The ubiquitous wireless network can convey continuous data to these devices thanks to the Internet, which is a system of sensors connected to wireless radios and CPUs. It can also be described as a formidable amalgamation of inexpensive sensors and strong apparatuses that blast high-speed networks and data to electronic devices with internet connectivity (Yang, 2011). This essay focuses on how to use the internet lawfully and what precautions to take to protect one’s intellectual property and avoid getting into trouble with the law. It is still challenging to formulate precise, unambiguous rules that regulate legal violations or conduct in many areas of internet law. Among them include fair use, intellectual property use, disclosure to the public about a private matter and legal issues that surround the online contributions. The majority who manage programs understand best the principles of libel laws, intellectual property and monitoring of online activities. Various characters challenge the lawmakers and courts to apply internet matters on trademark & copyright, free speech, privacy and online criminal activities. For instance, speed, lack of physical or geopolitical boundaries, and the ability of the users to remain anonymous have given the internet so much power as a medium of innovation and communication.
The use of the web by organizations or individuals has also raised some issues (Rice 2012). The majority who raise the ethical challenges create websites with the wrong information thus misleading others who think it’s legal. Some of them even use the internet to bully, incorporate illegal material, the spread of rumors and some also use the online media to share bad news. Also, people waste time deleting spam messages because someone else is busy sending unreliable information. The wrong use of wireless information has also made companies monitor their staff on how much they use the internet. Despite the company having the data on their employees, they also infringe information from their customers. The problem of having this information is that even if you delete something, it will always exist. A good example is when a company decides to use Google. According to the law, confidentiality is not sharing information with other parties. Therefore when this information is at hand, the possibility of the firm increasing their revenue is so high but they are still likely to infringe their rights regarding privacy.
The internet is, therefore, a very good memory keeper because it tracks our dislike and likes by identifying the sites we visit. The website that allows advertising to take place also permit the exposure of confidential matter to the public (Tsou, 2013). Therefore, many ethical problems arise from the use of online activities. Although the use of internet tends to close the gap between the poor and the rich, it is also seen that it has a reverse effect. Regardless of religion, race, gender, age disability or origin, everyone has a right to privacy.
The ethical implications of the use of the internet are connected directly to my course because they are all governed by the law of using the online services. In chapter nine, we are reading about internet law, social media and privacy and so when we look at this article, we have talked about how people waste time deleting spam emails, how companies collect information from both the staff and customer and where companies use the websites to do marketing. The few examples are still part of my course readings which go into details to educate us on the right and wrong use of internet services.
Rice, R. E. (2012). Social Consequences of Internet Use: Access, Involvement, and Interaction. MIT Press.
Tsou, M.-H. (2013). Internet GIS: Distributed Geographic Information Services for the Internet and Wireless Networks. John Wiley & Sons.
Yang, S.-H. (2011). Internet-based Control Systems: Design and Applications. Springer Science & Business Media.