The
Protected Privacy That’s Unsecured
Okay,
so it seems that privacy rights and associated legislation primarily refer to
the personal information American citizens willingly submit to organizations, information
government agencies collect during investigations and general surveillance, individuals’
personal property, as well as environments which warrant an expectation of
privacy. That said, any right to privacy we have has been
articulated by Supreme Court Justices via judicial opinions and court rulings, informed
by perpetual interpretations of the Bill
of Rights and other constitutional provisions and amendments, or explicitly
expressed in various pieces of federal and state legislation. Additionally, the general concept of the
right to privacy is a derivative aspect of our civil liberties, and can also be
linked to civil rights—which may also be considered as rights, enumerated or
implied, in the Constitution. Moreover,
with the plethora of federal and state legislation regarding privacy, along
with liberties and rights depicted in the national Constitution, United States’
citizens can be confident that their privacy is as well protected as it is
unsecured. Our real concerns about
privacy rights and, more specifically, privacy invasions, should be centered on
the ever-growing technological abilities of ordinary citizens, and the
possibility of business organizations and government agencies neglecting to
operate within company and legislative guidelines.
Although
civil rights do not particularly pertain to privacy rights, there is an association, given certain situations. Civil rights have more to do with unfair or
uncivilized treatment by public organizations on the basis of race, gender,
religion, sexual orientation or other personal characteristics. The recent IRS scandal is a sufficient
example of the relation between privacy and civil rights. The Internal Revenue Service was accused of
unfairly targeting “conservative groups who applied for tax-exempt status” (www.nationaljournal.com). In this scenario, the behavior of the IRS was
nothing less than the agency discriminating against conservative groups, clearly
infringing upon their freedom to privately
conduct their own business, legally, in their own way. Another example, is the racial profiling of individuals. This is discrimination as well, as it invades
a person’s right to be left alone, on the basis of his or her ethnic
background. It is necessary that we are
aware of the link between civil rights and the right to privacy provided in
these two examples, as we strive to better mitigate these things in the future.
Further, the concept of privacy rights can be likened to
an offspring of civil liberties. According
to civilrights.findlaw.com, civil liberties “typically include basic rights and
freedoms that are guaranteed by law—either explicitly identified in laws and
constitutions, or interpreted through the years by courts and lawmakers”
(2014). Freedom of speech, the right to
privacy, the right to be free from unreasonable searches and seizures, the
right to a fair court trial, the right to marry, and the right to vote are all
included in our civil liberty package deal.
However, the right to privacy stands out in this list because of its implied nature. Although it is “guaranteed by law”, it is not
“explicitly identified” in the constitution.
When discussing
privacy rights, it is fundamentally significant to, establish an adequate
understanding of the subject and the development of its jurisprudence. With no explicit
right to privacy expressed in our national constitution, any right to privacy
we have is recognized as mere implications
noticed when observing our civil liberties and other provisions and amendments,
found in the Constitution. These
implications are the soil to the federal “common law approach” used in the
development of privacy jurisprudence, while the Bill of Rights is the primary
point of reference (www.intechopen.com,
2014). Moreover, the 14th Amendment
and its “guarantee” of liberty has also been used by the Supreme Court to
determine a “fairly broad right of privacy”, providing
the Court leverage to decide on a variety of different cases (law2.umkc.edu,
2014). Ultimately, the Bill of Rights
and other constitutional provisions and amendments encompass our civil
liberties and civil rights, and has simply allowed us to determine the who,
what, when, where, and how of privacy rights.
Opinions written by Supreme Court Justices reflecting
their interpretation of how constitutional provisions and amendments were used
to sufficiently rule on certain questionable cases is the essence of the
aforementioned common law approach that ever-develops privacy jurisprudence. Various case law examples assist in providing
a more clear understanding of how privacy jurisprudence is developed. In Meyer
v. Nebraska (1923), a “7-2 decision […] held that it was indeed a violation
of the Due Process Clause” (atheism.about.com, 2014) to attempt to regulate
what parents are allowed to teach their children. According to atheism.about.com, this was one
of the first cases that revealed implied liberty rights in the Constitution
(2014). The conclusions generated in
Meyer v. Nebraska have been used in at least two other cases since then. Because of Griswold v. Connecticut (1965)—one of the cases supported by Meyer—birth
control was made legal. Griswold also
provided groundwork for the famous Roe v.
Wade as well as Eisenstadt v. Baird—both
of which also are examples of case law that has contributed to the
jurisprudence of privacy. The
conclusions of the cases mentioned here have primarily contributed their own distinctive
element to privacy jurisprudence, which allows us to have a better defined
perception of the subject.
Privacy
rights have also been protected by many different laws legislators have
specifically enacted for various reasons. These laws have been established on the federal
and state levels. For example, the Privacy Act of 1974 is a “comprehensive
law governing the protection of personal information in
the possession of the federal government” (www.gsa.gov,
2014). The Privacy Act’s intention is to
ensure that personal information is used properly and that “agencies institute
measures that prevent any misuse of information in their possession” (www.gsa.gov,
2014). The Gramm-Leach-Bliley Act “imposes restrictions on the ability of
financial institutions to disclose non-public personal information about
consumers to nonaffiliated third parties and requires financial institutions to
provide privacy notices to consumers” (www.cftc.gov,
2014). The Health Insurance Probability and Accountability Act of 1996 (HIPAA)
protects the privacy of personal health information. Additionally, there are 28
federal and state laws related to data
privacy alone presented on informationshield.com
(2014), which consist of laws such as the Cable
Communications Policy Act of 1984, the Electronic
Funds Transfer Act, the Information
Security Management Act, and many more.
Although some of us may be unaware of it, our personal privacy is
legally protected from a variety of perspectives on the national and
sub-national levels, and it is clear that the subject has been thoroughly
considered by legislators.
After arriving at the conclusion that our privacy is
indeed very well protected legally, why do we yet experience a sense of
insecurity about the subject? Why is it
that we yet believe our privacy is not totally protected? At the end of the day, we are insecure and we
lack confidence in privacy protection because there will simply always be “those
possibilities”. Regardless of all of the
laws that have been enacted on the federal and state levels, humans are still
in control of it all, and some of us simply do not have the best intentions or
discipline to make decisions of integrity in certain instances.
Edward Joseph Snowden is a computer specialist who once
was employed by the Central Intelligence Agency (CIA), and was also a
contractor for the National Security Agency (en.wikipedia.org, 2014). Snowden is responsible for providing classified NSA documents to media
outlets. This was considered the most
“significant leak in U.S. history” (en.wikipedia.org, 2014). Moreover, even though Snowden indicated that
his intentions were good, which has
garnered support from certain people—and this example does not directly pertain
to personal privacy—this is yet the “grandfather”
of examples that support a profound point discussed in this paper.
Aside from the enactment of the Patriot Act of 2002, the leaking of the NSA documents by Edward
Snowden is a factor that played a substantial role in provoking the current
cynical mentality regarding privacy rights.
It is because of this leak of information that mass surveillance and
government secrecy has been primary topics of conversation in the last year. It is because of this leak that people seem
so concerned with the possibility of their emails and telephone conversations being
monitored. Furthermore, according to
wikipedia.org, Snowden specifically expressed that his “’sole motive’” for
exposing the information was to “’inform the public as to that which is done in
their name, and that which is done against them” (en.wikipedia.org, 2014). This clearly supports any speculation of
government agencies acting outside of legislative guidelines.
Our ability to use the advanced technology we have
developed today is growing in an exponential way. This means that not only do government
agencies and private business organizations need to tighten and maintain their
virtual security, but those of us that live on our computers and other devices
that allow us to exist virtually, must not hesitate to do the same. Because the use of computers has become such
a necessity, government agencies,
private business organizations, and everyone existing virtually is knowingly or
unknowingly engaging in a cyber-war. This means that no computer system, personal
data, or any kind of records stored virtually are any more protected than files
stored traditionally in someone’s office.
Additionally, it seems that we simply cannot escape the
technology once we have entered its realm. It is wise for us, if we are interested in
concealing things about our personal selves, to do the least amount of things
electronically. According to hg.org, many
people that visit websites that require the submission of personal information,
often neglect to read the “terms of use” statement included on most websites of
that kind (www.hg.org,
2014). The terms of use statement on
these kinds of websites usually permits the company to track a person’s
activity on that website as well as their general online activity “through the
use of ‘cookies’” (www.hg.org,
2014). Further, almost anyone can access
your personal information by simply tapping into “public and private databases
that gather buy and sell your vital statistics” (www.consumerreports.org,
2014). Our personal information is often
“used for direct marketing” and it may even sold to “third parties” (www.hg.org,
2014). These facts only make us more
wary about the security of our personal information in the hands of government
agencies and private business organizations.
Even
ordinary individuals can hack into other peoples’ systems as well as systems
belonging to government agencies (e.g. Edward Snowden and NSA documents), and
private business organizations. In 2013,
the retail store, Target, had its system hacked, and the personal data of over
110 million customer’s was exposed (ww.bgr.com, 2014). The breach exposed the credit and debit card
information of at least “40 million” customers, according to bgr.com
(2014). Target customers probably would
not have even considered something like that happening to them in a million
years, nor would customers of any other retail establishment. However, as mentioned
previously, not only has technology advanced, but our ability to use technology
has advanced in a remarkable way. An
expert explains that a program called “BlackPOS” (bgr.com, 2014) is possibly
the tool that was used in the scam.
Although this is high-tech stuff, money can undoubtedly make almost
anything happen these days. The
“malicious program” can be purchased on the black market for as low as $1800,
and is a “specialized piece of malware designed to be installed on
point-of-sale devices (POS) and record all data from credit and debit cards
swiped through the infected system” (bgr.com, 2014). Obviously, it is just that easy.
Hence, it is very difficult to experience a sense of
complete security after becoming aware of the many possibilities associated
with cyber-war and the virtual invasion of privacy. The use of technology is simply a more
intelligent way of committing crimes—normally crimes dealing with the invasion
of peoples’ personal information.
However, as we are constantly experiencing a cyber-war, it is important that we implement the necessary measures that
will assist us in combat. Extensive
government oversight is needed in regards to enforcing proper use of citizens’
personal information. As citizens, it is
smart for us to limit the things we do electronically—which actually includes a
wide range of things that may not be particularly as necessary as they are
convenient. Also, those of us that
almost live our entire lives online must expediently take the proper
precautions to keep out unwanted virtual guests. These are just a few things we can do to
experience a better sense of comfort as we yet share ourselves with the rest of
the world.
As oxymoronic as it may seem, it is appropriate here to
say that our privacy is as well
protected as it is unsecured. While the
many federal and state laws that have been established encompasses nearly
every aspect of privacy we can think of, there are still individuals that either
know our every move or are able to observe certain things about us at absolutely
any time. This is, without a doubt, an
invasion of privacy, but can seriously be considered a potential threat to a
person’s overall safety as well. How
secure can we really believe our privacy is if a Florida couple can intercept a
Republican conference call in 1995
(Lane, 2001)? There is really no
question if the growth of our abilities to develop and use technology is
considered. Since 1995, we have grown
from cellular phones that allow us to talk to other people, to cellular phones
that allow us to talk to other people, text other people, send pictures to
other people, submit a final paper to our college instructors, watch movies,
and control things in our homes all from the same essential device we were
using in 1995. If ordinary people can create
the type of cellular phones we have today from the ones we had in ’95, they
most certainly can hack into Target’s database and steal customers’ personal
information, or hack into their boss’ email account, or even hack into the NSA’s
database and take classified documents. Whether
our personal information is exposed to a particular employee of the Central
Intelligence Agency, a doctor’s office or the local library, it seems safe to
believe that someone we do not even know has reached a level of intimacy with
most of us to an extent we could never imagine.
Furthermore, it is affirmative: the national constitution’s provisions
and amendments express civil liberties and rights that imply our right to
privacy, just as legislators have been able to enact federal and state laws
that protect it. However, not only does
it seem that laws are meant to be broken, it is fitting here to assert that
they will be.
No comments:
Post a Comment