StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Privacy and New Technology - Assignment Example

Cite this document
Summary
Control of data is important in cases where the individual involved is not able to assess the risk associated with disclosing of the personal information. In many cases individuals are not aware that the personal information they give can end up being in the hands of third…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
Privacy and New Technology
Read Text Preview

Extract of sample "Privacy and New Technology"

Privacy Principles and Consent Control of data is important in cases where the individual involved is not able to assess the risk associated with disclosing of the personal information. In many cases individuals are not aware that the personal information they give can end up being in the hands of third parties and this call for the control of the data. However consent becomes only relevant to the application of some privacy principles. It is either framed as an exemption to general prohibition done against handling of personal information in a certain way or it is also done as a basis to authorize the handling of personal information in a particular way.

This way, in a certain case, consent will not be the only exemption to a certain prohibition nor will it be the only basis for allowing the handling of personal information in a certain way. This calls for the law that controls the handling of the data if the individual concerned maybe signed consent oblivious of the circumstances that can surround its leakage to the third party. According to Naomi and Charles, 2011, information Privacy Principles do not require that an individual should give her consent to the collection of the concerned person’s personal information.

There is a laid rule that governs or is against an organization collecting sensitive information about an individual. Among the exceptions to the prohibition is where the individual has given the consent. The control of the information is also important to prohibit an agency from using the information obtained from an individual with consent in other ways that are contrary to the ones intended in the initial agreement. The law governing the handling the rights of an individual to his or her information clearly states the way the information should be handled.

The organization bears the whole responsibility if;-a. Uses the information acquired in other ways that are different from the one that was stipulated in the consent. The agency or company should be accountable if the information is used on other ways and leads to inconveniencies on the side of the individual.b. If the information is leaked to third parties. This could mean that the information has been allowed to be used contrary to the consent signed. Even if there was no consent signed the agency or company should be held accountable for the act.

The code of data sharing clearly states how the personal information should be handled. In case of any act that should prove without doubt that the information leaked to another party or was used for other means it should be held accountable.ReferenceKorn, Naomi and Oppenheim, Charles. Personal Data and Consent Management. Strathclyde: University of Strathclyde, 2011. Print.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy and New Technology Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Privacy and New Technology Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/law/1633847-privacy-and-new-technology
(Privacy and New Technology Assignment Example | Topics and Well Written Essays - 250 Words)
Privacy and New Technology Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/law/1633847-privacy-and-new-technology.
“Privacy and New Technology Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/law/1633847-privacy-and-new-technology.
  • Cited: 0 times

CHECK THESE SAMPLES OF Privacy and New Technology

Is technology an invasion of privacy

This paper will show how technology is an invasion of privacy.... The influence of private and governmental organizations to coerce disclosure (whether centered on circumstance, technology, or law) and to collect, analyze and disseminate personal data is growing swiftly(Lyon& Zureik 45).... he world is converting into a transparent community of record in that documentation of the history, present identity, location, physiological and communication, and psychological behavior and states is more and more possible through technology, and people's privacy is no longer private....
5 Pages (1250 words) Essay

The Value of Digital Privacy in an Information Technology Age

Another technology is the RFID tags.... Having knowledge of such technology has its advantages and disadvantages.... This is in respect to the use of biometric technology in conducting a search for an individual.... For instances, marketers can use the cloud computing technology to identify the consumption habits of individuals, and thereafter develop marketing programs that reflect their consumption habits.... According to the report the cloud computing technology involves a subscription based consumption of technological services....
5 Pages (1250 words) Essay

Privacy and technology

They use the rhetorical device of logos to contend that technology talking about the ability of new technology to use micro-expressions rather than the old profiling technique.... privacy and Technology Name: Institution: privacy and TECHNOLOGY Achieving total privacy in today's world is next to impossible and majority of people have now accepted that they can only live semi-private lives.... hellip; Today's technology has interfered with individual private lives, which has exposed them more to the international world....
4 Pages (1000 words) Essay

Technology and the Advancement of It

The paper describes the consequences of new technology researches.... And at the course of it, technology made a tremendous breakthrough that created a taboo, particularly in the economic realm.... Opinions and approaches, as well as psychological balances on how to go through the thickness and thinness of life, are all affected by the changes and developments of technology.... Reports on cases such as injuries or deaths caused by a mentally ill individual are sometimes the result of a depressed person brought by the effects of technology....
4 Pages (1000 words) Essay

Brave New World of Technology

This paper ''Brave New World of technology'' tells that Radio Frequency Identification (RFID) the latest surveillance technology raises new concerns about invasion of privacy.... Corporations and government agencies are increasingly subscribing to the new RFID surveillance technology....   Privacy Concerns There are two ways in which the use of RFID technology can constitute an invasion of privacy: Via direct monitoring by marketers, manufacturers, retailers, sales agents, government, police, hospitals, and street cameras....
9 Pages (2250 words) Essay

New Technology Development in the Primary Sector

Research is the first step in new technology development.... It includes the production of basic foods as well as raw materials.... Another way to describe it would be to say that it is involved in the growing, harvesting, extraction, and sometimes processing… Activities associated with it include mining, fishing, agriculture (both subsistence and commercial), quarrying, farming, hunting and gathering, forestry, and grazing....
4 Pages (1000 words) Assignment

How Social Networks Are Invading Our Privacy

The same critics said that a new technology like the Information Highway and the Internet will destroy home life, prevent people from visiting other people (instead use technology to keep in touch), and create a new nations of slugs too lazy to go out of their homes and offices.... His article is actually a summary of four books describing the reactions of people at various times how technology will impact their lives.... It is technology that had shaped societies in the past and it is the same technological changes that shape society today....
7 Pages (1750 words) Essay

Information Technology and Privacy

This term paper "Information Technology and Privacy" presents privacy and confidentiality that relate to the ability of information to be kept away from third persons (Garson, 2003).... hellip; Various other characteristics aided by developments in Information technology have also increased the invasion of individual privacy.... Security measures such as the implementation of the USA Patriot Act have also further increased interference with citizen privacy....
11 Pages (2750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us