Anda di halaman 1dari 17

OurConceptsofPrivacy

ArashAria
RachelKostrzewa
LuisMontejano
March10,2015
CST373Spring2015

Withtodaystechnologyevergrowingandeverchanging,societysideasofprivacymust
bechangingaswell.Inthe1960s,therewasnoFacebookwhereeveryonecouldseeeveryone
elsesbusiness.Theyhadtorelyongood,oldfashionedgossip.AmitaiEtzionisbook
The
LimitsofPrivacy
wasonlywritten16yearsago,butevenwithinthatspaceoftime,technology
hasrapidlygrownandchangedthewaymanyofuslive.Now,itispossibletoFaceTimeor
Skypewithanyone,anywhereintheworld,atanytime.Weposteverythingandanythingto
Facebook,Twitter,Instagram,etc.Partofthischangeinprivacyisbroughtonourselves,since
wechoosewhattosay.ButsincetheInternetispartofnearlyeveryoneseverydaylife,its
impossibletoavoidhavinginformationaboutoneselfonline.Eachindividualhastheirown
personalideaofprivacy,andeveryculturealsohastheirownviewpoints.
Ibelieveeveryoneshouldbeabletomaintainsomelevelsofprivacyforthemselves.
Growingupinahighlymilitarizedsocietydefinesmyconceptofprivacy.Ithinkprivacyis
somethingtofightforeveryday.WefoughtforfreedomandIthinkweshoulddothesamefor
privacy.Iagreewithuseofanonymousdatacollectionsinordertoeaseandadvanceourlives
butindividualsurveillanceiswayovertheline.Internetfirmsshouldkeepgovernmentsnose
outoftheirbusinessinordertomaintaintheiruserstrustandstayawayfrompoliticalgames.If
theyfailtoretainusersprivacyandgetinvolvedwithgovernment,theywillbecomeour
privacysfirstenemy.Usersneedtobereallycarefulabouttheservicestheyreceiveandthey
needtoeducatethemselveswithregardstowhatinformationtheygiveupinreturn.
Myconceptofprivacyistherighttoknowandkeepinformationconfidentialfrom
others.WhensomeoneelseacquiresinformationaboutanindividualwithoutconsentIcallitas
invadingtheindividualsprivacy.Privacycanbeaconceptwherethereisalotofcontroversyas

wheremanypeoplemayseeaspecificactionasnormal,butmanyotherpeoplemayseeitas
ethicallywrongbecauseitmayhasnegativelyimpactedapersonsprivacy.Privacywassafer
whentherewasnotechnologyinvolvedbecausepeoplewouldhaveahardertimetoacquirethe
desiredinformation,andintoday'stechnologicalworldhackershaveamucheasiertimegetting
theinformationtheywant.
Myconceptsofprivacyarefairlysimple.Igrewupwithafairamountofprivacy.Iwas
allowedtokeepprivatewhatIwantedunlesstherewasafairamountofsuspicionthatIwas
doingorsayingsomethingthatIshouldnothavebeen.Myviewofhowmuchprivacyweshould
beallowedasmembersofsocietyissimilartothis.Ibelievethatweshouldbeallowedprivacy
aslawabidingcitizens.Thatprivacycanbetakenawaywhenoneissuspectedofbreakingthe
law.

Bothbooks
Click
and
TheLimitsOfPrivacy
arerichininformationabouthowprivacy

canbeinterpreteddifferently.Thebookofprivacyshowsdifferentinstanceswherepeoples
privacyhasbeenusednegativelywithouttheconsentofanindividual.Iwasntsurprisedtosee
thedifferentwayspeopleusewithintechnologyinordertogatherconfidentialinformation
becausepeopleusewhatevertheyhaveavailablewhentalkingabouttechnology.Themoment
technologyandtheInternetcametoourlives,privacyhasbeenmoreimportantthanever
throughoutthehistoryofmankind.TheuseofInternetmayseemsecure,buttherearemany
tweaksthathackersuseinordertogetawayfromanysecurityprograminstalledinany
computer.Emailisthebiggestthreattopeoplesprivacybecausethemomentsomeoneopensan
unknownemailtheyaresuitabletograntaccesstoapersonthatisvirtuallythousandsofmiles
awayfromtheirlocation.Emailmayalsobeathreatinternallyfromthepeoplethatareserving

usersaccesstotheirdatabasesystems.Peoplemaythinkthatiftheydeletetheiremailsnonewill
beabletoaccessthoseconversationsinthefuture,butthetruthisthatmostlyalloftheemails
aresavedwithineachindustrythatprovideemailservices.Technologyhasbeingabigturnoutof
peopleslives,andeventhoughithashelpedmanypeoplehaveaneasiertimeconnectvirtually
ithasmanyproblemstobeaccountedforinordertohaveourprivacymoresecure.
BillTancers
Click
andAmitaiEtzionis
TheLimitsofPrivacy
seemtobeverydifferent
booksonthesurface.In
Click
,Tancertalksaboutthepatternsthatappearwithinsearchengine
queries.Heexamineswhycertainspikesinsearchesappearatcertaintimes.Hesaysaboutthis
data,ifyouspendenoughtimeconsideringallthedifferentelementsofourInternetuse,you
begintocompileaneverclearerpictureofwhoweareandwhatexactlyisonourminds
(Tancer,2008,p.3).
In
TheLimitsofPrivacy
,Etzioniemploysmanytacticstomakethereaderfeelasifthey
arebeingcaredfor.Etzionioftenexplainshowcertainpoliciesareforthebenefitofthegreater
good,givingthereadertheimpressionthathetrulycaresforsocietyandwantstoseeitbettered.
Inhischapteronmakingmedicalrecordsavailable,hediscusseshowpeoplelikemarketersand
insurancecompanieswouldnotbeabletoaccesssensitiveinformationaboutapatient,suchas
theirname,address,andsoon(Etzioni,1999).Thisalsogivesthereaderthefeelingthathetook
timetothinkabouttheindividual,asmanyseemarketersandinsurancecompaniesusing
personalinformationtosellproductsandpoliciesasslimyandtwisted.
Inhisbook,
TheLimitsofPrivacy
,AmitaiEtzionidiscusseswhatthegovernmentand
societyshoulddointermsofanumberofissuessuchasencryption,governmentIDcards,and
medicalrecords.Inhischapteronencryption,hediscusseswhetherornotthegovernmentand

policeshouldhaveaccesstoencryptionkeysinthecaseoftryingtostopacriminal.Etzionisays
thatalthoughhyperencryptiongreatlyenhancesprivacyinthecyberworld,itposesnewand
ratherdifficultbarrierstopublicauthoritiesasterrorists,druglords,pedophiles,andother
criminalsincreasinglydrawonthenewformsofencryption(1999,p.76).Ibelievethatthe
authoritiesshouldhaveaccesstoencryptionkeys,however,justlikeasearchofonesproperty,
probablecauseisneededaswellasasearchwarrant.Thegovernmentshouldalsobeableto
requestkeys,butjustlikeananalogsearch,theycanbedeniedthisrequest.Ifeelthatthisisa
waytostopterroristsandothercriminalswhilestillmaintainingsomelevelofprivacyforthe
general,lawabidingpublic.
ThenextissuethatEtzionidiscussesistheissueofgovernmentissuedIDcardsandother
biometricstechniques.HedescribesIDcardsthataresomethingthatisageneralmeansof
identificationthatallcitizens(orresidents)ofagivenjurisdiction,aboveacertainageare
requiredtohave(1999,p.113).HediscussesreasonsastowhyIDcardsarebothapositiveand
anegative.Onthesurface,IDcardsseemlikeanewconceptthatsocietywouldbenefitfrom.
Butwhentheyareexaminedfurther,IDcardshitafewsnags.Etzionisaysthatthesecardsmust
belinkedtoadatabasethatenablesauthoritiesbothtoverifytheinformationthatidentifiesthe
personandtolinkittootherinformationabouttheperson(1999,p.113).Thiscentraldatabase
mustneedtobehuge.Therewouldneedtobeasystemimplementedtomakeitsopeoplecan
makechangestotheirinformationrelativelyeasy.Forinstance,Ihavemoved3timesinunder3
years.TheUnitedStatesPostalServicemakesitfairlyeasytochangeyouraddresswiththem.
Theydo,however,chargeasmallfeetoverifyyouridentity(OfficialUSPSchangeofaddress,
n.d.).However,thisdoesnotchangeonesaddresseverywhere.Onemustremembertochange

theiraddressinalloftheimportantplaces.Thiscentraldatabasewouldbeonemorechanceto
remember.Thesecurityofthedatabasewouldalsoneedtobeconstantlyupdated.Ifahacker
managedtocrackintothisdatabase,theycouldwreakhavocformanypeople.
Itisinterestinghowwhenoneisathome,ontheirpersonalcomputer,asimplesearchis
somethingpersonal,areflectionofwhatoneisthinkingatthetime.However,withTancers
companyHitwise,theygatherallsearchdataandcompileitintocold,hard,statisticsthat
advertiserscanuseinordertohaveadvertisementsplacedtousers.Tancerdiscusseswhy
searchesforpromdressesspikeinJanuarysothatadvertisersandmarketersknowhowto
advertisetothecorrectaudience.RatherthanusingHitWisespowerforachangethatispositive
tosociety,itisusedtosimplymakebusinessesmoremoney.
Privacycanbothbeaffectedlegallyandillegallyasseenthroughouthistory.Many
peoplessocialsecurityandpersonalinformationhasbeenprovidedtoemployersandother
businessesthathavebeenaffectingpeoplesabilitytogethiredorhaveothertypesofbenefits.If
welookatthebookof
TheLimitsOfPrivacy,
weseethattherearevariousexamplesofpeoples
privacyinvadedwithouttheirknowledgeinthemedicalsectorthatareIsolatedacts,often
committedbyasinglepersontheyviolatethepoliciesandethicalcodesoftheinstitutionin
whichtheytookplaceandtheyaresometimesinviolationoffederalorstatelawsaswell
(Etzioni,pg.141).Thisisagreatexampleofpeoplesprivacyinvadedwithouttheirknowledge,
andthisquotefromthebookcomesfrompeoplesmedicalinformationdistributedwithouttheir
knowledge.
Etzionitalksaboutmakingmedicalinformationavailabletothepublic.Inthecurrent
system,anindividualsmedicalrecordsareprotectedbyHIPAA.HIPAAisafederallawthat

providesbaselineprivacyandsecuritystandardsformedicalinformation(
Factsheet8a:Health
privacy:HIPAAbasics,2015
).However,italsostatesthattheU.S.DepartmentofHealthand
HumanServiceslooksintopossibleHIPAAviolations,butthatindividualsdonothavea
privaterightofactionunderHIPAAandcannotsueforaviolation(
Factsheet8a:Health
privacy:HIPAAbasics,2015
).Thisisslightlydisturbingthatonecannotspeakupfor
themselvesandfightagainsttheirownabuses.InthesystemthatEtzionisuggests,an
individualsmedicalrecordsareavailable,butonlysensitiveinformationisreleasedtocertain
individuals.Heevensuggeststhattheindividualcouldsettheprivacysettingsthemselves(1999,
p.161).Hediscussesallowingthosewhoaredoingmedicalresearchaccesstoallofones
medicalrecords.Iamnotagainstthisidea.Backin2008,Ifellmysteriouslyillandforweeks,no
onecouldfigureoutwhatwaswrongwithme.WhenwefinallyhadadiagnosisofPostural
OrthostaticTachycardiaSyndrome,orPOTS,therewaslittleinformationavailable,anditwas
incrediblyscaryformyfamilyandmyself.IfascientistwhowasresearchingPOTSaskedto
haveaccesstomymedicalrecordssothattheycanbetterunderstandPOTS,Iwould
immediatelysayyes.However,thatmaynotbethecaseforeveryone.Mentalillnessiscurrently
averytabooissue,andthosewhoarebelievedtohaveamentalillnessarelookeddownupon.
TheNationalInstituteofMentalHealthreportsthatnearly19%ofadultshaveorhavehadsome
formofamentalillness(
Anymentalillness(AMI)amongadults,n.d.
).Evenwithnumbersas
highasthose,manyofthoseindividualsmaynotfeelcomfortablesharingtheirmedicalrecords
becauseofthestigma.
AwebsitefromtheWashingtonpostfromAndreaPetersonstatesthat,Criminalattacks
onhealthcareorganizationsincreased100percentbetween2009and2013(2014).This

statisticisalarmingbecausehackersareconcentratingmoreonmedicalrecordsthananything
elseinthepastyears.ThethingisthathackersarenoticingthatittakesHealthcareproviders
longertodetectthistypeoffraudthancreditcardcompaniesorbanks,whichareconstantly
lookingforinconsistenciesthatcouldsignaproblem(Peterson,2014).Thisiswhyhackersare
targetingthemedicalsectorbecausetheyarelessvulnerableofbeingcaughtdoingtheirillegal
acts.
Thebook
Click
takesadifferentapproachaboutprivacyintheInternet,anditgoesinto
statisticsaboutwhatarepeoplesurfingintheInternet.Inthebook
Click,
itquestionsifits
ethicallyrighttodosowithouthavingthereceiverknowwhoisthepersonsendingthemillions
ofspamemailsthroughouttheworld.ItexplainsthatspammersuseTrojanhorsestohack
individualusersbyusingremoteservers.Tancerexplainsthatthemethodusedbyspammersis
Virtuallyimpossibletoprosecutebecausespammerscantakeoveranunsuspectingusers
computer,sendmillionsofemailsinafewhours,andleavewithoutatrace(pg.30,2008).
Spammingisfoundtobeinvadingpeoplesprivacybecauseotherpeopleareusingvarious
computerstodofraudulentactivitiesthatwillbenefitthemeconomicallyandcausemanypeople
thinkthattheuseofinternetisnotsafebecauseitcangothroughourpersonalinformation.
Iranisthelandofdoublestandards.Veryconservativereligiousgovernmentandmore
thanthousandyearsofculturalinvasionbyIslammakesIranonethemostcomplicatedcountries
intheworld.ThiscomplicationisnoticeableinIranspoliticsandleadersaswellasinthe
society.AccordingtoIransparliamentwebsite,theyrecognizemanyrightssuchasfreedomand
equalityformenandwomenregardlessofcolorofskinandracebutinaction,allareabstract
(
TheconstitutionofIslamicRepublicofIran,1989
).Itisstunningthatonecouldn'tevenfind

anyamendmentdirectlyaddressingprivacythatshowsthelowpriorityofprivacyinIran.
Governmentandintelligenceservicesdeliberatelyaskpublictoreportanykindofpotential
threatandusefulinformationtocaptureandarrestthosewhoarejeopardizingnationalsecurity
whichincludes:Islam,theleaderandregime,governmentofficialsandpublicsafety.
InformationtechnologyisafairlynewconceptforIransofficialsandtheytrytodominateand
rulethevirtualworldaswell.Theyutilizeverynewsystemstointerruptandfilterall
informationcomingtothecountryandmonitorcloselytheinformationgoingout.Surprisingly
theyareveryeffectiveintheirjobandusuallysuccessful.Theyusealltheinformationtheyfind
againstpublicandanythingevenasunimportantasajokecouldreachtheirtolerancelimitthat
canhaveseriousconsequences.Theyhavearrestedelevenmenbecauseofresharingjokesabout
Khomeini,Iranslatesupremeleader.(
IranArrests11overSMSKhomeiniInsults,2015
).
Iranisnotacommunistcountrybutjustlikeone,thegovernmentownsallsensitive
organizationssuchascommunicationcompanies,nationalTVsandradioswhichhelpsthemalot
tokeeptrackofusers.Theycaneasilylookthroughtextmessagesandbugphonecallsbecause
theyownthemobileproviders.ButwhenitcomestointernetserviceslikeGmail,Viber,Whats
appandFacebookwhichtheycannotdirectlymonitorandaccess,theyusetheirhackersto
gatherusersinformations.Thosehackersarehighlytrainedandtheyuseuptodatetechnologies
andtoolsthankstoChinaandRussia.ThesehackersdonottargetGmailorViberinorderto
accessandrecordallinformationbuttheytargetindividualsattemptingtofindtheirpasswords
andthentheyaccessallconversationsandinfos.GooglewarnsIranianusersbefore,about
possiblesecuritybreachesandrecommendedthemtochangetheirpasswords(
GoogleWarns
IranianUserstoChangePasswords,2011
).

Iransgovernmentreservestherighttomonitoreveryoneinordertosustainthepower.Unlike
USormostofcountriesaroundtheworldtheyhavenorespectforindividualismandprivacyof
individuals.Henceitisveryhardtocompareprivacyrelatedtopicsbecausethereisnocommon
groundbetweenthem.Iranianofficialsseeinformationasatooltostrengthentheirgriponpower
whileUSofficialsclaimtomonitorinformationbecauseofpossiblethreats.
Iranssocietyalsohasnorespectforprivacywhichmakeiteasierforofficialsnotto
recognizeit.TheQurancommandsfaithfulmuslimstocommandingrightandforbidding
wrongwhichgivespermissiontoanyonetointerferewithotherspersonallife.Therearemany
linesintheQuranthataddressesthisIslamicminutiae.ForexampleAndlettherebe[arising]
fromyouanationinvitingto[allthatis]good,enjoiningwhatisrightandforbiddingwhatis
wrong,andthosewillbethesuccessful.(Quran3:104)Iraniancultureishighlyinfluencedby
IslamicteachingandIslamdoesnotrecognizeanyindividualrightsorprivacyforitsfollowers.
YoucanfindlotsofIranianoldsayingsabouttheprivacyandrespectingoneanothers
individualismasawayofcautioningagainstthisintrusiveislamiclaw.Thisisindicatingprivacy
issuesinthepastandcontinuinginthepresentinIraniansocieties.
InMexicotherehasbeenmanyissuesconcerningpeoplesprivacywithintechnology.
FederalregulatorspassedMexicosnewprivacynoticeanditwentintoeffectonApril17,2013.
Thisnewprivacynoticewillprotectpeople'spersonaldatabyhavingExtensiverequirements
forfurnishingadequatedataprivacynoticesandobtainingconsentbeforepersonaldatais
collecteddirectlyfromapersonorelectronicallyviacookies,webbeaconsorotherautomated
means(Medina&Osornio,2013).Thisisveryimportantbecausethiswillbeveryimportant
foremployersthatregularlycollectpersonaldatafromtheiremployeesonline,andifanyperson

isnoncompliantwiththisprivacynoticetheremaybesanctionsimposed.Thisdatamaybe
anythingthatprivatepersonsorentitieshavecollectedUse,disclosure,storage,accessed,
managed,transferredanddisposedofpersonaldata(Lawgroup,2013).Anymatterbeing
violatedbyapersoncanreachafineofupto1.2millionofdollarsofanypersonaldatarevealed
tothepublic.

InMexicanculturetheytakeprivacyseriouslybecausetheyhaveseverallawsthat

protecteveryMexicancitizen.Googlehadreceivedasanctionfornoterasingthedataofa
specificuser.Thisspecificcaseisimportantbecauseitsnotonlyaboutwhothepersonwas,but
Googleviolatedthecountrysdataprotectionlaw.Thearticleofreutersitstatesthat,According
toMexicanlaw,thefirstsanctionsappliedtothoseinbreachofdataprotectionlawsforcethem
tocomplywiththegovernmentsorder(Reuters,2014).Thiswasaddressedwhenthe
informationofauserofGooglerequestedtoremoveallofhisdataontheirservers,butGoogle
refused.ThisiswheretheMexicanlawthatprotectstheprivacyofuserscameinplayinorderto
makeGooglecomplywiththeusersdemands.IfGooglerefusedtocomplywiththelawthey
wouldhavetofacefinesofupto1milliondollars.
TheUKhasafewsystemsthatinvolveprivacythatarequitedifferenttotheUnited
States.CCTVhasquitetheprevalenceoverintheUK,withastudycitingthatthereis1CCTV
cameraperevery14residents(Barrett,2013).So,whenoneisoutinpublicintheUK,itis
probablethattheyarebeingwatchedatalltimes.Someofthesecamerasareevenavailable
onlineforthepublictomonitorthemselves.ThisisnotalwaysthecaseintheUnitedStates.In
urbanareas,thereareoftencameras,buttheyarenotalwayswidespread.However,intheUK,
onecanrequestallofthefootageofthemselvesfromaCCTVcamera.Thisrequestmustbe

madeinwritingandcannotinterferewithacriminalinvestigation(RequestCCTVfootageof
yourself,2015).
IntheUKandintheUStherewasascandalwherethesecurityagenciesstoleencryption
keysthatarebuiltintoSimcardsusedinmobilephonesfromtheDutchfirmGemalto.The
encryptionkeysgiveaccesstosecurityagenciestodecryptvoicecommunicationsfrommobile
phonesonthenetwork.Thistypeofactisillegalinmostofthecountries,andusersofmobile
phonesshouldbeawarethatatanytimetheirprivacycouldbeinvaded.Inthearticleitsaysthat,
MostmobilephoneswillhaveusedGemaltoSimcardsatsomepoint,meaningthatanyone
withaSimintheirmobilephonecouldbeaffected(Gibbs,2015).Privacyisinvadedthrough
phonecalls,databreachesintheInternetandcyberattacks.PrivacyintheInternetwillhave
manybreachesanditwillcontinuetobeacontroversialissuebecausetherearesituationswhere
peoplemaybeinfavorofsuchactionsthatotherpeoplemayseeitasaninvasionoftheir
privacy.
UnfortunatelyforthepeopleoftheUK,theUSgovernmenthassomecapabilitieswhenit
comestoviewingtheirdata.IfanyoneintheUKhasinformationstoredonaUSbasedservice,
thePatriotActprovidestheUSgovernmenttheabilitytoretrieveanyinformationfromthis
service(
PatriotActvsDataProtectionLaws,2013
).UKprivacylawsdonotprotectagainstthis.
EvenifanindividualhasaEuropeanbasedservice,theirinformationmaystillbeatrisk.The
Britishgovernmentcanrequestinformationfromanycloudservice,andthecustomersdonot
needtobenotified(HoganLovells,2012).TheUKhassomedifferentlawsthantheUSdoes,
butsomeremainverysimilartothosehereathome.

Whenconsideringhowtoreacttobreachesofprivacy,onemustconsidermany
questions.Howdoesthislineupwiththeirownideasprivacy?Howdoesthislineupwiththeir
culturesideaofprivacy?Howdoesthisaffecttheoverallgreatergood?Withthewaytechnology
israpidlychangingandevolving,legislationoftencannotkeepupwiththelegalsideofprivacy.
Whenconsideringonesownprivacyandsafety,itisimperativetorecognizethatkeepingyour
owndataandinformationsecureisextremelyimportant.Whilethelawmayormaynotprotect
individualsandtheirdata,itisuptotheusertomakesurethattheyhavetakeneverymeasure
possibletoensuretheirsecurity.However,mostofusareofthebeliefthateveryoneshouldhave
somelevelofprivacy,andthatshouldalwaysberespected.

References
Anymentalillness(AMI)amongadults.(n.d.).Retrievedfrom
http://www.nimh.nih.gov/health/statistics/prevalence/anymentalillnessamiamongadul
ts.shtml
Thiswebsiteprovidesabreakdownofhowmanypeoplehavedifferenttypesofmental
illnesses.Itprovideschartsandvisualsforabetterunderstanding.
Barrett,D.(2013,July10).Onesurveillancecameraforevery11peopleinBritain,saysCCTV
survey.Retrievedfrom
http://www.telegraph.co.uk/technology/10172298/Onesurveillancecameraforevery11
peopleinBritainsaysCCTVsurvey.html
ThisisanarticlefromtheTelegraph.Itisreportingonastudythatsaysthatthereisas
bigofaratioforcamerastopeopleas1to11.
Etzioni,A.(1999).
Thelimitsofprivacy
.NewYork,NewYork:BasicBooks.
Factsheet8a:Healthprivacy:HIPAAbasics.(2015,February1).Retrievedfrom
https://www.privacyrights.org/content/healthprivacyhipaabasics
ThisisawebpageoutlininghowHIPAAworks.Itisbrokendownintosectionsfor
easierreadingandunderstanding.
Gibbs,S.(2015,February20).MobilePhoneshacked.RetrievedFebruary8,2015,from
http://www.theguardian.com/technology/2015/feb/20/mobilephoneshackedcannsagch
qlistentoourphonecalls
Thisarticletalksaboutthehackingofsimcardswithinmillionsofcellphones.Itgives
accesstomanysecurityagenciestoheartelecommunicationsoverthephones.

GoogleWarnsIranianUserstoChangePasswords.
Msnbc.com
.N.p.,09Sept.2011.Web.11
Mar.2015.
Retrievedfrom
http://www.nbcnews.com/id/44461419/ns/technology_and_sciencesecurity/t/googlewarns
iranianuserschangepasswords/#.VP8Q_FPF9uo
ThisisGooglewarningIraniansaboutpotentialhackerattacksbyIraniangovernment.
HoganLovellswhitepaperongovernmentalaccesstodataintheclouddebunksfaulty
assumptionthatUSaccessisunique.(2012,May23).Retrievedfrom
http://www.hldataprotection.com/2012/05/articles/internationaleuprivacy/hoganlovells
whitepaperongovernmentalaccesstodataintheclouddebunksfaultyassumptiontha
tusaccessisunique/
ThisisanarticlethattalksabouthowtheUSisnottheonlycountrythatcanobtain
informationaboutitscitizens.Itdetailshowcloudstoragecanbeaccessed.
IranArrests11overSMSKhomeiniInsults.
Tribune.com
.NewYorkTimes,n.d.Web.Mar.
2015.
Retrievedfrom
http://tribune.com.pk/story/765691/iranarrests11oversmskhomeiniinsultsreport/
ThereportofarrestedpeopleinIranduetousingViberapp.
Medina,J.,&Osorio,E.(2013,April5).Mexico'sNewPrivacyNotice.RetrievedFebruary5,
2015,from
http://www.littler.com/publicationpress/publication/mexicosnewprivacynoticeguidelin
esrequireimmediateaction

Thisnewprivacynoticegivesmoreprotectionlawstousersinmexicoabouttheirdata
privacyintheinternet.ItenforcestherightforusersinMexico.

Mexico'sNewFederalLawOnTheProtectionOfPersonalData.(n.d.).RetrievedFebruary6,
2015,from
http://www.itlawgroup.com/resources/articles/98mexicosnewfederallawontheprotec
tionofpersonaldata
Thesame,butmoreinformationaboutdataprivacyofusersareprotected.Itsmore
detailedanditshowshowthelawcametoplace.
PatriotActvsDataProtectionLawsUSAvsEurope.(2013,February6).Retrievedfrom
http://www.dome9.com/blog/patriotactvsdataprotectionlawsusavseurope
ThiswebsitecomparesandcontrastsprivacylawsintheUSAandEurope.Itgives
examplesofhowtheyaresimilarbutdifferent.
Peterson,A.(2015,February5).Whyhackersaretargetingthemedicalsector.Retrieved
February2,2015,from
http://www.washingtonpost.com/blogs/theswitch/wp/2015/02/05/whyhackersaretarget
ingthemedicalsector/
Anexplanationaboutwhyhackersaretargetingthemedicalsector.
RequestCCTVfootageofyourself.(2015,February18).Retrievedfrom
https://www.gov.uk/requestcctvfootageofyourself
ThisisawebsiterunbytheUKgovernment.Itdetailshowtorequestfootageofyourself
fromaCCTVcamera.
Reuters.(2015,January27).MexicosaysmaysanctionGoogleoverdataprotection
breach.RetrievedFebruary8,2015,from

http://www.reuters.com/article/2015/01/28/usgooglemexicoidUSKBN0L104Z2015012
8

Googlemaybesanctionduetoitsfailureofdeletingusersdataintheirserver.

Tancer,B.(2008).
Click:Whatmillionsofpeoplearedoingonlineandwhyitmatters
.New
York,NewYork:Hyperion.
TheconstitutionofIslamicRepublicofIran.
Www.parliran.ir
.N.p.,(1989).Web.Mar.2015.
Retrievedfrom
http://en.parliran.ir/index.aspx?fkeyid=&siteid=84&pageid=3054
IransconstitutionasitisstatedbyIransparliament.
OfficialUSPSchangeofaddress.(n.d.).Retrievedfrom
https://moversguide.usps.com/icoa/mailforwarding/changeofaddress?state=coa
ThisisthebeginningpageofchangingonesaddressonUSPS.com.Itprovides
stepbystepinformationonhowtodoso.
Quran.
Surat'Ali`Imran[3:104]
.Quran,n.d.Web.11Mar.2015.
Retrievedfrom
http://quran.com/3/104
Quranchapterandlineaboutenjoiningrightsandforbiddingwrong.

Anda mungkin juga menyukai