CYB 220 Right to Privacy

.docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

220

Subject

Computer Science

Date

Jul 1, 2024

Type

docx

Pages

6

Uploaded by MasterPencil3659

Essay: Right to Privacy Rukiyyah Y. Johnson CSET, Grand Canyon University CYB 220: Cyber Law and Privacy in a Digital Age Professor Casterline March 10, 2024 1
Abstract In the digital time that we live in today there is a lot of focus on how companies are gathering users’ personal information as well as what they use it for and who they share it with. The essay discusses the different ways that our privacy is and can be affected due to our personal information being exposed in the public. Within the essay there will be preventative measures against these issues. Additionally, it will mention the correct ways companies should be using this data gathered and the effects of religious beliefs on these practices. There are laws that are currently being applied, but sometimes they are not always enforceable due to many reasons. There will be real would scenarios presented to provide guidance on reactive measures that should be taken in this digital age today. 2
Essay: Right to Privacy The leading cause today for the exposing of user privacy today is user agreements due to them having the ability to collect, view, and share personal information to outside companies (Science 2019) An example of a user agreement would be logging into any social media platform such as Instagram. Typically, when logging in the user will be asked to accept the terms and conditions before being able to continue. Once a user agrees to these terms whether they read them or not they are allowing their personal information to be collected which can be our browser history, geographic locations, and the people you communicate with on the platform. There are other ways that personal data can be accessed besides user agreements due to the advancements in technology today. An example would be a data broker due to them being able to collect data from users from more than one location, this can even be something like a public record. The existence of Internet of things is also a huge factor to consider due to the immense amounts of data that is all being gather with limited security. Preventative Measures To prevent the access of unauthorized data from reaching the wrong hands users must be aware of the websites, social media apps, and even the online shopping that they are indulging in because they can all leave a trace of data that can easily be accessed without being aware. There are cases that were legally upheld to display the significance of having good security practices such as FTC v. Wyndham worldwide corp. the significance of this cases is because the Federal Trade commission found Wyndham corporation at fault for not implementing the necessary preventative measures when it came to security which resulted in unwanted data breaches (Fair, 2019). Another preventative measure for users is by applying their own encryption tools, 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help