Presentation is loading. Please wait.

Presentation is loading. Please wait.

Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.

Similar presentations


Presentation on theme: "Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy."— Presentation transcript:

1 Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT

2 Invasion of our rights We like Technology but we also want our privacy.

3 What is privacy? Privacy is the expectation that confidential personal information is disclosed in a private place will not to be disclosed to third parties.

4 Privacy Law *Government rights -U.S Constitution *The Bill of Rights -Amendments -The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

5 Privacy Act *Employee Rights: - Getting Hired - Your Right to Fair Pay & Time Off at Work - Your Rights Against Workplace Discrimination & Harassment - Your Health & Safety in the Workplace - Your Right to Privacy in the Workplace - Losing Or Leaving Your Job Today, with the click of a mouse one can email requests around the world, chat in real time with people who are hundreds or thousands of miles away and set up shipments without ever leaving the cubicle. When it comes to company owned equipment and ideas the needs to be sure display prudent care in what they do. When all is said and done an employee has no right to privacy, reasonable or otherwise when it comes to the use of company equipment. This was recently tested and upheld by the Supreme Court when employees sued Hewlett Packard for hiring private investigators to uncover private phone records that were received and made from company paid for equipment. In addition the company won the right to view emails and chats that were logged on the company computers, often without the employee knowing that their online activities were being logged(Benderoff, 2006).

6 Privacy Act *Email Privacy Students; Does the University Administration/Cabinet of any school have the authority to check student's email accounts? It seems to be an easy question to look up the answer to and yet, the answer lies in the interpretation of many rules and regulations. Work; On your first day of a new job, you may be asked to sign and acknowledge some form of employer email policy. This policy will probably inform you that email is to be used only for everyday business purposes, that the computer systems at work are the property of your employer, that email may be monitored, and that you have no reasonable expectation of privacy in your use of email. A written statement like this, signed by an employee, creates a contract upon which an employer can rely if they want to snoop. Equally important, if a dispute arises over monitoring of email, the employer can point to the signed statement to show that it was unreasonable for the employee to think that email was private.

7 Privacy Act * Computer System Hacking and Cracking -As computer technologies have come into widespread use, computer related crime has emerged as a major problem for society. The costs of these crimes are inestimable.Hackers who cooperated with the authorities received mild treatment. More recently, however, attitudes have begun to change. In response to the increasing prevalence and severity of computer-related crimes, new statutes have been enacted. These laws give authorities the power to respond effectively to hacker attacks. By shifting the emphasis away from the specific monetary damages inflicted by such crime and considering its larger implications, the new laws will result in stiff fines and jail sentences for convicted offenders. Over the last few decades, computerrelated crime has escalated at a rapid rate. Of the various different types of computer crime, hacking involves secretly entering computer systems and maliciously destroying or stealing data (Littlejohn 37). In order to engage in these criminal activities, however, hackers must also be "crackers." "Cracking" involves obtaining the password to a computer. Actually, breaking into computers is a relatively easy thing to do. Crackers typically employ computer programs which try every word in the dictionary at a rate of 10,000 words per second. These programs can break the passwo

8 As our opinion, our privacy is important to ourselves and should not be supervised!


Download ppt "Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy."

Similar presentations


Ads by Google