Today in society, people are expected to be able to protect their own privacy, but the very definition of privacy states that it is in no way completely attainable, nor will it ever be. And why would people want that when it has been proven that to achieve absolute privacy would mean to forfeit a place in society (Nehf)? But in recent years, privacy infringements through the Internet have gotten out of hand. Until privacy becomes a principal concern for Internet users, they remain unsafe, easy targets for deceitful scammers, other users, data collectors, and more.
There are many problems surrounding the Internet and its current privacy systems, one of the biggest ones being the current user accountability arrangement. Currently, individuals are accountable for fixing their own privacy breaches. This means that if a problem occurred and a user’s privacy was violated, the user would be largely responsible for the majority of the restoring process, whatever that may entail. The problem with this is that individuals rarely know that a privacy breach has, in fact, occurred (Stefoff). Many skilled online scammers can steal a person’s personal information so clandestinely that the victim isn’t aware of the dangerous theft. Additionally, tracing problems to their causes or sources is nearly impossible (Brin). Because scammers are so skilled at their immoral occupation, they are adept at leaving no trail to be followed that would allow their incrimination.
Another better-known example of large scale Internet destruction is cyber bullying. Cyber bullying is when a child, preteen, or teen is tormented, threatened, harassed, humiliated, embarrassed, or otherwise targeted by another child, preteen, or teen using the Internet, interactive or digital technologies, or mobile phones (“Cyber Bullying: Outlook”). Cyber bullying is a complicating and devastating issue because less than 30 percent of its victims tell their parents and schools that observe it have a hard time intervening on behalf of children affected by cyber bullying without violating the bullies’ fundamental rights (“Cyber Bullying: Outlook”). For example, the First Amendment concerns the right to free speech. But where is the line drawn between free speech and cyber bullying? Many schools and organizations observe signs of Cyber bullying, but the Fourth Amendment banning illegal search and seizure prevents them from taking further action.
Privacy infringements through the Internet are publicly viewed as the work of evil, foul criminals. But what if the person violating your privacy is your best friend? In many situations a violation of privacy is an embarrassing wall post or a mean video or tweet. This is a specifically hurtful instance because it is much more difficult to confront a friend instead of a faceless online perpetrator. Moreover, many individuals are perfectly will to violate their own privacy through revealing photos and the sharing of too much personal...