Privacy Protections Legislation

Privacy Protections Legislation in United States

Privacy Protections Legislation

Overview of Privacy Protections Legislation in relation to cyber crime: [1] A simple activity like walking to my car in the evening after work may be videotaped and stored for later review. Is it any wonder that the progression of this technological advancement is the automated traffic violation system that utilizes video photography, governmental and informational databases, and even the U.S. Postal Service to acknowledge and correct my personal driving sins. No longer can one expect to speed and then hide in the privacy of personal anonymity. Technology seems to be making daily gains in unmasking these proclivities. Parking ticket recipients, a group that has formerly been occupied by scofflaws, have experienced a dramatic shift in enforcement techniques, given that local law officers can now use personal technology to identify the history of parking violations and unpaid fines and then adapt a response strategy, which may include towing the violator’s car or affixing a ”boot” to the tire until the owner takes care of his outstanding parking tickets. Oh for the good old days of being able to throw away a parking violation because one was driving a car with out-of-state plates and was thus protected by the shield of personal anonymity.

More Details about Privacy Protections Legislation

These life strategies have gone the way of the typewriter and carbon paper. Computer-based accountability procedures can be relentless in the pursuit of resolution and closure. Thus, we live in a world that embraces the fantasy of personal privacy while the reality of enhanced computer transparency continues to intrude upon our expectations. What a cognitive conundrum we have wrought. Movement toward embracing personal privacy produces the outraged cry that we are living in an ITstone age, while embracing the technological and informational leaps computers yield may result in our being data-naked and vulnerable to influences that seek to identify our personality characteristics in terms of potential for manipulation. This very dilemma goes to the heart of using legislative processes to establish a body of law governing Internet-based activities. At first glance such an agenda is likely to trigger a hue and cry from those concerned with freedom of choice and freedom of action, but a brief analysis of the potential pitfalls underscores the need for a legal framework to constructively pursue safe Internet access.

Resources

Notes and References

  1. By Kevin J. McCarthy and Samuel C. McQuade, III

See Also

  • Types of Cybercrime
  • Cybercriminal

Further Reading

Bennett, C.J. (1992). Regulating privacy: Data protection and public policy in Europe and the United States. Ithaca, NY: Cornell University Press; Boyd, C. (1998). Information security and privacy: Proceedings of the Third Australasian Conference, ACISP’98, Brisbane, Australia, July 13–15, 1998. Lecture Notes in Computer Science. New York: Springer Publishing; Caloyannides, M.A. (2004). Privacy protection and computer forensics (2nd ed.). Norwood, MA: Artech House Publishers.


Posted

in

,

by