VTech, the company, is a direct stakeholder of this information issue of children privacy getting compromised as a result of the data breach. VTech strives to provide innovation through technology. This is resonated in their mission statement which says, “To design, manufacture and supply innovative, high quality products that minimize any impact on the environment, while creating sustainable value for our stakeholders and communities” (VTech Holdings Limited, n.d.). While the mission statement…
1). Not only did the threat of having phone calls and text message privacy invaded, the threat of the app also “allowed…
Envision waking up and living in a society that has been fully taken over by an elite group. Not only this, but the citizens are informed that from now their every move will be watched twenty-four seven. Whether it be in your own room, walking around outside, or even on your cellular devices, they are always watching. In Nineteen Eighty-Four by George Orwell, Winston Smith is put in this exact situation. While being constantly watched by the government, also known as the Inner Party, it begins…
on the U.S citizens’ right to privacy. The methods used by the NSA such as; cracking online internet encryption, collecting text messages, and intercepting phone calls is unlawful and should not be used on the American people. The Foreign Intelligence Surveillance Act (FISA), signed into law by President Bush in 2008, expanded the government's authority to monitor Americans' electronic communications. Because of Snowden it has been revealed that the NSA used the law to conduct broad…
access to people's phones so they could find out what American citizens were doing on their cellular devices 24/7. However, Apple refused to help the FBI with open access to other phones because American Citizens have the right to privacy of their own belongings by law, above all Apple refusing the FBI was a good choice. In addition, Apple kept refusing the FBI, but the FBI found another way to get into the iphones. “Government said that it had found a third-party that was able to unlock the…
Many people who find these issues to be of little importance think well I have nothing to hide so they feel comfortable with the idea that their entire digital footprint is accessible by the government. I reject this position. Firstly, because it is a ridiculous stance. Not only does the NSA collect metadata, but it also collects content data like photos, voice communication, videos, text, email, and chat conversations. No sane person would be willing to make all of the contents of their…
divided; John Cassidy, writer for The New Yorker hails Snowden as a hero, (Cassidy) while his fellow New Yorker writer Jeffrey Toobin calls him “a grandiose narcissist who deserves to be in prison” (Toobin) By releasing this information, Snowden broke the law and the agreement of trust he had, but also did the country a service by alerting the public to the NSA’s questionable intelligence gathering activity. In June of 2013 headlines were made when Edward Snowden leaked many documents showing…
a researcher and professor, attempt to reach an uninformed, nonbiased audience (754). Through their writings, they bring to light the definition of Big Data, where it comes from, how it is used, and how it will affect the future of technology and privacy. Respectively, boyd and Crawford’s effort to persuade the audience…
research, internet, and dating sites, personal information (Big Data, geolocation,) is being modified and introduced to third parties for consumption. According to Daniel J. Solove, the John Marshall Harlan Research Professor of Law at the George Washington University Law School, he states that in his article, one of the bloggers proclaimed: “Do I care if the FBI monitors my phone calls? I have nothing to hide. Neither does the 99.99 percent of the population. If the wire-tapping stops one of…
speech, the right to bear arms and the right of privacy. The fourth amendment is the right to privacy such as no unreasonable seizures and searches to your personal belongings and property without any warrants. A search usually has to be based on probable cause- a reasonable basis to believe that the person can be linked to a crime (Remy, 2016). In this case, the topic about whether the police should wear body cameras is violating our right of privacy or is it not? One incident that…