Application: Tacit Consent
General Motors (GM) has inserted a technology in many of their vehicles called OnStar. OnStar is a GPS device that tracks data from individual vehicles, such as speed, location, and seat belt usage. In September 2011, it was reported that GM sells this information about their customersâ€™ vehicles to insurance companies and law enforcement agencies. The use of this technology and the sharing of GPS data can assist law enforcement in the recovery of stolen vehicles. It also was reported, however, that OnStar can continue to collect this GPS data even if the GM customer opts to turn off the OnStar service. Some argue that this is a violation of the right to privacy. Others argue that individuals who buy a vehicle with this built-in technology have given tacit (or implied) consent for the use of the personal information that it obtains.
For this assignment, think about technologies that law enforcement might use to apprehend criminals and any privacy issues related to those technologies. Then consider whether individuals who choose to use technology have given tacit consent for the use of personal information.
The Assignment (2â€“3 pages)
- Describe two technologies and explain how law enforcement might use each to apprehend criminals.
- Explain any privacy issues related to the two technologies you selected. You may reference the Fourth Amendment of the U.S. Constitution to support your response.
- Explain whether or not individuals who choose to use technology (i.e., the Internet, mobile phones) have given tacit consent for the use of personal information. Include a description of what constitutes “personal information.”
Two – three pages with at least three reference….
It is important that you cover all the topics identified in the assignment. Covering the topic does not mean mentioning the topic BUT presenting an explanation from the context of ethics and the readings for this class
To get maximum points you need to follow the requirements listed for this assignments 1) look at the page limits 2) review and follow APA rules 3) create subheadings to identify the key sections you are presenting and 4) Free from typographical and sentence construction errors.
- Course Text: Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital terrorism. (3rd ed.). Upper Saddle River, NJ: Pearson.
- Chapter 3, “The Criminology of Computer Crime”
- Article: Foley, J. (2007). Are Google searches private? An originalist interpretation of the Fourth Amendment in online communication cases. Berkeley Technology Law Journal, 22(1), 447â€“475.
- Article: Henson, B., Reyns, B. W., & Fisher, B. S. (2011). Security in the 21st century: Examining the link between online social network activity, privacy, and interpersonal victimization. Criminal Justice Review, 36(3), 253â€“268.
- Article: Hunter, A. (2010, October 13). Dying girl Kathleen Edward cyberbullied by 33-year-old neighbor: Why? CBS News. Retrieved from http://www.cbsnews.com/8301-504763 162-20019377-10391704.html
- Article: Is it legal?: Privacy. (2011). Newsletter on Intellectual Freedom, 60(2), 68, 81â€“82.
- Article: Kumar, A., & Kumar, P. (2010). Managing privacy of user generated information in a Web 2.0 world. Journal of Information Privacy & Security, 6(2), 3â€“16.
- Article: McPhee, M., Schabner, D., & Battiste, N. (2010, August 15). â€˜Craigslist Killerâ€™ Philip Markoff commits suicide. ABC News. Retrieved from http://abcnews.go.com/US/craigslist-killer-phillip-markoff-commits-suicide/story?id=11405484