Regulating Internet Privacy Regulation Has Remained Pinnacle Essay

PAGES
3
WORDS
1242
Cite

Regulating Internet Privacy Privacy regulation has remained pinnacle of issues that got birth with internet. Every innovation in technology is at the expense of privacy; it is no more there as most of technicians believe. A layman using internet does not find how and when his personal information is can be traced by someone else; privacy at workplace that was once enjoyed by the employees is no more at one's disposal, and the never ending cookies and internet bugs allow heightened levels of internet surveillance. General public, heedlessly, isn't aware of such issues and is jolted only when such issues are raised on media. Marc Rotenberg tells us about its importance, "Privacy will be to the information economy of the next century what consumer protection and environmental concerns have been to the industrial society of the 20th century" (Spinello, 2003).

What is the extent of privacy erosion? Where is it necessary and where is it creating moral and legal issues? And what should decide the limit of privacy regulation? Let's analyze. By definition, privacy isn't a vague word and it encompasses elements like secrecy, anonymity and solitude, where as, secrecy stands for right to limit disclosure of information about oneself, anonymity refers to willingness to avoid recognition or fame and solitude stands for lack of physical proximity (Spinello, 2003).

And now that we know a simple definition of privacy, let's come to its detailed theories. Amongst the most popular theories of privacy, the two that received considerable attention are control theory and restricted access theory.

According to control theory, one is entitled to have privacy only and only if he has control over his information. Infringement of such privacy allows others to misuse information as a weapon against one's position as in many of the reported cases like that of insurance, job promotions or transfers, blackmailing to have...

...

All this may deprive a person of perquisites that he may enjoy otherwise. This concept is known as extrinsic loss of freedom where by we lose authority to decide and drive our life without interference of external factors. There is another concept that we call as intrinsic loss of privacy which is based on the fact that one behaves not the way he normally does when he is being observed or noticed (Spinello, 2003). One feels more conscious about his moves and plans and that makes it worrisome. This theory grants one the right to accept or deny other's access to his information. However, it has some flaws; practically one can never have complete control over every piece of his information, it simply isn't possible and theoretically, the state of privacy whereby one's information is known by everyone yet he is entitled to control whether or not to reveal his information, is senseless (Tavani, 2000).
Restricted access theory advises that one has privacy only and only if access to one's information is restricted in one way or the other. This theory clears ambiguity of control theory and defines zones or context where by restrictions are implemented accordingly. However this theory doesn't allow the control of a person to monitor privacy. According to this theory, more is the extent to which a person's information is restricted (has smaller zone), more is person regarded as having privacy (Tavani, 2000). None of the theories is found to give comprehensive knowledge of what privacy should include, but both when combined can give sound insight of privacy.

Various efforts have been made by service providers and law makers to abate the violation of privacy regulation. Moor's controlled or restricted theory gives sound foundation to the policy makers of privacy regulation bodies. First of all, the policy includes that, privacy encompasses two simple values, notice and choice (Spinello, 2003). By…

Sources Used in Documents:

References:

Lugaresi, N. (2010). Electronic privacy in the workplace: Transparency and responsibility. International review of law, computers & technology, 24(2).

OECD guidelines on the protection of privacy and transporter flows of personal data. (n.d.). Retrieved April 10, 2013, from http://www.oecd.org/internet/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm

Schwartz, Paul M. (2000). Internet privacy and the state. Connecticut Law Review, Vol. 32, spring.

Spinally, R.A. (2003). Cyber Ethics: Morality and law in cyberspace. Canada, CA: Jones and Barlett Publishers.


Cite this Document:

"Regulating Internet Privacy Regulation Has Remained Pinnacle" (2013, April 12) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/regulating-internet-privacy-regulation-has-89372

"Regulating Internet Privacy Regulation Has Remained Pinnacle" 12 April 2013. Web.20 April. 2024. <
https://www.paperdue.com/essay/regulating-internet-privacy-regulation-has-89372>

"Regulating Internet Privacy Regulation Has Remained Pinnacle", 12 April 2013, Accessed.20 April. 2024,
https://www.paperdue.com/essay/regulating-internet-privacy-regulation-has-89372

Related Documents

Catholic church and public policy have remarked that the members of American clergy in general, without even excepting those who do not admit religious liberty, are all in favour of civil freedom; but they do not support any particular political system. They keep aloof from parties, and from public affairs. In the United States religion exercises but little influence upon laws, and upon the details of public opinion; but it