Application: Tacit Consent, Technologies science homework help
Application: Tacit Consent
General Motors (GM) has inserted a
technology in many of their vehicles called OnStar. OnStar is a GPS device that
tracks data from individual vehicles, such as speed, location, and seat belt usage.
In September 2011, it was reported that GM sells this information about their
customers’ vehicles to insurance companies and law enforcement agencies. The
use of this technology and the sharing of GPS data can assist law enforcement
in the recovery of stolen vehicles. It also was reported, however, that OnStar
can continue to collect this GPS data even if the GM customer opts to turn off
the OnStar service. Some argue that this is a violation of the right to
privacy. Others argue that individuals who buy a vehicle with this built-in
technology have given tacit (or implied) consent for the use of the personal
information that it obtains.
For this assignment, think about
technologies that law enforcement might use to apprehend criminals and any
privacy issues related to those technologies. Then consider whether individuals
who choose to use technology have given tacit consent for the use of personal
The Assignment (2–3 pages)
- Describe two technologies and explain how law enforcement might
use each to apprehend criminals.
- Explain any privacy issues related to the two technologies you
selected. You may reference the Fourth Amendment of the U.S. Constitution
to support your response.
- Explain whether or not individuals who choose to use technology
(i.e., the Internet, mobile phones) have given tacit consent for the use
of personal information. Include a description of what constitutes
Two – three pages with at least three reference….
It is important that you cover all the topics identified in the
assignment. Covering the topic does not mean mentioning the topic BUT
presenting an explanation from the context of ethics and the readings for this
To get maximum points you need to follow the requirements listed for
this assignments 1) look at the page limits 2) review and follow APA rules
3) create subheadings to identify the key sections you are presenting and
4) Free from typographical and sentence construction errors.
- Course Text: Taylor,
R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime
and digital terrorism. (3rd ed.). Upper Saddle River, NJ:
- Chapter 3, “The
Criminology of Computer Crime”
- Article: Foley, J.
(2007). Are Google searches private? An originalist interpretation of the
Fourth Amendment in online communication cases. Berkeley Technology Law
Journal, 22(1), 447–475.
- Article: Henson, B.,
Reyns, B. W., & Fisher, B. S. (2011). Security in the 21st century:
Examining the link between online social network activity, privacy, and
interpersonal victimization. Criminal Justice Review, 36(3),
- Article: Hunter, A.
(2010, October 13). Dying girl Kathleen Edward cyberbullied by 33-year-old
neighbor: Why? CBS News. Retrieved from http://www.cbsnews.com/8301-504763
- Article: Is it legal?:
Privacy. (2011). Newsletter on Intellectual Freedom, 60(2), 68,
- Article: Kumar, A.,
& Kumar, P. (2010). Managing privacy of user generated information in
a Web 2.0 world. Journal of Information Privacy & Security, 6(2),
- Article: McPhee, M.,
Schabner, D., & Battiste, N. (2010, August 15). ‘Craigslist Killer’
Philip Markoff commits suicide. ABC News. Retrieved from http://abcnews.go.com/US/craigslist-killer-phillip-markoff-commits-suicide/story?id=11405484