Privacy Since The Advent Of Essay

Length: 5 pages Sources: 4 Subject: Transportation Type: Essay Paper: #10161675 Related Topics: Privacy, Tsa, Airport Security, Biometrics
Excerpt from Essay :

While the TSA claims that privacy rights are not violated by the use of full body scanners, many passengers disagree, as do many in the human rights community. A United Nations special rapporteur on the protection of human rights points out that recording details of private parts was an especially egregious human rights violation. In particular it was noted that women, people of certain religions and certain cultural backgrounds would likely find the procedure and the notion of their bodies being recorded to be offensive (Agence France-Press, 2010).

There are two dimensions on which the privacy issue surrounding airport screening procedures can be evaluated. The first is the legal issue. The Privacy Act itself offers little direct guidance with respect to airport screening. The Act's emphasis is more on the control of information that comes from the activities of government agencies than on collection of the information itself. As such, the Privacy Act does not appear to set any definitions or limitations on what information can be collected. The collection of video or image records, for example, is not governed by this Act. The Act does govern the management of these records, however. The TSA would be subject to specific provisions with regards to the maintenance of any record from the full body screening procedure. The agency would be limited with respect to its ability to share the data. Most certainly, the leak of any image files to the public would violate the Privacy Act. This addresses one concern that exists, but does not address the risk of unprofessional behavior on the part of agents, sharing images among themselves or viewing the images beyond the course of duty.

The other dimension along which airport screening can be evaluated in terms of privacy is the ethical dimension. The TSA's viewpoint that full body scans are harmless and any privacy concerns are outweighed by security concerns is a utilitarian perspective. However, this view is not shared by many Americans. For many, the ethics of the scans are...


The protection of one's individual privacy is considered to be a strong American value, the result of the cultural emphasis on individualism.

It is this cultural norm by which most Americans determine the ethics of privacy. In many ethical philosophies, it is the cultural norms that define the ethics of an action. Under these philosophies, the outcomes of the action are subordinated to the ethics of the action itself. While the TSA operates on a "greatest good for the greatest number" principle, many Americans do not ascribe to that philosophy. They place individual privacy ahead of the greater good. For those people, airport security techniques, in particular the use of full body scans, represents a gross violation of the cultural norms with respect to personal privacy.

Every country and every airport is fit to set whatever security parameters they wish. Whereas one can reasonably argue that privacy is a right as dictated by the norms of American culture, air travel is not such a right. The decision to fly comes down to individual choice. There is no need to demand consistency in security procedures across all airports, as each airport and each transportation administration uses security techniques to meet its own unique set of objectives. If an airport chooses to violate privacy, then the airport has reached that decision by weighing the consequences of each potential action.

Individuals, however, have the right to choose whether or not to subject themselves to these privacy violations. It must be understood that while full body screening does appear to violate privacy according to the ethics of many Americans, they have a choice as to whether or not they wish to subject themselves to his procedure. Ultimately, if one's privacy is being violated, it is because they chose to submit themselves to such a violation.

Works Cited:

Hofstede, G. (2009). Cultural dimensions: United States. Retrieved March 13, 2010 from

Privacy Act of 1974. 5 U.S.C. § 552a. Retrieved March 13, 2010 from

Rucker, P. (2010) TSA tries to assuage privacy concerns about full-body scans. Washington Post. Retrieved March 13, 2010 from

Agence France-Press. (2010). Airport body scans breach rights: UN export. The Montreal Gazette. Retrieved March 13, 2010 from

Sources Used in Documents:

Works Cited:

Hofstede, G. (2009). Cultural dimensions: United States. Retrieved March 13, 2010 from

Privacy Act of 1974. 5 U.S.C. § 552a. Retrieved March 13, 2010 from

Rucker, P. (2010) TSA tries to assuage privacy concerns about full-body scans. Washington Post. Retrieved March 13, 2010 from

Agence France-Press. (2010). Airport body scans breach rights: UN export. The Montreal Gazette. Retrieved March 13, 2010 from

Cite this Document:

"Privacy Since The Advent Of" (2010, March 13) Retrieved June 30, 2022, from

"Privacy Since The Advent Of" 13 March 2010. Web.30 June. 2022. <>

"Privacy Since The Advent Of", 13 March 2010, Accessed.30 June. 2022,

Related Documents
Privacy Notices
Words: 1839 Length: 6 Pages Topic: Business Paper #: 64023924

Privacy By law, majority of business institutions are required to provide their customers with information regarding their privacy policies on an annual basis. Business institutions are prohibited from sharing nonpublic personally identifiable customer information with non- affiliated third parties, unless consumers are clearly provided with an opportunity to opt-out. However, there have been concerns among people, as the opt-out process is time consuming for many individuals and in some cases privacy

Privacy What Happens to Privacy
Words: 3867 Length: 14 Pages Topic: Education - Computers Paper #: 88000089

As will be discussed, this has serious implications for security issues on both a personal, organizational and corporate level. A central concern is that, as the number of users increase online so does the potential threat of invasion of privacy in many insidious forms. This can lead to serious ethical infringements of privacy, such as fraud and identity theft. As Miyazaki, and Fernandez ( 2001) emphasize; This rapid growth (of the

Privacy Abuse and Protection
Words: 3618 Length: 13 Pages Topic: Sports - College Paper #: 93748654

Privacy and Abuse Protection Efforts of Businesses Facts Many workforces in most nations all over the world are increasingly becoming global. These workforces cooperate, communicate, and link up in multinationals and global marketplaces via web-based applications across countries and territories. The phenomenon of globalization has removed quite a number of differences amongst peoples and nations both in workplaces and in other areas[footnoteRef:2]. However, some questions have been raised on the origins of

Employee Privacy Torts
Words: 7119 Length: 25 Pages Topic: Business - Law Paper #: 96826900

Employee Privacy Torts Issues relating to employee privacy have been at the forefront of businesses for many years. This has been fuelled by the dynamic workplace which changes constantly and also by employees and employers being more litigation-conscious. Technology has also spurred on employee privacy issues with e-mail and the internet being related to heightened concerns about vulnerability of employers to litigation. Many employers have thus exacerbated their concerns relating to

E-Marketing As a Threat to Privacy: Information Privacy
Words: 1437 Length: 4 Pages Topic: Education - Computers Paper #: 83884727

Privacy: E-Marketing as a Threat to Privacy Privacy is one of the most complex issues facing e-commerce today. Due to advances in information technology, it is becoming harder for individuals to maintain control over their personal information. More specifically, the advent of the information age has brought with it numerous concerns particularly because the accessibility of the internet allows for easy collection, processing, storage and utilization of personal information by

Social Networking Privacy Online Privacy
Words: 3284 Length: 10 Pages Topic: Education - Computers Paper #: 98903675

But research is very mixed on what that answer is when the data is voluntarily revealed. For example, if someone "likes" Apple on Facebook and Apple then in turn markets Apple products to that person, it should be asked whether Apple is acting improperly. Companies with products that compete with Apple could do the same thing. Research bears out that this question comes down to personal and professional ethics