Since day one, people have developed and created all sorts of new methods and machines to help improve everyday life in one way or another. Who can forget the invention of the wonderful telephone? And we can't forget how innovative and revolutionary computers have been. However, while all machines have their positive uses, there can also be many negative aspects depending on how you use such machines, eavesdropping on phone conversations, using spyware to silently monitor every keypress and click you make, and many other methods of unwanted espionage. arisen. As a result, laws have been enacted to ensure that no one takes advantage of these negative uses. But given how often technology changes, how can anyone know that laws enacted long ago can still uphold righteous justice? With the laws currently in place, it's a constant struggle to balance security with privacy. Privacy laws should be completely overhauled in order to create a better middle ground between security and privacy. A common misconception among many is that it is impossible to achieve a middle ground between privacy and security. However, as Daniel Solove well stated, “Protecting privacy does not necessarily mean sinking a security measure. Most people concerned about the privacy implications of government surveillance do not advocate no surveillance and absolute privacy. They would do well to give up some privacy as long as adequate controls, limitations, oversight and accountability mechanisms are in place.” (“5 Myths About Privacy”) The fight over privacy rights is by no means a recent conflict. In fact, there were conflicts even in the days before the Revolutionary War. One of the best known cases occurred in England,...... middle of paper... two things are just what is needed. Trust will be something necessary to truly achieve this happy medium and many people may argue and misinterpret. However, a true leader should know what is best for his or her people, even if the people may not completely agree. Works Cited Fridell, Ron. Privacy and Security: Your Rights in Conflict. Berkely Heights: Enslow Publishers, 2004. PrintKallen, Stuart A., ed. Are privacy rights violated?. Farmington Hills: Greenhaven Press, 2006. PrintKuhn, Betsy. Prying eyes: privacy in the twenty-first century. Minneapolis: Lerner PublishingGroup, 2008. PrintLazar, Wendi S. “Privacy Limitations in the Workplace: Electronic Investigations and Monitoring” Cyber Lawyer and the Internet (2012): SIRS. Network. 10 Sep. 2013Solove, Daniel J. “5 Myths About Privacy” Washington Post: B3. June 16, 2013. GENTLEMEN. Network. 10 weeks 2013
tags