ARE SECURITY CAMERAS AN INVASION OF PRIVACY                                                 3 
 
Are Security Cameras an Invasion of Privacy? 
To begin with, each one of us has the right to live and maintain a private life without 
being monitored. It is therefore wrong for anyone under the pretense of maintaining security and 
order to monitor our movements with proper consent from us or the police. However, the 
government and the stakeholders are violating this provision by installing security cameras to 
monitor our movements. To make it even worse they have gone to the extent that they are 
installing these so-called security devices in any spot they can find. These therefore imply that 
we are being monitored without our consent and therefore our right for privacy is being 
interfered with.   
Secondly, it is against the principles of privacy and seclusion to film anyone without their 
prior consent. However, these security firms have stocked every store, shop, and mall to film 
every move people are making without asking them. To make it even worse, several dressing 
rooms and bathrooms have security cameras to capture our movements. This is also against the 
principle of leading private lives. Our right to keep private is also interfered with. In fact, there is 
nothing worse than exposing the privacy of an adult being given that these security cameras 
sometimes catch the films of adults taking showers in their bathrooms (Addington, 2009).  
Lastly, security cameras infringe on our right for privacy since they are used to monitor 
how we conduct our daily routines. In the present economic times, businesses and the 
governments have become crazy to the extent that they are investing, millions of dollars just to 
get a hint on our behavior so that they can derive better profits. For instance, it is common for the 
government and businesses to install security cameras so that they can determine our behavior 
for their own benefits. Businesses for example may use such devices to study our consumer 
behavior so that they can better exploit our patterns (Addington, 2009).