CYB 220 Right to Privacy
.docx
keyboard_arrow_up
School
Grand Canyon University *
*We aren’t endorsed by this school
Course
220
Subject
Computer Science
Date
Jul 1, 2024
Type
docx
Pages
6
Uploaded by MasterPencil3659
Essay: Right to Privacy Rukiyyah Y. Johnson
CSET, Grand Canyon University
CYB 220: Cyber Law and Privacy in a Digital Age
Professor Casterline March 10, 2024
1
Abstract
In the digital time that we live in today there is a lot of focus on how companies are gathering users’ personal information as well as what they use it for and who they share it with. The essay discusses the different ways that our privacy is and can be affected due to our personal information being exposed in the public. Within the essay there will be preventative measures against these issues. Additionally, it will mention the correct ways companies should be using this data gathered and the effects of religious beliefs on these practices. There are laws that are currently being applied, but sometimes they are not always enforceable due to many reasons. There will be real would scenarios presented to provide guidance on reactive measures that should be taken in this digital age today.
2
Essay: Right to Privacy
The leading cause today for the exposing of user privacy today is user agreements due to them having the ability to collect, view, and share personal information to outside companies (Science 2019) An example of a user agreement would be logging into any social media platform
such as Instagram. Typically, when logging in the user will be asked to accept the terms and conditions before being able to continue. Once a user agrees to these terms whether they read them or not they are allowing their personal information to be collected which can be our browser history, geographic locations, and the people you communicate with on the platform. There are other ways that personal data can be accessed besides user agreements due to the advancements in technology today. An example would be a data broker due to them being able to collect data from users from more than one location, this can even be something like a public record. The existence of Internet of things is also a huge factor to consider due to the immense amounts of data that is all being gather with limited security. Preventative Measures
To prevent the access of unauthorized data from reaching the wrong hands users must be aware of the websites, social media apps, and even the online shopping that they are indulging in
because they can all leave a trace of data that can easily be accessed without being aware. There are cases that were legally upheld to display the significance of having good security practices such as FTC v. Wyndham worldwide corp. the significance of this cases is because the Federal Trade commission found Wyndham corporation at fault for not implementing the necessary preventative measures when it came to security which resulted in unwanted data breaches (Fair, 2019). Another preventative measure for users is by applying their own encryption tools, 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
"The impact of hacking on life" - For the last several years cyber-attacks/hacking are in the news on a seemingly continuous basis. Some of the most recent/largest hacking events include the Solarwinds hack that was the conduit for the major breach of many US Federal agencies and the disturbing Equifax hack from 2017. Have these events and the subsequent reporting caused you to change any habits/behaviors? Please provide your thoughts on this along with why you have or have not made any changes as a result of these events.
Hint: Please don't use chat gpt
arrow_forward
1. Information Privacy
A study by the Annenberg Public Policy Center at the University of Pennsylvania shows
that 95 percent of people who use the Internet at home think they should have a legal right
to know everything about the information that websites collect from them. Research also
shows that 57 percent of home Internet users incorrectly believe that when a website has
an information privacy policy it will not share personal information with other websites
or companies. In fact, the research found that after showing the users how companies
track, extract, and share website information to make money, 85 percent found the meth-
ods unacceptable, even for a highly valued site. Write a short paper arguing for or against
an organization's right to use and distribute personal information gathered from its website.
arrow_forward
Hi I want to make a video presentation on this topic which should be 5 mins atleast, so need help below format:
Discussion: Misadventures of a Nation State Podcast
Discuss Darknet Diaries Episode 10. Why is this a video discussion instead of a written response? It is an important skill to master to be able to present and summarize the key concepts of a complex cybersecurity incident in a short time frame. Remember that unless you are talking to other cybersecurity professionals, probably no one thinks this stuff is as interesting as you do.
Instructions: The main purpose of the video discussion assignments is to get you to dig into the main four cybersecurity frameworks and references we use in the class. Use the context of the specific security incident to explore and explain some aspects of the NIST CSF, the CIS CSCs, ACSC Strategies to Mitigate Cyber Incidents, and the MITRE ATT&CK matrix.
Keep each discussion sub-topic focused and to approximately 1 minute for a TOTAL video…
arrow_forward
INTERNET and COMPUTER CRIME
1. You are one of the top students in your university’s computer science program of 200 students. You are surprised when you are met after class by two representatives from a federal intelligence agency. Over dinner, they talk to you about the increasing threat of cyberterrorist attacks launched on the United States by foreign countries and the need to counter those attacks. They offer you a position on the agency’s supersecret cyber terrorism unit, at a starting salary 50 percent higher than you know other computer science graduates are being offered. Your role would be to both develop and defend against new zero-day exploits that could be used to plant malware in the software used by the government and military computers. Would such a role be of interest to you? What questions might you ask to determine if you would accept their offer of employment?
2. You are a member of the application development organization for a small but rapidly growing…
arrow_forward
Computer Ethics and Law Subbject.
Thak you in advance.
Is it ethically acceptable or ethically prohibited for an advocacy group to launch a socialbot on a social media system that pretends to be a person and subtly promotes the group’s viewpoint? Consider the same question for a socialbot that promotes a particular company’s products.
arrow_forward
Computer Science
After you have concluded the readings and lectures this week, think about what the laws do not cover in terms of cybercrime. Where are the gaps? Assume you are the lead staffer for a congressman, what would you recommend for future legislation (realistically – given current available technologies and limitations)? How would you approach a non-technically savvy person and convince them to support your legislation?
arrow_forward
The role of privacy is important and controversial in today's society. What more needs to be done to ensure privacy while online? For example, do you feel laws are enough?
arrow_forward
Links to topics where citizens have a constitutionally protected right to privacy.
arrow_forward
Discuss the steps to protect against privacy loss
arrow_forward
Word limit: 1000 words
arrow_forward
Subject :Guide to Computer Forensics and Investigations 6th edition
Topic 2: The investigator's office and laboratory
This topic provides an introduction to setting up an effective digital forensics laboratory and a private office where digital forensics examiner can manage cases, conduct interviews and communicate without eavesdropping concerns. The topic also introduces law, policies and procedures in the context of Australian digital legislation.
Question
A2Z Forensics is a digital forensics investigation firm that conducts forensic investigations for public as well as private sectors. You are working in this firm as a forensics specialist for a number of years now. The firm is establishing a new forensics lab to meet the future requirements. You have been asked to prepare a business case for this new lab. Your job is to focus on three aspects of the new lab which are hardware, software and lab security. Based on the knowledge of topic 2, prepare a brief business case, summarise…
arrow_forward
Data privacy? List five privacy measures.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- "The impact of hacking on life" - For the last several years cyber-attacks/hacking are in the news on a seemingly continuous basis. Some of the most recent/largest hacking events include the Solarwinds hack that was the conduit for the major breach of many US Federal agencies and the disturbing Equifax hack from 2017. Have these events and the subsequent reporting caused you to change any habits/behaviors? Please provide your thoughts on this along with why you have or have not made any changes as a result of these events. Hint: Please don't use chat gptarrow_forward1. Information Privacy A study by the Annenberg Public Policy Center at the University of Pennsylvania shows that 95 percent of people who use the Internet at home think they should have a legal right to know everything about the information that websites collect from them. Research also shows that 57 percent of home Internet users incorrectly believe that when a website has an information privacy policy it will not share personal information with other websites or companies. In fact, the research found that after showing the users how companies track, extract, and share website information to make money, 85 percent found the meth- ods unacceptable, even for a highly valued site. Write a short paper arguing for or against an organization's right to use and distribute personal information gathered from its website.arrow_forwardHi I want to make a video presentation on this topic which should be 5 mins atleast, so need help below format: Discussion: Misadventures of a Nation State Podcast Discuss Darknet Diaries Episode 10. Why is this a video discussion instead of a written response? It is an important skill to master to be able to present and summarize the key concepts of a complex cybersecurity incident in a short time frame. Remember that unless you are talking to other cybersecurity professionals, probably no one thinks this stuff is as interesting as you do. Instructions: The main purpose of the video discussion assignments is to get you to dig into the main four cybersecurity frameworks and references we use in the class. Use the context of the specific security incident to explore and explain some aspects of the NIST CSF, the CIS CSCs, ACSC Strategies to Mitigate Cyber Incidents, and the MITRE ATT&CK matrix. Keep each discussion sub-topic focused and to approximately 1 minute for a TOTAL video…arrow_forward
- INTERNET and COMPUTER CRIME 1. You are one of the top students in your university’s computer science program of 200 students. You are surprised when you are met after class by two representatives from a federal intelligence agency. Over dinner, they talk to you about the increasing threat of cyberterrorist attacks launched on the United States by foreign countries and the need to counter those attacks. They offer you a position on the agency’s supersecret cyber terrorism unit, at a starting salary 50 percent higher than you know other computer science graduates are being offered. Your role would be to both develop and defend against new zero-day exploits that could be used to plant malware in the software used by the government and military computers. Would such a role be of interest to you? What questions might you ask to determine if you would accept their offer of employment? 2. You are a member of the application development organization for a small but rapidly growing…arrow_forwardComputer Ethics and Law Subbject. Thak you in advance. Is it ethically acceptable or ethically prohibited for an advocacy group to launch a socialbot on a social media system that pretends to be a person and subtly promotes the group’s viewpoint? Consider the same question for a socialbot that promotes a particular company’s products.arrow_forwardComputer Science After you have concluded the readings and lectures this week, think about what the laws do not cover in terms of cybercrime. Where are the gaps? Assume you are the lead staffer for a congressman, what would you recommend for future legislation (realistically – given current available technologies and limitations)? How would you approach a non-technically savvy person and convince them to support your legislation?arrow_forward
- The role of privacy is important and controversial in today's society. What more needs to be done to ensure privacy while online? For example, do you feel laws are enough?arrow_forwardLinks to topics where citizens have a constitutionally protected right to privacy.arrow_forwardDiscuss the steps to protect against privacy lossarrow_forward
- Word limit: 1000 wordsarrow_forwardSubject :Guide to Computer Forensics and Investigations 6th edition Topic 2: The investigator's office and laboratory This topic provides an introduction to setting up an effective digital forensics laboratory and a private office where digital forensics examiner can manage cases, conduct interviews and communicate without eavesdropping concerns. The topic also introduces law, policies and procedures in the context of Australian digital legislation. Question A2Z Forensics is a digital forensics investigation firm that conducts forensic investigations for public as well as private sectors. You are working in this firm as a forensics specialist for a number of years now. The firm is establishing a new forensics lab to meet the future requirements. You have been asked to prepare a business case for this new lab. Your job is to focus on three aspects of the new lab which are hardware, software and lab security. Based on the knowledge of topic 2, prepare a brief business case, summarise…arrow_forwardData privacy? List five privacy measures.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning