Professional Documents
Culture Documents
Privacy denotes the concept that content of our lives and communication should remain
confidential. However, today, we are living in a swiftly changing world powered by technology
as such, the fundamental question is as technology continues to advance what will happen to the
right to privacy in an age of terrorism. Users and business privacy in the 21st century is being
eroded and challenged by technological innovations (Bott, & Renaud, 2018). Conversely, the
basic principle to privacy that users should be able to control their personal data even when
collected by a third party is nearly impossible in our cotemporally world where personal data is
being created, collected, processed, used, analyzed, transferred, shared, stored and copied in
unpredicted ways and at extraordinarily volume and speed. Privacy is a crucial aspect of human
existence; however, the more we share information online and become digitized data privacy
gains importance.
personal data form the increasing numbers of connected devices. Such devices include
smartphones, smart toys, smartwatches, among other devices (Thierer, 2015). The truth of the
modern society, sharing of personal information and technology are indispensable. Access to the
internet as well as the use of new technologies, will continue to be necessary for education,
employment, access to benefits, social connections as well as full participation in civic and
economic life.
this digital world. The privacy laws of most nations are founded on the antiquated notion of
choice (Gasser, 2016). Such laws are do not completely address privacy issues given that
technology is evolving rapidly. Therefore, policymakers must draft laws that address the issue of
PRIVACY AND TECHNOLOGY 3
privacy in a meaningful way. This is essential because for instance, in the year 2018, there were
high profile scandals involving user’s privacy. In 2018 Belgian and Germany courts found
Facebook guilty of the violation of privacy laws. In march 19, 2018 the Cambridge Analytics
scandal ignited debates over user’s security (Tuttle, 2018). The political data analytic firm used
legitimate applications to harvest user’s data from Facebook. Such violations of users’ privacy
The premises of the case United State V. Moalin was about whether the government violated the
defendant rights as stipulated by the fourth amendment by collecting the defendant metadata. The
fourth amendment forbids arbitrary government seizures and searches. According to the court a
warrant founded on probable cause should be required to conduct seizers and search. Previously the
Foreign Intelligence Surveillance Act, 50 U.S.C. § 1861, allowed the government to collect any business
that is relevant to national intelligence based on such authority NSA collected all phone call information
the metadata from the major services providers in the U.S. the defendant in this case Basaaly Moalin
was convicted as he was identified though NSA program. In the case Moalin challenges the
constitutionality and the legality of the NAS metadata program. Regarding the right to privacy in an age
of terrorism the case presents several questions. Fist Did the district court appropriately reject evidence
that Moalin was against al-Shabaab on the grounds that the proffered proof was from 2009 and the
arraignment charged 2007-08 acts? Did the district court appropriately deny Appellants' motion to
permit the recorded testimony of the witness with exculpatory proof? Did the district court permit
unduly biased and unimportant material in enabling the administration to show evidence about the
"Dark Hawk Down" occurrence when it was truly unrelated to any of the charges?
After the 9/11 terrorist attack there has been a substantial change in the U.S regarding online privacy.
Before the attack the U.S citizens online activities were not monitored by independent agencies.
However, the incidence leads the US government to employ law and intelligence enforcement agencies
that conduct online surveillance as well as data collection. The most notorious agency is NSA that collect
citizens online activity data. This agency operates under the legislation of USA Freedom Act which is a
successor of USA Patriot Act. The legislation forbids bulk collection of consumers data by intelligence
agencies with the aim of increasing government transparency regarding Foreign Intelligence Surveillance
Court (FISC) cases. Besides, the Act permits large technology companies such as Facebook to inform
citizens when they have handed data to intelligence agency. EPIC advocates for solid protected
confinements on residential and electronic surveillance. EPIC has a specific enthusiasm for the NSA
Metadata Program, having brought the principal challenge in the Supreme Court, in re EPIC, 134 S. Ct.
638 (2013), and having affirmed before Congress on the need to constrain the extent of the
organization's surveillance exercises. EPIC has likewise as of late presented amicus brief in Smith v.
Obama, No. 14-35555 (ninth Cir.), a case right now pending in this Court, contending that the court
ought not stretch out the third party principle to present day metadata in light of the fact that the
verifiable premises basic Smith v. Maryland never again apply. EPIC routinely takes an interest as amicus
curiae before government and state investigative courts in cases involving privacy and electronic
PRIVACY AND TECHNOLOGY 4
reconnaissance issues. It couldn't be any more obvious, e.g., United States v. Jones, 132 S.Ct. 945 (2012);
Riley v. California, 134 S. Ct. 2473 (2014); Clapper v. Absolution Int'l USA, 133 S.Ct. 1138 (2013);
When it comes to personal information, privacy is vital as it limits government power and
the power of the private corporation. Personal data are essential in our lives as they are used to
make critical decisions and as such, they can affect one’s reputation and can be used to influence
people decision in cases such election or influences consumer behavior. It is imperative to note
that people have much at stake regarding the privacy of their data. Privacy mainly applies to
personally identifiable data. To avoid some of the risks associated to violation of users’ privacy
government and business organization should create awareness because the more people become
enlightened about privacy, the better they will be able to shield from the several risks of the
violation.
PRIVACY AND TECHNOLOGY 5
References
Bott, G. J., & Renaud, K. (2018, June). Are 21st-Century Citizens Grieving for their Loss of
Gasser, U. (2016). Recoding privacy law: reflections on the future relationship among law,
Thierer, A. D. (2015). The internet of things and wearable technology: Addressing privacy and
security concerns without derailing innovation. Adam Thierer, The Internet of Things and
Innovation, 21.
Tuttle, H. (2018). Facebook Scandal Raises Data Privacy Concerns. Risk Management, 65(5), 6-
9.