Verified Document

US Obligation To Privacy Essay

Privacy & Civil Liberties needs to communicate goals to the American public that include protecting the nation against threats to national security, ensuring the safety of citizens, friends, allies, and nations with cooperative relationships (Clarke, 2013). Promote national security and foreign policy interests, including counterintelligence, counteracting, and international elements of organized crime. Protect the right to privacy. Protect democracy, civil liberties, and the rule of law, eliminating excessive surveillance and unjustified secrecy. Promote prosperity, security, and openness in a networked world adopting and sustaining policies that support technological innovation globally and establish and strengthen international norms of Internet freedom and security. Protect strategic alliances that preserve and strengthen strategic relationships, protect those relationships, and recognize the importance of 'cooperative relationships'.

The U.S. government must protect national security and personal privacy that includes Fourth Amendment rights. Risk management should involve the rights to privacy, freedom and liberties on the internet and elsewhere, relationships with nations, and trade and commerce, including international. Public officials should never engage in surveillance to punish political enemies, restrict freedom of speech or religion, suppress legitimate criticism or dissent, help preferred organizations promote unfair competition, or benefit or burden groups of religion, ethnicity, race, and gender.

The government should base decisions on careful analysis of consequences, including benefits and cost to a feasible extent. Congress should end storage and transition of meta data held privately for government query and use third party providers where information is retrieved only on relevancy and need to know basis with greater safeguards against intrusion and greater restriction on disclosure of private information.

Protection of privacy for non-U.S. persons should include: authorization...

The Privacy Act of 1974 should be applied to all persons globally. The President should create a new process of requiring the highest level approval of sensitive intelligence requirements and methods that identifies uses and limits of surveillance.
Organizational changes should include a Senate-confirmed civilian eligibility for Director of National Security Agency. Head of military unit, U.S. Cyber command, and director of NSA should be separate individuals. A Civil Liberties and Privacy Protection Board should replace the Privacy Oversight Board and have broad authority to review government activity relating to foreign intelligence and counterterrorism. A Special Assistant to the President should be designated and chair a Chief Privacy Officer Council to coordinate privacy policy throughout the Executive Branch. A position of Public Interest Advocate should represent interests of privacy and civil liberties before the FISC. FISC's decisions should be transparent and allow for change.

Internet governance should include all appropriate stakeholders. U.S. government should take appropriate steps to promote internet security, including encryption standards and measures. Privacy and Civil Liberty Impact Assessments should be created to assess data mining for statistical reliability, cost effectiveness, and privacy protection. Classified information should be shared by need to know. Personnel investigations should be eliminated. Restrictions should include software, standards, and practices.

US Obligation to Privacy

Surveillance…

Sources used in this document:
Works Cited

Clarke, R.A. (2013). Liberty and Security in a Changing World. The President's Review Group on Intelligence and Communications Technologies.
Cite this Document:
Copy Bibliography Citation

Related Documents

Privacy Laws Are a Big
Words: 1816 Length: 6 Document Type: Research Paper

They are also required to assess and address risks to customer information in all areas of operations, including employee management and training, information systems, and detecting and managing system failures. They must address what information is collected and stored as well as whether there is a business need for that particular information. Depending on the type of business operations, privacy laws govern how companies collect, store, and use customer identifiable

Privacy Issues in Mcdonald's: As Part of
Words: 897 Length: 3 Document Type: Essay

Privacy Issues in McDonald's: As part of its commitment to its customers, McDonalds Corporation is very sensitive to privacy issues. While the company does not share, sell or reveal any personal information to third parties, it may share this information within the corporation, subsidiaries, franchises and affiliates. However, the use of shared personal information within McDonald's family is based on the corporation's privacy policy. Notably, companies that may be engaged by

Privacy and Ethics in Medical Testing
Words: 772 Length: 2 Document Type: Essay

Ethics Incidental findings are fairly common in the course of medical testing, occurring in around one-third of all tests (Ofri, no date). Yet, the medical field is torn about what the ethical implications of such findings are. In particular, it can be difficult to determine whether reporting such findings is important, and therefore medical practice seeks to establish a threshold of what should and should not be reported. This particular finding,

Right to Privacy Being a Citizen of
Words: 2461 Length: 7 Document Type: Essay

Right to Privacy Being a citizen of the United States comes with many benefits in comparison to citizenship in other countries. Through the U.S. Constitution and the Bill of Rights we are granted certain rights -- the right to free speech, freedom of religion, freedom of the press, and freedom of assembly -- just to name a few. However, despite the 27 amendments the Bill of Rights that guarantee American protections

Surveillance Software Privacy Legislation and
Words: 656 Length: 2 Document Type: Article Review

Also, employees should be mindful of what they post on social networking sites, even if done from their home computer. Employers should always be aware of what is considered a reasonable expectation of privacy. In certain industries, workplace monitoring may be necessary so that the company can protect itself. In the case of an organization that deals with the well being of children, even with thorough background checks performed it

Staffing Privacy Staffing and Privacy
Words: 1698 Length: 6 Document Type: Term Paper

Wiegele indicates that "employers often wish to know whether they are entitled to contact an applicant's references and what obligations they may have in this regard. With respect to obtaining consent to contact such references, it is accepted that an applicant who lists references on a job application or resume is implicitly consenting to a prospective employer contacting and obtaining information from those references. Similarly, it is generally accepted

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now