Application: Tacit Consent

General Motors (GM) has inserted a technology in many of their vehicles called OnStar. OnStar is a GPS device that tracks data from individual vehicles, such as speed, location, and seat belt usage. In September 2011, it was reported that GM sells this information about their customers’ vehicles to insurance companies and law enforcement agencies. The use of this technology and the sharing of GPS data can assist law enforcement in the recovery of stolen vehicles. It also was reported, however, that OnStar can continue to collect this GPS data even if the GM customer opts to turn off the OnStar service. Some argue that this is a violation of the right to privacy. Others argue that individuals who buy a vehicle with this built-in technology have given tacit (or implied) consent for the use of the personal information that it obtains.

For this assignment, think about technologies that law enforcement might use to apprehend criminals and any privacy issues related to those technologies. Then consider whether individuals who choose to use technology have given tacit consent for the use of personal information.

The Assignment (2–3 pages)

  • Describe two technologies and explain how law enforcement might use each to apprehend criminals.
  • Explain any privacy issues related to the two technologies you selected. You may reference the Fourth Amendment of the U.S. Constitution to support your response.
  • Explain whether or not individuals who choose to use technology (i.e., the Internet, mobile phones) have given tacit consent for the use of personal information. Include a description of what constitutes “personal information.”

Two – three pages with at least three reference….

It is important that you cover all the topics identified in the assignment. Covering the topic does not mean mentioning the topic BUT presenting an explanation from the context of ethics and the readings for this class

To get maximum points you need to follow the requirements listed for this assignments 1) look at the page limits 2) review and follow APA rules 3) create subheadings to identify the key sections you are presenting and 4) Free from typographical and sentence construction errors.


  • Course Text: Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital terrorism. (3rd ed.). Upper Saddle River, NJ: Pearson.
    • Chapter 3, “The Criminology of Computer Crime”
  • Article: Foley, J. (2007). Are Google searches private? An originalist interpretation of the Fourth Amendment in online communication cases. Berkeley Technology Law Journal, 22(1), 447–475.
  • Article: Henson, B., Reyns, B. W., & Fisher, B. S. (2011). Security in the 21st century: Examining the link between online social network activity, privacy, and interpersonal victimization. Criminal Justice Review, 36(3), 253–268.
  • Article: Hunter, A. (2010, October 13). Dying girl Kathleen Edward cyberbullied by 33-year-old neighbor: Why? CBS News. Retrieved from 162-20019377-10391704.html
  • Article: Is it legal?: Privacy. (2011). Newsletter on Intellectual Freedom, 60(2), 68, 81–82.
  • Article: Kumar, A., & Kumar, P. (2010). Managing privacy of user generated information in a Web 2.0 world. Journal of Information Privacy & Security, 6(2), 3–16.
  • Article: McPhee, M., Schabner, D., & Battiste, N. (2010, August 15). ‘Craigslist Killer’ Philip Markoff commits suicide. ABC News. Retrieved from


Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post Application-Tacit-Consent-Technologies-science-homework-help appeared first on Nursing Writers Hub.

"Is this qustion part of your assignmentt? We will write the assignment for you. click order now and get up to 40% Discount"