⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 computer rights vs first and forth amentment right.txt

📁 黑客培训教程
💻 TXT
📖 第 1 页 / 共 3 页
字号:
found that her newly rented apartment was infested with cockroaches.When she gave her landlord a thirty day notice, he countered with aneviction notice.  When the landlord didn't show up in court, the judgethrew the case out.  But Ward was entered in the U.D. Registry as havingan eviction notice, and when she wanted to rent an apartment later shewas unable to (Burnham, pp. 34-35).        In both cases, errors caused a major personal difficulty andbreach of privacy.  Also, in both cases the victim did not know of theU.D. Registry's existence.  Therefore, neither could possibly confrontthe unfavorable, electronically-stored data, analogous to a "falsewitness," that led to their blacklisting.        Perhaps the grandest scale of gathering information about peopleby a non-governmental agency was undertaken by the Lotus DevelopmentCorp. in conjunction with Equifax Inc.  Lotus and Equifax developed"Marketplace: Households," a database of the names, addresses, andmarketing information on 120 million residents of the United States(Fisher, p. C3).  The purchaser of this information would probably belarge consumer goods companies specializing in mail order.  Databaseslike this are currently used by organizations to send unsolicited (junk)mail to potential buyers. Imagine the volume of junk mail if the entirebusiness world had the names and addresses of almost half of thecountry's population on-line!        Fortunately, on January 23, 1991, Lotus and Equifax announcedthat they had cancelled plans to release "Marketplace: Households" dueto  30,000 letter and phone calls from individuals who wanted theirfiles deleted from the product.  Apparently, the companies decided thatthe privacy issues involved would make the product unviable.  (Fisher,p.  C3.) Ironically, a similar product, "Marketplace: Business", whichcontained database  information on seven million U.S. businesses, wasdiscontinued the same day.  "Marketplace: Business" has been shippingsince October 1990, but was not profitable without the revenues from"Marketplace: Households" (Fisher, p. C3).        A similar example of the same type of database belongs to thePhone Disc USA Corporation.  This small, Massachusetts based companyhas manually copied the names, addresses and numbers of 90 millionpeople out of the white pages of telephone books from across the nation.They put this information on CD-ROM storage devices, and sell it tomass-marketers.  In a recent ruling, the Supreme Court decided that itis legal to copy white pages listings because they are not copyrighted.For the next version of the product, co-founder James Bryant plans tocopy every name from over 4000 sets of regional whites pages.(Kleinfield) Unlike the Lotus/Equifax undertaking, Phone Disc USA showsno signs of halting their product.        How many of these computer databases and networks exist that theaverage American doesn't know about?  Just about every government orprivate agency that interacts with the public has its own computerizedindex of names, addresses, social security numbers, etc.  Every time youopen a bank account, apply for a credit card, attend a learninginstitution, register at a hotel, get medical aid, or obtain a loan, anew file is opened for you, without your explicit knowledge!  And theseare the easy ones to track; there are many databases you get intowithout anyone telling you. In fact, these "secret" records, not unlikethe U.D. Registry's, are more effective if the "victims" don't knowabout them.        Now that we are aware of the problem, we can ask the question,"What do we do?"  First we must clarify one point - does the mereexistence of these databases and computerized records intrude upon theindividual's privacy, or does the use of them constitute privacyinvasion? The best way to do this is to find out if similar privacyviolations occurred before the advent of computerized files.        The Census Bureau's charter contains the provision, "in no caseshall information furnished under the authority of this act be used tothe detriment of the person or persons to which this informationrelates."  But, during World War I, the Justice Department was lookingfor the names and addresses of young men who were trying to evade thedraft so they could track these dissenters down and prosecute them.Under pressure from the military, the Census Bureau disclosed thisinformation (Burnham, pg. 24).  Computers did were not used to recordinformation until the mid-forties.  One of the first organizations touse primitive databases (stacks and stacks of punch cards) for thepurpose of information gathering on a large number of people was theCensus Bureau.        The violation of privacy did take place before computerizeddatabases.  The largest differences between a stack of papers and acomputer file are that the computer file is easier to use, faster tofind, able to be disseminated and/or transmitted quickly.  An example ofhow efficient computer files are at finding people is the case of theCalifornia Locator Service.  This database is used to track parents whorefuse to pay child support.  The names of the wayward parents are filedin the database.  The database is compared to that of the Franchise TaxBoard. In the case of a match, the parent's tax refund is interceptedand sent to the parent with custody (Burnham, pp. 30-33).  The LocatorService also has direct links to the Department of Motor Vehicles, theEmployment Development Board, criminal databases, and several othercomputer networks to help locate the delinquent parent.  According tomanager Richard Beall, the service is able to provide at least some sortof information 62% of the time (Burnham, pp. 30-33).  Imagine thedifference if the California Locator Service were run by pen, pencil, ortypewriter instead.  The proper information on the wayward parent wouldhave to be sent to all the associate agencies, processed, and answersgiven.  The time to do this would be prohibitive enough to make theservice slow and negligibly effective.  The computer facilitates thissort of information sharing and retrieval.        We conclude that computers aren't the inherent evil, but theyhelp the government and other organizations to procreate the evil ofprivacy infringement more easily than if computer databases weren'tused.  So we can't necessarily eliminate the problem by eliminating thedatabases. Often the computer database used for the questionableactivity is one that exists for a different purpose.  Cases of this arethe Census Bureau's information, and the NCIC.  Both of these databasesexist to serve beneficial purposes - population surveys and lawenforcement, respectively.  Eliminating all computer databasescontaining personal information would to too radical a step. Our societywould grind to a standstill as bank records, medical files, legalreports, etc. (the list goes on indefinitely) would have to be handcopied and disseminated.        Think of the examples of given at the beginning of this sectionof a library and a bank.  We saw how these organizations used databasesto improve their service to the public.  These same databases can beused to invade the privacy of the public.  For example if librarydatabases are available to the public, they can be used to list thebooks or type of books that an individual reads.  A magazine or bookclub might find library databases useful in deciding who to sendunsolicited subscription or membership information to.  Bank records canbe used similarly to determine the financial status of an individual.        What is comes down to is that any database containing personalinformation that is used for any other purpose than the one it existsfor is a potential violation of privacy.  As a case in point, undercurrent law, our video rental histories have more protection than ourmedical or insurance records. Under a 1988 law, video rental records mayonly be released under court order. That law, often referred to as the"Bork bill," was inacted after video rental information about a SupremeCourt nominee was made public in the press (Consumer Reports).  Must wewait for similar abuses related to the medical, library, or bank recordsof persons in the public eye to similarly secure the privacy of theserecords?        Is there a solution?  Is there a middle ground where we can havethe databases, but control how they are used?  In the January 1988 issueof Omni magazine, experts from various legal and scientific fields wereasked to comment upon the Terry Dean Rogan case (see above).  Someresponses were: (Science Court Opinions, p.  100).Sheldon L. Glashow, Nobel laureate and professor of physics at HarvardUniversity: "A centralized computerized crime file is absolutelynecessary for crime control, but it does jeopardize the rights ofcitizens...Under no circumstance but one should the NCIC files be madeavailable for non-crime related purposes: The exception is the right ofeach citizen to examine his or her own file."Melvin Konner, M.D.,  professor of anthropology at Emory University:"Centralized data banks pose a new, probably serious threat toprivacy, yet such data banks are too valuable to be forsworn....challenges should result in the emergence of a system of checkand balances that will prevent the abuse of data."John Money, professor emeritus of medical psychology and pediatrics atJohns Hopkins University and Hospital: "...it becomes imperativeto have strictly enforced safeguards on the usage of such[computerized] lists.  One such safeguard would be a legallyguaranteed principle of freedom of information, so that anindividual could access his or her name on the list and correctinformation falsely entered against it."George B. Schaller, director of science for Wildlife ConservationInternational: "...as a potential victim, I am pleased that the filemight help insure my privacy - that is my property and person.The file should, however, be accessible for criminal matters only,or it will be misused."        Furthermore, an interesting precedent may be set for privacyrights in the United States by the new European Community. The EuropeanCommunity is proposing a set of laws that would strictly limit howdatabase information is used and who has access to it.  Basically, thelaws would instruct owners of databases to notify individuals of theirinclusion, and these individuals would be able to obtain copies of thedatabase information on them.  Also, owners of databases would not beallowed to sell the personal information of an individual without thepermission of that individual.  "The proposals would prohibit...apublisher from selling a list of subscribers to a real estate developer- unless the subscribers agreed to be included.  Banks would be requiredto notify credit card holders before selling their names to mail-orderhouses." (Markoff, p. D1). Interestingly enough, these proposedregulations have the U.S. based companies complaining the loudest.  IBM,GTE, and AT&T claim that the proposed laws would strictly limit theirbusiness abroad (Markoff, p. D1).        Privacy experts maintain that the companies are overreacting.Some of the restriction that are under consideration include: (Markoff,p. D1).        --Companies must register all databases containing personal          information with the countries...in which they are          operating...        --Corporations using personal data must tell the subjects of          their use...        --Private companies can only collect or process personal data          with the consent of the subjects.         --Companies would not be able to transfer data to another           country unless that country also offered adequate protection           of records.        Taking these experts' opinions and the precedents underconsideration by the European Community, we have a basis for legislationconcerning computer databases and the privacy of individuals.  Thefollowing guidelines are suggested:        1) All individuals who have personal information stored in a           computer database must be informed of this fact. They also           must be given a chance to review their file(s) and to           petition for changes if they find that the information held           within is incorrect.        2) When a person is arrested and/or brought to trial because of           the information in one of these databases, attention must be           given to the question of the file's accuracy and           completeness.        3) Files that exist for purposes of law enforcement (e.g., the           NCIC) should not be used for anything other than law           enforcement.  A system of checks and balances should be           maintained to guarantee this.       4) Files that exist for marketing or statistical purposes should          inform all individuals who are included in the database of          their inclusion, and give them an opportunity to request that          their file be deleted.        The constitution was written as anticipatory democracy, but itsframers did not (and could not) anticipate the advent nor the power ofthe computer.  Although the ideals of individual privacy have notchanged over the last 200 years, the reality has.  In the next sectionother outdated legal concepts that are in danger of violating the Firstand Fourth Amendment rights of every citizen are exposed.III: The Printed Word vs. The Electronic Word            "The right of the people to be secure in their persons,        houses, papers, and effects, against unreasonable searches        and seizures, shall not be violated and no warrants shall        issue but upon probable cause, supported by oath or        affirmation, and particularly describing the place to be        searched, and the persons or things to be seized."                - The Fourth Amendment to the Constitution of the                  United States        On March 1st, 1990, Secret Service agents raided the offices ofSteve Jackson Games, a small role-playing game company.  The agentsseized three computers, including one being used to run a bulletinboard, all company software in the proximity of these computers, and allbusiness records contained in the computers' storage.        Why would the government want to virtually shut down a gamecompany? Because Steve Jackson Games was just weeks away frompublishing a science-fiction role-playing game called Gurps Cyberpunk.The game is set in a high-tech future society where the players usehuman/computer interfaces to "enter" computer networks and infiltrate(or hack) through defenses to valuable data.  Playing the game does notrequire the use of (or even the knowledge of how to use) a computer.  ASecret Service agent told Steve Jackson that the Gurps Cyberpunk playingmanual was a "handbook on computer crime." (Barlow).        As a result of losing their computing capabilities and data,Steve Jackson Games temporarily shut down and had to lay off half of itsemployees.  For three months, the Secret Service retained the equipmentand data even though they had no evidence that the game or any otherSteve Jackson game violated any law.  When some of the equipment wasfinally returned in June, 1990, the Service kept the drafts of GurpsCyberpunk.  The rest of the equipment was "lost." (Barlow).        According to the Fourth Amendment, the Secret Service agentsneeded "probable cause" that criminal evidence will be at the scene ofthe search to get a search warrant issued.  The Fourth Amendment alsospecifies that the search should be as narrow as possible (in other

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -