The growth of the Internet has caused additional concerns about personal privacy. Searching for information on the Internet is not as anonymous as it might seem.

The collection of online data about consumers is a marketing technique known as online profiling. When a commercial Web site is visited on the Internet, information about the user may be collected using various methods such as cookies or Web bugs.

A cookie is a text file created by the server computer when a user enters information into a Web site. The cookie file is then stored on the user’s computer and accessed each time the user visits that Web site. Cookies are often created when online purchases are made. Although cookies can only store information that the user has selected or entered, their use has raised concerns over privacy issues.

Web bugs are tiny, transparent graphics located on Web pages and are used to collect data about the Web page user. Usually an outside advertising company does the monitoring. The information a Web bug collects include the IP address of the computer, the URL being visited, the time the Web page was viewed, the type of browser being used, and the cookie file.

Before providing a company with personal information through a Web site, check the site’s privacy policy. A privacy policy is a legally binding document that explains how any personal information will be used.

The Internet has also opened up access to many files that were previously inaccessible. To protect both the privacy of an individual and the accuracy of data stored about individuals, several laws have been passed: ? The Electronic Communications Privacy Act of 1986 (ECPA) makes it a crime to access electronic data without authorization. It also prohibits unauthorized release of such data. ? The Electronic Freedom of Information Act of 1996 (E-FOIA) requires federal government agencies to make certain agency information available for public inspections and is designed to improve public access to agency records by making more information available online. ? The Children’s Online Privacy Protections Act of 1998 (COPPA) requires commercial Web sites that collect personal information from children under the age of 13 to obtain parental consent. ? The Safety and Freedom through Encryption Act of 1999 (SAFE) gives Americans the freedom to use any type of encryption to protect their confidential information. Concerns about Internet content, unproductive use and copyrights have prompted many schools and businesses to develop an Internet Use Agreement or Acceptable Use Policy. Internet Use Agreements typically contain rules similar to:

The society in which we live has been so profoundly affected by computers that historians refer to the present time as the information age. This is due to the computer’s ability to store and manipulate large amounts of information (data). As an information society, we must consider both the social and ethical implications of our dependency on computers. By ethical questions we mean asking what are the morally right and wrong ways to use computers.

Probably the most serious problem associated with computers is the possibility of invading our privacy. Because computers can store vast amounts of data we must decide what information is proper to store, what is improper, and who should have access to the information. Every time you use a credit card, make a phone call, withdraw money, reserve a flight, or register at school a computer records the transaction. These records can be used to learn a great deal about you—where you have been, when you were there, and how much money was spent. Should this information be available to everyone?

Computers are also used to store information about your credit rating, which determines your ability to borrow money. If you want to buy a car and finance it at a bank, the bank first checks your credit records on a computer to determine if you have a good credit rating. If you purchase the car and then apply for automobile insurance, another computer search will check to determine if you have traffic violations. How do you know if the information being used is accurate? Laws like the Fair Credit Reporting Act of 1970, the Privacy Act of 1974 and the Financial Privacy Act of 1978 protect these consumer rights.

Because computer software can be copied electronically, it is easy to duplicate. Such duplication is usually illegal because the company producing the software is not paid for the copy. This has become an increasingly serious problem as the number of illegal software copies distributed through piracy has grown. Developing, testing, marketing, and supporting software is an expensive process. If the software developer is then denied rightful compensation, the future development of all software is jeopardized.

Persons found guilty of using illegally copied software can be fined and their reputation damaged. Therefore, when using software it is important to use only legally acquired copies and to not make illegal copies.

Newspapers have carried numerous reports of crackers or hackers, gaining access to large computer databases to perform acts of vandalism. These acts are usually illegal and can cause very serious and expensive damage. The Electronic Communication Privacy Act of 1986 specifically makes it a federal offence to access electronic data without authorization.

One illegal and especially harmful act is distributing a virus. A virus is a series of instructions buried into a computer file that causes the computer to destroy data when given a certain signal. For example, a virus might check the computer’s clock and then destroy data when a certain time is reached. A virus is easily duplicated when the file is copied, which spreads it to other computers, hence the name virus. Computer viruses have become so widespread that anti-virus programs are typically installed on computers to detect and erase viruses before they can spread or damage data.

The willful destruction of computer data is no different than any other vandalism of property. Since the damage is done electronically the result is often not as obvious as destroying physical property, but the consequences are much the same. It is estimated that computer crimes cost the nation billions of dollars each year.

Web sites often contain dynamic pages that link to databases to provide the user real-time information. It is extremely difficult, if not impossible, for a Web developer to guarantee that data is always valid. A cause for concern is the increased reliance by computer users on the data presented. This places a strong ethical burden on the Web developer to ensure, as best they can, the reliability of the data.

As capable as computers have proven to be, we must be cautious when allowing them to replace human beings in areas where judgment is crucial. As intelligent beings, we can often detect that something out of the ordinary has occurred which has not been previously anticipated and then take appropriate action. Computers will only do what they have been programmed to do, even if it is to perform a dangerous act.