Monday, June 10, 2019
REWRITE THIS PAPER FOLLOWING DIRECTIONS BY PROF Essay
REWRITE THIS PAPER FOLLOWING DIRECTIONS BY PROF - Essay ExampleThough McLeod rightly claims that our rights nether the 1st Amendment have been curtailed through a rise in copyrighted material, he is wrong to include in his arguments gathering and protection of individualal nurture for homeland security purposes. McLeod nones, Information about citizens is collected by private companies and guarded for corporate purposes, or the use of the highest bidder (245). The Multistate Anti-TeRrorism Information eXchange (MATRIX) is such a political syllabus. With the MATRIX program, the US government collects information from private selective informationbases and uses it to its own ends (McLeod 245). Though McLeod is not completely wrong to point out and argue against the dangers of this innovation. The MATRIX program implies that most of the information that was previously public is now proprietary thus it is privately owned. MATRIX collects data on every citizen. harmonize to McCleod, MATRIX collects a wide range of data, including pictures of the subject, ones neighbors and family members (McLeod, 245). Also, this information is proprietary. Although this information is a collection of events and facts from a personal as well as public animateness of an individual, the owner and creator of this information, i.e. the individual whose data was collected, has no access to it. The Freedom of Information Act does not extend to ordinary citizens as the information has been privatized (McCleod 245). According to the Privacy Act of 1974, 5 USC 552a, cl.e, the executive has the right to collect personal information for the purpose of protecting the homeland security. However, individuals have a right to be informed of changes or disclosures of such information. By 2004, data was collected on 120,000 individuals, who were viewed as having high terrorism factor (Krouse 3). In cases where the use of MATRIX program is not kept in check then, the misuse of the privatized inf ormation is bound to happen (McLeod 247). McLeod cites Lt. Col. Ralph Periandi, deputy commissioner for operations with the Pennsylvania state police, who argues that these data will not be used for anti - terrorist activities only (246). They are open to misuse by the members of the US law enforcement agencies. Democracy will be cut by such actions of misuse of private information The democratic right to innovate too is tied up by such practice, as the case of ElcomSoft proves. An employee of this federation attended a conference where he intended to make public an ebook reader, a tool which would allow consumers to copy books legally onto a personal computer, in one case they paid for this service (McLeod 248). The employee was arrested, though later acquitted together with his company, as US jury decided that they were not aware of US laws regarding intellectual stead rights. Despite the arguments made by McLeod, some points about legal protection of the right to privacy should not be missed. Indeed, companies use cookies to collect private data such as IP address, or the social security number (Legal Information Institute). And databases collecting data about every aspect of a persons life intrude the private sphere. However, some of this data is given away consensually by individuals. Laws attempt to protect every sphere of an individual
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment