These personal pages are quite unique and incorporate extensive variation of the quantities and types of materials; they sometimes include the connection to other pages around the globe. (Cartwright, 1996) The embarrassment that we face with this shift in standard in based on the fact that there have been several abuses of the Internet
xanga.com. (Elizabeth, 2005) The friends and enemies can go around
Others contradict on the ground that government is not confronted with similar economic considerations that approach to exhausted industry regulations. (Hersh; Fordham, 2001) The Internet is a specific industry in that it contains different communities of users each sharing varied beliefs about the acceptability of behavior and concepts
Over the next 50 years, the journalist Simson Garfinkel narrates in Database Nation that we visualize the new kinds of risks to privacy that do not trace their roots in totalitarianism, but in capitalism, the free market, advanced technology, and the unrestrained exchange of electronic information. (Lester, 2001) The privacy is a great mater of consumer concerns and there is no doubt about it
New surveillance and information gathering technologies are available presently everywhere and they are fixing up all sorts of warning bells for those who are concerned about the corrosion of privacy. (Linda, 2001) The cookies are applied for those of us that reach the internet through a public ISP, each request we make to a Website cannot be connected to a previous request, while each request do not entail a permanent specific identifier
Finally it is essential to persistently find out the options for our schools that will generate a rational level of protection and enable all users to have access to this valuable information tool. (Perine, 2000) Safety measures implemented to curb the availability of contentious content over the Internet are performed by the schools in allowing a logging system that shows what are the sites that have been visited by each student by their account user identification; overseeing the students when they are surfing the Internet, making it mandatory for every student using the Internet to accept by signing the School District Student Acceptable Use Agreement prior to permission access
Chris Hoofnagle of the Electronic Privacy Information Center, a privacy rights group puts the actions of the recording industry and other copyright trade association as an attempt to turn the higher education institutions into policing bodies. (Roach, 2003) A number of present cases have revealed the ways the student and rights can interfere with the norms of school security and discipline issues
According to a school staff Richard Oft, the computer rooms have entailed failure of more students and being failed than membership in fraternity and sorority houses. (Rockey, 1996) But the analyses have also brought out the advantages gained by the high school students with the use of Internet
The list incorporates campuses in Los Gatos, San Jose's East Side Union High School District and the Loma Prieta district in the Santa Cruz Mountains, in Santa Clara County. (Suryaraman, 2003) Variations thus even when it is positive always generates imbalance, and the area of Internet usage is growing at an unprecedented rate
At the end for a school official to legally restrict or prohibit individual student speech, the school must establish that the speech would generate substantial disturbance or material impediment of the functioning of school. (Taylor, 2001) Irrespective of the fact that the First Amendment deters government and educational institutions from legislating laws and policies that prohibit free speech the right to expression of an individual is not unrestrained
And the capability of interactivity of Internet permits the consumers to empanel their ideas instantly and precisely, radically enhancing the likelihood that the marketplace will search the optimal balance between data safeguard and freedom of information values. (Wellbery; Wolfe, 1998) Secured Internet Access specifically in schools and public libraries continues to be of much concern
CIPA also necessitate the every school district to devise an Internet safety plan that deals with access to unsuitable Web contents and security of students while applying the electronic communications, unauthorized access and other illegal activities and unauthorized disclosure, use and dissemination of personal information with regard to students. (Willard, 2002) Next, we are required to keep in mind that the children and adults have varied understandings about the way the address the Internet security
School may be deprived of considerable professional improvement dimensions and extend the gap between the teachers, students and successful application of the Web. (Wollinsky, 2003) While the school use exerts heavy stress on Website access and some e-mail, researches have been made to reveal that at home students have enough liberty to cross all of the confinements
However, with those conveniences, information technology specialists dealing with higher education caution that virtual learning and administrative settings create a still increased danger to student privacy protection, especially outside the campus limits. (Yates, 1999) The increasing understanding of online predators has concentrated parental and governmental attention on the potential threats of the Internet entails to the children and the natural necessity for protection
According to Lugaresi (2010), employee has no right to personal use of internet unless expressly allowed or implicated, employer can trace employee's internet usage and email only when directed by electronic privacy policy in advance and employees right to electronic privacy is not absolute, both employee's right of personal online activities (if any) and employer's surveillance level are subject to certain limits. Workplace privacy rights provide us with fairness, transparency, accuracy and security of both the parties and this helps facing a lot of challenges of privacy regulation (Lugaresi, 2010)
Schwartz, University of California, studied the steps that could help resolving privacy regulation issues in U.S. And found out following ways (Schwartz, 2000): 1
This theory grants one the right to accept or deny other's access to his information. However, it has some flaws; practically one can never have complete control over every piece of his information, it simply isn't possible and theoretically, the state of privacy whereby one's information is known by everyone yet he is entitled to control whether or not to reveal his information, is senseless (Tavani, 2000)
There is no clear legal rule as to what is acceptable and what is not in the field of email or Internet monitoring in the workplace, which makes it very difficult for those who are trying to operate a business. Employers are left on their own to try to monitor their employees the best they can while making sure that they do not get too strict and get themselves into trouble with the courts (Boustani 2002)
The most important thing for a company to do is to set out clear policies for Web and Email usage and let employees know up front whether they will be monitored so that there will not be any confusion in the future. Usually, employee monitoring can be limited to a record of the email traffic and the subject of those emails, without actually having to read the contents (Loney, 2002)
If employers are stopping people from saying what they want to during an email, then they are taking away that right, some people believe. Other people believe that employers have to draw the line somewhere, and not having email policies and Internet policies would cause employees to spend too much time with their computers, using them for their own personal enjoyment, and not enough time on productive company activities (Purdy, 2000)