Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • Networking

    10 Things School Webcam Spying Allegations Teach Us About Privacy

    By
    Don Reisinger
    -
    February 22, 2010
    Share
    Facebook
    Twitter
    Linkedin

      When news broke recently that the Lower Merion School District in Pennsylvania had the ability to monitor student computers and allegedly accused a student of engaging in “improper behavior in the home,” several critics spoke out against the way the school district handled the situation.

      In a lawsuit, a student’s family alleged that students didn’t know the Webcams in their computers, which were issued by the district, could be remotely monitored. The suit contends that students’ privacy was violated.
      Some say tracking software isn’t a problem in and of itself. But when that software is used to monitor what a person is doing through a Webcam, as this suit claims, security and privacy watchdogs take offense. For good reason.

      It’s understandable that a school would want to know where its computers are at any time. But when allegations are made that a school was “spying” on students, it’s a different story altogether. And it teaches us some hard lessons about Web privacy.
      Let’s take a look at some of those lessons.
      1. No one can be trusted
      As much as we might like to believe that there are places on the Web where our personal privacy is truly intact, it isn’t. Whether the government wants to see what’s being said or co-workers are looking over our shoulders on the job, there is always someone out there trying to determine what others are up to on the Web. Today, Web privacy is practically nonexistent.
      2. It’s too easy
      Unfortunately, it’s too easy for personal privacy to be violated. Enterprise computers filled with monitoring applications that know every single thing an employee is doing on a computer each day are commonplace. Personal computers can quite easily be loaded with software that can monitor others. Knowing what someone else is doing has never been easier. And the worst part is, there are no signs of that changing any time soon.
      3. It can only go so far
      At the same time, it’s important to remember that personal privacy can only go so far. Companies have every right to know what an employee is doing on a computer if those actions could cause the organization legal harm. Public computers or machines that were authorized for use by an organization add a whole new twist to monitoring and personal privacy. Simply put, users can hope to maintain privacy at all times, but based on the state of security today, such a desire will likely never be reality.
      4. Anonymity is leaving the building
      The Internet was once a bastion of anonymity. The idea behind user names dates back to the early days of the Web when users coveted anonymity above all else. In recent years, that desire for anonymity has eroded as social networks have reached unprecedented popularity. More and more people are going to the Web with their full names in plain view. Others are using geolocation services to tell friends where they are at all times. It raises a question: How can we expect personal privacy if we’re so willing to give out our personal information at any time?

      Holding the Line Against the Erosion of Privacy

      5. Everyone has a vested interest

      Every Web user has a vested interest in seeing personal privacy preserved. If people are being monitored in the privacy of their homes, tracking has gone a little bit further than it should. Simply ignoring that issue wouldn’t do anyone any good and it would likely embolden other organizations to engage in the same practice. If personal privacy is truly what Web users desire, they need to stand up for it wherever possible.
      6. We need to be more astute
      When sitting on the couch at home or working at the office, most folks believe that no one is watching what they’re doing. It’s a faulty belief that has gotten more than one person in trouble. There are definite signs of being monitored while using the Web. Users need to be more aware of those signs and realize that when they’re online, it’s not always private.
      7. Education is key
      In order to become more astute, more folks need to be educated on issues surrounding privacy. They need to know what’s at stake if personal privacy is violated on the Internet. They also need to know just how easy it is for someone to spy on them without their knowledge. Armed with that basic information, users can more readily prepare for privacy violations. The Internet is no longer a place where few problems can arise. It’s now the home of major security outbreaks. Users need to be aware of that.
      8. It’s not getting any better
      As much as some folks might want their personal privacy preserved, it’s becoming more and more obvious that the industry is moving in another direction. Privacy is being eroded on several fronts. Part of that is due to a general lack of user understanding. But it’s also due to the current climate in the tech industry. More security outbreaks are affecting companies and organizations. Sensitive data is being stolen. Giving users too much privacy could, some say, limit the ability to fend off attacks. Privacy is now a pawn in the security world’s fight against malicious hackers.
      9. Privacy is subjective
      Personal privacy is a subjective term that is too easily thrown around without a clear definition of what violates it and what doesn’t. A violation to one person might not be a violation to another. That subjectivity only confuses the issue of how to handle personal privacy on the Web.
      10. It can be violated anywhere
      Privacy issues affect Web users around the globe both at work and at home. These issues have seeped into every facet of Web life. And they’re becoming more invasive by the day. It’s incumbent upon all Web users to recognize that and be prepared if and when they’re affected. The more connected we become, the more our personal privacy is at risk. We can’t forget that.

      Don Reisinger
      Don Reisinger is a longtime freelance contributor to several technology and business publications. Over his career, Don has written about everything from geek-friendly gadgetry to issues of privacy and data security. He became an eWEEK contributor in 2009 producing slide shows focusing on the top news stories of the day. When he's not writing, Don is typically found fixing computers or playing an old-school video game.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×