2015+PERIOD+4+INVASION+OF+PRIVACY

Invasion of Privacy

__**Invasion of Privacy-**__ Offensive or unjustifiable access obtained to someone's personality or personal affairs without his or her permission and/or knowledge

1. Gain some perspective and understanding (and possibly even future warning). Psych Central’s Dr. John Grohol points out, it’s important to understand that privacy invasion can happen to anyone – both online and “in person.” 2. Take control and be proactive about your privacy. You might decide to: 3. Seek help
 * __what can you do about it?__**
 * Take legal action.
 * Arm yourself with online privacy resources.
 * Seriously weigh the pros and cons of convenience versus risk.
 * Store extremely private documents and other items in bank safety deposit boxes.
 * Opt not to save passwords in your phone or on your computer, and forgo using “master password” programs.
 * Avoid cliche and easily guessed passwords and security question answers (like birthdays, anniversaries, and mothers’ maiden names) and, as Grohol suggests, consider periodically change your passwords.
 * Close all e-mail and social media accounts you don’t regularly use (or use at all anymore).
 * Take time to understand the privacy options (as well as terms and conditions) of each social media account you open, and set these options to those you’re comfortable with.
 * Look for opt-outs. Stapleton points out that some situations allow you the option to “opt-out” of having your e-mail address and even phone number used for any other purposes.
 * Think twice about what you post to sites like Facebook and Twitter.
 * Invest in quality “anti” programs for your computer. Anti-virus, anti-spyware, anti-malware – these can all help you keep your computer spy-free (as well as remove the programs that already infect your computer). Some of these programs are even equipped with tools that “scramble” your private photos and documents, so that no one accessing your computer, other than yourself, can see them.

Videos <span style="font-family: Symbol,sans-serif;">[] Google found a code that allows them to track people's iPhones and iPads.

<span style="font-family: Symbol,sans-serif;"> [] This video talks about new police technology that take pictures of each car’s license plate. This device can also track the location the car is going.

<span style="font-family: Impact,Charcoal,sans-serif; font-size: 170%;">News Articles 1-[] this article talks about the privacy rights for teenagers, and it also asks if teenagers should have the same rights to privacy like adults do, and gives you other links similar to this article. It also talks about the different perspectives on teen privacy. 2-[] This article talks about privacy in the workplace, Many offices use some type of audio or video surveillance to record what employees do and say. It talks about how companies will track employees data entry, and use a lie detector test, and test them for drugs and alcohol. 3. [] This article talks about how the government tracks your internet uses.

<span style="font-family: Impact,Charcoal,sans-serif; font-size: 160%;">Corresponding Criticism 1. [] This site talks about the cons of invasion of privacy on the internet, It also goes into detail on how Facebook is not reliable for privacy, because you are at high risk of exposing personal information when you post it on Facebook. 2.[] This site talks about the pros and cons of the internet privacy. It explains how people can express themselves through the internet and listen to people's opinions on other events. However, it gives some people the advantage of stealing other's identity.

3. [] This web page shows additional information to the pros and cons of social media.

Pros and Cons on Social Media Pros Cons
 * Internet lets people express their freedom of speech
 * Allows to state opinions
 * Connect with others such as friends and family
 * Meet new people.
 * Can be used for advertisement
 * Use little privacy in social media sites.
 * Can lead to identity theft/ Virus threats
 * Personal info can be stolen
 * Spamming
 * Abusing others (cyberbullying)

__JStor-__ [|__http://www.jstor.org/stable/4540882?Search=yes&resultItemClick=true&searchText=Invasion&searchText=of&searchText=Privacy&searchText=social&searchText=media&searchUri=%2Faction%2FdoBasicSearch%3FQuery%3DInvasion%2Bof%2BPrivacy%2Bsocial%2Bmedia%26amp%3Bprq%3DInvasion%2Bof%2BPrivacy%26amp%3Bgroup%3Dnone%26amp%3Bacc%3Don%26amp%3Bso%3Drel%26amp%3Bfc%3Doff%26amp%3Bwc%3Don%26amp%3Bhp%3D25&seq=1#page_scan_tab_contents__]

The paper was was about the definition of privacy and how it is changing in our society. As time goes on, privacy becomes more limited to people, because people have a hard time keeping things private.

<span style="font-family: Impact,Charcoal,sans-serif; font-size: 160%;">Web Pages 1. [] This web page says that invading people’s and sharing their information can ruin yours and their reputations.

2. [] This web page's states facts about invasion of privacy and what companies invade your privacy.

<span style="font-family: Impact,Charcoal,sans-serif; font-size: 160%;">Blog Posts 1. [] <span style="background-color: #ffffff; font-family: Arial; font-size: 14.6667px; vertical-align: baseline;">This blog by Preston Gralla talks about the invasion of privacy, and talks about how social networking -especially twitter and evenGoogle- can learn everything about you just by the information on your homepage. 2. [|http://lawprofessors.typepad.com/tortsprof/2013/10/bernabe-on-invasion-of-privacy.html__] <span style="background-color: #ffffff; font-family: Arial; font-size: 14.6667px; vertical-align: baseline;">This is a short helpful blog about the invasion of privacy law, and published in 1890 by Samuel warren and Louis brandies.

<span style="display: block; font-family: Impact,Charcoal,sans-serif; font-size: 160%; text-align: center;">Podcasts Podcasts: [|__http://blurredradio.com/tag/invasion-of-privacy/__] This podcast is about Privacy and Propaganda.