Premium Essay

Individual Privacy vs National Security

In:

Submitted By SGTSEFO
Words 2496
Pages 10
Individual Privacy vs. National Security
Anthony Sifuentes
ENG 122 English Composition II
Instructor vonFrohling
February 13, 2012

Individual Privacy vs. National Security The need to protect National Security is far more important than individual privacy. The greatest part of living in the United States of America is the freedom that we have. That freedom and the right to live freely is protected by various government agencies. From time to time, the privacy a person has may have to be invaded to guarantee the security of the country and other citizens. Everyone has the right to not have their life controlled by the government, but it has the right to make sure that citizens are not doing anything to threaten the security of the country. Our freedom also comes at a price; that price is the need of the government to monitor some of the things we do so ensure that the United States is not in danger of a terrorist attack or an attempted overthrow of the government. The most glaring example of how National Security is more important than the privacy of an individual is September 11, 2001. The terrorist attacks that day have changed how Americans see our National Security and it must take precedence over anything else. One definition found for national security is: “The measures taken by the state to ensure the security of itself, or its citizens or subjects.” (Thomas, 2007) He goes on to explain that is both a right and a responsibility for a state to protect its citizens. Thomas also writes that there is a fine line to be established between maintaining peace and order and the level of tolerance citizens will have to tolerate to have it. While it is the government’s job to protect itself from outside forces, such as terrorist attacks or all out invasions, it must also provide a level of privacy for everyone living in the country. It is also

Similar Documents

Premium Essay

Dont Read

...Balancing between national security and individual privacy is seemingly a daunting task that does not promise an amicable solution in the near future. There are so many controversies surrounding this issue where people with opposing opinions are striving to ensure that their views dominate. The question about which between the two should be prioritized is not relevant compared to the effects either of the alternatives will have in the lives of citizens. The issue is complicated further by the sensitive nature of both national security and individual privacy. There is a close association between the two, thus making it hard for policy makers to alter either of them without touching the other. However, it is a fact that as much as many people want to have full right to individual privacy, they will also be keen to ensure that their security is guaranteed. In other words, the two must be provided without necessarily causing collusion between the two. National security is prioritized compared to individual privacy given the fact that people universally value national security. Legal status of the Individual Privacy vs. National Security issue Controversies surrounding national security and individual privacy came at the limelight after the September 11, 2001 terrorist attacks in the United States. However, this issue has been in existence for a longer time although it has had minimal effect on individual privacy. This paper will focus on recent events since little was heard...

Words: 1286 - Pages: 6

Premium Essay

The Commodification of Free Speech

...Benjamin Marchman English 122 Cathryn Lawson The Value of Online Privacy Since the September 11th terrorist attacks the United Sates and the world at large has officially entered into an age of counter-terrorism. While the more obvious aspects of this effort against violent extremism, which violate human and constitutional rights, such as drone strikes, waterboarding, and black prison sites, are specifically targeted toward a specific population, it is the subtler aspects of mass surveillance and corporate and governmental intrusion of privacy which present an overwhelming threat to human rights and quality of life. As has been made clear by recent revelations of the scope and depth of these intrusions, internet users specifically have many reasons to suspect that private information entered online is vulnerable to un-ethical intrusions by third parties. However, many groups and individuals have come together to bring resolution to the issue of personal privacy and national security. According to article 12 of the Universal Declaration of Human Rights, no one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, or to attacks upon his honor and reputation (Lachmayer 749). However, the more subtle aspects of the new counter-terrorism age include a heightened amount of internet surveillance, video surveillance of public spaces, electronic eavesdropping, and data retention. Additionally governments have access to bank accounts,...

Words: 2685 - Pages: 11

Premium Essay

The Importance Of Internet Privacy

...In the modern world, our privacy is constantly being violated without our consent. This is due to information that is easily available. Whether you’re walking down the street, taking the subway, purchasing online items or in a store, chatting online, we are constantly under someone’s watch. Hacking, picture leaks and theft of private information are becoming recurrent issues in the 21st century. Some believe this may not be an issue but others are concerned with the impact it could have on our lives. The twentieth century was particularly marked by the growth of the Internet and the rise of social media programs. This has raised the population’s awareness about their privacy rights. A lot of information can be found online including credit...

Words: 1336 - Pages: 6

Premium Essay

Information Security

...Security Issues in Legal Context Discussion 5.1: Privacy in the Workplace The Children's Online Privacy Protection Act, which went into effect date, April 21, 2000, affects U. S. commercial Web sites and third-party commercial Web sites that schools permit their students to access. "COPPA requires "operators of websites or online services directed to children and operators of websites or online services who have actual knowledge that the person from whom they seek information is a child (1) To post prominent links on their websites to a notice of how they collect, use, and/or disclose personal information from children; (2) With certain exceptions, to notify parents that they wish to collect information from their children and obtain parental consent prior to collecting, using, and/or disclosing such information; (3) Not to condition a child's participation in online activities on the provision of more personal information than is reasonably necessary to participate in the activity; (4) To allow parents the opportunity to review and/or have their children's information deleted from the operator’s database and to prohibit further collection from the child; and (5) To establish procedures to protect the confidentiality, security, and integrity of personal information they collect from children. Non-profit sites are not included in the act; however, many are voluntarily complying. The Children's Internet Protection Act went into effect April 20, 2001...

Words: 2799 - Pages: 12

Premium Essay

Does Emr Protect Patient Privacy?

..."Does the EMR actually protect patient privacy and what are the regulatory ramifications in the US on EMR implementation?” Table of Contents: INTRODUCTION LITERATURE REVIEW ANALYSIS I. MEDICAL RECORDS THEN AND NOW A. Paper-Based Medical Records VS. Electronic Medical Records B. Benefits, Potential Problems and Cost of
 the EMR II. HEALTH CARE PRIVACY LAW A. HIPAA 1.What is HIPAA? 2. HIPPA Privacy & Security B. HIPAA and EMR III. CAN ANYTHING BE DONE TO PROTECT PATIENT CONFIDENTIALITY/ PRIVACY? A. Why Should Patient Privacy Be Afforded Privacy Protection Regulation? B. Patient Privacy Within EMR IV. SPANNING THE MILES Intranet & Extranet Software & IM/IT CONCLUSION GLOSSARY REFERENCES Introduction: Healthcare companies all over the world are slowly recognizing the benefits on an EMR. Although EMR’s were implemented over 30 years ago but as of 2006 fewer than 10% of hospitals were utilizing the system. In 2009 the he U.S. Department of Health and Human Services enacted a privacy rule under the Health Insurance Portability and Accountability Act (HIPAA) in an attempt to protect the privacy of patients medical records. But one question still arises; “Does the EMR actually protect patient privacy and what are the regulatory ramifications in the US on EMR implementation?” In this paper I will address EMR, patient privacy and the regulatory ramifications of EMR implementation. Literature Review The literature shows that there is...

Words: 1873 - Pages: 8

Premium Essay

Health Care Information Systems Terms Hcs 483

...|Definition |How It Is Used in Health Care | |Health Insurance Portability and |The HIPAA Act was established in 1996 to |The Health Insurance Portability and | |Accountability Act |protect personal, identifiable information |Accountability Act is used in health care | | |of patient’s from third parties not |by patients having to sign a HIPAA form | | |involved in the treatment of the patient. |that makes patients aware of their rights | | | |and the protection of their individual | | | |protected health information. | |Electronic medical record |Electronic medical records are patient |Electronic medical records are used in | | |health records that were primarily stored |health care for accessing and keeping | | |in patient files that can now be stored, |patient information current. For example, | |...

Words: 1044 - Pages: 5

Free Essay

Surveillance: a Double Edged Sword

...of law and order is that they will help us to exercise and enjoy these powers. Security from threats is another expectation that we demand from the keepers of law. Obviously, in order to provide us security from outside threat the law keepers need to exercise some special powers and the basics of that is “Surveillance”. Surveillance in ordinary language means “the close inspection of a suspect”. To conduct the Surveillance there are different ways & most commonly used ways include the monitoring of telephone records, spy camera, email and newly and most recent way is through digital media. Now the question arises that if surveillance is being conducted does it not comprise with the basic rights for national that is the “privacy”? The NSA and other agencies has produced some occurrences that clearly shows that it has some time stepped over the line and violated the privacy of nationals. The age of digital media justifies this yet people have other view. This makes the Surveillance a double edged sword hanging on the citizens. They can’t deny it yet they can’t take it. The problem In age of technological development you can never be sure that who is keeping a eye on us. The security agencies give a valid explanation that it is their duty to provide the security to the nation and so they need to perform these actions. The citizens can’t even oppose that because if it’s a matter of national security but obviously they feel that some guidelines need to be set. The Law makers intervened...

Words: 577 - Pages: 3

Premium Essay

Protection to Bankers

...to public  Banking is one of the most risky sectors as far as privacy is concerned due to the highly sensitive and personal nature of information which is often exchanged, recorded and retained. Although India has RBI guidelines and legislations to protect data, this blog post looks at the extent of those protections, and what are the areas that still need to be addressed. Introduction Banking is one of the most at risk sectors for privacy violations due to the sensitive, and highly personal nature of information that is exchanged, recorded, and retained. Individuals must trust banks with personal identifying information, their financial records, the access information to their accounts,  and their credit history. Thus, privacy violations are not taken lightly and heavily impact the individual whose privacy was violated. Ways in which a violation of privacy can take place in the banking sector include: sharing personal information with third parties without consent  for marketing purposes, stolen or lost banking number or card, sharing personal information or allowing access to third parties without informed consent, inadequate notification  to an individual concerning what will be done with their data, collecting more personal data than is necessary, refusal to provide financial records upon request by client, incorrectly recording personal information, and loss of  a clients personal data due to improper security measures.  banker's duty of confidentiality to the customer It...

Words: 2508 - Pages: 11

Premium Essay

Privacy

...Running Head: THE EXISTENCE OF PRIVACY WITH TECHNOLOGY THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Obediah Howard Bellevue University   THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Abstract This research paper will discuss the relationship between privacy and technology. It will attempt to ascertain if technology and privacy can share the same plane of existence. Benefits and deficiencies of a particular technology are not hereditary to that technology, but are depend on their application. The public insists on accountability of technological innovation and assurance that privacy will remain intact. Striking a balance between enabling technology to enrich lives and restricting it from invading privacy has to be addressed. Implementing controls to protect private data is imperative. Technological advances over the years have challenged the public’s perception and expectation of privacy. Technology and one of its preeminent by-products, convenience, will continue to grow exponentially for the foreseeable future; there is no evidence to suggest otherwise. Privacy finds itself in a precarious position in the face of evolving technology. The collective concept of privacy has to be revisited. With the advent of technological innovations and the accessibilities they bring, privacy in its purest form does not exist. From an anthropological perspective, privacy is a relatively modern development. Ancient cultures practiced communal...

Words: 1783 - Pages: 8

Premium Essay

Pols 1336 Notes

...political ideologies * Our political values – liberty, capitalism, equality, consent of the governed, individualism Ideology * Political ideology is an integrated system of ideas or beliefs about political values in general and the role of the government in particular * Ideology provides a framework for thinking about politics and policy preferences Ideologies * Modern liberalism is associated with ideas of liberty and political equality: * Tend to favor chance in social, political and economic realms to better protect individuals and produce equality What is the constitution? * Fundamental principles of a government and the basic structures and procedures Two US Constitutions * Articles of confederation ( 1781-1789) * Constitution of the united states (1789-present) Events leading up to the US constitution * By the 18th century, two-tier system of governance had evolved – local colonial assemblies vs Parliament in Britain * Britain’s involvement in the seven years’ war cost money that they tried to recoup from the colonies * Sugar act (1764) * Stamp act (1765) * Colonists responded with...

Words: 2355 - Pages: 10

Free Essay

Cyber Law

... TITLE OF THE PAPER: CYBER SPACE MASS SURVEILLANCE PROGRAMS,INFRINGEMENT OF PRIVACY OF INDIVIDUALS, BY STATE IN THE NAME OF NATIONAL SECURITY. ABSTRACT: In this present era of cyber revolution and globalization, citizens have turned into “Netizens”. The advancements in the field of technology is also accompanied with the development of various methods of surveillance and intervention by the State into individuals’ private information. Governments are keeping an eagle eye by monitoring individual's movements, businesses transactions and also the means of communication, which includes cyberspace. It is alleged that the United States of America’s National Security Agency runs a program known as PRISM, which enables the US government to gain access to e- mails , conversations, pictures, voice calls and even sign in details of people using websites and applications associated with 1|Page Facebook, Yahoo, Microsoft, to name a few. Failure of cyber law mechanisms and national authorities to advance legislation and frameworks along with the technological developments and the increasing trends on States’ surveillance practices has created an environment in which citizen’s right to privacy is easily violated, leading to human rights violations also and lack of accountability, which raises questions on the legitimacy of such act of state. This research paper will mainly be focusing on this issue of privacy...

Words: 6245 - Pages: 25

Free Essay

Nsa Spy Programs

...using eavesdropping techniques to intercept and review wireless communications. Initially, these capabilities were solely used to spy on hostile nations, and particularly for military purposes. Human operators had to manually review each transmission, and cryptanalysts pored over military ciphers in an attempt to decode important messages. As wireless communication has become an integral part of commercial and individual existence, and potential threats to security are increasingly found in peacetime and on home ground, the scope of this intelligence gathering has likewise broadened. One of the most controversial eavesdropping systems in existence is a classified project known as ‘Echelon.’ Its use of computer hardware and software to filter communications from all over the world brings up many ethical issues related to the impact of computers on privacy. Overview of Echelon Most of the evidence for Echelon is circumstantial, though a few facts have been established. The participating organizations (notably the US Central Intelligence Agency and National Security Agency) have neither confirmed nor denied its existence. In lieu of a discussion of the ethical issues, a brief summary of the current knowledge follows. How it Works Echelon is the product of Cold War efforts to monitor wireless communications in the USSR. It traces its roots back to the clandestine UKUSA alliance, a communications intelligence agreement that dates back from around 1947. Member nations...

Words: 5284 - Pages: 22

Free Essay

Surveillance in Schools

...Surveillance Surveillance in Schools: Safety vs. Personal Privacy A project created by Kathy Davis, John Kelsey, Dia Langellier, Misty Mapes, and Jeff Rosendahl Project Home Security Cameras Metal Detectors Locker Searches Internet Tracking “Surveillance…n. close observation, esp. of a suspected person” [emphasis added] --Reader’s Digest Oxford Complete Wordfinder, 1996 In 1995, “The total number of crimes committed per year in or near the 85,000 U.S. public schools has been estimated at around 3 million” (Volokh & Snell, 1998). Our educational system is evolving all the time, and one factor that is constantly changing is the aggressiveness within our schools. In 1940, a survey of teachers revealed that the biggest behavioral problems they had from students were “talking out of turn, chewing gum, making noise, running in the halls, cutting in line, [violating] the dress code, [and] littering” (Volokh & Snell, 1998). In 1990, the toprated problems were “drug abuse, alcohol abuse, pregnancy, suicide, rape, robbery, [and] assault” (Volokh & Snell, 1998). In 1940, we had little need for surveillance beyond a teacher’s observation and intervention. Today, however, we live in a much more diverse society with troubled youth and adults who have easy access to weapons, drugs, pornography, etc., which have enabled students and staff to bring their violent and/or inappropriate tendencies into the naïve schools. What worked in 1940 (teacher-student confrontation) is not as realistic...

Words: 17490 - Pages: 70

Free Essay

Stay Out of My Business

...The topic I have selected is individual privacy vs. national security. I chose this specific topic because it is very important to me that I have my own privacy I feel that the government should not be tracking every step I take in life. I understand that the United States needs to track and monitor terrorists. This, however, should have nothing to do with my rights. After the horrible act of terrorism on September 11, 2001 our government changed how people can be monitored. Forty-five days after those terror attacks, President George W. Bush signed the Patriot Act into law. The Patriot Act makes it very easy to spy on just about everyone, not just terrorists. I believe the government took these horrible acts as an opportunity to infringe on its citizens rights. This is unacceptable. Terrorism is a huge concern for the United States. I completely understand this. However, the Patriot Act must be revised to only focus on individual terrorists and/or terrorist groups such as Al Qaeda. “Senator Wyden has warned that a secret law allowing the White House to keep its internal interpretations of the act classified means that it is now being used to justify surveillance that goes beyond what the public believes the law allows. But as long as the Patriot Act remains focused on ordinary Americans rather than suspected terrorists, the terrorists -- if you’ll forgive the truism -- have indeed have won.” (Rosen, J. 2011) The Patriot Act is just too broad. Normal everyday citizens...

Words: 433 - Pages: 2

Premium Essay

Employment Laws

...| | | | | | |Said to be the single most important |Griggs vs, Duke Power Company |Is was designed to eliminate the |Typically applied in the hiring | |Civil Rights Act of 1964 |piece of legislation that has had the | |discrimination of potential employment|process or the selection of potential | | |greatest affect on reducing employment| |based on the significant facets of |employment candidates. | | |discrimination; established in 1964. | |discrimination such as: gender, | | | | | |religion, race, etc. | | | |Granted enforcement powers to the EEOC|McDonnell Douglas Corp. vs. Green |The EEOC could effectively...

Words: 913 - Pages: 4