Jennie's computer terminal
Scenario #10 (Privacy)
Jennie’s sister needs to leave the computer to take laundry from the dryer. While she is gone, Jennie finds she has been working on an email to her best friend and that her email program is still open. She checks to see what sis has to say.
Questions
Information inadvertently left accessible does not mean that it is appropriate to access it. Ask your child: “Is forgetting to lock one’s home the same as allowing anyone to enter it?”
As the writer of the email on left suggests, children may not immediately differentiate between a TV screen (public) and a computer screen (private).
Policies regarding Internet terminals in public libraries address this issue. What steps has your public library taken to help assure that its users’ information needs remain private?
Jennie’s sister needs to leave the computer to take laundry from the dryer. While she is gone, Jennie finds she has been working on an email to her best friend and that her email program is still open. She checks to see what sis has to say.
Questions
- Whose privacy is at risk?
- What danger or discomfort might the unethical or unwise action cause?
- How do public libraries help insure the privacy of patrons while on-line? Should schools do the same?
- Is there a parallel in the physical world to this scenario?
- Can you think of other incidents that would fall into this category?
Information inadvertently left accessible does not mean that it is appropriate to access it. Ask your child: “Is forgetting to lock one’s home the same as allowing anyone to enter it?”
As the writer of the email on left suggests, children may not immediately differentiate between a TV screen (public) and a computer screen (private).
Policies regarding Internet terminals in public libraries address this issue. What steps has your public library taken to help assure that its users’ information needs remain private?
Reader Comments (2)
Privacy Scenario
Jennie’s sister needs to leave the computer to take laundry from the dryer. While she is gone, Jennie finds she has been working on an email to her best friend and that her email program is still open. She checks to see what sis has to say.
In this Scenario, Jennie’s sister leaves the computer to do laundry and doesn’t close down her e-mail. While Jennie’s sister is away Jennie finds the open e-mail and looks at what her sister has to say. In this Scenario, Jennie’s sister and also Jennie’s sister’s friend’s privacy are at risk. This is because Jennie could find something personal in the e-mail that no one was supposed to see except for her friend. The danger or personal discomfort that the unethical or unwise action is that if Jennie told people what her sister had said on the e-mail, it might hurt her sister or someone else.
Public libraries help insure the privacy of the person on-line by addressing the American Library Association Code of Ethics. In Article III, the code says “We protect each library user’s right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted.” “This policy establishes guidelines for the protection of personally identifiable information contained in library records or accessible in the library or though its computer systems.” According to http://www.smpl.org/depts/admin/policies/privacy.htm .
“The Family Educational Rights and Privacy Act is a Federal law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education. FERPA gives parents certain rights with respect to their children's education records. These rights are moved to the student when he or she reaches the age of 18 or attends a school beyond the high school level.” According to http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html . This means that the United States Department of Education gives the school money so the school is able to protect the child’s records. People should make a law so the school is not just able to protect the child’s records, but protect them while they are on-line and make sure no one invades their privacy.
The parallel scenario to this could be someone who leaves their door unlocked. Once they leave their house anyone could come in and take their things or mess up their possessions. Just because the owner of that house did not lock it’s door, doesn’t mean it should be stolen from.
Some other incidents that would fall into this category would be if Jennie’s sister instead of left her e-mail, maybe she left her facebook, or phone lying around because Jennie could then talk to Jennie’s friends and saying things that weren’t true or things that they weren’t supposed to know.
Even though that there is not law that prevents direct family members looking at their personal things on the internet. It is still unethical to be looking at private things.
Thanks, Anymous
Very thoughtful analysis of the scenario. I am sure others will gain by reading it.
All the best,
Doug