Type a new keyword(s) and press Enter to search

Internet Privacy

 

Several of these companies used Orwellian computer software that was initially offered for only $99 and had the ability to screen and record every keystroke on the computer with video like precision. It is also possible for the firms to screen all incoming and outgoing e-mail for forbidden words and phrases- such as those involving racism, or the name of a boss. Suspicious messages would then be forwarded to a supervisor for review. .
             ?Changes in the delivery of books, music and television were extending these technologies of surveillance beyond the office?? (www.britannica.com) In 2000 Amazon.com created controversy when they changed their privacy policy without warning. They announced that customers were no longer allowed to obstruct the distribution of personal data. .
             Globally Unique Identifiers, or GUIDS make it possible to link every file, e-mail communication, and on-line chat room posting with the real-world identity of the person who created it. The unease for this issue is also growing. GUIDs are a kind of serial number that can be connected with a person's name and e-mail address when he registers on-line for merchandise or service. .
             .
             One of the most popular Internet music players, RealJukebox was recognized in November 1999 by privacy advocates when they realized that the music each user downloaded could pinpoint a user's identity by matching it with a unique identification number. There were even various software products such as Microsoft Word 97 and PowerPoint 97, which implanted distinct identifiers into every document. .
             ?Americans increasingly seem to agree that Congress should save them from the worst excesses of online profiling.? (www.britannica.com) A poll conducted in March for Business Week magazine showed that 57% of the respondents said that the government should pass laws that modify how personal information could be collected and used on the Internet.


Essays Related to Internet Privacy