SEARCH RESULTS

YOU WERE LOOKING FOR :Individual Privacy and Computers

Essays 301 - 330

Technology as a Non Racist Tool in the Fight Against Terrorism

In the twenty first century we are faced with a definite challenge in regard to how to go about balancing our...

Cyber-Crime Prevention: The Ethical Considerations

consumers or clients, or even contractually confidential information in some cases) is compromised, then it could mean the total d...

Criminal Surveillance: Pros and Cons

casual downtown shopping trip; they feel this constitutes an invasion of their privacy. For instance, the House Majority Leader at...

Why Surveillance Is Good

that suitable frameworks to prevent, or detect and stop abuses cannot be put into place, just as they have in the past with older ...

Electronic Medical Records - Business Incentives and Ethical Concerns

information flows between healthcare facilities; the bottom line is that legislation will have to be concerned not simply with pro...

Electronic Medical Records: An Overview of Benefits

records, highlighting the capacity for such a change to have a sweeping impact throughout the industry. For example, in the 2009 "...

Privacy Right of the Average Citizen

wake of arrests stemming from the September 2001 bombings. Interestingly enough, this idea of a persons right to privacy was alr...

Employee Rights and Organizational Security

be addressed, such that best practices can be established in order to balance the needs of employers with the rights of employees,...

Occupational Drug Testing of Employees

have enacted certain laws on their own which sometimes provide for testing in a much wider arena. Consider Idaho as an example. ...

Policies on Dating in the Workplace

times, one person is pursued by another, but the advances are unwanted. This too can result in a suit. Finally, uncomfortable situ...

Electronic Data Security and 1996's Health Insurance Portability and Accountability Act

late 1980s and early 1990s placed many in the position of not having health care coverage. Many faced long terms of unemployment,...

Email and the Workplace

equipment so that they can monitor their employees every move while onsite. In one respect most would state that if the boss...

Issues Involving the 'Right to Die'

In eighteen pages this research paper discusses the cases of Cruzan, Bouvia, and Quinlan in a consideration of the issues associat...

Workers Rights and Personal Privacy

or bus drivers, the lives of others are at stake. How does one weigh the privacy rights of employees regarding their behavior and ...

International Law and Privacy

real sanctions that country can suffer for breaching an international law. It can be argued that the reason for the agreement is...

NJ State Troopers and Privacy Rights

a person in a position that cannot be held by someone with AIDS submits a receipt for AZT; in the third, a claims administrator se...

A Consideration of Ann Wells' 'Who Owns Information?: From Privacy to Public Access'

risks which currently exist in regard to information privacy and eloquently addresses the evolutionary trend toward information ma...

Internet Era and Management

Vint Cerf (1989) noted that the "reliable operation of the Internet," (710) not to mention the correct use of resources when it ca...

A Dilemma of Ethics in the Workplace

personal correspondence of others regardless of how inviting the opportunity might be. Like other system administrators i...

Privacy Impact of the USA Patriot Act

claim that the new rule violates the constitutional right to counsel (2002). Indeed, the act does change things and suggesting th...

Case Studies on the Integration of Technology

to Point B overnight. Where FedEx has led the way is in the area of value add, in other words, using technology to help provide mo...

Privacy Issues and IT

their electronic mail and telephone conversations, and nearly every other aspect of their individual lives?" (1999, p. 620). Br...

Counseling Issues

In five pages issues such as privacy, referral, confidentiality, help skills, theories, and definitions as the pertain to counseli...

Privacy from a Philosophical Perspective

In sixteen pages this paper analyzes privacy from the perspective of philosophy. Twenty four sources are cited in the bibliograph...

Internet Terrorism and Freedom

In twenty pages this paper examines the Internet's anonymous servers in terms of advantages and disadvantages and discusses releva...

1996's HIPAA

In six pages the 1996 bill the Health Insurance Portability and Accountability Act is examined in an overview of privacy and secur...

Contract and Privacy Laws of New Zealand

In five pages this paper considers 2 case studies relating to New Zealand's contract and privacy laws. Four sources are cited in ...

American Hotel Industry Changes

law and it is enforced by the Wage & Hour Division of the U.S. Department of Labor (DOL). This Act was amended in 1940, 1947, 1949...

Government Should Not Regulate Electronic Commerce

pervasiveness of the net makes it difficult for even the best-intentioned of regulators to keep away ("Regulating," 2000). Some be...

Computer Age and Information Ethics

technology in general. The ease with which personal information can be unscrupulously gleaned from the multitude of computerized ...