Privacy Essays

Kudler Fine Foods Frequent Shopper Program

Service request kf-013 was submitted to create a requirements document for the proposed Frequent shopper program. The frequent shopper program is a new initiative by Kudler Fine Foods to increase revenue. The program is to track purchases of customers and accumulate points for gift items. This program will track purchase patterns to offer personalized savings to their customer, not only from them but also from their trading partners. There could be ethical, legal, and informational security issues. “Ethics refers to…

Read >>

Victims and Legislative Solutions

“knowing production, use or trafficking in counterfeit or unauthorized access devices such as any card, plate code, account number, electronic serial number… personal identification number,… that can be used to obtain money, goods, services, or any other thing of value, or that can be used to initiate a transfer of funds” (Cybercrime Public and Private Entities, 2007). Despite these measures in place, cybercrime is still a massive problem. This is due to the fact that hiring and retaining skilled investigators…

Read >>

Employee Monitoring

Employee Monitoring: Employer Safeguard or Invasion of Privacy? Employee privacy has been a controversial topic especially with the rise in internet usage, the popularity of social media increasing, and the addition of GPS to mobile devices. With these advances in technology there are numerous ways for employers to monitor their employees’ time at work. According to Evans (2007) as many as eighty percent of the employers, who employ twenty percent of the American population, monitor employees’ telephone conversations, e-mails, and…

Read >>

Nsa Surveillance

There has been a ton of controversy surrounding the topic of the NSA. Throughout the history of the United States we have fallen victim to terrorist attacks and we cannot blame the governments desire to be ten steps ahead rather than 10 steps behind. The NSA’s main focus is our safety, they do not exist to infringe on our constitutional rights. Liberty and security go hand-in-hand; one cannot exist without the other. People tend to approach this topic on a…

Read >>

Political and Legal Influences

RFID technology has come a long way since it was introduced and many different uses have been found for this technology, most of which bring up many political and legal issues. These tiny RFID microchips have the ability to store and transmit information. In many cases this is an extremely helpful technology that stores utilize to help with keeping inventory, and to prevent loses of stolen goods, however this technology is being used just for keeping inventory. These chips have…

Read >>

Ethics and Professionalism

The first principle, Universal Access to Information, basically stipulates that it is important to make information universally available to all. ACM believes it is important because it will have impacts on economic growth, education, and public health among other things. I would have to agree with this principle. When people have access to information it allows for growth in all areas. People can use information to expand on ideas and make advancements on others inventions and so forth. The Intellectual…

Read >>

Privacy at Work

There is no specific right to privacy in the US Constitution although the Fourth Amendment which makes provision for persons to feel safe and secure in their person and property is typically interpreted to give rise to a right to privacy.  In determing the right to privacy in the work place the US courts have determined that an employee’s right to privacy only exist when he or she has a reasonable expectation of privacy.  The manner in which the US…

Read >>

Security and Privacy

Introduction Identity theft is becoming very easy due to technological advancements. Protecting patient information must include all efforts from medical facilities, employees, and consumers. Society has the right to be protected from any misuse of personal data. An effective protective program starts with front-end preventive safeguards and ends with follow-through that reaches wherever incorrect information has flowed Identity theft has become a very popular topic for the past decade or so, the number of complaints has increased and is costing…

Read >>

Ethnics Unit 3 Db

In the business and corporate world of the contemporary society, this is a dominant principle currently being applied and observed by the group of the employers as well as the employees. This principle is regarding the current biological and physiological condition of a certain employee and connection with the personal aspect of drug use. This principle is mainly that drug use is and should be regarded as personal information thus it is rightfully private in nature and that employers should…

Read >>

national Institute for Engineering Ethics

NIEE produced Henry’s Daughters to raise awareness of the ethical aspects of engineering work, advance knowledge and understanding of professional standards and public obligations and expectations, improve skills in moral reasoning, and strengthen personal dedication to exemplary conduct. Executive Producers were Joseph Herkert, Michael Loui, William Marcy, Steven Nichols, and Jimmy Smith. The entire NIEE Executive Board members served as Senior Investigators and Technical Advisors. Discussion Questions Professional Issues 1. Are there ethical implications to Henry, a lobbyist, hosting the…

Read >>

Information Technology Ethics

Definitions -the right to be alone – the most comprehensive of rights, and the right most valued by people. (Justice Louis Brandeis, Olmstead v. US, 1928) -the right of individuals to control the collection and use of information about themselves. Legal Aspects Protection from unreasonable intrusion upon one’s isolation. Protection from appropriation of one’s name or likeness. Protection from unreasonable publicity given to one’s private. Protection from publicity that unreasonably places one in a false light before the public. RECENT HISTORY…

Read >>

Invasion of Privacy and Libel Case Study

Invasion of privacy is something that is a major concern among Americans. In this paper I will discuss Steve, who has recently joined a church. The church doctrine is such that members are to reveal indiscretions from their past. Steve has told them of some of his indiscretions but Steve is not happy about this and decides he would rather leave the church. The church leaders have told Steve even if he leaves his neighbors as well as members of…

Read >>

Ethical Issues with Hacking

There is a new crime on the verge of being on America’s top ten crimes list, computer hacking. Computer hacking is the practice of unlawfully gaining access to and sometimes tampering with information in a computer system. Since the cyber age, the use of computers has slowing integrated into most of society’s everyday life and since then new crimes have emerged as a result of this age. The access of information readily available at the click of a button, can…

Read >>

Individual Privacy Vs National Security

Introduction Since the terrorist attack of 9/11, America has been in a high level conflict with terrorist around the world, particularly the group known as Al Qaeda. There has been many discussions within the U.S. Congress about the measures of how to effectively combat this organization and their members, here and abroad. Consequently, the issue of individual privacy vs. national security has generated discussions within the civilian and government sectors. To date, the discussions continues with many private citizens who…

Read >>

Privacy in the Workplace_ Is Your Employer Watching you Now

What is the main point of the essay? The main point of the essay focuses on elements of privacy in the workplace, such as having email accounts that are not accessible to anyone else in the workplace, and the use of surveillance of employees by employers or other employees. What is the greatest strength of this essay? The greatest strength of this essay is the author’s personal conviction that privacy, of some degree, should be maintained whether a person is…

Read >>