StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Privacy and Security - Essay Example

Cite this document
Summary
On September 11, 2001 (also called 9/11), a group of al-Qaeda terrorists coordinated four attacks on American soil that resulted to nearly three thousand deaths in total, and since then, the U.S. government has boosted its efforts in preventing another traumatic terrorist attack…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Privacy and Security
Read Text Preview

Extract of sample "Privacy and Security"

Download file to see previous pages

The leaked documents revealed operational details of a global surveillance apparatus run by the NSA and other members of the Five Eyes alliance, along with numerous commercial and international partners.[3]The public and government officials are divided on the rightness and legality of these programs, but President Barack Obama defends their constitutionality, urgency, and effectiveness as he believes in the tradeoffs between security and privacy. Other commentators claim that privacy should not be traded off in any way for better security.

It is argued that the need for security is not threatening Americans’ right to privacy because the state is balancing them in the best way possible. The need for security is paramount, however, and should override privacy concerns because it only preserves public safety by reasonable authority, surveillance, and approval of Congress, some politicians, and courts. The need for security is not threatening Americans’ right to privacy because the state is doing its best to balance both interests.

First, President Obama himself assured the public that it is not listening into every call that Americans make. Wiretapping and listening to other data can be considered as a “search” that can breach the Fourth Amendment, but this is not what the government is doing. Instead, the government is only studying data trends. Lara Jakes and Darlene Superville report on the specific procedures of the government, clarifying that the program does not include listening into calls, but only monitoring the origin and duration of calls.

This means that the government is not fully breaching privacy rights. The article no longer explained though how data trends and call location can identify suspicious activities. Jakes and Superville add that if there are specific numbers that are perceived as suspicious of terrorist intentions, intelligence officials “must return to court to get approval” before

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy and Security Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Privacy and Security Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/english/1626454-privacy-and-security
(Privacy and Security Essay Example | Topics and Well Written Essays - 1000 Words)
Privacy and Security Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/english/1626454-privacy-and-security.
“Privacy and Security Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/english/1626454-privacy-and-security.
  • Cited: 1 times

CHECK THESE SAMPLES OF Privacy and Security

Privacy and Security in E-Commerce

An overly secure environment looks into the security of the transaction by creating passwords and logins in order to ensure privacy and confidentiality of the details of the transactions.... This essay discusses that security of credit card information and personal information of customers has become a great concern to participants of e-commerce business.... In cases where e-commerce involves financial transactions, the risk of loss of money becomes high hence making security issues key to e-commerce....
4 Pages (1000 words) Assignment

New Technology in the Medical Field

Rogerson (2000) states that in healthcare, Privacy and Security range from physical security for the patients to patient records and organization's confidential information.... With the increased… option of information technologies (ITs) there has been increased efficiency in the operation of healthcare organizations as well as Privacy and Security risks related to the use of IT.... According to Computer Science and Telecommunications Board, National Research Council (1997), New Technology in the Medical Field Privacy and Security is very important in all areas including healthcare settings....
2 Pages (500 words) Essay

Security of Credit Card Information and Personal Information

An overly secure environment looks into the security of the transaction by creating passwords and logins in order to ensure privacy and confidentiality of the details of the transactions.... Open environment is one that allows customers to transact business with the organizations without having login or password that enhances the security of the information passed between the customer and the business (McCarthy, Campbell & Brownstein, 2001).... In cases where e-commerce involves financila transactions, the risk of loss of money becomes high hence making security issues key in e-commerce....
4 Pages (1000 words) Assignment

Ethics, Privacy, and Security Sides of Computer Spammer Issue

The author answers the questions as to computer spammer issue from the ethics, Privacy and Security sides.... he interests of ordinary users are of no threat to anyone else especially their privacy and flow of information across the network.... Answering the questions, the author describes the approaches which could be taken to reduce spam and expresses his opinion as to Spamhaus methodology… The author states that there are legal issues faced in the usage and application of Spamhaus....
2 Pages (500 words) Essay

Information Policy: Information Privacy and Security

Perhaps the need for Information Policy Information Privacy and Security Information Security and Privacy is of importance to me because it has augmented in the last few decades due to the explosion of IT.... Any business that gathers, uses and distributes information faces more challenges as new Privacy and Security laws emerge each day.... Perhaps the need for information Privacy and Security will continue to escalate with the advancement in IT, and this correlation is of significant interest....
1 Pages (250 words) Essay

Security Standards: Technical Safeguards

According to the paper, HIPAA provides national standards so that it can “protect the Privacy and Security of health information” and gives individuals the rights in relation to their health information (United States Department of Health and Human Services, 2007).... IPAA information privacy establishes standards so that it can protect medical records and the related health information that applies to the entities involved who transact or communicate electronically  HIPAA provides national standards so that it can “protect the Privacy and Security of health information” and gives individuals the rights in relation to their health information[Sec07]....
1 Pages (250 words) Essay

The Dark Side of Social Media Privacy and Security risks of Social Media

The main focus of the paper "The Dark Side of Social Media Privacy and Security risks of Social Media"  is on examining such aspect as technological Assistant Program newsletter, way of shutting down the internet, the data on experiential profiles, political economies as an analytical.... Privacy and Security issues on social media became apparent in the late 90s and early 2000s, especially in 1998 when Chris Wysopal and his friends discovered a way of shutting down the internet....
10 Pages (2500 words) Essay

Legal, Privacy, and Security Issues in Electronic Commerce

… The paper "Legal, Privacy, and security Issues in Electronic Commerce" is a great example of an essay on e-commerce.... The paper "Legal, Privacy, and security Issues in Electronic Commerce" is a great example of an essay on e-commerce.... o how did they violate the right to privacy?... He said that the company values the privacy of the user and promised to respond to the public as soon as possible.... his is a case of pure neglect of consumer's privacy....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us