INVASION+OF+PRIVACY+2+and+PROPAGANDA+2



[[image:172.jpg width="360" height="320" align="center"]]
= = // **"Civilization is the progress toward a society of privacy. The savage's whole existence is public, ruled by the laws of his tribe. Civilization is the process of setting man free from men." -- Ayn Rand ** //

 As technology continually advances, with it comes both advantages and disadvantages. We are able to connect with others in an instant, shop online without leaving our couch, find old friends we haven’t seen in years – the possibilities are endless. However, there is a downside to this all – with new technology comes loss of privacy. Employers can now monitor workers more than ever, hackers can get a hold of your information you give out online, and databases containing personal profiles on all citizens are being accessed by almost anyone. Identity theft is at an all-time high, and unsecured websites are largely to blame. Credit card information as well as social security numbers are ending up in the hands of criminals, who are able to hack into online shopping websites. With sites like Facebook becoming so popular, teenagers are becoming careless with their personal information, some giving it out way too easily. Does this generation of teenagers value their privacy? With society today thriving on the headlines of celebrities – the photos, the gossip, and the desire to know their every move – where do we draw the line on what is acceptable and what is an invasion of privacy? (Simio '09).

= **Miscellaneous:** =

[[image:1592000436.01.LZZZZZZZ.jpg width="123" height="154" align="right"]]
[|An Invasion of Privacy (1983)]

Books:
[|An Invasion of Privacy!- Big Brother and the Company Hackers] [|Invasion of Privacy]

=Invasion of Privacy in the Workplace = //High tech monitoring of employees is a fast growing part of the security and surveillance business. Because of new technology advances, employers have more freedom to infringe on the privacy of their employees. //
 * 20 million working Americans may be subject to computer monitoring
 * 1993- nearly fifteen years ago, 22% of companies searched employee e-mail, voicemail, or computer files. That number has grown drastically in recent years.
 * The information does not remain confidential – 70% of the companies disclosed personal information to creditors and almost 50% gave the information to landlords, often without employee permission (Cosgrove '09).

Webpage Links:
[|Workplace Surveillance Act of 2005]This website provides information and a summary of the Workplace Surveillance Act of 2005 which states what is allowed and not allowed in workplace surveillance. [|Employees Privacy] This website contains information about the various ways that the employee’s privacy can be invaded by the employer.

News Article Links:
[|New York Times Employees Invasion of Privacy] = = [|New York Times- Spying on Employees] This article from the New York Times invade privacy during the workplace such as employer’s bringing in a third party to examine their employees.

**Scholarly Article Link:**
[|Workplace Protection]This article states ways to keep workplace surveillance from going too far.

Criticism:
[|Pros and Cons of Workplace Surveillance]

=Invasion of Privacy in the Internet = = = // With information so easily accessible on the internet, the safety of our personal information, billing or medical history, or even our families is at risk. A children’s database called Metromail got itself into trouble in 1996 because of privacy issues. The database contained names, addresses, phone numbers, and ages of millions of children. A subcontractor for the company even employed prison inmates to work on updating it. A Los Angeles reporter experimented with the database by sending them a money order for $277, using the name of a notorious kidnapper and murderer. Metromail sent the reporter just what she had ordered – a list of 5,000 families with children in the Los Angeles area, along with their personal information (Simio '09).

<span style="font-family: Arial,Helvetica,sans-serif;">

[|Metromail Press Release] This article explains exactly how Metromail was run and how a reporter was able to obtain personal information on thousands of children. //

==<span style="color: rgb(0, 255, 0); font-family: 'Arial Black',Gadget,sans-serif;">Facebook <span style="display: block; font-size: 72%; font-family: Georgia,serif; text-align: center;">"Publication is a self-invasion of privacy." -Marshall McLuhlan ==

[[image:facebook_logo.jpg width="169" height="62"]]
[|Cops on Facebook] This article explains how two police officers got themselves into trouble through what they posted on Facebook. [|Pros and Cons of Facebook]This website outlines how to protect your privacy in this online community. [|Facebook Privacy Problems] This paper discusses why people are so willing to post personal information on their pages.

<span style="font-family: Georgia,serif;">//In the Fall of 2005 at Penn State University, police officers made arrests of students who charged the football field after a game and started a riot. Although the police officers did not know the names of the students directly following the riot, they were able to log on to the Facebook and decipher which students were involved because they had all joined a Facebook group, entitled “I Rushed the Field After the OSU Game (and Lived!)."// <span style="font-family: Arial,Helvetica,sans-serif;">[|Penn State Riot] <span style="font-family: Arial,Helvetica,sans-serif;">This article explains how the college students were caught due to their Facebook pages.

<span style="color: rgb(0, 255, 0); font-family: 'Arial Black',Gadget,sans-serif;">**Videos:**
media type="file" key="3861a4ecfc4613f0c94e6b82b4858174.mov" Privacy on the Internet/Cellphones- Catherine Johnson, NewsTeamBoulder

=<span style="color: rgb(0, 0, 128); font-family: 'Arial Black',Gadget,sans-serif;">Identity Theft = <span style="font-family: 'Arial Black',Gadget,sans-serif;"> //<span style="font-family: Georgia,serif;">The crime of identity theft occurs when someone, without your knowledge, acquires a piece of your personal information and uses it to commit fraud.

Statistics: //
 * FTC (Federal Trade Commission) estimates that as many as 9 million Americans have their identities stolen each year
 * [|Fighting Back Against Identity Theft]
 * This link explains everything about identity theft, for example it explains what identity theft is, how do thieves steal identities, how can you find out if your identity is stolen, and what should you do if your identity is stolen


 * //<span style="font-family: Georgia,serif;">Types of Identity Fraud: //**<span style="font-family: Georgia,serif;">[[image:jwe0328l.jpg width="240" height="225" align="right"]]
 * <span style="font-family: Georgia,serif;">Credit Card Fraud most common type of identity theft
 * <span style="font-family: Georgia,serif;">Bank/Finance Fraud
 * <span style="font-family: Georgia,serif;">Social Security
 * <span style="font-family: Georgia,serif;">Medical
 * <span style="font-family: Georgia,serif;">Phone/Utilities
 * <span style="font-family: Georgia,serif;">Employment

<span style="color: rgb(0, 255, 0); font-family: 'Arial Black',Gadget,sans-serif;">**Links:**

 * [|Police Notebook- Identity Theft]**
 * [|Online Credibility]**

<span style="color: rgb(0, 255, 0); font-family: 'Arial Black',Gadget,sans-serif;">**Videos:**

<span style="color: rgb(0, 255, 0); font-family: 'Arial Black',Gadget,sans-serif;">media type="file" key="2816841c82f5e2eabd5be94137e7116f.mov"
Citibank Identity Theft Commercial-yahoo.com

media type="file" key="Online_Shopping.wmv"

Online Shopping-United Streaming -This video talks about the dangers of online shopping and gives safety tips to follow so that you are not the one to get your identity stolen!

=<span style="color: rgb(0, 0, 128);">**Celebrity Invasion of Privacy** =

<span style="color: rgb(0, 255, 0); font-family: 'Arial Black',Gadget,sans-serif;">**Links:**
These first two links fully explain the rights celebrities have so that their privacy and the privacy of their family members are not invaded [|Celebrity Rights]
 * [|Privacy Torts]



[|Photographers' Guide to Privacy]** This link explains the guidelines photographer's, journalist, etc. have to follow so that they can do their job without getting into trouble.

These next two links are examples of different celebrity cases involving privacy invasion.
 * [|Celebrity Privacy]**
 * This article is written by a lawyer and explains the exact rights celebrities have, it gives multiple celebrity privacy cases, and quotes the constitution
 * [|Sienna Miller Settles Paparazzi Lawsuit]**
 * Launched legal proceedings against British newspaper the Daily Star after it published a photo taken of her in Los Angeles on September 11 (she won this case)

//<span style="font-family: Georgia,serif;">The most recent celebrity invasion of privacy leak out had to do with Rhianna. Rhianna was allegedly beaten by her boyfriend, Chris Brown, and TMZ.com leaked a picture to the public of what she looked like right after it happened. Because this particular case is an official Domestic Violence Investigation, the Los Angeles police are trying to find out who leaked this picture and take seriously their duty to maintain the confidentiality of victims of domestic violence. Showed below is a news article link of the full story (Vangelas '09). //
 * [|Rhianna Photo an Invasion of Privacy]**

<span style="color: rgb(0, 255, 0); font-family: 'Arial Black',Gadget,sans-serif;">**Criticism/Opinions:**

 * [|Do you Think That Paparazzi are Being too Nosy When it Comes to Celeb Baby Bumps?]** This article talks about whether or not this should truly be considered an invasion of privacy or whether it should be considered public knowledge.
 * [|What's your View on the Invasion of Privacy of Celebrities?]**

=<span style="color: rgb(0, 0, 128); font-family: 'Arial Black',Gadget,sans-serif;"> RSS Feeds:=

rss url="http://privacylaw.proskauer.com/articles/invasion-of-privacy/" link="true" description="true" number="1" date="true" author="true" enclosure="true" rss url="http://www.huntonprivacyblog.com/tags/invasion-of-privacy/" link="true" description="true" number="1" date="true" author="true" enclosure="true" rss url="http://privacyview.blogspot.com/" link="true" description="true" number="1" date="true" author="true" enclosure="true"

=<span style="color: rgb(0, 0, 128); font-family: 'Arial Black',Gadget,sans-serif;">Discussion Questions :=

====<span style="font-family: Arial,Helvetica,sans-serif;">1.) Do you feel secure with the information that you have on your facebook? Do you think facebook does an adequate job protecting its users? If not what changes can be made? ====

<span style="font-family: Arial,Helvetica,sans-serif;">2.) Do you feel that a celebrity’s privacy is being invaded? How far is too far for the paparazzi invading a celebrity’s privacy?
====<span style="font-family: 'Times New Roman'; color: rgb(51, 51, 51);"><span style="color: rgb(0, 0, 0); font-family: Arial;">3.) How much of a right does an employeer have to look through one's personal life? (ex. facebook, e-mail) ==== ====<span style="font-family: 'Times New Roman'; color: rgb(51, 51, 51);">4.) Theft Identity can be defined as when someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. Is the person whose information was stolen at fault for this? Do you think this is a prevalent problem in today’s society with all of the new technological advances? ====