Intellectual Property Rights
Cyberthief/hacker, "phishing" scams - hyperlinks take users to phony sites posing as legitimate banks and credit card companies for the purpose of stealing passwords and account information.
Breaching Security, Modern telecommunications have given criminal networks to move people, money and goods across our borders with greater ease than before., People who make racially discriminating remarks on their blog, ie teenager who flame other races, may create discord between races in the country as countless people may access the internet daily, hence causing it to be a threat to security
Via the use of Google Maps/ Google Earth, the world is literally at the fingertips of anyone who is looking for information., Terrorists can plot their movements by viewing these maps
The government has bought more advance and state of the art weaponry from various other countries, allowing more wellrounded state security, The Singapore Army is currently undergoing the transformation into a 3rd Generation fighting force which involves combining advances in technology and training while using networking to integrate the tri-services into an integrated fighting force. This will provide even greater operational-readiness and flexibility during war and peace time.
Social networking sites such as Facebook allows strangers to view one's personal information and photos without their knowledge, this is a breach of their personal privacy, However having said so, people usually have a choice in whether they want to show their information to people by altering security settings.
Internet Eavesdropping - Calls made online can be tapped by a hacker and recorded down.
For example, porn video made by local polytechnic student, Tammy created much controversy. While, it may have been against social conventions, it was obtained without her knowledge or permission, hence causing it to be a breach of privacy
It promotes the new way of doing business by enabling new system such as electronic commerce (e-commerce) to the worldwide users, As a result, new privacy and security laws have to be made to cater to electronic transactions like online payment, electronic cart shopping and ordering, and online tracking
Internal GPS system in mobile devices allow people to see who is around them, stranger or not.
Blogs, Facebook etc
How we use our Information
How Third-Party Vendors, Sites, and Sponsors use our Information