TOPIC 4 ASSIGNMENT #1 – RIGHT TO PRIVACY
Many laws are in place in an attempt to ensure a citizen’s right to privacy is not violated. Review the Statutory Laws: 18 USC 2511 Electronic Communications Privacy Act and 18 USC 2701-12 Stored Communications Act. Then, in 750-1,200 words, examine how consumer and user data is collected, analyzed, and transmitted. Make sure to address the following:
- How can user agreements erode users’ privacy? Include a specific user agreement example.
- Provide three additional ways in which personally identifiable information can be accessed by new technology in the digital age.
- How do consumers and citizens ensure their data is not accessed or compromised (e.g., FTC v. Wyndham Worldwide Corp., 799 F.3d 236 (3d Cir. 2015))?
- What is the ethical expectation by organizations regarding the capture, use, and transition of personal data (e.g., Privacy Matters, Even in Data Security in the Matter of Compete, Inc., No. C-4384)? Make sure to consider the historical, social, professional, and legal aspects.
- In Europe, they tend to focus on a traditional human rights approach, neglecting the fact that nowadays, data is usually given away voluntarily upon contractual agreement. In this case, how does a Christian worldview stack up against an evolving traditional human rights approach?
Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is required
1. How can user agreements erode users’ privacy? Include a specific user agreement example.
Studies and reports have involved the idea, that every individual has the Right to privacy. The right to privacy mainly involves the right to have material or possession in order to seize the information based on the family’s concern with the private affairs on an unnecessary note that revealed the privacy of personal communication contravened.
2. Provide three additional ways in which personally identifiable information can be accessed by new technology in the digital age.
Additionally, the right to privacy mainly depends on the rights that an individual gets based on the excessive government intrusion based on the basic decision as well as the issues. Thus, rights are based on personal issues that are undisclosed or unpublicized with an individual’s Privacy Rights. Privacy Rights are important because this ensures the power of the people, in order to make different choices based on their thoughts and feelings in order to share information. Therefore, personally identifiable information is the method, that helps one to permit the identity based on the individual in order to get information that applies to understand the note of reasonable cause with direct and indirect means (Külcü & Henkoğlu 2014). Therefore, in contrast with the study of Privacy Rights, PII also includes information in order to have a clear identification of an individual with all the private details. This information might contain bank account details, schemes, identification proofs, or security numbers. Therefore, the three additional ways in which personally identifiable information can be accessed by new technology in this digital age are as follows:
Storing data: Leakage of data is one of the most crime taking place today, thus, storing the data is one of the most crucial aspects that require to be followed these days. Therefore, the need for it is mainly based on the data which has been used on a daily note, which is often stored in the computer, however, if it is hacked then the data shall be stolen. Thus, security passcodes and passwords are given in order to store my data. In the case of a business, the employee and their data shall be stored in order to keep the work in motion, from any digital location with another desktop in the Cloud system.
Permission: Research stated that CSP mainly allows the organization to store the documents that set permission levels on the employees based on the Personal Identifiable Information, which needs access based on public, private, and restricted access. Therefore, CSP is mainly used to create an ability the implement security measures. Thus, security measures mainly include the setting system, which often allows access to make an approval group under the IPs, the User Audits, and the Encryption (Braun et al. 2018).
Encrypt data at all levels: This is one of the obsessed measures in order to make encrypted data for both or the rest of the motion throughout the organization and on a personal note too.
3. How do consumers and citizens ensure their data is not accessed or compromised (e.g., FTC v. Wyndham Worldwide Corp., 799 F.3d 236 (3d Cir. 2015)?
Consumers and citizens mainly ensure about the data in order to access or can compromise to get extra careful about sharing the data, based on privacy settings and requirements for privacy rights. On the other hand, leading organizations based on learning is basically based on privacy and learning about data in order to create protection in order to generate business on the note of creating an advantage. Therefore, in most cases, the consumer, as well as the citizens, shall continuously lead to adoption in the digital field, where the data is mainly generated based on the duty in order to keep the data of the consumer secure and safe. This establishes consumer opportunity and consumer engagement. Therefore, for instance, in the case of the citizens, the data is required to be secured with the digital file in the digital technology so that nothing can be compromised on its note (Schwartz & Solove 2011). Thus, this helps in developing an insight so that this can help in generating new services with its products based on personalized marketing along with publicizing advertisements. Notably, the other ways are mainly based on the fact that the consumer or the citizens are required to ensure about their data without any compromise which can be accessed, mainly including the inventory asset, the regular audits on the security posture with compromise management.
4. What is the ethical expectation by organizations regarding the capture, use, and transition of personal data (e.g., Privacy Matters, Even in Data Security in the Matter of Compete, Inc., No. C-4384)? Make sure to consider the historical, social, professional, and legal aspects.
Moreover, Ethical expectations within the organization are concerned to capture, using, and transitioning personal data which can boost cyber security and deprive of any consumer exploitability. Therefore, this has been noted that there should not be any divulged or use of any consumer data, unless with the application made legal aspects, of law and the legal guidelines, which are required to be maintained within the organization, in order to continue storing the user data, under the legal annotation based on the organization. Most importantly, this can be noted that few consider it from the European perspective based on the importance of cyber security as well as data privacy with the help of global standards, in order to secure the citizen or consumer rights. European perspectives on cyber security as well as data privacy on the global standard. Therefore, additionally European Union General Data Protection Regulation has significance based on making improvements based on personal awareness as well as assertiveness while practicing data privacy. On the other hand, ethical expectations of the organization mainly regarded using, capturing, and transitioning personal data that includes making all the employees be aware of the potential harm before participation. The organization requires to be unbiased or neutral by letting them get an opinion that can hinder their data collection process, under the European Union General Data Protection Regulation (GDPR).
5. In Europe, they tend to focus on a traditional human rights approach, neglecting the fact that nowadays, data is usually given away voluntarily upon contractual agreement. In this case, how does a Christian worldview stack up against an evolving traditional human rights approach?
Therefore, in the case of the primary concept, which is based on the traditional concepts of human rights. From the Christian point of view which is against evolving the traditional human rights and its approach, based on the concept of human rights which is regarded as a virtue that is been created by the Almighty which is the true God. Apart from this, many scientists have discovered that based on traditional human rights the approach of translation is certainly based on primary rights. Therefore, most significantly, Christians have argued that human rights are based on the ground that God, is not justified with the facts based on the natural law. Thus, consequently, Christians, have made up the claims based on the rights, so that they can link with the evolving criteria based on the traditional rights which are formulated, hence, it is not created.
Braun, T., Fung, B. C., Iqbal, F., & Shah, B. (2018). Security and privacy challenges in smart cities. Sustainable cities and society, 39, 499-507.
Külcü, Ö., & Henkoğlu, T. (2014). Privacy in social networks: An analysis of Facebook. International Journal of Information Management, 34(6), 761-769.
Schwartz, P. M., & Solove, D. J. (2011). The PII problem: Privacy and a new concept of personally identifiable information. NYUL rev., 86, 1814.