Friday, August 23, 2019

Privacy hw Research Paper Example | Topics and Well Written Essays - 750 words

Privacy hw - Research Paper Example Privacy is required for risk management scenario. In the context of the provided case though, the logical factors for privacy will have to be correlated with human values and ethical consideration (Clarke, 2009). The parents of the deceased Marine wanted to seek access to his email. The service provider of the email, Yahoo was reluctant to concur with the request. In the given context from the point of view of Yahoo, the scenario brings into consideration the issue of computer ethics and the privacy aspect. Yahoo, as a service provider had agreed to certain terms with the deceased Marine which they can’t just waive off. The privacy issue is a main reason behind this decision as if the information is released to the parents then it could bring in devastating consequences. In terms of social point of view, the need for email privacy is a very relevant and important issue. Information ethics as a part of computer ethics has to consider not only the human beings along with their actions, characters, and intentions but also the ethical theories like utilitarianism and deontological has to be considered. Information ethics and the privacy related aspects sometimes has to be supplemented with traditional ethical consideration and it can also override the information ethics aspects if need arise (Bynum, 2008). In terms of privacy rights in general circumstances, the personal information associated with an email like password is very important. The security breach aspects like hacking, and stealing of personal information is very crucial aspect for ensuring email privacy and security. There is also a terms called ‘right to privacy’, which provides an individual to have right to control their personal information. Personal privacy in case of email in general circumstances is an uncompromising issue for a service provider like Yahoo (Privacy Rights Clearinghouse, 2010). As per electronic privacy information center, privacy laws are

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.