Paper Details  
 
   

Has Bibliography
2 Pages
436 Words

 
   
   
    Filter Topics  
 
     
   
 

computer privacy

Today a profound shift in the privacy equation is under way. Technology brings enormous efficiency to the collection, sorting and distribution of personal information. This efficiency has revolutionized countless organizations but it has also increased opportunities for snooping. The ability of computers to sift though personal information may make much of your life an open book, unless privacy policies are implemented. In many countries a large number of records are public, available to anyone. In the United States, for example, public records typically include voter registration lists, Department of Motor Vehicle records, federal tax liens, arrest and conviction records, court proceedings and judgments, bankruptcy and probate records, and lists of births, deaths and marriage licenses. Additional information is available in commercial directories and databases, including phone books, city directories, professional directories and newspaper databases. Many records that we think are confidential today such as credit reports, income-tax records, social security records, loan applications, bank account records, credit card records, Telephone Company records, military records and medical records may not be confidential tomorrow. If a curious neighbor wants to know something about you, it takes some expense and effort but with the rise of computer databases and the Internet, it's getting easier to correlate information and develop a profile of somebody. Already, some companies are beginning to offer services that collect personal information and sell it on CD-ROMs or online. Take police reports, for example, they are public. The Internet will make this kind of information extraordinarily public, unless the rules change. The way to protect privacy in this age of information technology is to develop respect for the privacy of personal information. We shouldn't ban the collection of legitimate information or deny organizations the benefit of...

Page 1 of 2 Next >

    More on computer privacy...

    Loading...
 
Copyright © 1999 - 2024 CollegeTermPapers.com. All Rights Reserved. DMCA