Describe how and in what ways ‘violation of privacy’ occurs in and through
Computers.
Computers make more information available to more people. This makes protection of computer privacy difficult.
1. Inappropriate Access:
• Documents recorded for a crime which one did not commit but was arrested.
• As a child you were arrested for drinking alcohol
• Medical data about visits to a psychiatrist.
• A loan default to a National Bank.
Any of the above information can be accessed by, let us say, a prospective employer during a security check.
2. Data Bank Errors:
• Even erroneous information when generated by computers is taken to be authenticated.
• Immediate reaction to such wrong information may mostly prove to be incorrect.
3. Hackers:
• ‘Hackers’ are people who compulsively challenge any computer security system, choke networks, give out false information, etc.
• This can be extremely harmful.
• It is a violation of property rights.
• At the least, it reduces productivity by shutting down systems.
• Individual privacy, national security, freedom to protect proprietary information are three values requiring limits on access to information.