Privacy in the Age of Technoloy

Privacy in the Age of Technoloy

  • Submitted By: aythea
  • Date Submitted: 10/13/2013 11:57 PM
  • Category: Business
  • Words: 1310
  • Page: 6
  • Views: 119

Is Privacy Impossible in the Age of Technology?
NaVisa Malloy
LEG 500
Professor Robert Weekly
July 29, 2012

Technologies Used to Research Citizen’s Private Information
In today’s day and age technology is all around us and even at the fingertips of essentially millions of people. But when you stop to think about it technology can be just as dangerous as it is useful. The internet is a super highway that houses many different programs that allow people to research the private data of just about anyone. Programs such as mylife.com, Google and usa-people-search.com are all programs that can be accessed when trying to find the address, phone number, or other personal data of a person of interest. Google one of the world’s most renown search engines is one of the options that many people turn to when researching things from how to grow tomatoes to what is the best home remedy for the common cold. But general information is not the only reason that people utilize Google, it can also be used to search for information on anyone whose name you know. Google has several different methods that you can use to gather information about someone. Those methods include “typing in a phone number, Googling a name in quotation marks, typing an address in Google maps, Google news alerts, image searches, and social searches” which provide information of any social site your person of interest may be registered with (Boswell, n.d.). But if by chance you are unable to find the information you are looking for the website mylife.com is available to help find personal information of anyone you choose. This website has “over 1 million new people joining it each month” which actually no surprise considering the amount of information you can gather from utilizing its services (www.mylife.com). The website provides “current and previous locations of people, contact information and photos, previous and current professional background as well as any social networks that someone may be a...

Similar Essays