Haven't found the Essay You Want?
GET YOUR CUSTOM ESSAY SAMPLE
For Only $12.90/page

Is Privacy In The 21st Century Possible? Essay

Privacy was once valued and protected. But now with so many new and convenient technological advancements, is privacy in the 21st century possible? To protect our privacy Congress created the Electronics Privacy Acts (ECPA) to protect us from government access to private information that is transmitted and stored on the Internet, such as emails, private photos, or corporate data.

Congress has not updated the ECPA on technology since it was created, in 1986. When the ECPA was created there was no “World Wide Web”, social networking was something in the future, and nothing was stored in what we call the “cloud.” With all the technological changes in today’s society no one is protected. Privacy is defined as being free from the public eye. Yet we have so many people sharing personal information on social networking websites, and government agencies monitoring emails, and phone calls most of the time without our knowledge. There is no privacy in the 21st century, it is just a nostalgic feeling, and it is no longer practiced.

Today’s privacy laws aren’t up to date with today’s technology. Things are rarely sent through the mail, and emails and text messages have replaced written communication. Online messaging and social networking was something of a novelty when lawmakers created the ECPA (Frolik, 2013). A recent article from the Dayton Daily news written by Cornelius Frolik on June 2013 he mentioned, “The Government can easily access many personal communications and other private information without sufficient probable cause”. Instead of acquiring a warrant that requires more standards and procedures. Government agencies instead obtain subpoena’s to obtain people’s emails, and telephone records (Frolik, 2013). Although, local authorities catch lots of dangerous criminals through information online like emails, photos, and social media sites like Facebook some critics still feel it is an invasion of privacy.

Also as our technology advances by leaps, and bounds so does the way Government uses new high tech tools to surveillance law-abiding citizens. Though our Fourth Amendment states to protect the American people from unreasonable searches and seizures. Almost everything is done through technology in the 21st century. This meaning that government can seize any emails that are 180 days or that has been opened without a warrant; subpoenas have become the most used investigator tool for Government agencies. The reason why is because they can be easily written inside the prosecutors office without any further review from a judge.

This means there is an exception to the Fourth Amendment of the United States Constitution, if it satisfies the requirements. The question we should be asking when it comes to Government and our privacy are ” Is to explain a clear understanding of the word privacy”? If the Government cannot clarify the term privacy then how can they protect our privacy? The lack of clarity makes it hard for lawmakers to create new policies that will keep our privacy out of harm (Libin, 2012). Two reasons why privacy can be considered threaten in today’s society one being the Government powers are limitless, and two being we the American people expose ourselves digitally (Libin, 2012). The people of America should come together and declare for the Government to protect our privacy rather than participate in warrantless searches (Libin, 2012). The fact that the Government can argue that the Fourth Amendment does not apply because there is no exception to privacy when it comes to protecting national security, then that leave the American people in times of calamity, and crisis.

Laws like the ECPA is a law that the Government has an obligation to respect (Libin, 2012). The ECPA protect the privacy of the electronic communications, but when law enforcement and prosecutors have to protect and enforce laws, personal information has to be collected to build a case (Libin, 2012). The solution is more complex than simply, and right now the Government is facing difficulties figuring out the best way to protect the American people (Libin, 2012). Given all the information privacy seems to be the problem. It can be portrayed in many ways, one as it’s protecting the public from terrorism, and local crime; and two being if you are innocent, what do you have to hide?

In 2014 I find that most American people store their digital lives in what we call “The Cloud” which included emails, calendar data, photos, and other sensitive information. The ECPA has become obsolete. Technology today leaves the ECPA outdated, the laws have not changed since it was originally created in 1986. The existing privacy laws only focus on the text-based personal records, and the issues that people face today with this outdated privacy law is gathering of digital multi-media files, and the way this unauthorized data is used (Lipton, 2010). Do you consider video surveillance systems out on the street personal data? Some may say yes and some may say no. According to a case study researched by Jacqueline D. Lipton, if the face of an individual is recognizable, than it is considered personal data. Some people feel protected with the video surveillance capturing their every moment.

Then on the other hand some people feel they are being scrutinized being watched by video surveillance. The U.S. has a protection for free speech and for free of a press under the First Amendment. However there is no express constitutional right to privacy (Lipton, 2012). The question that American people should rigorously examine is whether or not Congress should repeal the ECPA and creates new privacy laws to replace it (Kerr, 2014). The ECPA should be considered top priority when it comes to being reformed. If Congress were to start fresh on what changes to make on the ECPA the technologic changes would have to be particularly considered.

Being that the cost of stored information has changed it also changes how law enforcements surveillance people, it threatens privacy. In 1986 this all made sense because the internet was designed at this time to only hold limited storage, and wire-tapping was a threat more than stored information (Kerr, 2014). Overall access to stored record has become the greatest privacy threat. Technology has changed enormously, now everything is stored. With everything being stored now in what we call “The Cloud” like mentioned before stored information begins to reveal the same level of details as real time surveillance or real-time access (Kerr, 2014). Stored information has become more revealing an invasive. (Kerr, 2014).

References

_Cohen, J. E. (2013). What is Privacy For._ Harvard Law Review Association_,_ 126_(7), 1904,29. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=5&
sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=edsgbe&AN=edsgcl.333333595_

_Kerr, 0. S. (2014). The Next Generation Communications Privacy Act._ University of Pennsylvania Law Review_,_ 162_(2), 373-419. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/command/detail?vid=26&sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=aph&AN=93917886_

_Libn, N. (2012). PRIVACY AND ACCOUNTABILITY IN THE 21ST CENTURY: Foreword._ Harvard Law and Policy Review_,_ 6_, 263. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=15&sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=edslex&AN=edslex2F0EC940_

_Lipton, J. D. (2010). Digitlal Multi-Media and The Limits of Privacy Law._ Case Western Reserve Journal of International Law_,_ 42_(3), 551-571. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=24&sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=bsh&AN=51909959_

_Sutanto, J., Palme, E., Chuan-Hoo, T., & Chee Wei, P. (2013). Addressing The Personalization-Privacy Paradox: An Empirical Assessment From a Field Experiment on Smartphone Users._ MIS Quarterly_,_ 37_(4), 1141-A5. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=29&sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=bsh&AN=91906295_


Essay Topics:


Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email. Please, specify your valid email address

We can't stand spam as much as you do No, thanks. I prefer suffering on my own