Author Question: Describe and evaluate the different methods that are being used to protect online privacy. Which of ... (Read 21 times)

piesebel

  • Hero Member
  • *****
  • Posts: 565
Describe and evaluate the different methods that are being used to protect online privacy. Which of these methods do you think is or could be the most effective?
 
  What will be an ideal response?

Question 2

Discuss the Authors Guild's lawsuit against Google with respect to Google's Library Project, and explain why the courts ultimately ruled in Google's favor.
 
  What will be an ideal response?



aadams68

  • Sr. Member
  • ****
  • Posts: 317
Answer to Question 1

The different methods being used to protect online privacy include legal protections, industry self-regulation, privacy advocacy groups, privacy protection products, and technology solutions.

In the United States, the Federal Trade Commission has taken the lead in researching online privacy and recommending legislation to Congress. The FTC has issued the Fair Information Practice (FIP) Principles, which forms the basis for its recommendations for online privacy. Two core principles are Notice/Awareness and Choice/Consent. The Notice/Awareness principle recommends that sites disclose their information practices before collecting data. The Choice/Consent principle recommends that there be a choice system in place that allows consumers to choose how their information will be used for secondary purposes other than supporting transactions. Although the FIP principles are guidelines, not laws, they have stimulated private firms to develop their own guidelines and are being used as the basis of new legislation, such as the Children's Online Privacy Protection Act (COPPA), which requires websites to obtain parental permission before collecting information on children under 13 years of age. Recently, the FTC has developed a new framework to address consumer privacy. The main principles are privacy by design, simplified choice, and greater transparency, applied to all commercial entities that collect or use consumer data, not just those that collect PII. It has also called for a Do Not Track mechanism for online behavioral advertising. As with FIP, these principles remain guidelines. The emphasis in recent FTC privacy reports is not on restricting the collection of information (as in previous eras of privacy regulation), but instead on giving consumers rights with respect to the information collected about them in large databases and its use by various businesses and agencies. Although several bills have been introduced in Congress to implement them, none have been passed as of yet.

Historically, the online industry in the United States has opposed online privacy legislation, arguing that industry can do a better job of protecting privacy than government. However, facing fines, congressional investigations, and public embarrassment over their privacy invading behaviors, with the potential loss of some business and credibility, the major players in the e-commerce industry in the United States are beginning to change some of their policies regarding the treatment of consumer data. Large Internet firms that rely on personal information (Google, Facebook, Microsoft, and many others), along with privacy advocates, are calling on Washington to develop comprehensive consumer privacy protection legislation that would clarify for consumers and business firms the meaning of privacy in the current online commercial environment.

The online industry formed the Online Privacy Alliance (OPA) to encourage self-regulation. In addition, the Network Advertising Initiative, a consortium of major Internet advertising companies, was formed to develop policies for the industry. The NAI policies are designed to offer consumers opt-out programs and to provide consumers with redress for abuses. Other forms of self-regulation include various seals of approval that sites can display when in compliance with certain privacy policies. However, these seal programs have had a limited impact on online privacy practices and critics argue that the programs are not particularly effective in safeguarding privacy.

In general, industry efforts at self-regulation in online privacy have not succeeded in reducing American fears of privacy invasion during online transactions or in reducing the level of privacy invasion.

In addition, a number of firms have sprung up to sell products that they claim will help people protect their privacy, from protecting their online reputation to selling their personal information to the highest bidder. Consumer privacy groups have also formed to monitor developments, and there are some technological solutions that help, although primarily in the arena of security. Technological tools include spyware blockers, pop-up blockers, methods to secure e-mail, anonymous remailers, anonymous surfing, and cookie managers.

Student evaluations of which methods are the most effective will vary.

Answer to Question 2

Google's Library Project involved an effort by Google to scan all the books in several university and public libraries, and then make snippets and parts of the book available online without receiving permission from the publishers or paying royalties. Google said it would never show a full page, just relevant portions of a page in response to searches. In 2005, the Authors Guild and the large book publishers filed a lawsuit seeking to prevent Google from implementing the Library Project. Google argued that the Library Project constituted fair use of publishers' copyrighted works because it only published snippets. Moreover, Google claimed that it was simply helping libraries do what they are intended to do, namely, lend books. Library lending is considered a fair use following an agreement in the late 1930s with publishers, and such lending was codified into the Copyright Act of 1976. Google claimed that helping libraries make books more available to the public was in the broader public interest, and extended existing rights of libraries to encourage book availability. In 2013, a federal court finally found in favor of Google without reservation by ruling that Google's scanning and making snippets of text available to the public was fair use under U.S. copyright law. The judge believed the project had a broad public purpose of making it easier for students, researchers, teachers, and the public to find books, while also preserving consideration for author and publisher rights. The Google project was transformative in the court's view, giving books a new character and purpose, making it easier to discover old books, and leading to increased sales. The Supreme Court ruled in 2016 that Google's Library Project was fair use, and the matter is settled from a legal perspective.
AACSB: Analytical thinking; Information technology; Written and oral communication
LO: 8.3: Understand the various forms of intellectual property and the challenges involved in protecting it.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question


 

Did you know?

GI conditions that will keep you out of the U.S. armed services include ulcers, varices, fistulas, esophagitis, gastritis, congenital abnormalities, inflammatory bowel disease, enteritis, colitis, proctitis, duodenal diverticula, malabsorption syndromes, hepatitis, cirrhosis, cysts, abscesses, pancreatitis, polyps, certain hemorrhoids, splenomegaly, hernias, recent abdominal surgery, GI bypass or stomach stapling, and artificial GI openings.

Did you know?

Everyone has one nostril that is larger than the other.

Did you know?

In 1886, William Bates reported on the discovery of a substance produced by the adrenal gland that turned out to be epinephrine (adrenaline). In 1904, this drug was first artificially synthesized by Friedrich Stolz.

Did you know?

There are more sensory neurons in the tongue than in any other part of the body.

Did you know?

Adult head lice are gray, about ? inch long, and often have a tiny dot on their backs. A female can lay between 50 and 150 eggs within the several weeks that she is alive. They feed on human blood.

For a complete list of videos, visit our video library