{"id":123,"date":"2021-11-10T19:36:43","date_gmt":"2021-11-10T19:36:43","guid":{"rendered":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/?page_id=123"},"modified":"2021-11-14T03:53:27","modified_gmt":"2021-11-14T03:53:27","slug":"goal-strategy","status":"publish","type":"page","link":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/goal-strategy\/","title":{"rendered":"Perspectives"},"content":{"rendered":"<p><b data-stringify-type=\"bold\"><a class=\"c-link\" href=\"https:\/\/www.osano.com\/articles\/data-privacy-laws\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.osano.com\/articles\/data-privacy-laws\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">Legal Perspectives<\/a><\/b><b data-stringify-type=\"bold\">:<\/b><br \/>\nThere are currently no comprehensive federal laws that discuss user and data privacy in the United States.<br \/>\nCurrently, The Federal Trade Commission (FTC) has jurisdiction to take action against companies that violate a very broad selection of rules including:<\/p>\n<ul>\n<li>Failure to implement reasonable data security measures<\/li>\n<li class=\"p-rich_text_section\">Failure to follow a published privacy policy<\/li>\n<li class=\"p-rich_text_section\">Violate consumer data privacy rights by collecting, processing, or sharing consumer information<\/li>\n<li class=\"p-rich_text_section\">Engage in misleading advertising practices<\/li>\n<li class=\"p-rich_text_section\">The issue with these regulations is that while they seem reasonable, they are not strictly enforced or codified in any major federal legislation. Big Tech companies do these things today.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-199 aligncenter\" src=\"http:\/\/blogs.shu.edu\/surveillancecapitalism\/files\/2021\/11\/iStock-939262058-300x170.jpg\" alt=\"\" width=\"408\" height=\"231\" srcset=\"https:\/\/blogs.shu.edu\/surveillancecapitalism\/files\/2021\/11\/iStock-939262058-300x170.jpg 300w, https:\/\/blogs.shu.edu\/surveillancecapitalism\/files\/2021\/11\/iStock-939262058-768x436.jpg 768w, https:\/\/blogs.shu.edu\/surveillancecapitalism\/files\/2021\/11\/iStock-939262058.jpg 800w\" sizes=\"auto, (max-width: 408px) 100vw, 408px\" \/><\/p>\n<p>______________________________________________________________________________<\/p>\n<p><b data-stringify-type=\"bold\"><a class=\"c-link\" href=\"http:\/\/www.njhealthmatters.org\/content\/sites\/njhc\/Ethical_Considerations_in_Data_Collection.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"http:\/\/www.njhealthmatters.org\/content\/sites\/njhc\/Ethical_Considerations_in_Data_Collection.pdf\" data-sk=\"tooltip_parent\">Ethical Perspectives<\/a><\/b><b data-stringify-type=\"bold\">:<\/b><br \/>\nThere are several ethical issues that come to light in regard to personal privacy and data collection. One example of an ethical issue regarding data collection is <a class=\"c-link\" href=\"https:\/\/www.nytimes.com\/wirecutter\/blog\/amazons-alexa-never-stops-listening-to-you\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.nytimes.com\/wirecutter\/blog\/amazons-alexa-never-stops-listening-to-you\/\" data-sk=\"tooltip_parent\">Amazon Alexa<\/a>. This device is known to record your private conversations in your home and store them for future access. Most users of the device likely do not know they are being recorded outside of when you activate the Alexa. This can be considered ethically wrong as it poses a huge threat to privacy.<br \/>\nAs an organization, there are several things companies should be required to consider before collecting data:<\/p>\n<ul>\n<li>Are users aware of the data being collected, how it is being used, and are there options to opt-out without any fear of retaliation? (Ex. Social Media platforms get away with data collection because they require you to accept the terms and conditions to use the platform. This is ethically wrong and you should still be allowed access to a service if you do not want your data collected)<\/li>\n<\/ul>\n<ul>\n<li class=\"p-rich_text_section\">Does this data collection cause physical, mental, or emotional harm? (Ex. Facebook knew that teenage girls were suffering high rates of depression due to their algorithm which caters to user pages based off of data collected from the user)<\/li>\n<\/ul>\n<ul>\n<li class=\"p-rich_text_section\">Is the data kept anonymous, and is it shared?<\/li>\n<\/ul>\n<p>______________________________________________________________________________<\/p>\n<p><strong><a class=\"c-link\" href=\"https:\/\/www.jdsupra.com\/legalnews\/u-s-data-privacy-roundup-what-is-on-the-6247901\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.jdsupra.com\/legalnews\/u-s-data-privacy-roundup-what-is-on-the-6247901\/\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">Political Perspectives:<\/a><\/strong><br \/>\nThere are many rapid changes politically when discussing users\u2019 privacy and data in the United States.<br \/>\n<a class=\"c-link\" href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">An executive order under the Biden administration was passed in May 2021<\/a>, to provide guidelines for government agencies to follow to help better protect sensitive data from foreign adversaries. With main goals at the end of having trust in digital infrastructure that is both trustworthy and transparent and consequences if that trust is broken. There are currently no federal data privacy laws, however, states have begun passing data privacy laws.<\/p>\n<p>\u2022\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<a class=\"c-link\" href=\"https:\/\/www.spirion.com\/blog\/the-utah-cybersecurity-affirmative-defense-act\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.spirion.com\/blog\/the-utah-cybersecurity-affirmative-defense-act\/\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">Utah Cybersecurity Affirmative Defense Act to provide help to companies that undergo a data breach.<\/a><\/p>\n<p>\u2022\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<a class=\"c-link\" href=\"https:\/\/www.natlawreview.com\/article\/virginia-s-new-consumer-data-protection-act\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.natlawreview.com\/article\/virginia-s-new-consumer-data-protection-act\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">Virginia broad Consumer Data Protection Act (2023)<\/a><\/p>\n<p>\u2022\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<a class=\"c-link\" href=\"https:\/\/oag.ca.gov\/privacy\/ccpa\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/oag.ca.gov\/privacy\/ccpa\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">California Consumer Protection Act<\/a><\/p>\n<p>With much business conducted outside the US, privacy laws have begun to arise, however,\u00a0<a class=\"c-link\" href=\"https:\/\/www.jdsupra.com\/legalnews\/coming-soon-canada-s-new-privacy-law-3558341\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.jdsupra.com\/legalnews\/coming-soon-canada-s-new-privacy-law-3558341\/\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">Canada has set precedent, with a proposed privacy law that would focus on giving consumers control of their data and promote transparency<\/a>. Countries around the world are working on implementing more privacy laws. Will there be laws set in place to protect companies conducting business in foreign countries regarding data protection? An example of this could be TikTok a foreign company recently giving themselves permission to collect biometric data from US users, bringing up the need for laws to be put in place to protect citizens&#8217; information.<\/p>\n<p>______________________________________________________________________________<\/p>\n<p><a href=\"https:\/\/harvardlawreview.org\/2020\/02\/economies-of-surveillance\/\"><strong>Social Perspective:\u00a0<\/strong><\/a><br \/>\nDepending on the social logic that brings them to life, digital technologies can take many forms and produce many effects on people\u2019s lives. The <a class=\"c-link\" href=\"https:\/\/harvardlawreview.org\/2020\/02\/economies-of-surveillance\/\" target=\"_blank\" rel=\"noopener noreferrer\">economic system of surveillance capitalism<\/a>\u00a0is centered around the personal data of people\u2019s behaviors, allowing corporations to show and advertise what they want people to see. This process involves gathering data from the same groups of people that are ultimately going to be targeted. For example,\u00a0<a class=\"c-link\" href=\"https:\/\/www.nbcnews.com\/tech\/tech-news\/google-sells-future-powered-your-personal-data-n870501\" target=\"_blank\" rel=\"noopener noreferrer\">Google\u00a0<\/a>gathers personal information from us to target us with advertisements, and\u00a0<a class=\"c-link\" href=\"https:\/\/www.bbc.com\/news\/technology-46618582\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a> likely sells our personally identifiable information to organizations that want our votes. This practice of surveillance capitalism, also known as the legality of epistemic inequality, it not only gives companies profit but allows companies to feed ideas that intrude in people\u2019s lives.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/mariolucero.cl\/wp-content\/uploads\/2014\/09\/Agile-Cross-functional-team1.jpg\" alt=\"Agile Cross-functional team | Agile Lucero\" width=\"396\" height=\"297\" \/><\/p>\n<p>______________________________________________________________________________<\/p>\n<p><a href=\"https:\/\/sis628summer2015group1.wordpress.com\/perspectives\/cultural-perspective\/\"><strong>Cultural Perspective:<br \/>\n<\/strong><\/a>Rather than focusing on how surveillance is &#8220;done to&#8221; people, society must instead focus on the &#8220;imaginations&#8221; and &#8220;practices&#8221; of everyday surveillance, in which watching becomes<a class=\"c-link\" href=\"https:\/\/news.harvard.edu\/gazette\/story\/2019\/03\/harvard-professor-says-surveillance-capitalism-is-undermining-democracy\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u00a0a way of life<\/a>. In addition to determining the &#8216;impact&#8217; of surveillance, especially if it has a negative impact on more vulnerable populations, it is essential to understand how people interact with, respond to, and initiate surveillance in everyday life. In order to understand more clearly the relationship between contemporary surveillance and the everyday life of those who might be called its subjects, the concept of surveillance culture needs to be developed.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/sis628summer2015group1.files.wordpress.com\/2015\/06\/cultural-identity.jpg\" alt=\"Cultural Perspective | The War in Iraq\" width=\"428\" height=\"470\" \/><\/p>\n<p>______________________________________________________________________________<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Legal Perspectives: There are currently no comprehensive federal laws that discuss user and data privacy in the United States. Currently, The Federal Trade Commission (FTC)&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/blogs.shu.edu\/surveillancecapitalism\/goal-strategy\/\">Continue reading<span class=\"screen-reader-text\">Perspectives<\/span><\/a><\/div>\n","protected":false},"author":4937,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-123","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/pages\/123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/users\/4937"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":4,"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":235,"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/pages\/123\/revisions\/235"}],"wp:attachment":[{"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}