Research Paper Undergraduate 957 words Human Written

Regulating Internet Policy Regulating Internet

Last reviewed: ~5 min read Law › Workplace Privacy
80% visible
Read full paper →
Paper Overview

Regulating Internet Policy Regulating Internet Privacy The paper provides the annotated bibliography of the three articles. The paper also provides the reflections on experience, opinions, attitudes and feelings with regard to the ethics and information technology (it). Jacquelyn and Polito (2012) in their article titled "Ethical Considerations in Internet...

Full Paper Example 957 words · 80% shown · Sign up to read all

Regulating Internet Policy Regulating Internet Privacy The paper provides the annotated bibliography of the three articles. The paper also provides the reflections on experience, opinions, attitudes and feelings with regard to the ethics and information technology (it). Jacquelyn and Polito (2012) in their article titled "Ethical Considerations in Internet Use of Electronic Protected Health Information" reveal that patients, caregiver as well as family members are increasingly relying on it and social network websites for communicating, storing and referencing medical information.

However, HIPAA (Health Insurance Portability and Accountability Act) Privacy Rule seeks to protect the patients' privacy by protecting their health information to assure the information is only available to people who deliver the healthcare service. In the United States, the government has made laws and policies to safeguard patients' privacy; however, the laws are inadequate to safeguard patient's privacy against the present rapid development of information technology and innovative use of electronic health websites.

The authors identify the medical ethics as an effective strategy to protect patients' information against misuse of patients' information. Lugaresi, (2010) in his article titled "Electronic privacy in the workplace: Transparency and Responsibility" argues that regulating the use of internet within the workplace has become challenging for the law enforcement agent. In spite the intervention of DPAs (data protection authorities), law, scholars and other public bodies, there are still no persuasive, and exhaustive legal responses for the enhancement of electronic privacy within the workplace.

The employee's expectations of electronic privacy generally collide with employer's needs to monitor online activities. The author argues that employees' right to electronic privacy is not absolute; however, employees' right to electronic privacy must be in line with employer's electronic privacy policy to safeguard organizational data.

Falzone, (2013) in his article titled " Regulation and Technology" argues that technology development can derive a tremendously benefit from government involvement, and part of the government involvement in regulating technology is by assuming that technology is a private good similar to the private property that government should regulate. Typically, the internet is a very good example that the government should regulate. Presently, internet has become part of life of people globally. Thus, government regulation is essentially to enhance internet privacy.

However, the author points out that both government and private organizations should implement internet regulatory policies to enhance ethical use of the internet. Part II In the contemporary business environment, the use of internet and information technology has become part of the business strategy and modern method of doing business. The internet has become part of life for both businesses and individuals. Despite the importance of internet and it foe consumers and businesses, regulating the use of internet to enhance its ethical use has become challenging.

The present regulations to enhance the internet privacy are not sufficient in the face of internet hacking and other external penetrators who are using the internet technology to intrude into the privacy of individuals and businesses globally. In the United States and other part of the world where internet is rapidly developing, cyber threats have continued to be on the increase. Essentially, online shopping has become a modern way of doing business, and in the United States, millions of people purchase goods and services online.

To make an online shopping, individuals will need to submit their credit cards or other private information to make a purchase. Some private organizations even ask for the social security number and bank information of consumers before allowing them to make purchase of good and services. In the face of continuous use of internet for variety of activities, private consumers are increasingly facing the internet privacy threats because their private information could be compromised while sending their private data online.

In the face of threats to internet privacy, effective regulations to enhance internet privacy are very critical. Although, the government have made series of laws and regulations to enhance the ethical use of the internet, however, the government regulations are not sufficient with continuous increase in internet hacking and the unethical use of confidential people's information. Both government and private organizations need to collaborate to enhance internet privacy.

The theory of privacy reveals that privacy policies must meet the needs of the 21st century to enhance contextual integrity (CI) in the face of legal, social and technological environments. Moreover, the privacy theory reveals that private individuals have the rights to privacy where nobody has the access to their information. In the United States and Europe, both the governments and private organizations are collaborating to enhance the privacy rights and protection of private consumer against the internet threats. Health Insurance.

192 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
3 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Regulating Internet Policy Regulating Internet" (2013, July 30) Retrieved April 21, 2026, from
https://www.paperdue.com/essay/regulating-internet-policy-regulating-internet-93676

Always verify citation format against your institution's current style guide.

80% of this paper shown 192 words remaining