24.07.2015 Views

STRAYER LEG 500 Assignment 2 The Value of Digital Privacy in an Information Technology Age(Uop)/TutorialRank

LEG 500 Assignment 2 The Value of Digital Privacy in an Information Technology Age Research Websites and other technologies that provide private information on U.S. citizens. Write a 3-4 page paper in which you 1. List and describe at least three (3) technologies that allow an individual to research citizens’ private data. 2. Discuss the advantages and disadvantages of public access to this information, both for the researchers and those who are being “ investigated”. 3. Determine what measures citizens can take to protect private information or information they do not want to be disclosed. 4. Discuss a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public, and whether or not you agree with this law.

LEG 500 Assignment 2 The Value of Digital Privacy in an Information Technology Age

Research Websites and other technologies that provide private information on U.S. citizens.

Write a 3-4 page paper in which you
1. List and describe at least three (3) technologies that allow an individual to research citizens’ private data.
2. Discuss the advantages and disadvantages of public access to this information, both for the researchers and those who are being “ investigated”.
3. Determine what measures citizens can take to protect private information or information they do not want to be disclosed.
4. Discuss a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public, and whether or not you agree with this law.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

to make private <strong>in</strong>formation on U.S. citizens available to the public <strong>an</strong>d<br />

whether or not you agree with this law.<br />

5. Determ<strong>in</strong>e whether there are “electronic privacy laws” that c<strong>an</strong><br />

prevent others from hav<strong>in</strong>g access to “private <strong>in</strong>formation” as well as<br />

how effective they are.<br />

Weight 15% Did not submit or <strong>in</strong>completely determ<strong>in</strong>ed whether there<br />

are “electronic privacy laws” that c<strong>an</strong> prevent others from hav<strong>in</strong>g access<br />

to “ private <strong>in</strong>formation” as well as how effective they are. Partially<br />

determ<strong>in</strong>ed whether there are “electronic privacy laws” that c<strong>an</strong> prevent<br />

others from hav<strong>in</strong>g access to “private <strong>in</strong>formation” as well as how<br />

effective they are. Satisfactorily determ<strong>in</strong>ed whether there are<br />

“electronic privacy laws” that c<strong>an</strong> prevent others from hav<strong>in</strong>g access to<br />

“private <strong>in</strong>formation” as well as how effective they are. Thoroughly<br />

determ<strong>in</strong>ed whether there are “electronic privacy laws” that c<strong>an</strong> prevent<br />

others from hav<strong>in</strong>g access to “private <strong>in</strong>formation” as well as how<br />

effective they are.<br />

6. Clarity, writ<strong>in</strong>g mech<strong>an</strong>ics, <strong>an</strong>d formatt<strong>in</strong>g requirements<br />

Weight 10%

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!