This website uses cookies to ensure you have the best experience. Learn more

Understanding Privacy Issues In Cyberspace Essay

1501 words - 7 pages

Understanding Privacy Issues in Cyberspace
Corley S. Bradford Jr.
University of Maryland University College CSEC 610
Dr. Hanners
Due Date: April 27, 2014

Table of Contents

Understanding Privacy Issues in Cyberspace 3
AT&T Wireless 4
Cricket Wireless 5
Verizon Wireless 6
Comparing and Contrasting private polices 7
Recommended Policy Changes 7
Conclusion 7
References 8

Understanding Privacy Issues in Cyberspace
The history of mobile devices dates all the way back to the early 1970s, originating with Motorola being one of the first companies to develop these devices. This mobile technology allowed for communications to become more reliable and robust, ...view middle of the document...

Although new mobile technology promotes flexibility and reliability it also comes at a price of privacy issues as well. In this paper, this writer will attempt to correlate how the use of mobile devices increases privacy concerns within various organizations. Additionally, the writer will provide a brief analysis on the following organization: Verizon, Cricket and AT&T Wireless mission statement and compare and contrast details of each stated privacy policy. Furthermore, this writer will recommend private policy changes by using sensitive customer information to increase corporate profitability and advantage, and more importantly how to safeguard consumer information to evade potential privacy or liability issues.
AT&T Wireless
AT&T’s mission is to develop technical improvements for the advantage of its customers and AT&T by executing next generation (NEX-GEN) technology and network progression in services and operations [ (AT&T, 2014) ]. Formerly known as Cingular Wireless from 2000-2007, AT&T was established in the year 2000. As of today, AT&T happens to be the Second largest voice and data network mobile communications company in the United States with Approx 111.5 million subscribers [ (AT&T, 2014) ]and Verizon Wireless being the largest with Approx 103.3 million subscribers [ (Verizon Wireless, 2014) ]. However, AT&T mobile network is known for its advanced multi-tasking capable network, unlike other wireless companies. Such features allow consumer to use voice and data simultaneously, this allows talking, texting, and surfing the internet all at the same time. AT&T continues to pursue NEX-GEN innovation like no other wireless company and continues to lead innovations to provide consumers with the best products and network reliability [ (AT&T, 2014) ]
Moreover, AT&T continues to remain transparent with it privacy policies procedure which provide consumers with a sense of security when it comes to their personal data [ (AT&T, 2014) ]. In addition, you can also review a synopsis of AT&T privacy policy on the website, under FAQ privacy policy, because the company understands that policies are long, complex, and can be difficult to understand at times. Therefore, AT&T enhanced readability for all consumers’ by focusing on sentence structure and terminology, so that the privacy policy can be interpreted with ease (AT&T, 2014)
Cricket Wireless
Cricket wireless was established in 1998, with a company motto of “Half is more.” As of today, this company has approx 4.8 million wireless subscribers, who enjoy the benefits of Crickets no commitment contracts [ (Cricket Wireless, 2014) ]. This includes some of the best service options on smart phones for a fraction of the price of the competition such as unlimited text, data, and talk [ (Cricket Wireless, 2014) ]. Conversely, anything that is cheap comes with potential consequences, and in this case, the...

Other Papers Like Understanding Privacy Issues in Cyberspace

Cyberbullying and Its Harmful Effects Essay

1897 words - 8 pages cyberbullying rates are so high and there are so many forms is because, “cyberbullying can be anonymous and ‘predators’ in cyberspace do not have to be physically stronger or bigger than cybervictims” (Li 2008). In traditional forms of bullying, the bully is usually stronger and bigger than the victim and that is why they hold more power. Without being in direct physical contact with another individual, it is much easier to be a bully if you are not

Individual and the Law Essay

1299 words - 6 pages statute though. There are also Acts at federal and state level that specifically pertain to cyberspace activities, such as The Spam Act 2003 (Cth). Racial hatred is illegal in Australia under the Racial discrimination Act 1975 (Cth) and this act has been extended to even apply equally to cyberspace, to help individuals. Privacy and intellectual property are other issues when it comes to technology, for example a music artist Lilly Allen had


565 words - 3 pages Health Records (EHR). “While it may never be possible to ensure the absolute security of all records held in cyberspace, with the necessary safeguards in place, the government can at least assure the American people that their protected health information is receiving the highest feasible level of security” (Jacques, 2011, p. 462) With all the debate over the compromised privacy of health information, we must also examine the benefits that will come

Legal Issues Paper

2806 words - 12 pages for illegal purposes is subject to prosecution. However, most companies use their corporate policy to ensure guidelines are followed in relation to Internet usage. Most employees are required to sign statements in relation to adhering to the procedures and by signing indicates an understanding regarding repercussions.2C. How Do the Laws vary on an International Level?Internet privacy laws do not change in relation to the business. Essentially, no


1034 words - 5 pages . This field of study as several concerns from the environment to health issues, however, the main in terms of cyber-subcultures deals with social change. Social change can be described as any event that causes a dramatic change immediately or over time. The presence of the Internet and cyberspace has already caused several changes in society. Facebook (FB), Twitter and other social media sights have made it possible to connect with people


5055 words - 21 pages Understanding of the Battlespace in the Contest for Information Superiority” p. 27 HSA’s Information Conference, London 13.-14.11.1997. -------------------------------------------- [ 1 ]. Cyberspace is the total interconnectedness of human beings through computers and telecommunication without regard to physical geography. William Gibson is sometimes credited with inventing or popularizing the term by using it in his novel of 1984, Neuromancer

Sex, Laws, And Cyberspace

1416 words - 6 pages illegal export of munitions. The three defendants in these cases felt that the First Amendment protected them, but it was not the case.Sex, Laws, and Cyberspace is precise in its opinion on the First Amendment and defends every case presented within the book. Sex, Laws, and Cyberspace addresses the legal issues and ethical debates surrounding the worldwide growth of the Internet. The same qualities that make these networks invaluable--low cost

Business Law Assigment 1

1258 words - 6 pages worth taking when doing business in cyberspace so long as the counsel does not consider them illegal(Bagley, 2008). It is important for a social media-marketing manager to understand the current laws that affect his company in regards to customer privacy, data mining, and taxation and interstate commerce.   This manager must take responsibility in understanding and following the various regulations involving his specific industry.   This

Public Paces

629 words - 3 pages Summary. Commentary around the electronic media has raised issues of political action, com-munity formation and changing identities. This paper explores how the notions of 'public space' can inform this debate over electronic media. It examines the metaphorical adoption of urban models to look at electronic sociality and suggests four principle approaches: cities set in or against world flows, suburbanised telecities, communitarian visions and

Administrative Ethics

976 words - 4 pages that would help to understand what are HIPAA sensitive records and the historical storage of these materials. Legal issues involve understanding exactly what the terms confidentiality and privacy means. Weiner and Gilliland states, “Although the terms “confidentiality” and “privacy” are often used inexactly or interchangeably, they are not equivalent, as it is possible to keep information private while still breaching confidentiality (Journal of

Locating Topics of Interest

2720 words - 11 pages is useful in providing the reader with a understanding that information technology is more than computers and networking infrastructure but encompasses the data that the organization creates and the linked technologies such as social networking used on some cases to convey this information. The Cloud and its influence on the pace of global business Nelson, M. R. (2009). The cloud, the crowd, and public policy. Issues in Science and Technology

Related Essays

Explain The Role Of Theories In Understanding Child Development, Describe The Three Basic Issues On Which Major Theories Take A Stand, And Explain The Concepts Of Plasticity And Stability In...

5909 words - 24 pages Week 7 Week 8 SCHAUMBURG COMMUNITY CHURCH THROUGH THE BIBLE IN ONE YEAR Passages 1st Passage 2nd Passage (Old Testament) (New Testament) Genesis 1:1-2:25 Luke 5:27-39 Genesis 3-5 Luke 6:1-26 Genesis 6:1-7:24 Luke 6:27-49 Genesis 8-10 Luke 7:1-17 Genesis 11 Luke 7:18-5 Genesis 12 Luke 8:1-25 Genesis 13:1-14:24 Luke 8:26-56 Genesis 15 Luke 9:1-27 Genesis 16 Luke 9:28-62 Genesis 17 Luke 10:1-20 Genesis 18 Luke 10:21

Personal Privacy In A Technologically Public World

2568 words - 11 pages terabit upon terabit of archived files, active or abandoned transaction records, and deliberate compilations of information (data mining) used by various organizations to create a profile of who we are or were. Not suprisingly, a Dell sponsored survey conducted in August 2000 by Harris Interactive, revealed that loss of personal privacy ranked as an issue of higher concern for Americans than the issues of crime, health care, or the environment 3

Computer Privacy Essay

828 words - 4 pages , management information systems (MIS), marketing, jurisprudence, and the social sciences. Even within HCI, the privacy literature is fairly spread out. Furthermore, many IT professionals have common-sense notions about privacy that can turn out to be inaccurate. Hence, the goal of this article is to provide a unified overview of privacy research in HCI, focusing specifically on issues related to the evaluation of end-user systems that have privacy

Personal Privacy In A Technologically Public World

2461 words - 10 pages , and deliberate compilations of information (data mining) used by various organizations to create a profile of who we are or were. Not suprisingly, a Dell sponsored survey conducted in August 2000 by Harris Interactive, revealed that loss of personal privacy ranked as an issue of higher concern for Americans than the issues of crime, health care, or the environment 3 In the United States, each of us owns our personal information, to share or