This topic contains a solution. Click here to go to the answer

Author Question: What are the four types of invasion of privacy? What will be an ideal ... (Read 81 times)

luminitza

  • Hero Member
  • *****
  • Posts: 555
What are the four types of invasion of privacy?
 
  What will be an ideal response?

Question 2

What is data mining? Describe the privacy issues associated with data mining.
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

matt95

  • Sr. Member
  • ****
  • Posts: 317
Answer to Question 1

The tort of invasion of privacy encompasses four causes of action: 1) unreasonable intrusion upon the seclusion of another; 2) misappropriation of a person's name or likeness; 3) public disclosure of private facts; or 4) publicity that unreasonably places the other in a false light before the public.

Answer to Question 2

Data mining is series of techniques used to extract intelligence from vast stores of digital information. Data mining, especially of health information, created privacy questions. Some legislation has been adopted to address privacy concerns with data mining but there are also constitutional issues with data mining legislation.



luminitza

  • Hero Member
  • *****
  • Posts: 555

matt95

  • Sr. Member
  • ****
  • Posts: 317
Always glad to help...



 

Did you know?

Your chance of developing a kidney stone is 1 in 10. In recent years, approximately 3.7 million people in the United States were diagnosed with a kidney disease.

Did you know?

Vaccines cause herd immunity. If the majority of people in a community have been vaccinated against a disease, an unvaccinated person is less likely to get the disease since others are less likely to become sick from it and spread the disease.

Did you know?

There are 60,000 miles of blood vessels in every adult human.

Did you know?

There are major differences in the metabolism of morphine and the illegal drug heroin. Morphine mostly produces its CNS effects through m-receptors, and at k- and d-receptors. Heroin has a slight affinity for opiate receptors. Most of its actions are due to metabolism to active metabolites (6-acetylmorphine, morphine, and morphine-6-glucuronide).

Did you know?

About one in five American adults and teenagers have had a genital herpes infection—and most of them don't know it. People with genital herpes have at least twice the risk of becoming infected with HIV if exposed to it than those people who do not have genital herpes.

For a complete list of videos, visit our video library