What Types Of Data Are Subject To Information Privacy? Argumentative Essay Example

Published: 2021-06-18 05:11:37
essay essay
This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Hey! We can write a custom essay for you.

All possible types of assignments. Written by academics

GET MY ESSAY
In the 21st century, private information is easily available and privacy appears to have disappeared. While some believe this may not be an issue, others are concerned with the impact on our lives. Write an argumentative essay presenting clear arguments and counterarguments.
Information privacy
Nowadays one of the hottest topics about personal privacy is the private information privacy. But what is the personal privacy? And why it is important for some people?
The privacy of the personal information, which usually is related to the personal data saved on computer systems, including online and offline sources. The data may include several types of information, including financial records, political records, criminal records, and medical records, which remain to be essential to maintain their privacy.
The answer to the question in regards to importance of the maintenance of the privacy of the personal information can be related to the sensitivity of such information, which is even getting more vulnerable, due to the advancements of the new digital age. (http://www.techopedia.com/definition/10380/information-privacy)
Online or Internet privacy: Any type of information shared online, is subject to privacy issues. Therefore, the websites most of the times have to provide privacy policy, which defines the way the information, is collected and used from online and even offline sources, in detail.
Medical privacy: This category is also subject to very strict privacy laws that define the prerogative rights. Thus, individuals, which deal with processing and storing of such information, need to have security and authentication systems.
Financial privacy: One of the most sensitive group of personal information regards to financial information, which can easily be used to commit fraud.
Therefore, by taking into consideration, the sensitivity of such information, the necessity of maintenance of the information privacy becomes more obvious. However, some people may doubt the importance of this information and may say that they do not have anything to hide. But the fact of information privacy is much deeper than hiding or not hiding some personal information. It may even put someone’s life into danger; this is where the information may be misused. But there are much deeper reasons to respect the information privacy, which are highly fundamental, and touch the essence of personhood of humanity. Humanity as an autonomous being requires and needs respect, the respect to humanity, and respect to the privacy cannot come apart. In other words putting the privacy of human in danger is not less than putting his life and dignity in danger. So we can say “even if privacy is not in itself a fundamental right, it is necessary to protect other fundamental rights.”( McFarland 2012)
But who exactly threatens our data privacy?
In this case, the very first person who is threatening us is ourselves. As already mentioned, almost all of the websites and application have a privacy policy, which defines the access they require to the information, which most of the times are against our privacy standards, however just to use those websites and applications, we accept their terms, and let them have access to our private information. This is one of the simple and initial violations of our information privacy.
Therefore, it is essential for the users to understand the level of the sensitivity of the information that is being shared online, in order to maintain the information privacy.
However, there are other situations, when our privacy is violated and we are not even aware of them. One of these situations is the gathering information by secret service agencies and governments of different countries that even sometimes do not have enough legal permissions to do so, but still is being done in the name of fighting terrorism or national security. That is one of the situations when especially governments are accused of violating the people’s information privacy. According to leaks, just in United States, the NSA in addition to collecting information about the cellphone use of the Americans, is collecting all types of digital communications which of course includes the most private and personal conversations. (As cited in Government threatens our privacy, 2013)
However, such violation of the people’s privacy has so many supporters as the main concern is the national security, and those who support idea claim that the security of the people and the country in comparison to people’s privacy is much more important. Of course, this aspect of the issue is also very important but there are several nuances that must be taken into consideration. In regards, there are not really clear rules which define, exactly who, why, and under which circumstances is authorized to access the information, however the situation is even much worse, as there is no specific type of information that the security agencies gather, they have access almost to all information, which is being bulk collected. It is not important that a person is suspected to be a dangerous person or not, anyway the information is recorded, and that is why this systematic violation of privacy is not acceptable. In case government provides clear rules, which specifies, under which circumstances will need to have access to personal information, it will logical and understandable.
The other threats of information privacy are those who try to access the information illegally and without the confirmation of the owner of the information. This group is always known as hackers, which have their own purposes for such acts, such as selling the information, extortion and of course other fraudulent activities. The purpose of this group is clear for everyone, therefore there is a consensus in fighting them to maintain the information privacy.
Conclusion
References
Janssen, C. (n.d.). What is Information Privacy? - Definition from Techopedia. Retrieved May 19, 2015, from http://www.techopedia.com/definition/10380/information-privacy
McFarland, M. Why We Care About Privacy. (2012, June 1). Retrieved May 19, 2015, from http://www.scu.edu/ethics/practicing/focusareas/technology/internet/privacy/why-care-about-privacy.html
ZOLNIKOV, D. (2013, July 25). Government threatens our privacy. Retrieved May 20, 2015, from http://missoulian.com/news/opinion/columnists/government-threatens-our-privacy/article_aefa5fac-f534-11e2-9414-001a4bcf887a.html

Warning! This essay is not original. Get 100% unique essay within 45 seconds!

GET UNIQUE ESSAY

We can write your paper just for 11.99$

i want to copy...

This essay has been submitted by a student and contain not unique content

People also read