{"id":58,"date":"2024-08-22T14:17:52","date_gmt":"2024-08-22T14:17:52","guid":{"rendered":"http:\/\/localhost\/mediaethics\/?post_type=content&#038;p=58"},"modified":"2024-09-20T09:47:58","modified_gmt":"2024-09-20T09:47:58","slug":"chapter-5-invasion-of-privacy","status":"publish","type":"content","link":"https:\/\/staging.routledgelearning.com\/mediaethics\/students\/part-1-news\/chapter-5-invasion-of-privacy\/","title":{"rendered":"Chapter 5: Invasion of Privacy"},"content":{"rendered":"\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60)\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\"><div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/staging.routledgelearning.com\/mediaethics\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\/<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/staging.routledgelearning.com\/mediaethics\/students\/\" title=\"Students\">Students<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\/<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/staging.routledgelearning.com\/mediaethics\/students\/part-1-news\/\" title=\"Part 1: News\">Part 1: News<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\/<\/span><span class=\"aioseo-breadcrumb\">\n\tChapter 5: Invasion of Privacy\n<\/span><\/div>\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:60%\"><h1 class=\"wp-block-post-title\">Chapter 5: Invasion of Privacy<\/h1>\n\n\n<p>From an ethical perspective, privacy is not merely an individual right but is a human condition and is fundamentally moral. Journalists who recognize this deeper and bigger perspective need ethical guidelines for implementing it. With internet and information technologies creating the greatest challenges, this chapter focuses on privacy in the digital age. The first case situates the privacy question in everyday internet usage. When people are connected to one another outside of business and government, the news media need to stimulate public understanding of privacy invasion. The second case introduces the challenges from the big data companies to our traditional understanding of privacy, using Facebook as an example of commercial intrusion. In the third case, the post-September 11 USA Patriot Act illustrates the dangers to privacy in the name of security that are true of democratic societies around the world. The last case discusses the emerging ethical concerns in the development and use of biometric technologies. Using police surveillance of protesters after the death of George Floyd as an example, the case discusses privacy issues in the age of biometric data collection.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40%\">\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\">\n<media-player  load=\"visible\" id=\"vidstack-video-block_36ba41e2d141e13b369f3b9f76219e8a\" class=\"vidstack-video\" title=\"Chapter 5 - Video Introduction\" src=\"https:\/\/s3-eu-west-1.amazonaws.com\/s3-euw1-ap-pe-ws4-cws-documents.ri-prod\/9781032391397\/Chapter-05-Video-Introduction.mp4\">\n  <media-provider>\n                  <media-poster\n          class=\"vds-poster\"\n          alt=\"\">\n        <\/media-poster>\n\n  <\/media-provider>\n  <media-video-layout><\/media-video-layout>\n  <media-controls class=\"vds-controls\">\n      <media-controls-group class=\"vds-controls-group\"><\/media-controls-group>\n  <\/media-controls>\n<\/media-player>\n\n\n<h3 class=\"wp-block-heading\">Chapter 5 &#8211; Video Introduction<\/h3>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/cdn-staging.routledgelearning.com\/wp-content\/uploads\/assets\/sites\/20\/Chapter-05-Video-Introduction-Transcript.docx\" style=\"background-color:#e5d6eb;padding-top:0;padding-bottom:0;box-shadow:none\">Transcript<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Case 20<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Discussion Questions<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How can the spread of information be used to promote privacy?&nbsp;<\/li>\n\n\n\n<li>What can news organizations do to keep governments and other organizations in check regarding individual privacy?<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Weblinks<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>PBS Guidelines on Privacy, Media Law 101\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.pbs.org\/standards\/media-law-101\/privacy\/\">https:\/\/www.pbs.org\/standards\/media-law-101\/privacy\/<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Pew Research, \u201cHow Americans feel about social media and privacy\u201d\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.pewresearch.org\/short-reads\/2018\/03\/27\/americans-complicated-feelings-about-social-media-in-an-era-of-privacy-concerns\/\">https:\/\/www.pewresearch.org\/short-reads\/2018\/03\/27\/americans-complicated-feelings-about-social-media-in-an-era-of-privacy-concerns\/<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>CBS News, \u201cX\u2019s new privacy policy allows it to collect users\u2019 biometric data\u201d\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.cbsnews.com\/news\/x-biometric-data-collection-new-privacy-policy-twitter\/\">https:\/\/www.cbsnews.com\/news\/x-biometric-data-collection-new-privacy-policy-twitter\/<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Case 21<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Discussion Questions<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Social media applications like Facebook are often important resources for reporters and journalists. How should journalists be careful with data and privacy on these apps?&nbsp;<\/li>\n\n\n\n<li>As X (the company formerly known as Twitter) has undergone management shifts, many journalists and reporters who had frequented the app have now left or become inactive. What happens to an internet platform when it becomes hostile to journalists?<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Weblinks<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u201cThe Great Hack\u201d, Netflix\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=iX8GxLP1FHo\">https:\/\/www.youtube.com\/watch?v=iX8GxLP1FHo<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>CNN, Mark Zuckerburg apology after the scandal broke\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/youtu.be\/G6DOhioBfyY?si=bajMdLLCaMjYfNNR\">https:\/\/youtu.be\/G6DOhioBfyY?si=bajMdLLCaMjYfNNR<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Pew Research, Social Media and Journalists\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.pewresearch.org\/journalism\/2022\/06\/14\/many-journalists-say-social-media-helps-at-work-but-most-decry-its-impact-on-journalism\/\">https:\/\/www.pewresearch.org\/journalism\/2022\/06\/14\/many-journalists-say-social-media-helps-at-work-but-most-decry-its-impact-on-journalism\/<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Case 22<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Discussion Questions<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How might new technological advancements be evaluated in terms of potential harm?<\/li>\n\n\n\n<li>When does a violation of privacy meet the definition of &#8220;harm&#8221;?<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Weblinks<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>USA Patriot Act, U.S. Congress, Oct. 26, 2001\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.congress.gov\/107\/plaws\/publ56\/PLAW-107publ56.pdf\">https:\/\/www.congress.gov\/107\/plaws\/publ56\/PLAW-107publ56.pdf<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>U.S. Department of Justice, PATRIOT ACT explainer\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.justice.gov\/archive\/ll\/highlights.htm\">https:\/\/www.justice.gov\/archive\/ll\/highlights.htm<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>President Bush\u2019s remarks on signing the PATRIOT ACT\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.presidency.ucsb.edu\/documents\/remarks-signing-the-usa-patriot-act-2001\">https:\/\/www.presidency.ucsb.edu\/documents\/remarks-signing-the-usa-patriot-act-2001<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>VICE News, \u201cThe Patriot Act: 20 Years Later\u201d\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/youtu.be\/9fCJCF3Z2n8?si=5jpzWeVBF-9T4isD\">https:\/\/youtu.be\/9fCJCF3Z2n8?si=5jpzWeVBF-9T4isD<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Case 23<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Discussion Questions<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What schools of ethics might approve of the use of biometric data collection on George Floyd protesters, and which may disapprove of that use?<\/li>\n\n\n\n<li>At what point in time did these protesters consent to having their likeness used or collected by police agencies? Does that matter?<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Weblinks<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The Intercept, \u201cHow CBP policed George Floyd Protests\u201d\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/theintercept.com\/2023\/09\/21\/cbp-george-floyd-protests\/\">https:\/\/theintercept.com\/2023\/09\/21\/cbp-george-floyd-protests\/<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>ACLU, Body Cameras and George Floyd Protests\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.aclu.org\/news\/privacy-technology\/body-cameras-and-the-george-floyd-protests\">https:\/\/www.aclu.org\/news\/privacy-technology\/body-cameras-and-the-george-floyd-protests<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Washington Post, \u201cYour protest is being watched. Here\u2019s how to protect your privacy.\u201d\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.washingtonpost.com\/video\/technology\/your-protest-is-being-watched-heres-how-to-protect-your-privacy\/2020\/06\/03\/3badf963-ef49-47f9-8228-2d8bfb8c88b3_video.html?itid=lk_interstitial_manual_81\">https:\/\/www.washingtonpost.com\/video\/technology\/your-protest-is-being-watched-heres-how-to-protect-your-privacy\/2020\/06\/03\/3badf963-ef49-47f9-8228-2d8bfb8c88b3_video.html?itid=lk_interstitial_manual_81<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>The Hill, \u201cWatchdog: Six federal agencies used facial recognition software to ID George Floyd protesters\u201d\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/thehill.com\/policy\/technology\/560805-watchdog-6-federal-agencies-used-facial-recognition-software-to-id-george\/\">https:\/\/thehill.com\/policy\/technology\/560805-watchdog-6-federal-agencies-used-facial-recognition-software-to-id-george\/<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>From an ethical perspective, privacy is not merely an individual right but is a human condition and is fundamentally moral. Journalists who recognize this deeper and bigger perspective need ethical guidelines for implementing it. With internet and information technologies creating the greatest challenges, this chapter focuses on privacy in the digital age. The first case [&hellip;]<\/p>\n","protected":false},"featured_media":0,"parent":26,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false},"categories":[],"class_list":["post-58","content","type-content","status-publish","format-standard","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/staging.routledgelearning.com\/mediaethics\/wp-json\/wp\/v2\/content\/58","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.routledgelearning.com\/mediaethics\/wp-json\/wp\/v2\/content"}],"about":[{"href":"https:\/\/staging.routledgelearning.com\/mediaethics\/wp-json\/wp\/v2\/types\/content"}],"up":[{"embeddable":true,"href":"https:\/\/staging.routledgelearning.com\/mediaethics\/wp-json\/wp\/v2\/content\/26"}],"wp:attachment":[{"href":"https:\/\/staging.routledgelearning.com\/mediaethics\/wp-json\/wp\/v2\/media?parent=58"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staging.routledgelearning.com\/mediaethics\/wp-json\/wp\/v2\/categories?post=58"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}