The article was written by the [url=https://best-essay-service.org/buy-outline-online.html]outline writing service[/url]

First of all, each person has a right to use public information provided by media, authority institutions, etc. However,, using of any kind of personal information is prohibited by laws enacted in different countries. We should also consider that nowadays, technologies allow to get access to any person’s private data. Also, each person has the right of access to public information. That is why, it would be reasonable to consider the advantages and disadvantages of public access to this information. It is of higly importanceto determine the possible ways to protect private information or information that can not be disclosed. Finally, we would like to pay attention to the Federal law that allows the Federal Government to use private information legally.

Also, it is reasonable to determine available “electronic privacy laws” that can protect citizens’ rights when some received the access to private information.

1. List and describe at least three (3) technologies that allow an individual to research citizens’ private data.

There are a lot of technologies, which allow to find and usesomene’sprivate data, for example, Cloud Computing. Cloud Computing is a set of interrelated technologies, which represent its own resources as a service to the customer. The term "cloud" is used as a metaphor, as the image of a complex infrastructure, which hides all the technical details. According to the document IEEE, published in 2008, "cloud computing is a paradigm in which information is permanently stored in servers on the Internet and temporarily cached on the client side, such as personal computers, game consoles, laptops, smartphones and etc.".

Cloud computing is a concept that includes the concept of software as a service, Web 2.0 and other technological trends, in which there is common belief that the Internet is able to meet the needs of users in data processing.

Another technology that may use personal data is HTTP cookie. “HTTP cookies provide the server with a mechanism to store and retrieve state information on the client application's system. This mechanism allows web-based applications to store information about selected items, user preferences, registration information, and other information that can be retrieved later” (HTTP Cookies (Windows), n.d.). A cookie is a small piece of text information from the web server to the browser. The browser will store this information and pass it to the server with every request to the HTTP header. Some of the cookies can only be stored in a single session, they are deleted after closing the browser, while others established for a period of time, stored in a file. Usually, this file is called 'cookies.txt', and lies in the working directory of your web browser. This textual information is quite dangerous, since cookies can store a wide range of data, including personally identifying information (such as, your name, address, email address, or telephone number). However, this information can be saved only if you give it, since web sites can not get the information that you did not provide them, besides, they can not access other files on your computer.

There are different ways and methods of biometric identification, but they are based mainly on the measurement of physiological properties and characteristics of behavior. These include areas such as authentication geometry hands and fingers, venous structures, iris, internal structure of the bottom of the eye, facial features, fingerprints.

While talking on the phone, we do not always realize that this device can be used to identify the person behind the voice. Devices of such system analyze the energy and dynamic range of speech, and in some cases even words. These systems are characterized by large tolerances and, consequently, a relatively low level of security, which means a high probability of illegal access to personal data. The nature of the keyboard can also be used in this field. Soon, with the cheapening of costs in wide consumption will be included household devices equipped with biometric devices, which will record the characteristics of their master.

2. Discuss the advantages and disadvantages of public access to this information, both for the researchers and those who are being “investigated”.

According to international standards regarding the access to public information, such information include freely collected, received, stored, used and distributed. Restriction for the collection, receipt, storage, use and dissemination of public information is only due to storage conditions, the specific character of conservation is defined by law. Public information is the one that is reflected and documented by any means and in media. Moreover, the information that is created, collected, processed and stored at the expense of budget funds allocated for the support of the appropriate authority can be considered as public information.

There are advantages and disadvantages of the access to public information. First of all, all citizens are able to use, read, and save information they need provided by authorities, media, etc. It is a huge advantage, since you can obtain the required information without any restrictions. It should be noticed that right of access to public information is the natural right of each citizen. Also, access to public information is an important characteristic of democratic society. That is why, country with any restrictions regarding with access to public information can not be considered as democratic. However, access to public information has its own disadvantages, since many users of such information can receive inaccurate information in order to create the public opinion. That is why, users of public information should carefully check the truthfulness and authenticity of such information.

Also, public information has a big advantage, since the police and other institutions of the authority are able to find all the information about offenders. However, the police, and other special institutions of investigation are able to receive public information about all citizens and use it for other purposes.

To conclude, access to public information has its pros and cons, since access to data is open and everybody can take an advantage of it with different purposes.The police and authorities may use it in order to find criminals and offenders, but on the contrary such information may be used to shape the necessary citizen’s opinion.

3. Determine what measures citizens can take to protect private information or information they do not want to be disclosed.

Citizens are providing a personal information on the Internet in various ways, such as voluntarily placing in the public domain, consenting to use when registering for online resources, allowing the browser to remember login and password, phone number.

Sometimes swindlers have resorted to the use of Internet derived from personal information in order to give credibility to their words. Often personal information such as friends, job occupation, phone numbers an d lot so fother things hackers get through social networks. Thus, the main recommendation for fans of online communication, do not provide all personal information in the public domain, make it visible only to your friends. Carefully treat your own login and password. If you use the same user names and passwords for different resources, it facilitates fraudsters the access to your data. In order to increase security do not use one mailbox to registrate on different resources. If the rascal breaks your email, then he can get the password to all the resources, on which you are registered. Pay attention while choosing your mailbox, do not register on unfamiliar mail servers, for your own security use complicated and strong password. It will help you protect your personal data.

It should also be noted that the leading mail servers create additional conditions for the protection of personal data. For example, when one computer opens your mailbox, and you are trying at this time to come to it from another computer, the mail server sends to your mobile phone verification code, without which data access is blocked.

So, each human should be accountable for his personal information. You can protect yourself by following advices:

? use anti-virus software;

? install anti-spyware software;

? install a firewall (a device or program that blocks unauthorized access to your computer);

? periodically update the above programs and install security updates for applications and operating systems;

? beware of links and attachments that come with e-mail or instant messaging, especially if you do not expect or contain a request for personal information or confirmation password;

? sending confidential information such as credit card information, use an encrypted connection and then immediately close the web page ;

? create passwords, which are difficult to guess;

? do not copy and do not install software from unknown sources;

? regularly make a reserve copies of your files and store them securely.

4. Discuss a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public, and whether or not you agree with this law.

There are a lot of federal laws, which protect the privacy of personal information. These laws include: the Electronic Communications Privacy Act, the Telephone Consumer Protection Act of 1991, the Freedom of Information Act, the Computer Security Act of 1987, the Health Insurance Portability and Accountability Act, the Family Education Rights and Privacy Act, the Privacy Protection Act of 1980. Each of these federal acts, protect the human right in privacy for personal information in different scopes. “The Health Insurance Portability and Accountability Act (HIPAA) offers protections for millions of American workers that improve portability and continuity of health insurance coverage” (The Health Insurance Portability And Accountability Act (HIPAA), n.d.). However, according to these laws, personal information can be published only in very special cases. For example, the Health Insurance Portability and Accountability Act, which was signed in 1996 by President Bill Clinton. According to this law, personal information can be used by authority institutions. However, it should be noted that publication of personal data is prohibited in general, but is allowed in some concrete and very unique cases.

5. Determine whether there are “electronic privacy laws” that can prevent others from having access to “private information” as well as how effective they are.

It is a well-known fact thatthere are a lot of potential risks, since some people are able to use your personal data by using the Internet and electronic documents. That is why, governments of many countries have enacted laws, which prohibit the using of electronic documents and personal information in general. One of these laws is the Electronic Communications Privacy Act enacted in 1986. “The Electronic Communications Privacy Act and the Stored Wire Electronic Communications Act are commonly referred together as the Electronic Communications Privacy Act of 1986 (ECPA). The ECPA updated the Federal Wiretap Act of 1968” (Electronic Communications Privacy Act of 1986 (ECPA), n.d.). According to this law, any kind of transference of personal information is prohibited. “The ECPA, as amended, protects wire, oral, and electronic communications while those communications are being made, are in transit, and when they are stored on computers. The Act applies to email, telephone conversations, and data stored electronically” (Electronic Communications Privacy Act of 1986 (ECPA), n.d.).

There is another “electronic privacy law” enacted by the Parliament of Canada. This law is called as The Personal Information Protection and Electronic Documents Act. It has been created in order to protect the personal information and electronic personal documents. “This Act is divided into five parts. Part One outlines the ground rules for managing personal information in the private sector. Parts Two through Five concern the use of electronic documents and signatures as legal alternatives to originalones” (Personal Information Protection and Electronic Documents Act (PIPEDA) - Part 1, n.d.).

To conclude, there are a lot of technologies that allow the access to personal information. These technologies include Cloud Computing, HTTP cookies, and biometric identification. Using each of the mentioned technologies can provide the opportunity to get access to personal data. There are advantages and disadvantages of the access to public information. First of all, all citizens are able to use, read, and save needed for them information provided by authorities, media, etc. Also, access to public information is an important feature of democratic society. However, access to public information has its own disadvantages, since many users of such information can obtain inaccurate information in order to create the neccessary public opinion. Also, there are a lot of possible ways to protect your own personal data such as using different anti-virus software, installing anti-spyware software, creating such passwords, which would be difficult to guess.

References

Electronic Communications Privacy Act of 1986 (ECPA). (n.d.). Justice Information Sharing

U.S. Department of Justice, Office of Justice Programs. Retrieved from

http://www.it.ojp.gov/default.aspx?area=privacy&page=1285

HTTP Cookies (Windows). (n.d.). Dev Center – Desktop. Retrieved from

http://msdn.microsoft.com/en-us/library/windows/desktop/aa384321%28v=vs.85%29.aspx

Personal Information Protection and Electronic Documents Act (PIPEDA) - Part 1. (n.d.).

Treasury Board of Canada Secretariat. Retrieved from

http://www.tbs-sct.gc.ca/pgol-pged/piatp-pfefvp/course1/mod2/mod2-3-eng.asp

PIPEDA (Personal Information Protection and Electronic Documents Act). (n.d.). SurNet

Insurance Group Inc. Retrieved from

http://www.surnet.net/pages/privacy

Schneider, L. What is Cloud Computing? (n.d.). Retrieved from

http://jobsearchtech.about.com/od/historyoftechindustry/a/cloud_computing.htm

The Health Insurance Portability And Accountability Act (HIPAA). (n.d.). United states

Department of Labor. Retrieved from

http://www.dol.gov/ebsa/newsroom/fshipaa.html