Privacy is the ability of an individual or group to
seclude them or information about themselves and thereby reveal them
selectively. The boundaries and content of what is considered private differ
among cultures and individuals, but share basic common themes. Privacy
is sometimes related to anonymity, the wish to remain
unnoticed or unidentified in the public realm. When something is private to a person,
it usually means there is something within them that is considered inherently
special or personally sensitive. The degree to which private information is
exposed therefore depends on how the public will receive this information,
which differs between places and over time (http://en.wikipedia.org).
During our
short discussions we had discussed the five different types of privacy in our
Ethics subject as follows, Identity theft, customer profiling,
Identity theft is a
crime in which an imposter obtains key pieces of personal information, such as
Social Security or driver's license numbers, in order to impersonate someone
else. The information can be used to obtain credit, merchandise, and services
in the name of the victim, or to provide the thief with false credentials. In
addition to running up debt, an imposter might provide false identification to
police, creating a criminal record or leaving outstanding arrest warrants for
the person whose identity has been stolen. Identity theft is categorized in two
ways: true name and account takeover. True name identity theft means that the
thief uses personal information to open new accounts. The thief might open a
new credit card account, establish cellular phone service, or open a new
checking account in order to obtain blank checks. Account takeover identity
theft means the imposter uses personal information to gain access to the
person's existing accounts. Typically, the thief will change the mailing
address on an account and run up a huge bill before the person whose identity
has been stolen realizes there is a problem. The Internet has made it easier
for an identity thief to use the information they've stolen because
transactions can be made without any personal interaction. Although
an identity thief might crack into a database to obtain personal information,
experts say it's more likely the thief would obtain information by using
old-fashioned methods. Retrieving personal paperwork and discarded mail from
trash dumpsters dumpster diving is one of the easiest ways for an identity
thief to get information. Another popular method to get information is shoulder surfing - the identity thief
simply stands next to someone at a public office, such the Bureau of Motor
Vehicles, and watches as the person fills out personal information on a form.
To
prevent identity theft, experts recommend that you regularly check your credit
report with major credit bureaus, follow up with creditors if your bills do not
arrive on time, destroy unsolicited credit applications, and protect yourself
by not giving out any personal information in response to unsolicited e-mail (http://searchsecurity.techtarget.com).
This is
the few types of Identity theft.
1. Financial Identity Theft
2.
Insurance Identity Theft
3.
Medical Identity Theft
4.
Criminal Identity Theft
5.
Driver’s License Identity Theft
6.
Social Security Identity Theft
7.
Synthetic Identity Theft
8.
Child Identity Theft
Consumer Profiling is a description of a customer
group or type of customer based on various demographic, psycho graphic and/or
geographic characteristics; also called shopper profile. For example, magazine advertising salespeople provide advertisers with
customer profiles describing the type of person who will be exposed to
advertisements in that magazine. The description may include income,
occupation, and level of education, age, gender, hobbies, or area of residence.
Customer profiles provide the knowledge needed to select the best prospect
lists and to enable advertisers to select the best media.
Companies openly collect
personal information about Internet users by the use of cookies; it is text
files that a Web site puts on a user’s hard drive so that it can remember the
information later. Tracking software similar methods used outside the Web
Environment. Databases contain a huge amount of a consumer behavioral data.
Affiliated Websites it is
a Group of Web sites served by a single advertising network, customized service
for each consumer.
Types of data collected
while surfing the Web:
- GET data
- POST data
- Click-stream data
There are four ways to
limit or even stop the deposit of cookies on hard drives.
–
Set the browser to limit or stop cookies
–
Manually delete them from the hard drive
–
Download and install a cookie-management program
–
Use anonymous browsing programs that don’t accept cookies
Treating Consumer Data Responsibly strong measures are
required to avoid customer relationship problems. The Chief privacy Officer
(CPO) is the one who oversee data privacy policies and initiatives.
Employers monitor workers
ensures that corporate IT usage policy is followed. Fourth Amendment cannot be
used to limit how a private employer treats its employees public-sector
employees have far greater privacy rights than in the private industry. Privacy advocates want federal legislation to keeps employers from
infringing upon privacy rights of employees. Example of this is spamming; transmission
of the same e-mail message to a large number of people, extremely inexpensive
method of marketing, used by many legitimate organizations, Can contain
unwanted and objectionable materials
Employee monitoring in the workplace should be expected but the lack of
laws and legislation mean workers' privacy is at risk. As such, there should be
clear, written policies to identify the parameters of monitoring by employers
to prevent intruding into people's private affairs, observers suggest.
Advanced Surveillance Technology is use also to monitor their employees
if they do their work properly and if they follow the rules of the company.
Surveillance Technologies has distinguished itself from other security
companies by specializing in providing top of the line digital recording
surveillance systems that allow business to remotely manage their facilities
from anywhere around the world.
Three main types
of Advanced Surveillance Technology that used by most of rich countries
- Camera surveillance - U.S. cities plan to expand surveillance systems “Smart
surveillance system”
- Facial recognition software - identifies criminal suspects and other
undesirable characters, yields mixed results
- Global Positioning System (GPS) chips - Placed in many devices,
Precisely locate users
Thank you for spending your time reading my blog :).




No comments:
Post a Comment