You are on page 1of 7

Fall

08

Assignment 2 Michelle Angu

Law and Ethics LEG 500

Summer 2012 July 30, 2012

Strayer University

and hospitals have database capabilities where only certain persons are privy to its access. Search engines such as Google. genetic information.Introduction Privacy. credit scores and other data that are more private. Database is a computer program that organizes data and or information in digital format for research and storing purposes for either public or private use. Information in theses private database may include various information such as birth date. This paper will discuss the use of technology to research ones private information. and more are used to monitor a person or a group. The World Wide Web gives the public access to ones personal and private . Other technologies utilized to research private information on a person is the use of surveillance devices. school and the work environment. a term that is reluctant in today’s modernized society who’s meaning is far from realistic. Surveillance devices are commonly operated in public areas. microphones. In these facilities an individual is responsible of observing the private activities of a person such as their movement use of telephonic and network devices with out formal consent. law officials. Due to the innovation and use of technology today. the advantages and disadvantages of the public access of such information and the laws that promulgate such data. home. Private institutions such as the government. through technology our lives as we know as our own is far from it. investigators and any person whom inquires private information of another person. employers. private information of an individual is easier to locate than in prior years. Bing and Ebscohost are frequently used databases that may be accessed by any persons. The use of technology daily has enabled neighbors. Devices such as cameras. One use of technology that allows access to ones private information is through a computer program called database. computers. information generated from theses search engines is disclosed to the public with out individuals consent. As the world congruently fosters a new way of living. universities.

current location and etc. the investigator manipulates the benefits of such technology for the same reason a person would not appreciate personal data disclosed to the public. the reuniting of lost love ones. Oppose to the person being investigated. With the superb things social networks provide. from accessing our bank information online. these social media entities have evolved to networks for all persons to connect. to the public. email. shopping. status updates. for the person being investigated and the person doing the investigation. Social networking has enabled people to do many things such as meet people that share similar interest. Vital information maybe obtained through electronic mail. The party being investigated is oblivious to what is being searched about them and to what degree of information is being presented. With such technology utilized to gain information on a person the advantages and disadvantages varies by party. the investigator is able to .information through social networks and email. and or frequent posting of pictures one may can easily attempt to allocate personal information of someone. previous names. date of birth. ones email circulates the web. video blogging. friends and acquaintance up to date with their personal life through blogging. it causes a detriment to ones privacy. the person under investigation is ultimately unaware of what personal information and individual may access about them. to our social networks. The investigated party is represented as a detriment. Such technologies provides disclosed information about a persons past that they may not want to share such as medical history. so is an individuals personal information. With ones email circulating from one website to another. school registration. Email works as the catalyst to all of our endeavors on the World Wide Web. and promote up and coming musicians. credit report. Social networks such as Facebook and MySpace were utilized to connect students with one another. For those users who utilize social networks to keep family. and keeping family and friends up to date with their ongoing lives.

The Privacy Act of 1974 attempts to protect unauthorized access of personnel federal records by other parties such as the disclosure of ones social security number (Federal Trade Commission. one may find that information sought through certain technologies such as a database and the World Wide Web may not be current or adequate to their needs. According to the Federal Trade Commission. having probable cause. or incriminate them selves. 2010).research data of an individual. the investigator is privy to locate information the individual may not be willing to share. The benefit of locating intimate data of a person through technology may sound marvelous. and if necessary may request to revise data obtained (Federal Trade Commission. According to Mount.S. The act solely protects federal government data of a citizen. it can be complicated. as well as the epidemic of identity theft that will lead an investigator to false information of a person. The Fifth Amendment protects an individual from responding to a question that will hinder. a citizen is authorized to obtain and review information retained by the federal government. Whether for personal. Several orders that enables and protects an individuals private information from being disclosed is declared under The United States Constitution. 2012). In this era of innovation towards technology. thus all other personal information such as credit . The U. such doctrines as the Privacy Act of 1974 and The Electronic Communications Privacy Act 1986 (ECPA) enables the public to private information to a certain degree (Mount. Such reasoning’s as developed software may disable an investigator from collection specific data that satisfies their needs. The Fourth Amendment requires judicial authorization prior to the searching and seizing and individuals belongings. Constitution is designed to protect its citizens from both internal and external strife however it reluctantly protects it’s citizen’s private well being. The Ninth Amendment protects any persons from being restricted to certain rights by the government. business or out of curiosity. 2010).

all personal information of an individual can be sought to a belittling degree.S. the doctrine does enable other parties to legally scrutinize personal data. In sum. they may legally request such information through the government. Although the ECPA protects data from being disclosed. seldom protect them. society promotes digital living where hardcopy data of our lives is continuously transformed into digital form. The Electronic Communications Privacy act of 1986 attempts to protect non-governmental information from being disclosed haphazardly. thus providing public access to ones life and deteriorating our privacy. Department of Justice. The doctrines that proclaim to protect citizens personnel data. the act protects other parties from retaining access of an individual without legal consent including emails and telephone conversations (U. If a party wants to seek more information than what a person is willing to provide. 2012). education history. As technology vastly evolves. The doctrines seem to guide various ways for other parties to locate information on an individual more than protect information from being disclosed. . medical history and more are not protected under this doctrine.report.

2012. The Privacy Act of 1974. as amended . 2012. Retrieved July 27.gov/default.it.it. US Constitution Explained. 2012. from Justice of Information Sharing: U. (2012. Department of Justice. Constitution: http://www.ojp.S.gov/ogc/stats. Privacy Act of 1974. Office of Justice Programs: http://www. from http://www. March 02).gov/default. from Justice of information sharing: U. June 14). September 26).S.shtm Federal Trade Commission. Retrieved July 27. (2003.htm Federal Trade Commission. from Federal Trade Commission: http://www. (2012. Retrieved July 27. S. Liberties. Retrieved July 28.gov/opcl/privstat.usconstitution.ftc. (2012.aspx? area=privacy&page=1285 United Stated Department of Justice. Department of Justice. 2012.ftc.References U. Office of Justice Programs: http://www.S. November 03). from The U. Retrieved July 28. April). Producer) Retrieved July 27. (D. 2012.justice. Department of Justice.aspx?area=privacy&page=1285 . March 21).net/constquick.gov/foia/privacy_act. (2010. Statutes Enforced or Administered by the Commission. (2010. from Federal Trade Commission: http://www.html Privacy & Civil Liberties. Privacy & Civil Liberties: Federal Statutes. f.ojp.shtm Mount. 2012.S.