Professional Documents
Culture Documents
Alexis Bryant
Joseph Connolly
Chad Pestelos
CST 373
March 11, 2015
Privacy Challenges
The concept and values associated with privacy in the United States have changed
dramatically throughout the years. These changes specifically relate to events that occur in our
society and the technology that continues to enhance. Since the devastating terrorist attack of
September 11th, the values of personal privacy have been at stake. After the tragedy of the
September 11th attack on the US, the Patriot Act was established to prevent an event like this
from ever happening again. Along with the Act came policies that could potentially limit
civilians personal values of privacy. Additionally, technology involved with tracking personal
devices is constantly getting more and more advanced and this challenges personal privacy as
well. Since our society has become so dependent on the technology that we have developed, it
There are a few different types of privacy I think of when it comes to my ideas of
privacy. This includes personal space, personal property and personal information.
The right to be free from secret surveillance and to determine whether, when,
In specific, privacy may be divided into four categories (1) Physical: restriction
senses; (2) Informational: restriction on searching for or revealing facts that are
Comparing this definition to my ideas of privacy, they both have the same principal about
categories of privacy. My idea of privacy and personal space is that any person should have the
right to their own space; for example, one should not enter anothers space (office, room, car,
purse, etc.) without permission from the person who owns the space. When it comes to personal
property, one should not take or borrow personal property without asking. Finally, when it comes
to personal information, one should not share sensitive information about another without the
permission of the parties involved. An example of sharing sensitive information would be the
The three categories of privacy I just described can also be looked at in terms of virtual
privacy. Virtual privacy has become a main concern in the recent years as technology has
become a role in everyones day to day routine. The idea of virtual privacy should be respected
in the same way I described above. For example, one should respect anothers virtual privacy by
not looking over their shoulder while their neighbor types up an e-mail, or dig through a friends
phone to see what kind of risque pictures or text messages are being sent. Privacy, as a whole,
The Patriot Act was passed with little debate during the aftermath of September 11th and
because of this, people did not know the threats to personal privacy that came along with the new
Under the Patriot Act, the government can conduct warrantless private property
without even your notice. A section of the law grants the government the
Bryant, Connolly, Pestelos 3
authority to force any company to release private records about their customers.
Google could be sharing your Internet browsing history with the FBI. You have
(Borowski)
From the statement made by Borowski that Google could be sharing your information without
your consent clearly illustrates the way technology has challenged personal privacy.
Another issue with the Patriot Act and privacy concerns is that it is said to violate the
Fourth Amendment. The Fourth Amendment is, The right of the people to be secure in their
persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be
violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation,
and particularly describing the place to be searched, and the persons or things to be seized
(Legal Information Institute). With the Patriot Act in place, this right is challenged; the Patriot
Act allows FBI agents to get approval from a judge and search a person's home or business
without their consent. The Patriot Act was put in place to prevent terrorism and according to an
article from NPR titled As It Turns 10, Patriot Act Remains Controversial, less than 1 percent of
these sneak-and-peek searches are happening for terrorism investigations... ...They're instead
being used primarily in drug cases, in immigration cases, and some fraud (Johnson). This
statement illustrates that the Patriot Act takes advantage of its rights in that it is not being used
only for terrorists acts but invading the privacy of American citizens. From another perspective,
the text The Limits of Privacy by Amitai Etzioni, the author explains that the interpretation of the
Fourth Amendment has changed over time. Etzioni states, more and more legal searches are
conducted for which neither warrants nor even specific suspicion are required. Examples include
Bryant, Connolly, Pestelos 4
drug testing, screening gates in airports, and field sobriety checkpoints (204). Although
interpretation does change over time, the Patriot Act clearly challenges the Fourth Amendment
rights.
The increasing advancements in technology have also challenged personal privacy. The
ability to track our information on the Internet and sell it to the highest bidder has become quite
popular and easy to do. As the American Civil Liberties Union puts it, With more and more of
our lives moving online, these intrusions have devastating implications for our right to privacy.
But more than just privacy is threatened when everything we say, everywhere we go, and
everyone we associate with are fair game (ACLU). Technology achieves this personal
information in a number of ways including online banking, shopping, medical records, phone
records, and anything you could possibly think of, even your smart TV! Year after year, the
capabilities of technology go above and beyond the previous years ability. These new
enhancements in technology benefit our advancing world, but also come with the price to pay:
privacy.
Values of privacy vary from culture to culture. In the United States, privacy is extremely
important to its citizens and always has been, but this has changed due to other changes in the
culture, especially the drastic event of September 11th as well as technology. Many cultures
concepts are different than the United States. The following paragraphs will discuss the
differences and similarities of privacy in the Chinese, Filipino, and Arabian cultures in
The People Republic of China has come a long way since its establishment in 1949
under the rule of Mao Zedong. During Mao Zedongs ruling was a time when people were
Bryant, Connolly, Pestelos 5
persecuted and imprisoned not only for what they said, but for who they were (Goldman). Mao
saw any of separate thought from the beliefs of the Peoples Republic an enemy of the state.
Including any with separate thought into persecution, according to Goldman this included
landlords, entrepreneurs, believers of feudalism and capitalism. We will have to appreciate the
freedoms that we enjoy in the United States. That we are free to live our private lives and our
private thoughts and express our opinions. The article The long march to privacy states:
ago. When Chinas communist rulers came to power in 1949, they set few limits
on their freedom to pry into the lives of ordinary people. In the heyday of state
control, the Chinese had their employment, housing, health care, food rations and
travel all micromanaged by bureaucrats, and their lives were open books. Women
of childbearing age even had their menstrual cycles monitored so the state could
ensure that those without permission did not getor remainpregnant. (The
Economist)
Furthermore, take a look at Chinas Real Name Internet Policy. Is it to improve the
internet or control the content of the internet? The internet has always been the Wild West and
filled with a bunch of traveling unknowns. With Chinas new Real Name Internet Policy, users
are required to register their real names before they speak out on an Internet platform. These
platforms consist of blogging websites, instant messaging services, posting comments, and
contributing on forums. It seems China wants to grab hold of what is said and hold people
accountable for what they say towards a new report in the comments. This policy seems to be
Bryant, Connolly, Pestelos 6
created to stop people for thinking differently and posting their opinions for others to read. As in
the Wall Street Journal article it says, including anything that harms national security, involves
national secrets, incites ethnic discrimination or hatred, or harms national unity (Chin). The
statement seems to be very vague and the policy words can be twisted to make a case towards a
comment against the beliefs of the government pursued in court and be punished. Users will
also be required to agree to respect the law, the socialist political system, social morality and
truth before being allowed to use a given service (Chin). Just like the state of Californias DMV
statement on driving, driving is a privilege not a right. The Chinese have adapted a system that
using the Internet as a privilege and privileges can be molded to fit the government idea of
information control.
Public privacy is another issue in China that greatly differs from public privacy in the
United States. China has a few different public privacy issues as stated from The Economist:
The countrys public lavatories are often open-plan affairs where locals
modesty is often thrown to the wind as treatments are carried out in full view of
milling crowds. In the most casual of social interactions, complete strangers think
nothing of asking each other detailsabout their salary, weight and so onthat
The two different ways of how things are carried out in public would be the results of the
different cultures. The Chinese and the Peoples Republic have had a different mindset on how
people go throughout their lives. With the Communist takeover in 1949 under rule of Mao, the
Bryant, Connolly, Pestelos 7
government has been instructing its citizens how things should be done in the eye of the
Peoples Republic. The difference between the United States and Chinas public privacy is a
matter of culture and the uprising of the generations. The public privacy differences between
China and the United States in the matters mentioned above are cultural; differences will always
be seen when compared between any two cultures that do not practice the same methods.
Compared to other asian cultures, Filipinos almost have a sense of no privacy within the
immediate family. Even those who are remotely related to the a family member are widely
recognized throughout the family tree. Within a Filipino culture, belonging to a place or family
is a very strong sense among family members (The Gorgon). Parents sometimes have such
difficulties letting go of their children because of the remarkable closeness that grows over the
years. It is very common to see grandparents living with their children and grandchildren. This
concept is called the sandwich generation (Daez). Grandparents enjoy living their grandchildren
and looking after them. Even after the child finishes college, the parents are still not opposed for
them to live with them until they are willing to leave themselves. This can be connected to
financial reasons as well as the previous fact of parents not letting go of their children. On the
childs side, they feel to support their parents and look after them as they age, therefore the
Although the island mentality of the Filipino culture does not emphasize privacy on a
daily basis, the Filipino government has a strong law to focus attention on privacy. According to
It is the policy of the State to protect the fundamental human right of privacy, of
and growth. The State recognizes the vital role of information and
the government and in the private sector are secured and protected.
Any person who violates this law can be penalized by imprisonment for up to six years and a fine
of up to four million pesos, which is equivalent to one hundred thousand US dollars (Toral). The
emerging economy of the Philippines realizes the strength and significance in technology, and
understands that they will need to take further precautions to protect their people and their
Another act similar to the Data Privacy Act of 2012 is the Republic Act No. 8792 of
E-Commerce Act includes provisions on privacy security and provides for penalties on computer
hacking, introduction of viruses and piracy of copyright works (Varilla). The E-Commerce Act
states any person who obtained access to any electronic data message, or electronic document,..
information, or other material pursuant to any powers conferred under this Act, shall not convey
to or share the same with any other person. Like this Act, the Philippines have implemented
many other laws to secure online data not just for citizens, but also for business and government
organizations.
In the Arabian culture, privacy is one of the most important values in their society as a
whole. To further support this statement, the online article Respected values in Arab culture
Bryant, Connolly, Pestelos 9
makes a statement that, "most Arabs consider privacy to be an important value and they rarely
talk about anything that is personal. Family issues are expected to remain in the family and are
not discussed with outsiders. It is considered to be rude to ask too many personal questions...
...most Arabs will not share very much personal information with you and for the most part they
will not ask you to share anything that is personal about yourself" (Arab Business Etiquette).
This statement shows that the Arabian culture is more conservative than the United States, but
also shares the similarity that personal information involving family and friend should be up to
Additionally, unlike the United States, the Arabian culture does not take advantage of
what technology has to offer due to concerns of privacy. For example, the article Lessons to Be
Learnt: Cultural Means Impeding e-Commerce Adoption in a Saudi Industry explains that the
Arabian country Saudi Arabia, chooses not to take advantage of e-commerce, despite the
availability of technological know how and the proven advantage of online marketing for the
tourism industry, e-commerce has not been to its full capacity (Brdesee, Corbitt,
Pittayachawan). The article goes further to explain the reasons behind not using this technology
and it all comes down to privacy concerns. There is a statement made that says, trust seems to
be the most significant issue hampering e-commerce adoption as this is not only a relatively new
form of trading but also has a lot of security and privacy concerns unlike traditional forms of
business. Security issues, issues with prototypes on e-shopping, and payment logistics were some
concern in the United States, but the U.S. utilizes e-commerce and everything technology has to
Bryant, Connolly, Pestelos 10
offer. Therefore, this example shows the restrictions that the Arabian culture uses to prevent
personal privacy from being invaded and that privacy is one of the top concerns for their culture.
Throughout the world, different cultures are seen by some citizens of the United States as
indifferent and the wrong way to live. In the years of history with the United States of America,
we tried to change and adapted different cultures to western ideology. Current countries with
their cultures being tested, as in Afghanistan and Iraq. With our deployment of troops to occupy
these countries and reduce the national threat of terrorism towards the United States. But the
question remains how different are we from other countries and our freedom and privacy. A
article The Washington Post titled 10 reasons the U.S. is no longer the land of the free states:
confident that any definition of a free nation must include their own the land of
free. Yet, the laws and practices of the land should shake that confidence. In the
decade since Sept. 11, 2001, this country has comprehensively reduced civil
Since 9/11 the United States has adopted new policies for national security and all of the policies
created are to help reduce the threat of terrorism against the United States. The article from the
Assassination of U.S. citizens, the right to order the killing of any citizen
suspects are to be held by the military the president also has the authority to
Considering the policies that have been put into action to protect our nations freedoms, we often
overlook cultures that have a different perspective. It would seem our freedoms compared to
other cultures, are not much different after all. When dealing with liberties that can be
The intention of these cultures and governments have positive ideas to help protect the
homeland. Protecting both from domestic and foreign attacks. The methods that have been in use
since post 9/11 have been brought on to prevent terrorism thriving in our nation. Either from
China restricting its citizens to register real names to prevent deemed unwanted material by the
government published online, to protect its citizens. The difference between the Chinese and
Arabian nations about public privacy. The Chinese have a culture open to the public way with
physical and social activities. How the Arabian nations keep privacy to a high standard in their
culture and do not pry into ones privacy to find secrets. Today for us Americans, it is how much
is too much? How often do you turn on the television news channel or browse headlines online
and see an issue with the United States spying on its citizens. Will our nation ever satisfy the
Works Cited
Borowski, Julie. (2013). The USA Freedom Act Limits NSAs Surveillance Powers. Web. 5
March, 2015.
http://townhall.com/columnists/julieborowski/2013/11/11/the-usa-freedom-act-limits-nsas-surve
illance-powers-n1743509/page/full
Brdesee, Hani, Corbitt, Brian, Pittayachawan, Siddhi. (2012). Lessons to Be Learnt: Cultural
Means Impeding e-Commerce Adoption in a Saudi Industry. Web. 5 March, 2015.
http://www.academia.edu/2484072/Lessons_to_be_learnt_Cultural_means_impeding_e-commer
ce_adoption_in_a_Saudi_industry
BusinessDictionary.com. http://www.businessdictionary.com/definition/privacy.html
Chin, Josh. China Is Requiring People to Register Real Names for Some Internet Services. The
Wall Street Journal. Web. 4 February, 2015.
http://www.wsj.com/articles/china-to-enforce-real-name-registration-for-internet-users-1423033
973
Daez, Mylene. The Sandwich Generation. Brighter Life. Web. 30 July 2013.
http://brighterlife.com.ph/2013/07/30/the-sandwich-generation/.
Internet Privacy. American Civil Liberties Union (ACLU). Web. 5 March, 2015.
https://www.aclu.org/technology-and-liberty/internet-privacy
The Long March to Privacy. The Economist. Print edition. Web. 14 January, 2006.
http://www.economist.com/node/5389362
Respected values in Arab culture. (2015). Arab Business Etiquette. Web. 5 March, 2015.
http://www.arab-business-etiquette.com/respected-values-in-arab-culture.php
Toral, Janette. Republic Act No. 10173 - Data Privacy Act of 2012. Digital Filipino. Web. 24
August 2012. http://digitalfilipino.com/republic-act-no-10173-data-privacy-act-of-2012/.
The Gorgon. On Filipino Close Family Ties. Anti-Pinoy. Web. 20 June 2011.
http://antipinoy.com/on-filipino-close-family-ties/
Bryant, Connolly, Pestelos 13
Turley, Jonathan. 10 reasons the U.S. is no longer the land of the free. The Washington Post.
Web. 13 January, 2012.
http://www.washingtonpost.com/opinions/is-the-united-states-still-the-land-of-the-free/2012/01/
04/gIQAvcD1wP_story.html