Thursday, March 10, 2005

SAQ 8-1

2. Think of an act, other than those already discussed in this module, that would constitute a viloation of privacy in computing. Explain.


Privacy can be pondered of as the power to conceal parts of the truth about oneself, or sometimes the power to control the use of truths about one that other people know. It is something that is not easy to define because it is a subjective matter. Some people have a desire, for personal motives, to move through society without being recognized, non-intervention in their affairs. Others have no problems giving out information about themselves in order to access information, goods, services or memberships. For most people, privacy is an issue of simplicity and security. People want to avail services without complicated forms and reference checks, and may be voluntarily allow information systems tracked their movements or purchases.

"Privacy of communications" refers to cover from interception with communication over the phone or the Internet. Respect for the privacy of communications is an important prerequisite for the maintenance of human relationships via technological communications media. This includes Voice Mail and SMS messages, Internet Relay Chats, Instant Messaging, Phone Conversations (on VoIP, PSTN, and Cellular), etc.

This act is either morally good or morally bad depending on the motive and purpose. It is morally bad because it transgresses the privacy of the concern. On the other hand, it can be morally good because it prevents terroristic activities.



Reference:
http://www.apc.org/english/rights/handbook/ICT_21.shtml
http://archive.cpsr.net/cpsr/privacy/wiretap/wiretap.html