24.07.2015 Views

STRAYER LEG 500 Assignment 2 The Value of Digital Privacy in an Information Technology Age(Uop)/TutorialRank

LEG 500 Assignment 2 The Value of Digital Privacy in an Information Technology Age Research Websites and other technologies that provide private information on U.S. citizens. Write a 3-4 page paper in which you 1. List and describe at least three (3) technologies that allow an individual to research citizens’ private data. 2. Discuss the advantages and disadvantages of public access to this information, both for the researchers and those who are being “ investigated”. 3. Determine what measures citizens can take to protect private information or information they do not want to be disclosed. 4. Discuss a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public, and whether or not you agree with this law.

LEG 500 Assignment 2 The Value of Digital Privacy in an Information Technology Age

Research Websites and other technologies that provide private information on U.S. citizens.

Write a 3-4 page paper in which you
1. List and describe at least three (3) technologies that allow an individual to research citizens’ private data.
2. Discuss the advantages and disadvantages of public access to this information, both for the researchers and those who are being “ investigated”.
3. Determine what measures citizens can take to protect private information or information they do not want to be disclosed.
4. Discuss a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public, and whether or not you agree with this law.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

5. Determ<strong>in</strong>e whether there are “electronic privacy laws” that c<strong>an</strong><br />

prevent others from hav<strong>in</strong>g access to “private <strong>in</strong>formation” as well as<br />

how effective they are.<br />

<strong>The</strong> specific course learn<strong>in</strong>g outcomes associated with this <strong>LEG</strong> <strong>500</strong><br />

<strong>Assignment</strong> are<br />

• Analyze employee <strong>an</strong>d consumer privacy under the law.<br />

• Use technology <strong>an</strong>d <strong>in</strong>formation resources to research issues <strong>in</strong> law,<br />

ethics, <strong>an</strong>d corporate govern<strong>an</strong>ce.<br />

• Write clearly <strong>an</strong>d concisely about law, ethics, <strong>an</strong>d corporate<br />

govern<strong>an</strong>ce us<strong>in</strong>g proper writ<strong>in</strong>g mech<strong>an</strong>ics.<br />

Grad<strong>in</strong>g for this <strong>LEG</strong> <strong>500</strong> <strong>Assignment</strong> will be based on <strong>an</strong>swer quality,<br />

logic / org<strong>an</strong>ization <strong>of</strong> the paper, <strong>an</strong>d l<strong>an</strong>guage <strong>an</strong>d writ<strong>in</strong>g skills, us<strong>in</strong>g<br />

the follow<strong>in</strong>g rubric.<br />

Po<strong>in</strong>ts 100 <strong>LEG</strong> <strong>500</strong> <strong>Assignment</strong> 2 <strong>The</strong> <strong>Value</strong> <strong>of</strong> <strong>Digital</strong> <strong>Privacy</strong> <strong>in</strong> <strong>an</strong><br />

<strong>Information</strong> <strong>Technology</strong> <strong>Age</strong><br />

Criteria Unacceptable<br />

Below 70% F Fair<br />

70-79% C Pr<strong>of</strong>icient<br />

80-89% B Exemplary<br />

90-100% A<br />

1. List <strong>an</strong>d describe at least three (3) technologies that allow <strong>an</strong><br />

<strong>in</strong>dividual to research citizens’ private data.<br />

Weight 15% Did not submit or <strong>in</strong>completely listed <strong>an</strong>d described at least<br />

three (3) technologies that allow <strong>an</strong> <strong>in</strong>dividual to research citizens’<br />

private data. Partially listed <strong>an</strong>d described at least three (3) technologies<br />

that allow <strong>an</strong> <strong>in</strong>dividual to research citizens’ private data. Satisfactorily<br />

listed <strong>an</strong>d described at least three (3) technologies that allow <strong>an</strong><br />

<strong>in</strong>dividual to research citizens’ private data. Thoroughly listed <strong>an</strong>d<br />

described at least three (3) technologies that allow <strong>an</strong> <strong>in</strong>dividual to<br />

research citizens’ private data.<br />

2. Discuss the adv<strong>an</strong>tages <strong>an</strong>d disadv<strong>an</strong>tages <strong>of</strong> public access to this<br />

<strong>in</strong>formation, both for the researchers <strong>an</strong>d those who are be<strong>in</strong>g<br />

“ <strong>in</strong>vestigated”.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!