The Value of Digital Privacy in an Information Technology Age Essay
Submitted By rsaunders1014
Words: 1211
Pages: 5
Legal 500
Week 4 Assignment 2 The Value of Digital Privacy in an Information Technology Age
Strayer University
The Value of Digital Privacy in an Information Technology Age We live in the technology era. This technology can either be for us or against us. Laws have been transformed and created to protect the people from unwanted privacy breaches. There are growing concerns with privacy issues and the ease of access. It use to be that one would have to spend hours doing lookup over the internet, however, now all the information has been combined on one website. There are numerous websites that give personal information with only a name. Some of these websites that will be discussed in this paper are: Been Verified, People Finders, and Look Up Anyone.
1. List and describe at least three (3) technologies that allow an individual to research citizens’ private data.
Been Verified is a website that provides contact information, criminal history, bankruptcies, judgments and liens. Their company mission is "to make public records easy, affordable, and accurate for everyone, giving all people the opportunity to access public records when they need them – instantly, affordably, and reliably" (Levy, Josh). People Finders provides information on everything on one person. For a membership fee you can access: full name, address, phone number, relatives, age and DOB, address History, property search, marriage/divorce, birth/death, bankruptcies, sex offender check, and criminal check. Lookup Anyone is a website where one can obtain an array of information. In one place, for a small fee one can do searches for: people, public records, reverse phone, background check, cell phone ID, property report, email lookup, death records, and business search. As per their terms and conditions " upon registration, LookupAnyone grants you a nontransferable, nonexclusive license to access our databases and the information contained in the databases, for the purpose of performing data verification, person, property and address location and related searches solely for your own internal uses in compliance with these terms and conditions" (LookupAnyone Consumer Site).
2. Discuss the advantages and disadvantages of public access to this information, both for the researchers and those who are being “ investigated”.
There are advantages and disadvantages when using technology to look up personal information. These advantages and disadvantages can be broken down into two categories: the researcher and the one being investigated. Taking a first look at the researchers side, the advantages are ease of access, and less time doing the research. Instead of researchers having to go to multiple websites for the information, companies databases have combined all the information, for a fee, in one location that can be obtain from one search. The disadvantages for the researcher is one should not assume that the data provides a complete or accurate history of any person's criminal or civil history. Researchers should use extreme caution when interpreting the results of a criminal or civil background search for any type of personal verification because websites give both positive and negative results and do not guarantee the information provided. Addresses, telephone numbers, and email addresses are not always up to date. For the person being investigated, results can also have their advantages and disadvantages depending on their individual background. A person with no criminal history or any imperfections on their background check will have an advantages when companies or persons of interest search their name. No news is sometimes good news. If a person has their work experience on a website that promotes them in their profession, it will be an advantages for potential employers or customers to see their work experience and credentials. Technology is also used to find lost loved ones or distant class mates. Use of these
Related Documents: The Value of Digital Privacy in an Information Technology Age Essay
Assignment 2: The Value of Digital Privacy in an Information Technology Age Legal 500 January 29, 2013 Once upon a time long long ago when you were going on a date with someone you met at a party and you wanted to know a little bit more about that person, you would ask around. Maybe you would ask his friends or your friends what they knew about this guy or girl. But in today’s digital age, once you find out someone’s name, place of employment or a partial license plate the first…
policy debate around technology and privacy has been transformed. There have been many changes in the technical, economic, and policy domains that have changed the way we can think about our government today. The changes include the emergence of digital communications networks on a global scale; emerging technologies for protecting communications and personal identity; new digital media that support a wide range of social relationships; a generation of technological privacy activists. “In the United…
What will digital life look like in 2025? Highlights from our reports BY LEE RAINIE AND JANNA ANDERSON4 COMMENTS This year marked the 25th anniversary of the creation of the internet, making it a good time to look at how the internet had changed lives and what opportunities, challenges and dangers the coming years might bring. To do that, the Pew Research Center and Elon University’s Imagining the Internet Center posed a battery of questions to nearly 3,000 internet experts and scholars, centering…
Business Intelligence: Applications and technologies to help users make better business decisions. Chief Information officer: Senior manager in charge of the information systems function in the firm. Chief knowledge officer: Senior executive in charge of the organizations knowledge management program. Chief privacy officer: Responsible for ensuring the company complies with existing data privacy laws. Chief security officer: Heads a formal security function for the organization and is responsible…
THE VALUE OF DIGITAL PRIVACY IN AN INFORMATION TECHNOLOGY AGE First & Last Name Prof. Name Law, Ethics & Corp. Governance May 5, 2013 There are numerous ways to research a citizens' private data. Over 94 Million people have their personal information exposed. From search engines, to social networking sites, companies and data brokers have compiled your information and will share or sell your personal information to anyone. These days the most common technology are mainly…
adoption of technology innovations: The consumer adoption (pic) Two important stages follow trial. First, the consumer must decide to purchase/continue purchasing the product, which can be behaviorally identified as adoption. The internationalization stage is particularly important in the case of technology. Products or services with a high component of technology often require that consumers undergo a substantial learning process in order to be used successfully. The chasm: technologies may have…
employ filtering software that blocks child pornography, images that are obscene, or items deemed harmful to juveniles” (Rubin 2004, 155). ALA opposes this because it affects the library users’ free access to information. Article III is when patrons believe that they have a right to privacy and confidentiality regarding to their library usage and professionals support these rights. However, this all changed due to September 11, 2001 when the USA Patriot Act passed to allow the Federal Bureau of…
and MIS, Miami University, 309 Upham, Oxford, OH 45056, USA Department of Information Management, National Chung Cheng University, Ming Hsiung, Chia-Yi, Taiwan, ROC Received 25 March 2003; received in revised form 25 March 2003; accepted 30 March 2003 Abstract The Internet has increasingly been used for communication between people. Most users have no problem relaying messages, which do not contain confidential information, over a network. Yet, for it to be accepted as a medium of conducting monetary…
paragraph on each article, including: (1)Data, data everywhere -The world contains a vast amount of digital information that can make it possible to do many things, the data should be managed well that can be used to new sources of economic value, provide fresh insights into science and hold governments to account. -The interesting part of this article that I found out is the business of information management is helping organizations to make sense of their data, such as IBM, Microsoft. (2)All too…
company can stay on top of the newest technology or create a marketing strategy that is environmentally friendly and sustainable. The macroenvironement consists of large societal forces that affect the microenvironment. These forces include the demographic, economic, natural, technological, political and cultural environments. Demographic Environment First and foremost the changing demographic or the study of human population in terms of size, density, location, age, gender, race and occupation is…