SlideShare une entreprise Scribd logo
1  sur  9
Unit2PeerResponse 5006 Due 10.20.2022
Response Guidelines
To practice thinking critically and communicating when
advocating for your point of view on behalf of your clients,
challenge a colleague's policy analytic method, value critical
analysis versus analytic descriptive, by providing competing
arguments for using the opposite method.
Peer Response to challenge:
The value critical analysis is defined as “economic, cultural,
and social structures privilege some and not others, those who
are not privileged tend to need social work service because of
their position in such structures (Chambers & Bonk, 2014)”.
Analytic descriptive method evaluation is defined as a method
that “identifies or describes a social policy or program and what
the outcome should be as a result of the identifiable challenge
(Chambers & Bonk, 2014)”.There are a few differences between
the two forms of analysis. The differences are that the value
critical analysis evaluates the process of using current and
historical data to identify trends and relationships but doesn't
dig deep into the concern, analytic descriptive method policy
analysis is the description of a social policy or program, and
considers the impacts that the policy or program will have on
their neighbors or friends.The analytic descriptive method
offers a viewpoint of how things works. In order to best address
the issue I presented in my discussion I would use the analytic
approach to analyze the various ways social policy can help
balance the equal rights of women.
8/21/2021 The Erosion Of Privacy As We Know It
https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the-
erosion-of-privacy-as-we-know-it/?sh=7c127e075208 1/5
Innovation
POST WRITTEN BY
Reg Harnish
CEO of GreyCastle Security, a cybersecurity consulting firm
dedicated to the practical management of
cybersecurity risks.
The Erosion Of Privacy As We
Know It
Jun 21, 2017, 09:00am EDT
Reg Harnish Forbes Councils Member
Forbes Technology Council COUNCIL POST | Membership
(fee-based)
A decade ago, who would have thought an electronic heart
device could be
connected to the internet? Or that the data from that same
device could lead
to an arson and insurance fraud conviction of the very man it
was placed in?
If our own bodily functions can’t be kept private, what makes
us think that
everything else isn’t already waiting to be exposed? As
technology makes its
way into every aspect of our lives, we are increasingly trading
our privacy for
convenience, whether we know it or not. But based on the
example above,
and assuming you are a law-abiding citizen, this might not be a
bad thing.
https://www.forbes.com/innovation
https://www.greycastlesecurity.com/
https://www.forbes.com/sites/forbestechcouncil/
https://www.forbes.com/sites/forbestechcouncil/people/regharni
sh/
https://www.forbes.com/sites/forbestechcouncil/
http://fortune.com/2017/02/07/pacemaker-arson-charges/
8/21/2021 The Erosion Of Privacy As We Know It
https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the-
erosion-of-privacy-as-we-know-it/?sh=7c127e075208 2/5
In today’s world, we are never alone.
Most people don’t realize they will be photographed roughly 15
times, on
average, during a simple drive to the supermarket. On that same
trip, they’ll
typically end up on about 90 seconds of video without ever
knowing about it.
The texts and the calls they made on the way could also be
tracked. The
metadata will be sent instantly to databases around the world
and into the
cloud, where it will be immediately available to hundreds,
perhaps
thousands, of people and organizations. Our smartphones are
broadcasting
our exact locations at every moment, possibly sending the
information to
our friends, governments around the world, certainly to the
National
Security Agency (NSA) and to many others we are not aware of.
Let’s face it: Privacy as we know it is gone. But is that such a
bad thing?
Some argue that privacy is an intrinsic value and shouldn’t be
treated as a
dispensable commodity. They argue that privacy is essential for
self-
development, and without that, we would all conform to each
other and lose
our individuality.
Today, however, most Americans have unwittingly opted out of
privacy for
the convenience of surfing the web, monitoring their fitness
activity with
health trackers or receiving digital discounts at the grocery
store, just to
name a few. Our texts, medical records and credit card
information all have
been entered online and provided at our consent through terms
and
conditions. In fact, if we actually read through all of the terms
and
conditions each one of us is subjected to each year, it would
take about 76
work days to complete.
Shutterstock
http://crimefeed.com/2015/02/eyes-many-times-caught-
surveillance-cameras-per-day/
https://philosophia.uncg.edu/phi361-matteson/module-6-
privacy-property-and-technology/why-do-we-value-privacy/
http://techland.time.com/2012/03/06/youd-need-76-work-days-
to-read-all-your-privacy-policies-each-year/
8/21/2021 The Erosion Of Privacy As We Know It
https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the-
erosion-of-privacy-as-we-know-it/?sh=7c127e075208 3/5
By spending so much time online or opting in to terms and
conditions, we
are essentially allowing third parties not only to create digital
copies of
ourselves but also to predict our behaviors before we even know
how we will
behave ourselves.
Again, is that such a bad thing?
Maybe it’s time we embrace this change. Here are three benefits
that I
believe will come from the erosion of privacy as we know it
today:
Less Cybercrime
The mere fact that we assign value to privacy makes it worth
stealing. Take
social security numbers, for example. SSNs were never intended
to be
anything more than a means for tracking the earnings histories
of U.S.
workers to determine their benefit entitlements. Now, someone
can use your
social security number to open a bank account under your name,
receive
benefits and ultimately steal your identity -- all because we put
so much
value on a previously worthless nine-digit number. We as a
society created a
need to keep social security numbers private, and now it’s
coming back to
haunt us.
Like our SSNs, information -- including NSA records, the
security cameras
that line our city streets and corporate databases -- should be
made public.
The more public our information is, the less it’s worth,
therefore limiting any
real value for cybercriminals.
Forbes Technology Council is an invitation-only community for
world-class
CIOs, CTOs and technology executives. Do I qualify?
Improved Health
A world without privacy has many benefits that extend far
beyond receiving
tailored advertisements and discounts showing up on your social
media
https://www.ssa.gov/policy/docs/ssb/v69n2/v69n2p55.html
http://www.forbestechcouncil.com/qualify/?source=forbes-text
http://www.forbestechcouncil.com/qualify/?source=forbes-text
8/21/2021 The Erosion Of Privacy As We Know It
https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the-
erosion-of-privacy-as-we-know-it/?sh=7c127e075208 4/5
feed. It can also save lives. Currently, our health data is
protected by the
Health Insurance Portability and Accountability Act (HIPAA),
which limits
disclosure of patient data and mandates secure storage and
transmission of
electronic records.
But what patients don’t realize is their health data may provide
the next big
breakthrough in medicine. By freely sharing our information --
such as the
state of our own health, medications we’re taking, side effects
we are
experiencing and our lifestyle habits -- we can help medical
providers,
entrepreneurs and companies make new medical discoveries that
would not
be possible without access to the large amounts of data that is
currently
being protected.
If we truly want answers to the world’s biggest health
mysteries, we must be
willing to share our most personal health information. We’ll not
only save
lives, but we may just all live a little bit longer.
Transparency
Privacy as we know it has only existed for a short time. If we
continue to
fight it, we are doing ourselves a disservice, because the more
we continue to
keep our information hidden from the masses, the longer our
governments
and a select few will be the only entities with access to it.
Having large sums
of data and metadata in the hands of only a few, allowing them
to dictate the
flow of information, could set the stage for societal peril.
Our information should be shared democratically like it was in
simpler
times, when everyone knew everything about you. Your favorite
color. Your
favorite food. What made you laugh. Your kids’ names. Where
is the harm in
that? Once information flows freely, governments will be forced
to follow
suit with transparency.
If we can’t stop the erosion of privacy as we know it, let’s
embrace a society
without it. Maybe we just might make the world a better place.
https://www.virgin.com/entrepreneur/why-you-have-duty-share-
your-health-data
https://medium.com/the-ferenstein-wire/the-birth-and-death-of-
privacy-3-000-years-of-history-in-50-images-614c26059e
8/21/2021 The Erosion Of Privacy As We Know It
https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the-
erosion-of-privacy-as-we-know-it/?sh=7c127e075208 5/5
Reg Harnish
Reg Harnish is the CEO of GreyCastle Security, a cybersecurity
consulting firm
dedicated to the practical management of cybersecurity
risks.… Read More
ADVERTISEMENT
Reprints & Permissions
https://www.forbes.com/sites/forbestechcouncil/people/regharni
sh/
https://www.greycastlesecurity.com/
https://www.forbes.com/sites/forbestechcouncil/people/regharni
sh/
https://www.parsintl.com/publication/forbes/

Contenu connexe

Similaire à Unit2PeerResponse 5006 Due 10.20.2022Response Guidelines .docx

Similaire à Unit2PeerResponse 5006 Due 10.20.2022Response Guidelines .docx (7)

Sogeti big data research privacy technology and the law
Sogeti big data research privacy technology and the lawSogeti big data research privacy technology and the law
Sogeti big data research privacy technology and the law
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 

Plus de jolleybendicty

Which of the works we read was used by President Bushs 2002 appoint.docx
Which of the works we read was used by President Bushs 2002 appoint.docxWhich of the works we read was used by President Bushs 2002 appoint.docx
Which of the works we read was used by President Bushs 2002 appoint.docx
jolleybendicty
 
Which of these images represents the following system of equations b.docx
Which of these images represents the following system of equations b.docxWhich of these images represents the following system of equations b.docx
Which of these images represents the following system of equations b.docx
jolleybendicty
 
Which of the following was a component of the Earths Hadean atm.docx
Which of the following was a component of the Earths Hadean atm.docxWhich of the following was a component of the Earths Hadean atm.docx
Which of the following was a component of the Earths Hadean atm.docx
jolleybendicty
 
Which of the following statements was true of the Homestead Strike.docx
Which of the following statements was true of the Homestead Strike.docxWhich of the following statements was true of the Homestead Strike.docx
Which of the following statements was true of the Homestead Strike.docx
jolleybendicty
 
Which of the following studies would require a scientist to have e.docx
Which of the following studies would require a scientist to have e.docxWhich of the following studies would require a scientist to have e.docx
Which of the following studies would require a scientist to have e.docx
jolleybendicty
 
Which of the following statements is true about the Internet[remo.docx
Which of the following statements is true about the Internet[remo.docxWhich of the following statements is true about the Internet[remo.docx
Which of the following statements is true about the Internet[remo.docx
jolleybendicty
 
Which of the following occurred after the Civil WarAnswer.docx
Which of the following occurred after the Civil WarAnswer.docxWhich of the following occurred after the Civil WarAnswer.docx
Which of the following occurred after the Civil WarAnswer.docx
jolleybendicty
 
Which of the following statements about Mexican immigration to.docx
Which of the following statements about Mexican immigration to.docxWhich of the following statements about Mexican immigration to.docx
Which of the following statements about Mexican immigration to.docx
jolleybendicty
 
Which of the following is true of chemical properties (2 points).docx
Which of the following is true of chemical properties (2 points).docxWhich of the following is true of chemical properties (2 points).docx
Which of the following is true of chemical properties (2 points).docx
jolleybendicty
 
Which of the following is true in a monopolyA.)Business owner.docx
Which of the following is true in a monopolyA.)Business owner.docxWhich of the following is true in a monopolyA.)Business owner.docx
Which of the following is true in a monopolyA.)Business owner.docx
jolleybendicty
 
Which of the following is the net requirement using an MRP program i.docx
Which of the following is the net requirement using an MRP program i.docxWhich of the following is the net requirement using an MRP program i.docx
Which of the following is the net requirement using an MRP program i.docx
jolleybendicty
 
Which of the following is not a way managers generally benefit from .docx
Which of the following is not a way managers generally benefit from .docxWhich of the following is not a way managers generally benefit from .docx
Which of the following is not a way managers generally benefit from .docx
jolleybendicty
 

Plus de jolleybendicty (20)

Which of the following statements regarding components of a time ser.docx
Which of the following statements regarding components of a time ser.docxWhich of the following statements regarding components of a time ser.docx
Which of the following statements regarding components of a time ser.docx
 
Which of the works we read was used by President Bushs 2002 appoint.docx
Which of the works we read was used by President Bushs 2002 appoint.docxWhich of the works we read was used by President Bushs 2002 appoint.docx
Which of the works we read was used by President Bushs 2002 appoint.docx
 
Which of these articles confirms or negates your view on housing ava.docx
Which of these articles confirms or negates your view on housing ava.docxWhich of these articles confirms or negates your view on housing ava.docx
Which of these articles confirms or negates your view on housing ava.docx
 
Which of these images represents the following system of equations b.docx
Which of these images represents the following system of equations b.docxWhich of these images represents the following system of equations b.docx
Which of these images represents the following system of equations b.docx
 
Which of these images tells us the most about the rise, fall and the.docx
Which of these images tells us the most about the rise, fall and the.docxWhich of these images tells us the most about the rise, fall and the.docx
Which of these images tells us the most about the rise, fall and the.docx
 
Which of the following was a component of the Earths Hadean atm.docx
Which of the following was a component of the Earths Hadean atm.docxWhich of the following was a component of the Earths Hadean atm.docx
Which of the following was a component of the Earths Hadean atm.docx
 
Which of the following statements was true of the Homestead Strike.docx
Which of the following statements was true of the Homestead Strike.docxWhich of the following statements was true of the Homestead Strike.docx
Which of the following statements was true of the Homestead Strike.docx
 
Which of the following studies would require a scientist to have e.docx
Which of the following studies would require a scientist to have e.docxWhich of the following studies would require a scientist to have e.docx
Which of the following studies would require a scientist to have e.docx
 
Which of the following statements is true about the Internet[remo.docx
Which of the following statements is true about the Internet[remo.docxWhich of the following statements is true about the Internet[remo.docx
Which of the following statements is true about the Internet[remo.docx
 
Which of the following occurred after the Civil WarAnswer.docx
Which of the following occurred after the Civil WarAnswer.docxWhich of the following occurred after the Civil WarAnswer.docx
Which of the following occurred after the Civil WarAnswer.docx
 
Which of the following statements about bodhisattvas is true..docx
Which of the following statements about bodhisattvas is true..docxWhich of the following statements about bodhisattvas is true..docx
Which of the following statements about bodhisattvas is true..docx
 
Which of the following statements about Mexican immigration to.docx
Which of the following statements about Mexican immigration to.docxWhich of the following statements about Mexican immigration to.docx
Which of the following statements about Mexican immigration to.docx
 
Which of the following statements is NOT true of an atomthat.docx
Which of the following statements is NOT true of an atomthat.docxWhich of the following statements is NOT true of an atomthat.docx
Which of the following statements is NOT true of an atomthat.docx
 
Which of the following is true of chemical properties (2 points).docx
Which of the following is true of chemical properties (2 points).docxWhich of the following is true of chemical properties (2 points).docx
Which of the following is true of chemical properties (2 points).docx
 
Which of the following is NOT true of dialects (Points 1)       .docx
Which of the following is NOT true of dialects (Points  1)       .docxWhich of the following is NOT true of dialects (Points  1)       .docx
Which of the following is NOT true of dialects (Points 1)       .docx
 
Which of the following is true in a monopolyA.)Business owner.docx
Which of the following is true in a monopolyA.)Business owner.docxWhich of the following is true in a monopolyA.)Business owner.docx
Which of the following is true in a monopolyA.)Business owner.docx
 
Which of the following psychological perspectives is most likely to .docx
Which of the following psychological perspectives is most likely to .docxWhich of the following psychological perspectives is most likely to .docx
Which of the following psychological perspectives is most likely to .docx
 
Which of the following is true a. Economics is the study of the .docx
Which of the following is true a. Economics is the study of the .docxWhich of the following is true a. Economics is the study of the .docx
Which of the following is true a. Economics is the study of the .docx
 
Which of the following is the net requirement using an MRP program i.docx
Which of the following is the net requirement using an MRP program i.docxWhich of the following is the net requirement using an MRP program i.docx
Which of the following is the net requirement using an MRP program i.docx
 
Which of the following is not a way managers generally benefit from .docx
Which of the following is not a way managers generally benefit from .docxWhich of the following is not a way managers generally benefit from .docx
Which of the following is not a way managers generally benefit from .docx
 

Dernier

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Dernier (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Unit2PeerResponse 5006 Due 10.20.2022Response Guidelines .docx

  • 1. Unit2PeerResponse 5006 Due 10.20.2022 Response Guidelines To practice thinking critically and communicating when advocating for your point of view on behalf of your clients, challenge a colleague's policy analytic method, value critical analysis versus analytic descriptive, by providing competing arguments for using the opposite method. Peer Response to challenge: The value critical analysis is defined as “economic, cultural, and social structures privilege some and not others, those who are not privileged tend to need social work service because of their position in such structures (Chambers & Bonk, 2014)”. Analytic descriptive method evaluation is defined as a method that “identifies or describes a social policy or program and what the outcome should be as a result of the identifiable challenge (Chambers & Bonk, 2014)”.There are a few differences between the two forms of analysis. The differences are that the value critical analysis evaluates the process of using current and historical data to identify trends and relationships but doesn't dig deep into the concern, analytic descriptive method policy analysis is the description of a social policy or program, and considers the impacts that the policy or program will have on their neighbors or friends.The analytic descriptive method offers a viewpoint of how things works. In order to best address the issue I presented in my discussion I would use the analytic approach to analyze the various ways social policy can help balance the equal rights of women.
  • 2. 8/21/2021 The Erosion Of Privacy As We Know It https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the- erosion-of-privacy-as-we-know-it/?sh=7c127e075208 1/5 Innovation POST WRITTEN BY Reg Harnish CEO of GreyCastle Security, a cybersecurity consulting firm dedicated to the practical management of cybersecurity risks. The Erosion Of Privacy As We Know It Jun 21, 2017, 09:00am EDT Reg Harnish Forbes Councils Member Forbes Technology Council COUNCIL POST | Membership (fee-based) A decade ago, who would have thought an electronic heart device could be connected to the internet? Or that the data from that same device could lead to an arson and insurance fraud conviction of the very man it was placed in?
  • 3. If our own bodily functions can’t be kept private, what makes us think that everything else isn’t already waiting to be exposed? As technology makes its way into every aspect of our lives, we are increasingly trading our privacy for convenience, whether we know it or not. But based on the example above, and assuming you are a law-abiding citizen, this might not be a bad thing. https://www.forbes.com/innovation https://www.greycastlesecurity.com/ https://www.forbes.com/sites/forbestechcouncil/ https://www.forbes.com/sites/forbestechcouncil/people/regharni sh/ https://www.forbes.com/sites/forbestechcouncil/ http://fortune.com/2017/02/07/pacemaker-arson-charges/ 8/21/2021 The Erosion Of Privacy As We Know It https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the- erosion-of-privacy-as-we-know-it/?sh=7c127e075208 2/5 In today’s world, we are never alone. Most people don’t realize they will be photographed roughly 15 times, on average, during a simple drive to the supermarket. On that same trip, they’ll typically end up on about 90 seconds of video without ever knowing about it. The texts and the calls they made on the way could also be tracked. The
  • 4. metadata will be sent instantly to databases around the world and into the cloud, where it will be immediately available to hundreds, perhaps thousands, of people and organizations. Our smartphones are broadcasting our exact locations at every moment, possibly sending the information to our friends, governments around the world, certainly to the National Security Agency (NSA) and to many others we are not aware of. Let’s face it: Privacy as we know it is gone. But is that such a bad thing? Some argue that privacy is an intrinsic value and shouldn’t be treated as a dispensable commodity. They argue that privacy is essential for self- development, and without that, we would all conform to each other and lose our individuality. Today, however, most Americans have unwittingly opted out of privacy for the convenience of surfing the web, monitoring their fitness activity with health trackers or receiving digital discounts at the grocery store, just to name a few. Our texts, medical records and credit card information all have been entered online and provided at our consent through terms and conditions. In fact, if we actually read through all of the terms and conditions each one of us is subjected to each year, it would
  • 5. take about 76 work days to complete. Shutterstock http://crimefeed.com/2015/02/eyes-many-times-caught- surveillance-cameras-per-day/ https://philosophia.uncg.edu/phi361-matteson/module-6- privacy-property-and-technology/why-do-we-value-privacy/ http://techland.time.com/2012/03/06/youd-need-76-work-days- to-read-all-your-privacy-policies-each-year/ 8/21/2021 The Erosion Of Privacy As We Know It https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the- erosion-of-privacy-as-we-know-it/?sh=7c127e075208 3/5 By spending so much time online or opting in to terms and conditions, we are essentially allowing third parties not only to create digital copies of ourselves but also to predict our behaviors before we even know how we will behave ourselves. Again, is that such a bad thing? Maybe it’s time we embrace this change. Here are three benefits that I believe will come from the erosion of privacy as we know it today: Less Cybercrime The mere fact that we assign value to privacy makes it worth
  • 6. stealing. Take social security numbers, for example. SSNs were never intended to be anything more than a means for tracking the earnings histories of U.S. workers to determine their benefit entitlements. Now, someone can use your social security number to open a bank account under your name, receive benefits and ultimately steal your identity -- all because we put so much value on a previously worthless nine-digit number. We as a society created a need to keep social security numbers private, and now it’s coming back to haunt us. Like our SSNs, information -- including NSA records, the security cameras that line our city streets and corporate databases -- should be made public. The more public our information is, the less it’s worth, therefore limiting any real value for cybercriminals. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify? Improved Health A world without privacy has many benefits that extend far beyond receiving tailored advertisements and discounts showing up on your social media
  • 7. https://www.ssa.gov/policy/docs/ssb/v69n2/v69n2p55.html http://www.forbestechcouncil.com/qualify/?source=forbes-text http://www.forbestechcouncil.com/qualify/?source=forbes-text 8/21/2021 The Erosion Of Privacy As We Know It https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the- erosion-of-privacy-as-we-know-it/?sh=7c127e075208 4/5 feed. It can also save lives. Currently, our health data is protected by the Health Insurance Portability and Accountability Act (HIPAA), which limits disclosure of patient data and mandates secure storage and transmission of electronic records. But what patients don’t realize is their health data may provide the next big breakthrough in medicine. By freely sharing our information -- such as the state of our own health, medications we’re taking, side effects we are experiencing and our lifestyle habits -- we can help medical providers, entrepreneurs and companies make new medical discoveries that would not be possible without access to the large amounts of data that is currently being protected. If we truly want answers to the world’s biggest health mysteries, we must be willing to share our most personal health information. We’ll not only save
  • 8. lives, but we may just all live a little bit longer. Transparency Privacy as we know it has only existed for a short time. If we continue to fight it, we are doing ourselves a disservice, because the more we continue to keep our information hidden from the masses, the longer our governments and a select few will be the only entities with access to it. Having large sums of data and metadata in the hands of only a few, allowing them to dictate the flow of information, could set the stage for societal peril. Our information should be shared democratically like it was in simpler times, when everyone knew everything about you. Your favorite color. Your favorite food. What made you laugh. Your kids’ names. Where is the harm in that? Once information flows freely, governments will be forced to follow suit with transparency. If we can’t stop the erosion of privacy as we know it, let’s embrace a society without it. Maybe we just might make the world a better place. https://www.virgin.com/entrepreneur/why-you-have-duty-share- your-health-data https://medium.com/the-ferenstein-wire/the-birth-and-death-of- privacy-3-000-years-of-history-in-50-images-614c26059e
  • 9. 8/21/2021 The Erosion Of Privacy As We Know It https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the- erosion-of-privacy-as-we-know-it/?sh=7c127e075208 5/5 Reg Harnish Reg Harnish is the CEO of GreyCastle Security, a cybersecurity consulting firm dedicated to the practical management of cybersecurity risks.… Read More ADVERTISEMENT Reprints & Permissions https://www.forbes.com/sites/forbestechcouncil/people/regharni sh/ https://www.greycastlesecurity.com/ https://www.forbes.com/sites/forbestechcouncil/people/regharni sh/ https://www.parsintl.com/publication/forbes/