Governmental Power Placed Above Personal Freedoms Term Paper

PAGES
5
WORDS
1539
Cite

¶ … Patriot Act and current developments in the United States In 2011, the PATRIOT Sunsets Extension Act made possible the tracking of small businesses and corporate affairs that are on the territory of the United States. The applicability of this law can be seen in the most common working spaces and, thru this, the confidentiality of the information shared and traded via the Internet becomes a matter of the past. The Patriot Act is therefore an issue of concern and at the same time a matter of ensuring security for the population of the United States. However, it is important to consider the price in terms of privacy that both the average American as well as its international counterparts need to pay in order to obey by the Patriot Act and the necessity for safety.

There are several aspects to consider. The Internet as a means of communication, the privacy as a trading unit for safety, and the efficiency or lack of when applied the Patriot Act.

The Internet has become an actual substitute for interpersonal and face-to-face relationships, for others a working environment. However, taking into account the fact that this is a virtual environment, we are also vulnerable to all challenges possible. There are many aspect of the information area which are unknown for the common Internet user or even for a well trained IT person. The fact that the world is in constant evolution, there will always be people and personnel that that will have a better knowledge and command of the system on which we are relying so heavily nowadays, the Internet.

The issue of vulnerability is indeed a matter of great concern. We are rarely taking into account the fact that the communication process can be traced and analyzed, especially by the federal government and in the light of the Patriot Act which allows the authorities to access private correspondence without notice. However, even in such situations the issue of privacy could be considered a debatable subject, if national security is invoked. People tend to be more opened to accepting the violation of mail, telephone conversations, or other type of communication when the reason is protecting national security.

The issue of privacy is the subject of discussion for a long time now. However, in the early days of the society, when people were the only ones able to invade your privacy and only through direct contact, the idea of "personal space" or even the usage of certain pronouns determined the limit of one's private area. In this sense, in a traditional perspective, "a person who wanted to keep some information from being generally available knew how to go about it. The drawn shade and the closed door preserved the privacy of his behavior; the locked drawer contained his confidential documents; only the ear of a trusted ally heard his secrets. His techniques to forestall discovery were of the same order as, and by and large adequate to, the means which others might employ to force disclosure"

.Therefore, it can be said that in the traditional understanding of the concept, the issue of privacy and especially privacy violation was considered to be a rather intimate affair and did not demand effort to maintain it, while being rather hard to break it.

Nowadays, the issue of privacy is automatically related to the idea of personal space and the security of one's personal data, be it on a job application or on the Internet. The alerts present of various sites which deal with personal information informing that no part of the information you provided would be used in means other than those for which you supplied them are rather common nowadays. This is largely because it is rather obvious that this global communication and the World Wide Web represent one of the most important ways through which one is denied of its privacy. More precisely, "high-speed computers process and distribute diverse bits of information garnered from the myriads of records now available about each individual. His home, his person, and even his mind are potentially at the disposal of others' curiosity"

. Therefore, we are currently experiencing...

...

The Patriot Act has come as a legal framework to allow this privacy to be shattered and questioned.
Privacy can also be discussed from the point-of-view of the federal government. Having in mind elements such as the government's interference in our communication, or the lack of privacy concerning the people around us, it would appear normal that a proper environment in which one can be sure to have his privacy protected would be in a place locked by a password and security elements. Even though it is a virtual place, it should give us the sense of privacy and of confidentiality of our own thoughts and communication.

Internet privacy is nowadays a matter of the law precisely because it involves the protection of personal information and data. The federal Electronic Communications Privacy Act is such an act, as it considers "unlawful under certain circumstances for someone to read or disclose the contents of an electronic communication"

. The circumstances which are accepted by this law included the handling of personal information during the service an operator specially assigned provides

. However, in my personal case, it did not involve any exception from the law.

There is still another point to consider: the possible abuses of private information by the Government itself. In this sense, there have been arguments according to which the government is constantly controlling the activities of most individuals on the Internet, in the name of the general principle of the Patriot Act

. However it comes in contradiction with the fundamental right to a private life enshrined in the Constitution. Therefore, there is either the choice of respecting the privacy of every internet user and taking the chance to fail to detect possible dangerous plots threatening the national security, or admitting the breach of this fundamental right of the citizen in the hope that any possible threat to the integrity of the society can be averted and prevented.

Currently the debate over the power of the Patriot Act has extended above the common American being monitored on everyday activities and now involves even the corporate world After the issuance of the Patriot Act, the Federal Bureau of Investigation had the right and legal background to demand customer records through National Security Letters

Despite the fact that these orders were rarely if ever actually challenged, it raises the question on the limits of the National security reason that would allow the federal government to interfere in the private businesses of corporation. An thinking exercise can assume that, for example, an IT company that is based in the United States but deals or shares information in Europe can be fully verified by the federal government without a clear statement of the reasons. More precisely, assuming that the software company has datacenters in Europe or the Middle East which it uses to store vital information of its international and global clients, the federal government, seeing that it has the authority over the U.S. based company, can verify the datacenters that company has in Europe or the Middle East and the information provided by its customers are readily available for the federal government to access. In such a situation, the privacy of information that such a software company guarantees thru its services is no longer a certainty. Further, there may be clients, such as the ones in the Middle East that would care for the privacy of their information to such an extend as to choose another software company that would ensure no risk in sharing the information with any government.

Overall, it can be said that the Patriot Act raises certain serious concerns over the security of the Internet, which has become one of the most…

Sources Used in Documents:

References

Bier, William C.S.J. Privacy: A Vanishing Value? New York: Fordham University Press, 1980.

Electronic Communications Privacy Act. Cornell University Law School. N.d. 2008 http://www.law.cornell.edu/uscode/18/usc_sec_18_00002516-000-.html

Kim Zetter, "Few Companies Fight Patriot Act Gag Orders, FBI Admits" Wired Online, 2012, http://www.wired.com/threatlevel/2012/05/nsl-challenges/

Privacy Rights Clearinghouse. Fact sheet no18: online privacy. 2007. http://www.privacyrights.org/fs/fs18-cyb.htm#Email" target="_blank" REL="NOFOLLOW" style="text-decoration: underline !important;">http://www.privacyrights.org/fs/fs18-cyb.htm#Email
Slater, Derek. FBI's abuse of Patriot Act even worse than we thought. Electronic Frontier Foundation. 2007. <http://www.eff.org/deeplinks/archives/005314.php>
http://www.privacyrights.org/fs/fs18-cyb.htm
Electronic Communications Privacy Act. Cornell University Law School. N.d. 2008 http://www.law.cornell.edu/uscode/18/usc_sec_18_00002516-000-.html
Slater, Derek. "FBI's abuse of Patriot Act even worse than we thought." Electronic Frontier Foundation. 2007. <http://www.eff.org/deeplinks/archives/005314.php>
Kim Zetter, "Few Companies Fight Patriot Act Gag Orders, FBI Admits" Wired Online, 2012, http://www.wired.com/threatlevel/2012/05/nsl-challenges/


Cite this Document:

"Governmental Power Placed Above Personal Freedoms" (2013, October 02) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/governmental-power-placed-above-personal-123641

"Governmental Power Placed Above Personal Freedoms" 02 October 2013. Web.25 April. 2024. <
https://www.paperdue.com/essay/governmental-power-placed-above-personal-123641>

"Governmental Power Placed Above Personal Freedoms", 02 October 2013, Accessed.25 April. 2024,
https://www.paperdue.com/essay/governmental-power-placed-above-personal-123641

Related Documents

Personal Digital Assistants in Healthcare Current Applications and Future Trends in the Use of Personal Digital Assistants in Healthcare Today, healthcare practitioners enjoy a wide range of digital equipment that can help them provide more efficient healthcare services, including laptop computers, cellular telephones and personal digital assistants, or PDAs. These devices have been used in various ways by clinicians to improve their ability to deliver more timely and accurate diagnoses and treatments,

Unfortunately many aspects of modern American society threaten individual liberties. For example, the disparity between the rich and the poor in American society impacts the level of freedom enjoyed by certain segments of the population. The "freedom" to pay workers a pittance in order to increase profits in a large corporation is therefore not really a "freedom" at all. Therefore, it is up to the government and to the

Freedom and Terrorism Online
PAGES 10 WORDS 3136

policy makers underestimate internet independence? YouTube independence of positing video content The internet moderated terrorism Regulating the internet for anti-terrorism Freedom and Terrorism on the Internet The purpose of the study is to explore the use of internet by terrorist organizations and the degree of independence that terrorist enjoy while conducting and coordinating their terrorism activities from the cyberspace. The topic is an area of interest for the researcher as it is significantly relevant

riot disruptive movement "Occupy Wall Street" place New York City. The discussion MUST include: 1. A chronological description 2. engaged commentary (opinionated) 3. theoretical interventions. We live in a world today that is seen as being clearly a sign of discrepancy between the different standards of living, between the rich and the poor, between the highlife and the low life in the society. Some analysts consider that the different levels

Mill on Liberty
PAGES 6 WORDS 1812

Freedom, Liberty, And Authority Thomas Jefferson is attributed as saying "the price for freedom is constant vigilance." Only those who are willing to stake there reputation, their personal well being, their fortunes and their futures on the pursuit and defense of freedom are those who will have a guarantee of remaining free from the tyranny of those who would exchange the freedom for the freedom of minority at the expense of

HARMONIZING PERSONAL AND PROFESSIONAL BALANCE: STUDY OF EMPLOYERS' FAMILY FRIENDLY POLICIES IN THE U.K. This study seeks to show that there are several different family friendly policies being utilized by employers in the U.K. And that these have been necessary for some time. The three main policies are: part-time work, flex-time (flexible start and finish times) and teleworking. All three of these policies are important for working mums and others that