Journal entry14

1.Monitoring without Authorization: A person cannot spy on the private communications of another, including calls and messages, and even social networking activities. This is a violation of privacy laws, such as the U.S. Wiretap Act, which does not permit the interception of electronic communications without permission, except in cases allowed by law enforcement. Such situations do result in severe legal implications and broken trust that might especially fall between personal and workplace relationships.

2.Exploitation of Children’s Data: Companies like Amazon have received hefty fines for retaining sensitive information such as children’s conversations with Alexa, even after being requested to delete them. This went against the COPPA regulation, which shows how leveraging the data of minors for commercial purposes can dent trust in technology and harm vulnerable populations.

3.Misuse of Spyware Applications: A number of spyware applications sold for parental control are misused in spying on adults, mainly in abusive relationships. This, being an illegal use, results in undermining safety and furthering harassment, hence a critical issue for law enforcement and privacy advocates.

4.Physical access to install spyware without authority: Installing spyware directly onto someone’s device is a serious violation of one’s privacy. In many cases, this would involve some sort of intimate partner violence or workplace espionage, where the victim’s security and personal autonomy are breached.

5.Data breaches by malicious applications or phishing: usually, hackers use spyware camouflaged as legitimate applications or phishing to steal sensitive information from users. This exposes financial and personal data, leading to wide ramifications for victims, including identity theft and fraud.