Thursday, December 19, 2019

Comprehensive Legislation Of Social Media Privacy

Comprehensive Legislation to Protect Social Media Privacy Reading and Writing Workshop II, Section 007 Qiu Jin (Rachel) August 11, 2014 Comprehensive Legislation to Protect Social Media Privacy Abstract The article makes a research on both the present situation of social media users’ privacy, and the work of the FTC and other federal departments to protect social media privacy. However, without a comprehensive legislation in the federal level, the fragmentation of such trial cannot arise enough and active attention to privacy issues in the industry and in public. So the article suggests comprehensive legislation and gives recommendation on primary elements the legislation should take into consideration. Key Words Social Media, Privacy, Legislation, The FTC Introduction Social media is a digital communication process that connects people in the creation and exchange of dialogue, content and communities. Nowadays, social media have been playing more and more important roles in public communication. However, some issues have aroused accompanying the popularity of social media, for example, information overload and easy access to obscenity, but the most important issue about social media is the sacrifice of personal privacy. Everything you do on social media is public by default, and you have to change the personal settings to make it private. What is more serious, once information gets revealed to public, it will soon spread to the wholeShow MoreRelatedSurveillance and Privacy Issues1000 Words   |  4 Pagesopens fascinating possibilities-and alarming ones.† The Economist, Nov. 16, 2013 Discuss this statement in the light of the medias recent preoccupation with surveillance and privacy issues. Include government surveillance and social media. For example the young woman who accused Florida state quarterback jameis Winston of rape was identified by football fans on social media and had ugly anonymous things posted about her. Nearly every major international agreement on human rights protects theRead MoreThe Implementation of Technologies in Relation to Social Control – Surveillance Camera and the Big900 Words   |  4 PagesThe Implementation of Technologies in Relation to Social Control – Surveillance Camera and the Big Brother Society. The New Media and the Loss of Privacy. Media technologies were embraced by people as the means of easing their lives. However, if one does not know or take measures to use this technology properly, then one risks his life being abused by technology (Doyle, 2010, p. 4). Have you noticed that you regularly receive targeted ads as they offer you goods and services you used to surf forRead MoreProtecting Individuals Health Information From Various Threats1296 Words   |  6 Pages such as a patient’s physical and mental health status, social behaviors, personal relationships, and financial status are all documented (NCBI, 2016). Therefore, protecting the privacy of this information becomes a huge task for the individuals delivering healthcare and for those who need access to such information to make sound medical decisions and to improve the quality of care (HRSA, 2016). Health Systems Privacy or health privacy can be defined as keeping sensitive information about a patientRead MoreThe Effects Of Social Networking On Society1545 Words   |  7 PagesSheena Gonzales Instructor Mushett Eng-123 10 June, 2015 The Effects of Social Networking Social networking websites (further referred to as SNS) are web based platforms in which people connect to other individuals that they already have a real-life connection to, locate individuals they have shared interests with, and they allow users to share information with others such as photographs, life events and thoughts. Being able to keep current with one s personal group quickly and easily is one ofRead MoreEthics Fired Over Social Media802 Words   |  4 PagesEthics Fired Over Social Media Ethics Fired Over Social Media The purpose of this literary review is to enlighten my viewers of the importance of the ethical idea of companies crossing the lines of business with your personal life, when involving social media accounts. Most of my research has operated from the ATU library using the find it tool. Furthermost, the researched information use was from peer-reviewed research journal. I will discuss includes social media cons in the work environmentRead MoreThe Hipaa Act Of 1996851 Words   |  4 PagesWhat is the HIPAA Act of 1996? HIPAA, what is it? It is privacy, control, and peace of mind. You have the right for your medical information to be kept confidential. You have the right to decide whether or not family members are privy to your medical information. If you are changing jobs, why worry about health insurance coverage. Picture this. A woman called a local hospital and inquired about the condition of a patient. She was informed by the nurse that the patient was on a ventilator and couldRead MoreEssay Software and Hardware Companies: Oracle NZ Ltd1375 Words   |  6 Pagesrespect to IITP code of conduct and the New Zealand government legislation. Property: Intellectual property is an term used for human innovations and creativity that are capable of being protected under national and international law. IP includes a diverse range of commercial assets from patents for new inventions through to copyright protected artworks. Use our general information and guide to assist you in capturing your IP assets. Privacy: Oracle Corporation and there subsidiaries respect your preferencesRead MoreFourth Amendment Essay1438 Words   |  6 Pagesprotects citizens from unreasonable searches or seizures. However, the phrase, â€Å"reasonable expectation of privacy† is a different aspect that is pertinent to the evolution of the Fourth Amendment, and Riley v. California. To dissect this phrase, reasonable is the important aspect here, this is where the court must decide what is and what is not reasonable, in relation to the Fourth Amendment. Privacy, on the other hand, seems to be defined inadequately. (Baude Stern, 2016). Within this, importance comesRead MoreGtd Flaws And Issues. Gtd Is Considered As One Of The Most1382 Words   |  6 PagesGTD Flaws and Issues GTD is considered as one of the most comprehensive database of terrorist events in the world. But is it ideal? Since we deal with big data from open sources around the world, it’s not always show the true picture. All entries in one way or another were created upon unclassified information, mostly from media articles. That creates bias because articles is always a subjective view, moreover only English articles were used, thus we can see only one side of the coin. Data collectionRead MoreInsurance Customer Service Plan 20161037 Words   |  5 Pagesmechanisms we will utilise to investigate and assess our customer needs include customer satisfaction surveys, Competitor price comparisons, Social media monitoring, Historical complaint data. Other initiatives we will employ to ensure we are meeting our customer’s needs as well as meeting legislative requirements will include reward and recognition programmes, comprehensive complaint resolution processes and internal mystery shopping. The mystery shopping will entail call monitoring across multiple departments

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.