Ever since social media was introduced as such a necessary and almost vital part of our lives, several concerns have risen about the boundaries at which we must draw in terms of our privacy. The mass of information users pour into this endless stream of...
Thesis Statement: Big data can necessarily be supported by cloud computing as well as all its computing requirements. However, the personalization information for Big Data can often be considered private thus, rendering privacy issues. Russom, P. (2011). Big data analytics. TDWI the best practices report,...
Large companies have an outstanding amount of data on its consumers, and there’s no legislation that limits how much data they can collect. They have too much personal information on users, it’s gotten to the point where the collection is a threat to public security....
When the founding fathers wrote the constitution and granted the people of the United States a list of unalienable rights, they forgot, or perhaps they deliberately excluded, one specific right: privacy. According to Milan Kundera, author of Testaments Betrayed, privacy is a basic human right...
The internet has become a useful and powerful tool for everyone. It allows people to communicate with each other anywhere in the world, however, there is a saying which says “all that glitters is not gold” unfortunately most people think the internet is a fairyland...
Introduction The divide between our online- and physical social lives is shrinking by the day, the impact of online communications on our social lives is more profound than ever. Today social media sites like Facebook influence a large portion of our social life and with...
Introduction The use of surveillance technology within the United States has changed drastically in the post-9/11 era. The increase of this technology, along with other important social media features, has made police closer than ever to the community that they patrol. However, some may feel...
In the last few decades, technology has advanced swiftly in non-public industry. Devices just like the iPhone and the Internet have fundamentally changed the manner we live our lives, lots of the ones changes being good and plenty of being bad. As this technology makes...
There is a fine line between right and wrong. Whether it be in your personal life or in politics, its been seen over and over again. It might be something as trivial as skipping a day class or something greater such as deciding your major...
It is both the accomplishment and the progress of legal codes with the intentionality of preserving the country against assualts, illegal foreign invasions and terrorism. It greatly helps to maintain security in worldwide trade and guarantees the control of immigrants. National security surrounds (focuses) on...
A key aspect in neuroscience as developed in this case is the brain privacy ethical issue. The need to ensure that an individual personal information is not available to others has been critical issue in neuro-ethics with a significant focus on what need to be...
A uniformal aspect of psychology, among all practitioners, is the sacredness of patient confidentiality. However, just as no two psychological practitioners are alike, neither are protocols for confidentiality. Because of the flexibility of the confidentiality system, breaches are a common and problematic occurrence. The problems...
What is the Internet? How does it work? The Internet has the capacity of becoming something powerful and extensive, to the point that it can be used for almost any purpose, which depends on the information. It can be accessed by any and every individual...
May it please the court that I have brought forth my take on the following topic: Internet Privacy. Internet Privacy is, I believe, something that should be respected, unless of course there are extenuating circumstances. Everyone has surfed or stumbled upon websites that they would...
Susie Co-ed was ill prepared for her sociology exam. The teacher stepped out of the classroom for a moment during the exam and Susie decided to sneak a peek at what she believed was the key. When pressed by her peers to share her information,...
The growing concern of the American people today is the normalization of internet censorship. The act of putting restraints on publishing and viewing work on the internet to some may seem like a positive effort to protect most citizens from harmful ideas and or propaganda....
My right to privacy at home, in my car, and within my emails is one of the most fundamental rights protecting about who I am as a person. One of the amendments that present this right is the Fourth Amendment to the US Constitution. The...
Introduction Client confidentiality is the practice where an institution or individual providing a beneficial service keeps the information, details and in some cases, the identity of their clients, private and exempt from release to any third party unless the client consents to it or a...
Imagine it is the year 2025 or more and at that time you are asked or straight declined to use social media websites on which most people rely on nowadays as their favourite pass time. Now imagine it is the year 2030 or more and...
Introduction to the CIA Triad The CIA Triad is a foundational concept in information security, representing the three core principles: Confidentiality, Integrity, and Availability. These principles guide the development and implementation of security measures designed to protect sensitive data and ensure the reliability of information...
Social media is a daily part of most in today’s society, which has started a trend of constant oversharing of one’s emotions and lives. Although one may not see this as an issue, since it is one’s decision whether or not they share private aspects...
In this day and age, accessing specific information couldn’t be easier. Whether its research, a school project or even a quick search on your favourite celebrity, all the information you seek is only a few clicks away. Twenty years ago looking up a specific topic...
During your visit to this website, Right Claims may collect personal data about you, either directly (where you are asked to provide the data) or indirectly. Right Claims will, however, only use these personal data in accordance with the purposes set forth in this Privacy...
A city is described as being smart when it has high technological advancements. Such technological advancements include intelligent transport systems, smart energy grids, sensor networks, cloud computing, logistics management system with the desire to use digital technology to create a better life for citizens. Thite...
Unanimous judgment by the Supreme Court of India (SCI) in Justice K.S. Puttaswamy (Retd) vs Union of India is a resounding victory for privacy. The ruling is the outcome of a petition challenging the constitutional validity of the Indian biometric identity scheme Aadhaar. The judgment’s...
The General Data Protection Regulation (GDPR) is a legal framework created by the European Commission to regulate data protection across the European Union. First proposed in January 2012, the GDPR aimed to update the previous data protection laws to better fit the digital age. An...
How would you feel if all of your private conversations could potentially be released all over social media and shared with millions? It is easy to say that we all think that not all of our conversations should be open to releasing for everyone to...
The current Health Information Privacy Code, Privacy Commissioner and Human Rights Review Tribunal are relevant. Powerful health laws and legal structures give the establishment to solid and versatile health frameworks. As health laws and legal systems can help with nations to achieve it’s essential health...
The regulation applies if the data controller (an organization that collects data from EU residents) or processor (an organization that processes data on behalf of data controller e.g. cloud service providers) or the data subject (person) is based in the EU. Furthermore the regulation also...
Over the summer, my grandmother purchased a wireless security camera for her backyard that is controlled by an application on her smartphone. As I assisted her in installing this camera, I began to wonder if she was the only person who was viewing the video...