Internet Privacy – Has It Become Non-Existent? Essay Example
Internet Privacy – Has It Become Non-Existent? Essay Example

Internet Privacy – Has It Become Non-Existent? Essay Example

Available Only on StudyHippo
  • Pages: 8 (1961 words)
  • Published: January 17, 2018
  • Type: Case Study
View Entire Sample
Text preview

The Internet has made significant technological advancements over the past decade, revolutionizing communication and information access for millions of users worldwide. Initially developed as a secure military communication tool during the Cold War, it is now as commonplace as telephones or automobiles in America. With the necessary computer hardware, browser application, and internet connection, users can quickly access and exchange information.

However, connecting to the Internet also poses risks that threaten user privacy through various channels such as Internet service providers, search engines, and visited websites. As this communication medium continues to evolve, so do the threats to user privacy. Many internet marketing conglomerates discreetly collect valuable information from users including search engine results, visited websites, purchases made, and email addresses.

Unbeknownst to internet users themselves, they unknowingly leave behind trails of pe

...

rsonal information. The current regulations governing the collection and dissemination of this data by private companies and government entities are inadequate considering today's technological advances. Existing federal laws regulate the collection and distribution of data related to a user's internet activities.

The Electronic Communications Privacy Act (CPA) and the Children's Online Privacy Protection Act are laws designed to protect privacy. The CPA, established in 1986, regulates wiretapping and mail interception. However, some argue that these laws are outdated compared to new technologies. Certain entities benefit from the vague provisions of the CPA and oppose stronger privacy legislation. Currently, online marketing companies collect various user data such as search queries, visited webpages, purchases, and geographic location for targeted advertising purposes. User data is also sold to firms that compile comprehensive profiles by connecting fragments of information obtained through sign-ups or purchases on websites. Many

View entire sample
Join StudyHippo to see entire essay

adults are unaware of how valuable this collected data is for online marketing firms who can create detailed profiles based on users' activities. Behavioral advertising, which uses internet activity history to present targeted ads or offers, is seen as discriminatory by privacy advocates, consumers, and legislators alike.
This practice allows online companies to customize promotions based on users' preferences. For instance, individuals who are interested in discount websites like Walter may receive personalized promotions related to their interests. Conversely, those who are interested in higher-end websites such as narcissuses.com may come across different advertisements and promotional opportunities. However, this seemingly harmless practice can become problematic when users with credit challenges search for debt relief and provide their email address. In these cases, there is a potential risk of their profile being flagged due to previous associations with debt relief searches. This could have negative consequences if they later apply for a job in the financial sector and their email matches a previous profile associated with debt relief searches.

Mark Rottenest, executive director of the Electronic Privacy Information Center and Georgetown University Law Center professor, has testified before Congress about the lack of user awareness regarding data gathering and its potential misuse without proper legal regulations (CTD. N Marshall 938). It is crucial to consider the long-term effects of data collection and information sharing since major search engines like Google, MS, or Yahoo retain vast amounts of user data including visited websites. These companies maintain the digital roadmap for varying periods ranging from 90 days to 18 months.The Privacy Rights Clearinghouse cautions that email services like Microsoft's Hotmail and the MS web browser link individuals' email addresses to

their browsing activities, despite arguments for improved service and security. Privacy advocates express concerns about extended retention times and potential government surveillance. Google, which held an 82% global market share in 2008 as the dominant search engine, has successfully resisted subpoenas from the Justice Department seeking access to user searches. Over the past decade, pressure from privacy advocacy groups and constituents has prompted attempts at federal legislation aimed at regulating personal data collection. These laws seek to establish a federal privacy standard for websites, search engines, and governmental agencies due to increased use of tools by online industries for targeted advertising.

In 2002, Democratic Senator Ernest Holdings of South Carolina introduced the Online Personal Privacy Act with the goal of setting a minimum standard for online privacy. This act includes provisions for notice, consent, access, security, and enforcement requirements (Holdings par.1,10). Senator Holdings believes that this legislation will safeguard consumers against unscrupulous companies sharing personal information during online transactions. Additionally, it addresses consumer concerns about privacy while supporting e-commerce growth. Currently, there is no federal minimum standard for collecting user data on websites.Many websites either lack a privacy policy or have one written in complex legal language that average individuals struggle to understand its impact on their privacy. As long as a website follows its stated policy, even if it's vague, they cannot be accused of deceptive practices. Advertising executives argue against additional legislation as collecting marketing data is crucial for attracting advertising revenue. This revenue helps keep the Internet primarily free for exchanging consumer information and ensures its thriving existence.
Critics of regulation question whether consumers would be willing to pay for currently free content and

suggest users educate themselves about privacy issues, utilize browser privacy features, and avoid websites with inadequate privacy policies.
Targeted marketing is justified as it provides consumers with options that align with their preferences. In 2008, Charter Communications and Nebula announced plans to enhance customer data analysis, sparking Congressional hearings. However, following the hearings, both companies decided to abandon their plans.
Currently, there is no specific federal legislation addressing Internet privacy except for the Children's Online Privacy Protection Act. In the absence of such legislation, the Federal Trade Commission (FTC) has collaborated with industry leaders to establish self-regulation practices aimed at protecting consumer rights.The Network Advertising Initiative (ANA), which was formed in 1999 by 12 leading companies, initially established privacy guidelines that require members to disclose and conduct their practices according to certain standards. These guidelines include informing users about potential third-party cookie usage by advertisers, providing an option for users to opt out of personal information collection, and refraining from merging acquired user information. In December 2008, additional policies were introduced regarding sensitive information options, parental consent for children under 13, and annual compliance reviews (Marshall 946). With the growth of e-commerce, privacy protection companies like Trusts, EBB, and Version have emerged to establish standardized standards for member organizations regarding the collection of identifiable user information. Nowadays, almost all reputable websites display a privacy seal from one or more organizations (Fact Sheet 18). In his 2002 senate address, Senator Holdings recognizes the commendable efforts of industry leaders such as EarthLink, U-Haul, Intel, and others who have developed strong pro-consumer privacy policies and adhere to them. However, he also emphasizes that relying solely on self-regulation has not been

enough to protect privacy despite good intentions and some successful endeavors.The Federal Trade Commission (FTC) issued warnings in February 2009 to Internet marketing companies for not adequately explaining their information gathering policies to users. While the FTC believes that Internet companies can self-regulate, commission member Jon Leibniz cautioned that if privacy protections are not ensured, legislation may be introduced as Congress lacks patience. These hearings demonstrate the FTC's urging for the industry to improve their data collection privacy policies and practices or potentially face legislative actions. Privacy advocates argue that the USA Patriot Act, passed after the 9/11 attacks, has reduced Americans' protection against government surveillance and access to their communication records. This is because provisions in the Act allow the Justice Department to issue national security letters to internet service providers without a warrant from a judge, which contradicts standard requirements for telephone tapping. Consequently, this undermines the Electronic Communications Privacy Act of 1986. Jay Stanley from the American Civil Liberties Union highlights that technology has surpassed courts' understanding and ability to safeguard privacy. In the past, personal information was mainly stored in people's homes; however, now it is stored on servers owned by multinational corporations.The passage discusses the significance of sensitive information exchanged through the internet, particularly in relation to privacy concerns raised by the USA Patriot Act. It suggests that if these concerns had been addressed prior to 2001, they could have been a central theme in Dan Brown's fictional novel Digital Fortress. The story depicts Commander Tremor Stateroom leading a team of cryptography experts at the National Security Agency who decode intercepted electronic messages. Various US agencies also adopt this form

of global communication and begin tapping phones. The novel explains that privacy rights advocates like the Electronics Frontier Foundation had previously demanded an encryption formula from the government to prevent intelligence agencies from intercepting private communications. Stateroom's team is tasked with developing this encryption standard, but he secretly adds a backdoor into the code to maintain the National Security Agency's monitoring superiority. This alteration causes public outrage. Seeking redemption and career advancement, Stateroom sees an opportunity with a potential release of a new encryption code and tries to insert a backdoor code using Ana's powerful computer for code breaking purposes.To his surprise, he discovers that the code is actually a trick introducing a virus capable of destroying national security databanks. Consequently, the country becomes vulnerable to electronic terrorists. Such actions have led to the emergence of privacy advocacy groups like the Privacy Rights Clearinghouse in San Diego, California. The Privacy Rights Clearinghouse, a non-profit organization, is dedicated to increasing consumer awareness and advocating for consumer privacy rights in policy hearings. Other groups, such as the American Civil Liberties Union, the Center for Democracy and Technology, and the Electronic Frontier Foundation also support online privacy rights. These organizations argue that today's technological landscape renders the 1986 Electronic Communications Privacy Act ineffective and call for stronger federal Internet privacy protections. Critics believe that Congress's lack of federal legislation on Internet privacy may be attributed to its demographics as highlighted in a July 2008 Washington Post article titled "Senate Grapples with Web Privacy Issues". Websites have been collecting user data and creating detailed profiles for approximately ten years. During questioning, Senator Bill Nelson from Florida asked about Internet

connections but received confusion as a response; even he admitted uncertainty in this area.The confusion regarding discussions on data flows, bits and bytes, and Sips can be attributed to the fact that members of Congress are typically middle-aged or older and have not fully embraced technology like younger generations. However, some senators have proudly mentioned instances of reading their hometown newspaper online. The Platform for Privacy Preference (POP) is a solution that aims to safeguard Internet users' privacy through the use of machine-readable privacy policies. It involves the company's website communicating with the user's computer to ensure adherence to pre-configured privacy policies. However, a report from the Electronic Privacy Information Center titled "Pretty Poor Privacy: An Assessment of POP and Internet Privacy" discredits the effectiveness of POP in addressing online privacy concerns (par.1). According to the center, POP is seen as a complex and confusing protocol that hinders users from protecting their privacy effectively. Improper configuration of POP can lead to blocking access to legitimate websites and giving users a false sense of security. The internet has had a significant global impact on people's lives by facilitating instant information exchange and performing tasks that were once reliant on physical visits.

The convenience of storing personal information on external network servers instead of at home raises concerns about safeguarding users' private information. User privacy can be compromised in various ways, and the absence of federal legislation regarding the collection, assimilation, and sharing of personal information by marketing organizations or government authorities makes it inevitable that some data will be disclosed when using the internet. Previously, Americans' financial records, health data, and correspondence were kept within their

homes, ensuring privacy protection according to the constitution. However, technological advancements have led to this information being stored on external network servers rather than at home.

Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New