What is your core ethical belief concerning internet privacy

Assignment Help Computer Engineering
Reference no: EM133482378

Question: What is your core ethical belief concerning Internet privacy, especially regarding the collecting of personally identifiable information? Your answer should include examples and explanation to give an in-depth view of your core ethical belief.

Summarize your privacy policy in a paragraph format, highlighting the main concepts-

Answer the following questions by providing detailed explanations for the yes/no questions:

a) Which categories of personal and private information can be gathered?

b) Can personal details obtained be used for other purposes such as used in commercials or ads?

c) Are individuals notified by the company if they use personal information?

d) Is this data shared with third party companies? Are these companies identified?

e) Can an individual stop using the website and request the company to remove their data from their database?

f) How long will this data be stored?

Three pros and three cons of this privacy policy, from the business' viewpoint, put into a table format.

Answer the following three questions in details with examples:

Can users have smart devices or software apps that offer us great conveniences while preserving our fundamental right to privacy? Why or why not?

What ethical issues would companies face if personal identifiable information is not protected?

Who is ultimately responsible for controlling our privacy: we as the users, the companies that make the devices or the software apps? Explain your answer.

Reference no: EM133482378

Questions Cloud

Why you believe it is important to align ea : Why you believe it is important to align EA with the organization's core goals and strategic direction and Why is it important to maintain
Describe the three broadest types of metadata : What is metadata? Describe the three broadest types of metadata. Discuss how encoding standards and XML support metadata
Example of suspected abuse : Should a service provider prevent a person from making their own decisions and exercising their own rights when that decision could cause harm?
What type of ongoing monitoring does he need : Rick is afebrile, his oxygen saturation is 95% on room air, and his in-office spirometry indicates his forced expiratory volume (FEV1) is 75% of predicted.
What is your core ethical belief concerning internet privacy : Who is ultimately responsible for controlling our privacy: we as the users, the companies that make the devices or the software apps? Explain your answer
How would you manage potential conflict : How would you manage potential conflict and have a positive communication if you were Palmater or Ross
How did you identify the usage of impact indicators : How did you identify the usage of impact indicators by the panels during the discussion? Each panel represents a previous host and candidate city.
How those determinants contribute to the health gap : Identify two social determinants that impact your identified community (Manchester NH) and explain how those determinants contribute to the health gap.
Create documents for the research project : Create a new directory /mnt/data/projects/genome that will allow both wendy and peter to create documents for the research project they are working together in

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd