Saturday, April 20, 2019

The future of privacy Essay Example | Topics and Well Written Essays - 1000 words

The futurity of covert - experiment ExamplePrivacy is a fundamental right, and everyone is entitled to it.Understanding that technology depart keep ontogenesis will help find better ways that will curb the violation of privacy. It is not practical to know the kind of technology that will be there in years to come, and that is why we adopt to be prep ard for anything. Passwords will no longer be safe to be used for privacy measures, and this will call for new methods to be used to guarantee the users security. Many and more people are now conversant with computer networks, and it is now easy to hack into someones account, and gain retrieve to their private information. There have been cases where Twitter and Facebook accounts of individuals have been hacked. The hacker controls what is posted and shared on the account. With future privacy laws, the social sites have to find better ways to avert this problem. Without this, few people will continue using the sites considering tha t their privacy is not guaranteed.With all the new methods of communication, everyone wants to share information with their friends and even strangers. This raise be done through social sites which include, Facebook, Twitter, Instagram or any other sites that may come up in the future. To control the privacy of what is shared, an individual should ensure that he or she safeguards his privacy. This means that he or she has to have a limit of what he wants to share with people on these social sites. This state of personal business means that unless individuals can protect their own privacy they lose power (Lanier 66).Surveillance is used by employers to ensure that there is a smooth flow in business operations. It is, however, debatable about the goal that the surveillance cameras should be placed. Cameras in a washroom, for instance, are considered as a serious violation of humane rights. Surveillance footages capture employees moments that are otherwise considered private, and b oundaries should be set

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.