Saturday, May 16, 2020

The Need for the Social Networking Protection Act Essay

Introduction The rapidly increasing growth of social media has surpassed legislation that is currently in place. Any information that individuals display onto their social networking sites such as Twitter, Facebook, Instagram and so on, is being used by numerous employers around the world in order to gain additional knowledge of employees and applicants. When there are no laws that are set in place to ban such behavior, it becomes a conventional occurrence amongst employers. Social media websites have developed into a widespread communication instrument for personal and professional affairs. Therefore, employers will naturally want to gain access to these websites, especially the websites of their employees and potential employees to†¦show more content†¦This Act addresses the current problem head on by seeking to outlaw current and potential employers from requesting login information to personal social media websites. Not only does the Act deal with employers but also schools and unive rsities. The employers in each of these sectors will not be able to demand any login information to punish, discriminate or refuse employment, and the employees will not be punished for declining to hand over the information. Additionally, this bill will protect the personal privacy of employees, potential job applicants, current students and potential students. Statement of the Problem This proposed legislation is intended to stop a rising trend of employers and schools seeking social media passwords from their students, employees and prospective students and employees. Too many schools and employers feel the need to know every detail, private or public, about the people they want in their agencies. Everyone in this world, who has a job, wants to get a job, goes to school, or wants to get into a school is affected by this problem. Employers want to gather masses of information about their employees and potential employees they want to hire in order to make sure they are hiring respectable people. Schools want to gather information from students and potential students for the same reason. However, schools are now being pressured to gather information on their students’ social media sitesShow MoreRelatedPrivacy Issues in Social Media Essay1278 Words   |  6 Pages Privacy Issues in Social Media Social Media is a current way in which people are using to interact with one another daily. Since the launch of various Social Networking Sites (SNS) its been a huge attraction in a new way to share information with others and correspond with interests of your choice in many different forms. Although social media sites allow users to share information with friends and other sites on the internet, many people are unaware of how their privacy is getting out. Now thatRead MoreBis 220 Introduction to Computer Applications and Systems /Complete Class1089 Words   |  5 PagesTechnology Acts Paper Select two of the following acts to research: †¢ Do Not Call Implementation Act, 2003 †¢ Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, 2003 †¢ Federal Information Security Management Act (FISMA), 2002 †¢ Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (US Patriot Act), 2001, renewed 2006 †¢ Children’s Internet Protection Act, 2000 †¢ Financial Services Modernization Act, 1999 Read MoreUnderstand Legislation, Policies and Procedures for Confidentiality and Sharing Information Including Data Protection1075 Words   |  5 Pagesincluding data protection. ï ¿ ¼ Why it is important to reassure children, young people and adults about confidentiality and why it may need to be breached. For the home country England there are many policies and procedures within the legislation that relate to safeguarding human rights, data protection and confidentiality. These have been refined into every school policy and procedures such as the human rights act 1998/2004, children act 1989/2004Read MorePrivacy on Internet Essay1587 Words   |  7 Pagesbecome a thing of the past. People have come to accept that strangers can view personal information about them on social networks such as facebook, and companies and the government are constantly viewing peoples’ activity online for a variety of reasons. The government has attempted to help the consumer regain their privacy online by passing the Consumer Internet Privacy Protection Act of 1997, although it is difficult to enforce and has become outdated with the fast-moving tendency of the constantlyRead MoreViolation Of Personal Data On Social Networks991 Words   |  4 PagesViolation of Personal Data on Social Networks Research question: What measures are in place to protect against personal data theft in social networks? Thesis Statement: The rise of social networking sites has considerable increased the volume of personal data being collected or sold online by some organizations without any consent by the owners, therefore, there are many practices that should be performed by either users or organizations in order to protect the violation. I. The causes of personalRead MoreBSTRACT Social Networking sites are playing an important role in personal life as well as1300 Words   |  6 PagesBSTRACT Social Networking sites are playing an important role in personal life as well as business. A social networking site has become very popular for people to connect and share their interest with family and friends. Although the use of social networks is increasingly on the rise, many users are properly informed of the risks associated with using social networks. The risks as well as the security and privacy issues of social networks in business and public policy need to be evaluated and studiedRead MoreViolations Of Personal Data On Social Networks1456 Words   |  6 PagesViolations of Personal Data on Social Networks The Causes of Personal Data Stolen on Social Networks Social network sites contain specifically precious information. This data inevitably relates personal information of its users, which shows particular details of their life. According to Obole, Cruz, Welsh (2015), using social networking sites have resulted in concerning issues relating to privacy, for instance, manipulate voters, track users or disclose user’s location. Indeed, business sectorRead MoreThe Private Sector Public Sector Cybersecurity Issues Essay952 Words   |  4 Pagesthe big-data collection of information about consumers to determine customer’s habits and personal information. This will be explored through an analysis of Facebook and social networking. With this collection of information, the issue of who owns, use, and access the information has arisen. Also the issue of privacy, and protection come into the light, and how has the government/lawmakers protected those effected. Goals of the Business Facebook which was found by Mark Zuckerberg in Cambridge, MaineRead MoreA Brief Look at Cloud Computing882 Words   |  3 Pagescomputers and devices through the Internet. cloud computing structure allows access to information as long as an electronic device has access to the web. Cloud computing system allows employees to work remotely. Examples of cloud computing include social networking websites and facebook. INTRODUCTION TO CLOUD COMPUTING: Everyone has a opinion on what is cloud computing. Cloud computing is the ability to rent a server or a thousand servers and and run a geophysical modeling application on the most powerfulRead MoreSocial Networing Sites: Befriending Identity Theft1126 Words   |  5 PagesSocial networking sites are increasingly becoming one of the internet most utilized activities. However, how often does one think that their Facebook site is hazardous to their identity. According to the U.S. Department of Justice, an estimated 11.7 million Americans were victims of identity theft in 2010 (U.S. Dept. of Justice). Identity theft is defined as a crime where someone illegally acquires and utilizes another person’s vital information to deceive for personal gain. That same year, the Federal

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.