Application: Tacit Consent, Technologies science homework help

Don't use plagiarized sources. Get Your Custom Essay on
Need an answer from similar question? You have just landed to the most confidential, trustful essay writing service to order the paper from.
Just from $13/Page
Order Now

Application: Tacit Consent

General Motors (GM) has inserted a
technology in many of their vehicles called OnStar. OnStar is a GPS device that
tracks data from individual vehicles, such as speed, location, and seat belt usage.
In September 2011, it was reported that GM sells this information about their
customers’ vehicles to insurance companies and law enforcement agencies. The
use of this technology and the sharing of GPS data can assist law enforcement
in the recovery of stolen vehicles. It also was reported, however, that OnStar
can continue to collect this GPS data even if the GM customer opts to turn off
the OnStar service. Some argue that this is a violation of the right to
privacy. Others argue that individuals who buy a vehicle with this built-in
technology have given tacit (or implied) consent for the use of the personal
information that it obtains.

For this assignment, think about
technologies that law enforcement might use to apprehend criminals and any
privacy issues related to those technologies. Then consider whether individuals
who choose to use technology have given tacit consent for the use of personal
information.

The Assignment (2–3 pages)

  • Describe two technologies and explain how law enforcement might
    use each to apprehend criminals.
  • Explain any privacy issues related to the two technologies you
    selected. You may reference the Fourth Amendment of the U.S. Constitution
    to support your response.
  • Explain whether or not individuals who choose to use technology
    (i.e., the Internet, mobile phones) have given tacit consent for the use
    of personal information. Include a description of what constitutes
    “personal information.”

Two – three pages with at least three reference….

It is important that you cover all the topics identified in the
assignment. Covering the topic does not mean mentioning the topic BUT
presenting an explanation from the context of ethics and the readings for this
class

To get maximum points you need to follow the requirements listed for
this assignments 1) look at the page limits 2) review and follow APA rules
3) create subheadings to identify the key sections you are presenting and
4) Free from typographical and sentence construction errors.

Readings

  • Course Text: Taylor,
    R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime
    and digital terrorism.
    (3rd ed.). Upper Saddle River, NJ:
    Pearson.
    • Chapter 3, “The
      Criminology of Computer Crime”
  • Article: Foley, J.
    (2007). Are Google searches private? An originalist interpretation of the
    Fourth Amendment in online communication cases. Berkeley Technology Law
    Journal, 22
    (1), 447–475.
        
  • Article: Henson, B.,
    Reyns, B. W., & Fisher, B. S. (2011). Security in the 21st century:
    Examining the link between online social network activity, privacy, and
    interpersonal victimization. Criminal Justice Review, 36(3),
    253–268.
        
  • Article: Is it legal?:
    Privacy. (2011). Newsletter on Intellectual Freedom, 60(2), 68,
    81–82.
        
  • Article: Kumar, A.,
    & Kumar, P. (2010). Managing privacy of user generated information in
    a Web 2.0 world. Journal of Information Privacy & Security, 6(2),
    3–16.