Internet Privacy Concerns for the Cyber Generation
Intro
Internet privacy is an important topic that has been on debate since the late 1990’s. Ranging from small community meetings to large scale senate sessions on Capital Hill, it is a subject that is familiar with almost every internet user. However, the rapid rate of internet growth is becoming a difficult project to manage not only by the private sector but also the government. With no formal law protecting internet privacy, issues such as identity theft rates have sky rocketed. While the history behind this topic is quite simple, the current situation is intricate, but the future projection remains at a standstill.
Problem
According to a recent study, in June 2009, 24.7% of the world’s population had access to the internet; while just eight years ago that proportion was only 7.9% (3). This is an astronomical impulse of internet activity that has two biased sides. On the one hand, an increased rate of internet access ensures an advancing society that is well connected on a global scale. But this also means that the privacy and security of individuals are at stake because people of various backgrounds now have the same access.
It is an amazing phenomenon how much the average internet user can achieve in such a short amount of time though a few very simple key strokes. With a few mouse clicks here and there, a person can order weekly groceries, access medical records, evaluate bank statements, renew DMV licenses, and even instant message an old family friend on the other side of the world. However, with a growing number of services that are becoming available, more personal information (e.g. credit cards numbers, bank routing numbers, social security numbers) is being submitted electronically. This simple procedure poses a serious threat to a person’s identity. It is no surprise as to why identity theft is such a prevailing issue currently. In 2008, almost ten-million individuals were victims of identity theft in the United States. This was a 22% increase from 2007, which is a frightening rate of increase (4). Basically the biggest problem at issue here is that the current level of security protocols merely cannot manage the already high volume of internet users. Although a simple solution would be to declare an official law to regulate internet privacy, but this is easier said than done due to the complexity of the situation.
History
Internet privacy has a long history of fraud and scams. One of the most prominent is the Internet Privacy Act of 1995. This is actually a false law that is posted by various websites that host illegal activities, such as peer-to-peer media sharing. Websites cite this fabricated law as a disclaimer in order to discourage prosecutions by organizations and to also appear legitimate (2). Many websites even state that President Bill Clinton signed the law in order to validate authenticity, but in truth, the president never signed the law because it did not exist to begin with. Thus it goes without saying that due to the overabundance of online fraud, keen judgment is vital for any internet user who is accessing an unsecured network.
Present
“Privacy is dead-get over it,” is a statement made by Steve Rambam, a popular private investigator specializing in internet security. This unfortunate testimonial may just be the true peril of this ongoing trend. After all, regardless of the various rumors that may exist, there is no formal law that protects the privacy of internet users. In any instance, efforts are diligently underway to make the internet a safer environment. But human negligence is another factor in the struggle for internet security. Social network sites such as Facebook and Myspace are becoming very popular not only among teenagers, but also adults. Users are entering valuable personal information such as names, ages, traceable phone numbers, and even pictures. Although many of these websites have features that enable a user to make an account more private and anonymous, it should be noted that there is never a limit to the ingenuity of hackers that not only find but also exploit vulnerabilities. After all, many large corporations much as Microsoft often hire top hackers to test the security of their networks (1, 6).
Even though discretion may be a useful tool for protection and privacy, another big concern is the threat that posed by viruses, spyware, malware, tracking cookies, and data key loggers. Several malicious websites can now infect computers that infiltrate even the best security software (5). These programs can trace the activity of the computer and send back valuable information that is stored on the computer, such as PINs and personal documents, to a host computer. This is an unfortunate consequence of the digital age, as more information is inputted by internet users; a large portion of that data is susceptible to theft and thus the sense of personal privacy is demolished.
Legal
The necessity for strict internet privacy disclosure guidelines have resulted in several U.S. court cases. U.S. v. Ziegler and New Jersey State v. Reid are among the two most popular. In 2006, the federal court found defendant Jeffrey Ziegler guilty for accessing inappropriate websites from his office computer. Ziegler argued that the Fourth Amendment protected an employee’s computer with a strict privacy standard. The Fourth Amendment, which protects a citizen against unreasonable searches and seizures, was overruled in this case since Ziegler’s employer, the owner of the company, authorized the search to be conducted by officials (9). In another case, New Jersey State v. Reid, the court ruled that a computer user has a standard of privacy concerning the personal information give to and disclosed by their Internet Service Providers (ISPs). Thus, it was decided in 2008 that ISPs can only disclose sensitive information regarding a user to law enforcement upon the issuance of a grand jury subpoena (9). These two litigations are among many others which are forming the rigid framework for a law related to internet privacy.
Future
Internet privacy and Internet privacy is a complex and multifarious field. The dire necessity for robust internet privacy protocols is especially vital in the digital age. With strict guidelines, it can be projected that identity theft rates would be decreased, more secure services would be made available online, time and costs would be dramatically reduced, and most importantly a sense of privacy could be established. Another beneficial factor to consider is the natural environment; online transactions eliminate the need for paper billing which can contribute to a much “greener” planet. On the other hand, internet security has two significant drawbacks: the immense amount of capital and time required to even initiate the project. Based on the current 2009 financial status, no organization is willing to risk spending such a drastic amount of money or time (8). Although it can be argued that the benefits considerably outweigh the drawbacks, no single organization currently has the necessary funds or the boldness to declare a war against the current privacy practices.
Network neutrality is a newly developed topic that is expected to pave the road for future internet privacy laws. The background behind this new idea is that individual users should have the primary authority in regulating what content they can or cannot view on the internet, not their internet service providers (7). Although numerous heated discussions are underway related to the scope of this matter, the basic consensus is that net neutrality basically defines equal access and modification to the internet.
Conclusion
Internet privacy encompasses a large scope of significance. The rapid growth of internet services that are readily becoming available is directly proportional to the amount of personal information that is being submitted electronically. However, with no formal law protecting that information, privacy is theoretically nonexistent. Although it can be argued that human negligence is a notable factor, the unlimited number of vulnerabilities in software merely cannot be overlooked. In conclusion, based on present concerns and litigations, constructive planning is underway for the future. Conversely, the question at stake is not whether or not internet security will be improved, but will the debut be early enough to make a difference.
References
Arena, D. Computer and Internet Lawyer. Obtaining and Protecting Personal Information
in Litigation: The Perspective of a Wire and Electronic Communications Service Provider, 26(10), 18-26. Retrieved from ProQuest database.
• Basic outline of internet service provider disclosure guidelines of personal information.
Cohen, A. (2001, July). Privacy Online: Internet Insecurity. Time, 157(26), 85.
• Somewhat outdated, but a relevant source dictating the importance of internet discretion.
E-marketing. (2009). Internet Growth Statistics. Retrieved on September 15, 2009, from
Global Village Online Website: http://www.internetworldstats.com/emark eting.htm.
• Progression of the internet world wide.
Identity Theft Statistics. (2005). Retrieved on September 15, 2009, from Spam Laws
Website: http://www.spamlaws.com/id-theft-statistics.html.
• Brief statistics regarding identity theft rates in the US.
Meade, M. (2009). Computer and Internet Lawyer. Data Security and Privacy at
Colleges and Universities, 26(10), 26-32. Retrieved from ProQuest database.
• Vital security measures that should be implemented in moderately large networks.
Microsoft hires Akamai to prevent hacker attacks. (2001). Retrieved on September 12, 2009,
from Cnet News Website: http://news.cnet.com/2100-1001-251672.html.
• Microsoft hires popular hackers in order to address vulnerabilities.
Steinberg, G. (2008). Introduction to Computer Information Systems. Iowa: Kendall/Hunt
Publishing.
• Introduction into net neutrality and its relevance to internet privacy.
US Economy at a Glance. (2009). Retrieved on October, 04, 2009, from U.S. Bureau of
Labor Statistics Website: http://www.bls.gov/eag/eag.us.htm.
• Current US economy at a glance, including GDP, GNP, and unemployment rates.
Walton, T. (2000). Internet Privacy Law. Retrieved on September 12, 2009, from Netatty:
Internet Attorney Website: http://www.netatty.com/privacy.html.
• Laws and court cases regarding the internet.
Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts
Tuesday, September 29, 2009
Subscribe to:
Posts (Atom)