This website uses cookies to ensure you have the best experience. Learn more

Privacy In The Information Age Essay

1007 words - 4 pages

Notes: Watch for spelling and grammar errors. Privacy is something that is being lost today because of modern technological advancements. Too many individuals have access to other individuals' information. In today's technologically advancing world of information, employers are having a never-ending battle with their employees on how much privacy employees have and how much of that privacy the employers should have access to. William S. Hubbartt's essay, "Privacy Rights: The New Employee battlefield," suggests that privacy invasion begins before a potential employee starts his or her first day of work. The individual must go through a series of tests and examinations to prove themselves worthy of working for the particular company. Such tests include physical exams and drug screenings. Although this is a form of privacy invasion, it is also a form of testing that must be done. This evaluates how much of a health risk an individual is to the company. If the individual is a health risk, then it is not to the company's best interest to hire that individual.Looking at a potential employees' background information can be seen as another form of privacy invasion. The thought of having someone look into an individual's past and judging him or her by it can seem assaulting to the individual. However, it is a good way for the employer to verify that all the information provided by the applying individual is accurate. It also gives the employer ease of mind to know the individual's qualifications. The employer may have too many applicants and be able to hire only a few. Such information could provide the applying individual the boost that he or she needs. It is a form of privacy, but one that is needed.Hubbartt believes that all these pre-employment exams and screenings are a form of privacy invasion. However, in accepting to take these exams, the individuals are also accepting to divulge any required personal information. They are the ones putting themselves in that position; therefore, many may see it as it not being an invasion in privacy. It is information that the individual provided. As for the background check, the individuals are also stating that the information on the paper is true and that the employer is allowed to verify such information. A private place is no longer private if the individual grants access to such place. Such is the application process for certain employments.One other invasion of privacy in the work place that Hobbartt points out is when the individual is hired. Once an individual is employed, the employer acquires more power to invade the employee's privacy. The example given is the monitoring of computers. Computer activity monitors are able to count how many keystrokes the employee makes, how much time the individual spends off the computer, and how much company time the individual is spending surfing through web sites that are non-work related.All these test and screenings are seen as a privacy...

Find Another Essay On Privacy in the Information Age

Privacy in the Age of Digital Social Media

2061 words - 8 pages people will remember these. But they are not the only data created. For example, Facebook stores information about all activities their users do. They store all messages, even deleted ones, they store all information about all logins, they know the times, places, and the devices you logged in from (Solon, 2012). At the beginning of the age of Internet, companies wanted to track how many visitors they have. They developed a technique that

Image And Sound In The Information Age

602 words - 2 pages Image And Sound In The Information AgeMinimalistic Glass, The Silk Road Project, Video art pieces by Paik and Viola, and the global paradigms of Chris Ofili, Andreas Gursky, and Cai Guo-Qiang, this variety may seem to have been impossible decades ago. Back then, Expressionism was a movement that proved to be an enduring force in 20th century art, exercising a strong influence on New York painters of the 1940s and 1950s. This period also promoted

The information age

533 words - 2 pages Joe the mailman will no longer be coming to your door. You won't have to go pickup your newspaper in the bushes at 6:00am anymore. Libraries will be a thing of the past.Why is this all happening? Welcome to the information age.'You've got mail!' is the sound most people are listening to. No more lickingstamps, just click on the 'send' icon, and express delivery service will take on a wholenew meaning.The future is here. Now, a mouse is better

Security and Consumer Protection in the Information Age

3706 words - 15 pages Abstract: At this point in time the ubiquity of personal and sensitive information of businesses and individuals who participate in the world economy is greater than ever. As in the past, your information could be found on an old credit card statement inside your garbage can at the end of your driveway; just waiting to be plucked by the next crafty criminal who can get his hands on it. Now your sensitive personal information is inside not

Information Technology and Open Source Marketing in the Participation Age

6126 words - 25 pages participation age as the new driving business values of the 21stcentury."In the Participation Age, there are no arbitrary distinctions between passengers and crew, actorsand audience. Be one, be both, be everything in between." (McNeally: nd).The participation age (as the logical evolutionary step after information age) clearly induced thevalues of the open source movement.Scott McNeally and Sun's top executives are not particularly known as

Information Privacy In Todays Tecnological World

1527 words - 6 pages reuse. However,due to advances in technology and data retrieval systems andtransactions, information has been given commercial value, especially with regards to the issue of who owns and controls this information. The information age has been a period that has allowed rights to privacyto beocme seriously jeopardized by new information technologies.Richard A. Spinello, has defined two distinct phases to the systematicerosion of information privacy

Privacy of Personal Information on the Internet

2437 words - 10 pages send all the information to the hacker. The user must also use firewalls to prevent networks from being attacked. Companies should take extra precautions to prevent attacks on their network. b. Regularly updating anti-virus software New viruses appear everyday. The users must regularly update their software kept track of new privacy attacks that may arise in the future. c. Using Good Password Most effective password attacks

Privacy of Personal Information on the Internet

2042 words - 8 pages Privacy of Personal Information on the Internet United States Policy Living in the United States has its advantages. We are afforded many opportunities that are unavailable or unheard of in other countries. We maintain a limited right to privacy in the areas of education, marriage, procreation, contraception etc. In certain instances, government officials are allowed to watch, listen, search and/or seize a person's personal information

Research in the area of Information Security at Corporate Websites including the role of "Privacy Seals"

3857 words - 15 pages Research in the area of Information Security at Corporate Websites including the role of "Privacy Seals"The moot question that needs to be answered before one starts the analysis of research in the area of web security is to gauge the importance of electronic commerce. Electronic Commerce has taken the world by storm and is perhaps the fastest growing frontiers in the business arena. The sheer statistics tells a story that is often untold and

Privacy in the Workplace

2493 words - 10 pages by a lot of viewpoints. If a company is clear about it's policies from the beginning and the reasons for this monitoring can be presented in a logical manner then the employees would probably accept them if they are within reasonable limits. The problem with the information being gathered from monitoring is that like all data it is open to interpretation and so error can result from it. To decrease privacy abuse in companies there has to be

Privacy in the Workplace

1612 words - 6 pages to genetic testing invading privacy is that it reveals information about an individual that can hinder their livelihood without their discretion. “Only in the ‘exceptional cases’ should ‘the use of genetic screening… be considered… [and] the performance of the test does not prejudice the aim of improving conditions in the workplace’ (Holtzman, 2003). If a test is conducted without the consent of the individual, its use should only be for a

Similar Essays

Living In The Information Age Essay

597 words - 3 pages to report such case because they fear losing their client’s trust. It is clear that cyber-attacks on individuals and private organizations causes harm. Nonetheless, its harm is far less than the harm it causes to government institutions. This is because attacks on individuals and private organizations, leads to financial and privacy losses to a minority. On the contrary, attacks on government institutions results in unwanted tension that affects

Becoming Information Literate In The Digital Age

749 words - 3 pages so many professors are surprised to see how much information their students used is from biased, inaccurate, and commercial websites. This essay aims to provide a holistic view of online information and how students can improve their search ability in the digital age. To understand how information is communicated online, students need to understand the basics of the global network. The Internet, as it sounds, is a connection of

Living In The Age Of Information Explosion

1811 words - 8 pages Today is an era of information explosion. In the past few years, many newly invented technological devices and software are now tightly integrated with our everyday lives. Today, people can look up almost any kind of information, make friends, communicate with others, and express ourselves with the simple touch of a button on a device we usually keep within arm’s reach. “Widespread use of technology is changing the way we work, learn, and

Deliberate Democracy In The Information Age

845 words - 3 pages Jason Cordero November 13, 2001 Ethics in the Information Age Deliberative Democracy in the Information Age The Internet today could help or deter democratic participation. By using the net I could promote hate groups and negative consequences as such. The Internet can also be very helpful and important. Ideas and views that would never have been viewed by such a wide range of people. Exposing the population to new ideas and responsibilities.The