Verified Document

Criminal Laws Vs. Privacy Laws This Paper Research Proposal

Criminal Laws vs. Privacy Laws This paper will attempt to answer the question, "Can a private investigator or internal auditor, for the sake of clarifying an allegation/suspicion of fraud, breach the privacy regulations in order to access some personal information?" For the sake of argument, we will say that the answer is "No." This leads to another question, "Where should we draw the line between public interest and privacy interest?"

Here in the United States, it has almost gotten to the point where there is no privacy anymore. Anyone with access to a computer and the money to pay for it can pull up any type of information wanted or needed about another person. This includes criminal records, employment records, driving records and monetary records. If you watch television shows about private investigators or detectives, you see that they can access any information about an individual at any time, without the person's permission.

In European countries and other "common law" countries, there is a big difference. For example, in Hong Kong, "the Office of the Privacy Commissioner for Personal Data (PCPD)...

486) which came into force on the 20th December, 1996." (PCPD)
PCPD had a conference on 13th June, 2012 which was attended by 260 delegates and they discussed different types of privacy issues. One of the keynote speakers was Ken Anderson, Assistant Commissioner (Privacy) from Ontario (Canada) who spoke on Privacy by Design: What's Been Happening? In his presentation he stated the following definition:

Personally-identifiable information ("PII") can be biographical, biological, genealogical, historical, transactional, locational, relational, computational, vocational or reputational, and is the stuff that makes up our modern identity

Personal information must be managed responsibly. When it is not, accountability is undermined and confidence in our evolving information society is eroded.

He also stated facts about how the international community is working towards embracing his "Privacy By Design" pardigm. For example, in December 2010, the U.S. Federal Trade…

Sources used in this document:
References

Anderson, K. Privacy by Design, Retrieved from http://privacybydesign.ca/content/uploads/2011/11/PbRD-framework.pdf July 9, 2012.

Office of the Privacy Commissioner, Hong Kong; Retrieved from http://www.pcpd.org.hk/english/about/role.html July 9, 2012.

Gordon, P.L., What Does the Criminal Conviction for Privacy Law Violations of Three Google Executives in Italy Mean for Multi-National Employers in the U.S.

March 9, 2010, Privacy and Data Protection Practice Group . Retrieved from http://privacyblog.littler.com/2010/03/articles/international-privacy-law/what-does-the-criminal-conviction-for-privacy-law-violations-of-three-google-executives-in-italy-mean-for-multinational-employers-in-the-us / July 9, 2012.
Cite this Document:
Copy Bibliography Citation

Related Documents

Criminal Law Foundations Evaluation Criminal Law Foundations
Words: 1658 Length: 5 Document Type: Essay

Criminal Law Foundations Evaluation Criminal Law Foundations Paper Constitution signifies different political contexts safeguarding the well-being of the citizens, as well as, the convicts in the state. The constitution gives an integrated model of a republic that dictates the roles, responsibilities of different arms of the legal and criminal justice system that ensure social equity and coercion. It is recognizable that each state has a unique political system characterized by "checks and

Criminal Justice Gaetz, S. July 2004 . Safe
Words: 2782 Length: 10 Document Type: Term Paper

Criminal Justice Gaetz, S. (July 2004). Safe streets for whom? Homeless youth, social exclusion, and criminal victimization. Canadian Journal of Criminology & Criminal Justice. This journal article reports the researcher's survey findings regarding the prevalence of victimization among street youths compared to domiciled youths. Gaetz defines the street youth operatively as "people up to the age of 24 who are 'absolutely periodically, or temporarily without shelter, as well as those who are

Criminal Justice System in Two Countries
Words: 4897 Length: 12 Document Type: Term Paper

Criminal Justice System Ever since gaining independence status, both Mozambique and Zimbabwe have come under the scanner for violation of human rights incidences and extrajudicial excesses. The under trials, often arrested without formal sanctions have been continually processed through undemocratic norms and subjected to undue treatment when in confinement and under the control of policing authorities in spite of the fact that statutory provisions in the constitution provide assured guarantee

Privacy Rights in the Case
Words: 6316 Length: 15 Document Type: Term Paper

Layne', in December 1994, the Office of the Information and Privacy Commissioner received a compliant that the Vancouver Police Department had taken a decision to block out the faces of those person who were being interviewed by the police in the program, "To Serve and to Protect." The complainant was KF Media Inc., of Vancouver B.C. KF Media Inc. who was the producer of the program, and it generally

Criminal Justice What Do You Think Paradigm
Words: 1247 Length: 4 Document Type: Research Paper

Criminal Justice What do you Think Paradigm of Laws Paradigm of Laws • the paradigm of law your actions define and give reasons Law and ethics applies to everyone whether free individuals or a prisoners. Everybody has the right of existence, justice and fairness. However, there are occasions when a prisoner cannot be offered the right of confidentiality and privacy. This is exactly what I have done to the inmate in state prison where I

Laws and Corrections the Proposed
Words: 1929 Length: 6 Document Type: Term Paper

One of the additional oversights in the Proposed Consent Decree is that it does not address the sensitive matter of cell searches of two-person cells that are focused on one inmate. The cell search conducted by Officer Anderson and Sgt. Belker was conducted in an attempt to locate contraband cigarettes that had been sold by Joe Johnson; however, they were still able to search all of Jack Jones' materials. The

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now