The Value of Digital Privacy in an Information Technology Age

Technologies which allow an individual to research citizen’s private data

These technologies vary from data mining, deep analytics, neural networks and Artificial Intelligence among others (Halbert 245). They are used to promote more learning about the details of the citizens in terms of behavior, biometrics and thinking. However good data mining is, it has raised security and ethical concerns especially when used in Total Information Awareness (TIA). The behavior learned about citizens can be useful in terms of prediction for improvement of services. It is a bridge of privacy especially when used to obtain their account details and credit card information. Deep Analytics technology involves voluminous collection of information about an area of interest. It violates the privacy as the collected information can lead to discovery of an individual’s private information.

The Neural Networks collect information from orders made by clients. The information collected might be sensitive and can be used to bridge the security of that client. It might also be exposed and therefore be made readily available to malicious individuals, who might benefit at an expense of the client.

Businesses employ the use of Artificial intelligence to mine and consolidate customer data. This data can be used by individuals who need specific sensitive information about citizens for malicious purposes. Data mining in this case will provide a vulnerable source of insecurity attacks.

Advantages and disadvantages of public access to this information

The access to this information especially by researchers saves time. This is evident especially when a company uses neural networks to take and process clients’ orders. It also reduces the cost of taking and receiving orders. If a company employs deep analytics to learn the consumer behavior of its customers, they incur fewer costs than when they use human beings to survey the same customers. Moreover, it is useful in improving the accuracy and the speed of processing the taken orders. The malice attached to the use of information especially by competitors and hackers negate the right use of information. For instance, using credit card information to steal money from clients or attacking the website to derail business processes are some of the disadvantages of public access to this information (Mallor et al 2009).

Measures to protect private information

Some of the measures involve avoiding giving out the sensitive information to interviewers especially when the use of information is unclear. Saving sensitive information like credit card details in networked computers can become more costly to an individual. This should therefore be avoided. The private information like passwords and usernames should be complicated enough for other people to know and easier for an individual. Passwords should meet the standard quality which includes the use of other characters on top of letters and numbers. Regular changing of passwords is encouraged (Poltorak & Lerner 2011).

Freedom of information act (FOIA)

According to Wikipedia, FOIA is a law ensuring public access to U.S. government records. It carries a presumption of disclosure of information. There is a requirement for the agencies of the US to disclose the required information on request. However, there are nine exemption conditions where the information cannot be disclosed. This is an enforceable access right in the law court. I agree with the act as it gives more information to the public and in turn promotes government trust. The information given might be useful in improving the quality and competition of major organizations. This leads to better services and products to the nations. From Sarbanes-Oxley section 409 states that the public has a right to issuers disclosing of information, this disclosing information should be done on request, when they make changes or any other necessary time. The entire disclosure of the information should use a simple, clear and precise language to ensure that the target public gets the message (Bargley & Dauchy 2011).

I agree with this law as it will provide full information to investors who might invest and therefore improve the quality of the company.

Electronic privacy laws

The Electronic Communications Privacy act (ECPA) law is very crucial. It has different parts whose second title deals with the security of electronically stored and computer stored messages. The next title denies the use any material aiming at trapping and tracing the communication process to establish the messages sent.

The Computer Fraud and Abuse Act was developed by the United States Congress in 1986. It is intended to reduce cracking of computer systems and to address federal computer-related offenses (Bainbridge 77). This act is applied inn serious cases involving more than one state, whereby the states have issues with one another on grounds of computer and information abuse. In my opinion, its rooted on the fear of competition.

It is ineffective as it has failed to protect all consumer records and communications. The failure to protect consumer data from governmental agencies makes it even more unsafe. This privilege of using the information by the agency just with a simple written request which meets the well-established conditions is not acceptable. Lack of judicial involvement in this matter makes it even more unsatisfactory. It has led to increased justification of crimes towards the use of surveillance. The authorizing judicial members have significantly increased following this act.

Reference List

Bainbridge, S. (2007). Complete Guide to Sarbanes-Oxley: Understanding How Sarbanes-Oxley Affects Your Business. California: Adams Media.

Bargley, C., and Dauchy, C. (2011). The Entrepreneur’s Guide to Business Law (4th Ed.) California: South-Western College.

Halbert, T., and Inqulli, E. (2002). Law and Ethics in the Business Environment (4th ed.). California: South-Western College.

Mallor, J., Barnes, A., Bowers, L., and Langvardt, A. (2009). Business Law: The Ethical, Global, and E-Commerce Environment (14th ed.). Indiana: McGraw-Hill/Irwin.

Poltorak, A., and Lerner, P. (2011). Essentials of Intellectual Property: Law, Economics, and Strategy (2nd ed.) Indiana: Wiley.

Video Voice-over

Cite this paper

Select style

Reference

LawBirdie. (2023, August 20). The Value of Digital Privacy in an Information Technology Age. https://lawbirdie.com/the-value-of-digital-privacy-in-an-information-technology-age-essay/

Work Cited

"The Value of Digital Privacy in an Information Technology Age." LawBirdie, 20 Aug. 2023, lawbirdie.com/the-value-of-digital-privacy-in-an-information-technology-age-essay/.

References

LawBirdie. (2023) 'The Value of Digital Privacy in an Information Technology Age'. 20 August.

References

LawBirdie. 2023. "The Value of Digital Privacy in an Information Technology Age." August 20, 2023. https://lawbirdie.com/the-value-of-digital-privacy-in-an-information-technology-age-essay/.

1. LawBirdie. "The Value of Digital Privacy in an Information Technology Age." August 20, 2023. https://lawbirdie.com/the-value-of-digital-privacy-in-an-information-technology-age-essay/.


Bibliography


LawBirdie. "The Value of Digital Privacy in an Information Technology Age." August 20, 2023. https://lawbirdie.com/the-value-of-digital-privacy-in-an-information-technology-age-essay/.