What is information privacy?
Information privacy is the privacy of personal information and usually relates to personal data stored on computer systems.
The need to maintain information privacy is applicable to collected personal information, such as medical records, financial data, criminal records, political records, business related information or website data.
Information privacy is also known as data privacy.
Techopedia explains Information Privacy
Information privacy is considered an important aspect of information sharing. With the advancement of the digital age, personal information vulnerabilities have increased.
Information privacy may be applied in numerous ways, including encryption, authentication and data masking - each attempting to ensure that information is available only to those with authorized access. These protective measures are geared toward preventing data mining and the unauthorized use of personal information, which are illegal in many parts of the world.
Information privacy relates to different data types, including:
Information privacy may be applied in numerous ways, including encryption, authentication and data masking - each attempting to ensure that information is available only to those with authorized access. These protective measures are geared toward preventing data mining and the unauthorized use of personal information, which are illegal in many parts of the world.
Information privacy relates to different data types, including:
- Internet privacy (online privacy): All personal data shared over the Internet is subject to privacy issues. Most websites publish a privacy policy that details the website's intended use of collected online and/or offline collected data.
- Financial privacy: Financial information is particularly sensitive, as it may easily used to commit online and/or offline fraud.
- Medical privacy: All medical records are subject to stringent laws that address user access privileges. By law, security and authentication systems are often required for individuals that process and store medical records.
First Amendment Rights
•Right to freedom of expression
–Important right for free people everywhere
–Guaranteed by the First Amendment
•Definition of free speech includes:
–Nonverbal, visual, and symbolic forms of
expression
–Right to speak anonymously
•Not protected by the First Amendment
–Perjury
–Fraud
–Defamation
–Obscene speech
–Incitement of panic
–Incitement to crime
–“Fighting words”
–Sedition
- Children's Internet protection Act (CIPA)
For those schools that have applied (or will apply) for discounted telecommunications, Internet access, and internal connections services (Priority 1) under the E-rate program, the Federal Communications Commission (FCC) adopted a new order that pertains to the certification of compliance with CIPA requirements on August 10, 2011. The Protecting Children in the 21st Century Act revises section 54.520(c)(l)(i) of the Commission’s rules to include the new certification that a school’s “Internet safety policy must also include monitoring the online activities of minors and must provide for educating minors about appropriate online behavior, including interacting with other individuals on social networking websites and in chat rooms and cyberbullying awareness and response.”
We encourage schools to update their Internet safety policies as soon as practicable but before July 1, 2012. This requirement is effective for the 2012 funding year, which begins July 1, 2012. In Arizona, schools need to issue a public notice (newsletter or webpage) about the update to their Internet safety policies in accordance with the new Protecting Children in the 21st Century Act requirements. Schools do not need to hold a hearing or meeting for this amendment. Also, you do not need to amend the FCC Forms 486 and 479 because the existing language already incorporates a certification of compliance with all of the statutory requirements. However, a public notice and a public hearing or meeting is required for any newly adopted Internet safety policies.
Internet Safety Policy issues that must be addressed:
- Access by minors to inappropriate material
- Safety/security of minors when using email, chat rooms, other direct electronic communications
- Unauthorized access, including “hacking” and other unlawful activities by minors online
- Unauthorized disclosure, use and dissemination of personal information regarding minors
- Measures designed to restrict minors’ access to materials harmful to minors
Technology Protection Measure (filter)
- Specific technology that blocks or filters Internet access
- Must protect against access by adults and minors to visual depictions that are obscene, child pornography, or harmful to minors
- Can be disabled for adults engaged in bona fide research or other lawful purposes
Anonymity on the Internet
Anonymity means that the real author of a message is not shown. Anonymity can be implemented to make it impossible or very difficult to find out the real author of a message.Good purpose of anonymity:
Anonymity can in may cases be desirable for one person and not desirable for another person. A company may, for example, not like an employee to divulge information about improper practices within the company, but society as a whole may find it important that such improper practices are publicly exposed. People dependent on an organization, or afraid of revenge, may divulge serious misuse, which should be revealed. Anonymous tips can be used as an information source by newspapers, as well as by police departments, soliciting tips aimed at catching criminals. Everyone will not regard such anonymous communication as good. Police use of anonymity is a complex issue, since the police often will want to know the identity of the tipper in order to get more information, evaluate the reliability or get the tipper as a witness.
People are more equal in anonymous discussions, factors like status, gender, etc., will not influence the evaluation of what they say.
Anonymity on the Internet is almost never 100 %, there is always a possibility to find the perpetrator, especially if the same person uses the same way to gain anonymity multiple times.
In the simplest case, a person sends an e-mail or writes a Usenet news article using a falsified name. Most mail and news software allows the users to specify whichever name they prefer, and makes no check of the correct identity. Using web-based mail systemslike Hotmail, it is even possible to receive replies and conduct discussions using a pseudonym.
Anonymous expression is a expression by the peoples opinion who do not reveal their identity. Everyone have freedom to express an opinion without fear of reprisal much more in democracy society. There are laws of anonymous political expression. And someone who is guilty of breaking this laws will have a punishment from whippings to hangings. In 1735, named John Zenger, who was prosecuted for libel because he did not want to reveal the names of the writers of his writings he publish. The governor of British refuse to convict John. The other is Thomas Paine who is a influential writer, statesman of the revolutionary war era and a philosopher. He published pamphlet called “Common Sense” which he criticized the British Monarchy. He also urged the Colonist to become independent by their own pamphlets sold more than 500,000 copies and have been less than 4,000,000. In 1958 case of national association for the advancement of colored people for the first rollings of the bill of rights. Another case of anonymity in US Navy because of information obtained from America online (AOL). In year 1998, a navy investigator asked the AOL to post the information the personal file that suggested if he might be gay. But AOL violated company by providing information. A federal judge ruled that the navy had overstepped its authority and the Electronics Communicators Privacy Act. Maintaining anonymity on the Internet is important to some computer users. Other users would like to ban web anonymity because they think its use increase the risks of deformation, fraud, libel and the exploitation of children.In the simplest case, a person sends an e-mail or writes a Usenet news article using a falsified name. Most mail and news software allows the users to specify whichever name they prefer, and makes no check of the correct identity. Using web-based mail systemslike Hotmail, it is even possible to receive replies and conduct discussions using a pseudonym.
JOHN DOE LAWSUIT
John Doe Lawsuit when a party suing (plaintiff) is not sure if he/she knows if there are unknown persons involved in the incident or the business being sued, there are named fictitious persons, usually designated Doe I, Doe II, and so forth, or “Green and Red Company,” with an allegation in the complaint that if and when the true names are discovered they will be inserted in the complaint by amendment. Naming fictitious defendants stops the statute of limitations (the time in which a party has to file alawsuit) from running out even though the true name is not yet known. Sometimes during the investigation or discovery (taking depositions or asking written questions under oath) new information about a potential defendant is found and the real name substituted. Then that person is served with a summons and complaint. If no substitution of a real name for a Doe has been made by the time of trial, usually the fictitious defendants are then dismissed from the case since they never existed in the first place, and the case continues against the named defendants. Fictitious defendants are not permitted in federal cases.
A John Doe Lawsuit can be filed when a defendant whose identity is temporarily unknown because he/she is communicating anonymously. Once it is filed the plaintiff can request couert permission to issue subpoena’s to command a person to appear under penalty. America Online, Earth Link, NEtzep, Verizon Online and other ISP’s receive more that a thousand subpoena’s per year directing them to reveal the identity of John Does.John Doe cases are based on serious allegations of wrong doing such as libel or disclosure of confidential information proponents of John Doe lawsuits argue that perpetrators should not be able to hide behing anonymity to avoid responsibility for their actions. The California state court in prepaid legal V. sturtz set another legal precedent that refined the criteria that the court apply when deciding whether or not to approve subpoenas requesting the identity of anonymous web posters. The electronic tronies foundation represents two of the John Does whose identities were subpoenaed. EFF attorneys argued that the message board postings cited by PPLS revealed no company secrets but were merely disparaging the company and its treatment of sales associates.
Summary
•First Amendment protects the right to:
–Freedom of religion and expression
•Does not protect obscene speech, defamation
•Key issues
–Controlling access to Internet information,
especially for children
–Anonymous communication
–Spread of defamation and hate speech
–Access to pornography
–CAN-SPAM Act limitations on email messages



.jpg)



