case occurred in the Nissan Motor Corporation in Southern California where two employee t rainers were coordinating their efforts by keeping in touch via E-mail. At time, their messages contained negative remarks about upper management. They did not realize that their boss was monitoring their E-mail remarks, until they were called in and re primanded. The two women sued Nissan for invasion of privacy, but the court ruled in favor of the company because Nissan owned the computer system (Clavin 76). Because of the threat to individual privacy, the growth of E-mail litigation is one of the fa stest growing areas in the United States. Federal and state laws have not kept up with the varied use of E-mail (Posch 54). Besides computer monitoring in the workplace, other forms of electronic monitoring include video surveillance, closed circuit television, and tracking devices. Workplace surveillance becomes more sophisticated and more effective in monitoring work ers' activities. A camera as small as a thimble can be installed in workers' offices or lounges to record what they are doing and talking about; many times surveillance cameras are used in industries to track down thefts and record questionable behavior. At a Surveillance Expo show, a salesperson demonstrated the latest in sophisticated video cameras: body video. Wearing a tiny camera hidden in a pair of glasses, the salesperson strutted about the stage as the image of his audience was produced on a n earby video monitor. This camera is being marketed to industries in the United States this year (Frankel 12). One of the most controversial developments in the line of tracking devices is the "active bridge." A small card that looks like an i dentification badge is clipped onto the worker's clothing, transmitting a signal every ten seconds to a central computer. Employers say the devices will allow workers to make more efficient use of their time. The badge will tell supervisors exactly wher e an employee is located in the building, eliminating the time and effort taken to hunt them down. Privacty rights activists forsee that the badge will invade the employee's privacy, because every step he takes will be monitored. They insist that employ ees will become less productive if continuously scrutinized under surveillance, and it will harm worker morale (Long 57). The Information Age has suffered especially in health care as the privacy of medical records is being invaded. Technology of computer-based patient records is beginning to improve in terms of results and costs. Traditional paper medical records a re typically incomplete and often illegible, so physicians turn to electronic medical records for quick and relevant information on the injured and ill, especially necessary in emergencies. The health care industry spent $15 billion on information techno logy in 1996 for the following: electronic medical records, billing systems, internal networks and agencies, and public networks, such as the Internet, to distribute health-related information and data. Types of organizations that collect and store elec tronic health information include members of the direct health care provider teams such as doctors, nurses, lab technicians, and groups such as insurance companies, government and private agencies (Why 24). As medical and health information becomes more accessible through electonic sources, medical records of patients will be made available to many people. While the health care information superhighway has brought such benefits as detailed health and medical information and has increased the efficiency of managed care organizations in data collection and analysis, outsiders who have access to patient s' medical histories are using them as tools of discrimination in employment, promotions, insurance coverage, and even politics. Dr. Denise Nagel, president of Coalition for Patient Rights of New England, state, "The traditional right of medical pri vacy, protected by the Hippocratic Oath, is being eroded as our medical records become transformed into commodities desired by insurers, employers, researchers, and yes, even police." She goes on to give the example of a woman, who with only average computer skills, was able to access information abou ther psychiatric condition from her medical record in an insurance company's database. Concerned that future employers would obtain it as easily as she had, she requested its removal, but was turned d own by the company (Nagel A13). When a confidential list of 4,000 AIDS patients wound up in newsrooms in Tampa, Florida, last year, it was discovered that the computerized medical records had been tapped by a major pharmaceutical company (Butler 8). Th ese examples arouse concern about how private medical data really is. Patients have the right to keep their medical history private for their own protection, but that privacy is increasingly being threatened by the growth of the information superhighway. Securing electronic medical records needs to be done on two levels. The first is protecting confidentiality of medical information as it is held and used by individual health care providers. The second is protecting the information as it moves fr om a doctor's office to outside parties such as insurers, employers, and health care managers. Introduced before Congress in January 1997 was the Fair Health Information Practices Act, written by Representative Gary Condit of California, incorporating th e two levels into a legal document which is yet to be passed by Congress and signed into law by the president (Electronic A22). To add privacy, the government has invented a chip to deal with the growth of electonic eavesdropping. The Clipper Chip is a cryptographic device used to protect private communications in today's technology. Inserted into a telephone or computer, it is used to encrypt voice mail messages, while a similar chip known as a Capstone would encrypt data. It uses a code to scramble the information put into the computer so outsiders cannot read it. The Clipper has a built-in back door that allows the U .S. government to use a special key to unlock the code. The government developed this chip in order to protect the privacy of people. Privacy groups, however, feel the Clipper will turn the nation's phone system into a vast surveillance network that coul d be easily abused (Buchsbaum 12). A major problem of the Clipper Chip deals with the Law Enforcement Access Field (LEAF) and escrowed keys. The LEAF allows government agencies to investigate wrong doings by criminals and terrorists. They must first obtain a search warrant, then p resent the warrant to government offices obtaining the keys, and finally use the key to obtain information about the parties. People see escrowed keys as a way to prevent eavesdropping while they see the LEAF field as a violation of their freedom of spee ch and personal privacy. If the government passes the Clipper Chip, then the government would have access to everyone's personal information (Rosen 2). The Information Age is growing by the second. Many people realize this and are for technology advancing. Because of this many people do not know that their privacy is being invaded. The Clipper Chip is a device that might help people who want their privacy. The government would hold the key to access a person's computer or telephone, but they must have a court order before they can use the key to tap into a person's computer. People are leaving their privacy in the hands of the government. The issues of privacy and the consumer, privacy and the workplace, and privacy and medical records have forced the government to investigate encryption as a way of deterring the invasion of personal privacy in the Information Age. Work Cited Buchsbaum, Herbert. "No Secrets in Cyberspace?" Scholastic Update 2 Sept. 1994: 11-13. Butler, Robert N. "Privacy in the Electronic Age." Geriatrics Jan. 1997: 8-9. Clavin, Thomas. "Is Your Boss Spying on You?" Ladies' Home Journal April 1995: 82. "Electronic Threats to Medical Privacy." New York Times 11 May 1997: A22. Frankel, Mark. "Corporate Snooping 101." New Republic 20 May 1996: 11-12. "Is Your Computer Spying on You? Consumer Research Magazine May 1997: 6. Long, Robert Emmet. Rights to Privacy. New York: H.W. Wilson Co., 1997. Mossberg, Walter A. "Threats to Privacy on-line Become More Worrisome." Wall Street Journal 24 Oct. 1996: B1. Nagel, Denise M. "The End of Personal Medical Privacy." Wall Street Journal 7 June 1996: A13. Posch, Robert J. "E-mail and Voice Mail: Basic Legal Issues for Corporate Management." Direct Marketing Jan. 1996: 54-57. Rosen, Dan. "Is the Clipper Chip Necessary?" [http://acm.cis.udel.edu/~rosen/cscc2.html] Sept. 18,1997. "Why Your Health Privacy is Threatened." Consumer Research Magazine April 1997: 24-27.

More about Privacy in the Information Age Exploratory Essays Research Papers

Open Document