SEARCH RESULTS

YOU WERE LOOKING FOR :A Privacy Issue

Essays 151 - 180

Criminal Surveillance: Pros and Cons

casual downtown shopping trip; they feel this constitutes an invasion of their privacy. For instance, the House Majority Leader at...

Constitutional Rights v. Internet Privacy

Current Issues & The Conflicts Involved In terms of time, the Internet is basically still in its infancy. Its origin can be trac...

Google Privacy Policy Change - An Ethical Perspective

been introduced with out giving any individuals the ability to opt out of the new policies. The new policy was introduced on 1 Mar...

U.S. CITIZENS AND PRIVACY INFORMATION

privacy - and it isnt helped by the fact that there are certain cases in which the federal government has the right to make privat...

Arguing Against Industry or Business Use of Polygraph Testing

In three pages this paper argues against polygraph testing in the corporate sector as an invasion of employee privacy. Four sourc...

The Military and Informational Privacy

judge decided that the "dont ask, dont tell" dictum should not be enforced, President Obama asked to wait on that decision. Geidne...

Electronic Medical Records: An Overview of Benefits

records, highlighting the capacity for such a change to have a sweeping impact throughout the industry. For example, in the 2009 "...

Privacy Concerns and Information System Usage

them out, which is not conducive to a desirable outcome. With such a policy in place, the issue is less personal. If no properly w...

THE WORKPLACE AND BREASTFEEDING

of choice and need are pitted against each other in the debate over breastfeeding in the workplace, the winner has historically fa...

Health Agencies and Regulation

and enforcer, taking on issues that are deemed to be in the public interest, but are not provided through other market mechanisms....

Technology as a Non Racist Tool in the Fight Against Terrorism

In the twenty first century we are faced with a definite challenge in regard to how to go about balancing our...

Cyber-Crime Prevention: The Ethical Considerations

consumers or clients, or even contractually confidential information in some cases) is compromised, then it could mean the total d...

Less Privacy, More Security

one should trade for security is as old as the Republic itself, with Ben Franklin famously weighing in with the sentiment that any...

Corporate v Personal Rights on the Internet

However, Engstrom described security in relationship to pipeline theory, where if a consumer opts out, the action stops the flow o...

SWISS BANKS, SECRECY AND TAXES

that has been in place for decades (Geiger and Hurzeler, 2010). But this is changing in recent years. U.S. tax enforcers a...

E-COMMERCE PROGRAM FOR KUDLER FINE FOODS

need to be reassured that the data would only be used for Kudlers purposes. There are also legal considerations for a progr...

Privacy in the Use of a Cell Phone and the Job of a Defense Attorney

or even months. But a moments reflection reveals why the law insists on this interpretation. In U.S. jurisprudence, the burden is ...

American Hotel Industry Changes

law and it is enforced by the Wage & Hour Division of the U.S. Department of Labor (DOL). This Act was amended in 1940, 1947, 1949...

Computer Age and Information Ethics

technology in general. The ease with which personal information can be unscrupulously gleaned from the multitude of computerized ...

Historical Perspectives on the Right to Privacy Concept

This paper examines the 'right to privacy' concept from an historical perspective with contemporary techniques of surveillance and...

Workplace Privacy and Skinner v. Railway Labor Executives Association, 489 U. S. 602, 1989

In five pages this paper examines privacy in the workplace with regards to this case that considered whether or not mandatory work...

Privacy from a Philosophical Perspective

In sixteen pages this paper analyzes privacy from the perspective of philosophy. Twenty four sources are cited in the bibliograph...

Internet Information Basics

In a paper consisting of ten pages the ways in which the Internet can be used are examined with its historical development first c...

Contract and Privacy Laws of New Zealand

In five pages this paper considers 2 case studies relating to New Zealand's contract and privacy laws. Four sources are cited in ...

Silence and Go Tell It On The Mountain by James Baldwin

In five pages this paper presents the argument that silence in this text is employed as a means of hiding sins and preserving peac...

Consumer Privacy, Data Protection, and the Digital Age

In ten pages this paper discusses the compromising of consumer privacy that can occur as a result of the Internet in a considerati...

3 Websites Reviewed and Evaluated

are displayed on a left bar; asides are relegated to a bar on the right. It provides a link to Amazon.com, and tells users precis...

Case Analysis of Information Systems Management

In five pages this case analysis presents a problem definition regarding privacy invasion through data mining, problem justificati...

Totalitarianism Themes in 1984 by George Orwell

be infiltrated by hackers. In some ways the tables have turned. 1998 is not 1984. Rather, it is a topsy turvy world where the thes...

US Constitution's 4th Amendment

In five pages this paper analyzes the 4th Amendment of the US Constitution as it pertains to privacy rights and 'search and seizur...