Personal Privacy Summary

Improved Essays
Though the technology of RFID tags does not put everyone in immediate danger, it does present risk to personal privacy. In Alejandro Martinez’s article, “Privacy concerns grow with the use of RFID tags,” he shows the reader the incredible benefits of the technology, as well as Ozer’s example of the technology being used for kidnapping. Yet, the problem is not with RFID tags themselves, but with the almost none-existent boundary between legal and illegal use. RFID tags, like non-military drones, are not inherently wrong, but have the potential for awful actions. Yet, without creating legal boundaries, it could be stated that some privacy issues are self-inflicted. Companies who use RFID tags have the moral obligations to only gather necessary information from the consumer and to refuse to sell consumer information to third-party companies. Martinez gives a great example of a gaining excess information through Walmart keeping RFID tags active, after the consumer has left the store (Martinez, “Privacy concerns”). By doing this, Walmart not only loses credibility, they also become invasive to their consumers. In addition, without the obligation of refusing to sell …show more content…
RFID tags are very beneficial in saving business’ time and money, as well as lowering cost for the consumer (Impinj, “What Is RFID”). If one were to believe Bentham’s idea that good and pleasure are synonymous (qtd. in “Utilitarianism”) than the benefits would be able to outweigh the privacy infringements and justify the use of this technology. Yet, the article also discusses the levels of value (“Nathanson, “Utilitarianism”) which adds difficulty in coming to a conclusion. More specifically, since privacy infractions are considered, it could be argued that the technology is wrong because, in the near future, the majority may be negatively effected from RFID

Related Documents

  • Improved Essays

    Information privacy is the major issue in the current generation. People are more concerned about their convenience along with security. For example if the car breaks downs, one can push a button and the On-star operator will provide help by tracking the location of the car. This situation explains how conveniently one get the service immediately. On the other hand, we are not sure who is tracking our car location and is there any harm caused by that person.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Random people should not be able to track nor scan other peoples license plates. In the articles "Who Has the right to track you" by David Sirota and "Private License Plate Scanners Amassing Vast Databases Open to Highest Bidders” claims that when it comes to personal privacy, companies need personal records. In both articles "privacy advocates say the datapoints gleaned by the scanners pose a highly intrusive risk to the public."…

    • 249 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Chip Card Nightmares Published in Wall Street Journal, Joanna Stern’s “Chip Card Nightmares, Help Is on The Way” (a) Swipe the card (b) get scold by the cashier to use the chip reader (c) insert the chip and cancel all foreseeable plans (d) wait, wait some more and celebrate once you hear that joyless “ remove your card” sound. I want you to remember that next time you experience, it’s not you. It’s the banks, credit card companies, merchants, payment processors, terminal Manufacturers and many others But there’s a ray of hope; your Smartphone.…

    • 94 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Post 9/11 Privacy Rights: The Case Against Electronic Surveillance In response to concerns about terrorism after the attacks on September 11,2001, the government of the United States enacted new guidelines for conducting surveillance on the public. This paper will discuss the implementation of electronic surveillance as a tool to combat terrorism and will make the case against sweeping electronic surveillance of American citizens and others in this country. Various examples of increased surveillance along with decreasing privacy right will help the reader to conclude that these tactics have not reduced incidents of any type of crime, including terrorism. This paper will also discuss several types of electronic surveillance, including the collection of metadata from telephone records, which intruded on the private lives of citizens and did not increase their safety in any meaningful way.…

    • 1377 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Rfid Tag Research Paper

    • 512 Words
    • 3 Pages

    Even Though RFID’s track kids and pets that ran away from home, they should not be used because they are dangerous to personal security, invade privacy and could aide in terrorism. Obviously RFID’s invade privacy because they are easily coded that, if anyone has an RFID tag reader, all the stored…

    • 512 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Why Privacy Matter Even If You Have “Nothing to Hide” In the article “Why Privacy Matter Even If You Have ‘Nothing to Hide,”’ Daniel J. Solove, talking about the government governed the information to analyze without the permission. Many people didn’t realize how many problems by let the government take their information to analyze. Solove does a great job to persuade the readers that we deserve more the privacy by using the appeal to authority and anecdote.…

    • 704 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    According to the United Nations, privacy is basic human right that should be protected by law. The United States Constitution also implies a right to privacy in the Fourth Amendment. Recent laws passed by the government have raised questions about whether the government’s actions infringe upon a citizen’s right to privacy. The USA Patriot Act was the first of many laws that increased the powers of government organizations such as the NSA and the FBI. The law allowed these agencies to access private records of US citizens without the need of a warrant or judge’s consent.…

    • 716 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This paper will delve into and critically analyze Thomson’s perspective of privacy rights as being unpersuasive because it is diluted, incoherent, and subjective. To achieve this goal, the paper is organized into two main sections. The first section consists of a summary on the arguments Judith Thomson makes to aid her in proving her conception of privacy and the second section this conceptual paper will examine and evaluate Thomson’s paper. Judith Thomson states in her work that there is little consensus as to what privacy rights entail. She claims in her paper that this may be due to the fact that privacy issues do not have distinctive characteristics which separate them from other right and this makes it difficult to form boundaries as to where other rights end and where privacy rights begin.…

    • 1075 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    From big things such as televisions to small things such as watches, technology might just be completely taking over our world. Kids are now grasping iPhones and playing on them, from the time they’re about two years old, that is their new toy. Parents might not be thinking twice about this, but there’s much more belonging to this innocent act. What happened to stuffed animals and building blocks? Is this just an easier way for the government to start corrupting the minds of innocent people at such a young age?…

    • 537 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In our daily lives, we relinquish some of our private information ignorantly. As human beings, many of us tend to simply hand out our information in exchange for other items or free services. Many times, online shopping offers better prices but at what cost? Sometimes, better prices means relinquishing your private information that could be obtained by anyone at anytime. In the article, The Convenience-Surveillance Tradeoff, the author makes compelling points on how our society is unaware of the repercussions that come with relinquishing our…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Why Privacy Matters

    • 1428 Words
    • 6 Pages

    Privacy is not frequently undermined by a solitary great act, yet rather by a moderate aggregation of little unobtrusive acts. Every act may appear to be innocuous, yet in time the government will be watching and knowing every little thing about us. Solove states that even if you don't have anything to hide, the government can hurt coincidentally, because of mistakes or carelessness. All in all, he fights that when you comprehend the immeasurable measure of privacy concerns connected with government data gathering and observation, the nothing-to-hide argument is less powerful. This essay addresses the ramifications of proceeded with government data accumulation and reconnaissance, before these practices get to be marked into perpetual law as a major aspect of the USA Patriot Act.…

    • 1428 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Technology and media play a significant role in most people 's lives in today 's society. Digital devices are starting to rule over people 's lives. In Fahrenheit 451, Ray Bradbury illustrates a fictional society that revolves around electronics. The people living in Bradbury 's creation are brainwashed by the government, almost programmed to be the same, with a world in which reading books is illegal. The novel sends a clear warning to the real world showing how electronics can destroy freedom and independence.…

    • 1601 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Radio Frequency Identification (RFID) Radio-Frequency Identification (RFID) is a wireless technology that uses radio waves to read and capture information stored on a tag. A RFID reader can read the tag from upto several feet away. However unlike barcode, it does not need to be within direct line-of-sight of the reader to be scanned. There are two different type of tags: one is passive tag which collects energy from a nearby RFID reader 's radio waves; and another one is active tag that has a battery and may operate at longer distance than the passive tags.…

    • 827 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Bavarian International School Extended Essay on Artificial Intelligence (I.T.G.S) To what extent can RFID tags be used in schools and OAP Homes (Old aged pensioners homes), do the advantages over-ride the disadvantages? Candidate Name: Alex Ramirez Walker Candidate Number: Centre Number: Word Count: Supervisor: Mr. Nevers Introduction: My research question is: “To what extent can RFID tags be used in schools and OAP Homes (Old aged pensioners homes), do the advantages over-ride the disadvantages?”…

    • 2627 Words
    • 11 Pages
    Superior Essays