Sunday, October 6, 2019
The Value of Digital Privacy in an Information Technology Age Essay
The Value of Digital Privacy in an Information Technology Age - Essay Example Another technology is the RFID tags. This stands for radio frequency identification and it involves the use of electronic magnets for purposes of tracking and identification of objects attached to the RFID tags. These tags have the capability of storing information in an electronic manner, and these data are read by using magnetic fields. A researcher can access the information of an individual without his or her knowledge by use of these RFID tags (Keizer, 2012). This is because the tags can be implanted within individuals, and this increases the possibility of reading private information of an individual without their consent. The use of these tags has raised privacy concerns in United States of America. Having knowledge of such technology has its advantages and disadvantages. One advantage that the public has if they know this kind of information is that they will take measures of protecting their privacy. For instance, people wonââ¬â¢t just provide their DNA details, names and addresses without confirming on why this type of information is required. This is in respect to the use of biometric technology in conducting a search for an individual. Another advantage is that the public would seek various measures of complaining to the authorities in case their privacy is breached. For instances, marketers can use the cloud computing technology to identify the consumption habits of individuals, and thereafter develop marketing programs that reflect their consumption habits. This usually involves perusing through the personal information of individuals without their consent. This practice is unethical, and needs to be condemned (Smith,... According to the reportà the cloud computing technology involves a subscription based consumption of technological services. In this type of technology, the software and hardware systems of a computer system are delivered through the internet. This type of computer technology involves the design of a cloud that can enable a computer user to focus on what he or she is looking for. On this basis, the user does not need to worry about where the information he or she is looking for is stored.As the paper discusses according to the act, the federal government has the authority to monitor all the computer system used by suspected terrorists, and compels all banking institutions, telecom organization, and libraries to provide tangible information regarding a suspected terrorist. This should be done without their knowledge and consent. In my own opinion, this law is uncalled for, and a breach to the constitutional rights of individuals contained in the due process clause of the 14th amendm ent, which protects the right of privacy. This law also breaks the provisions contained in the fourth amendment of the American constitution, which guarantees the right of an individual against illegal searches and seizure. For instance, in Katz vs. United States, the Supreme Court denoted that the use of technology in eavesdropping on an individualââ¬â¢s private communication amounts to an illegal search, and it is therefore unconstitutional.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.