Scholarly activity

1
SCHOLARLY ACTIVITY
Scholarly Activity
Student’s Name
University
2
SCHOLARLY ACTIVITY
Introduction
America as a nation has had historical reverence for citizens' rights such as a right to liberty,
right to privacy and civil right. However, in recent times the federal government, local as well as
state governments have been passing laws to make America safer and safer; as this happens, they
are slowly chewing away citizens' rights they have enjoyed for decades. The digital age has been
introduced where cameras capture every move of a person that would have been deemed a
private life; entering malls, public buildings, walking or driving along roads are obtained by the
government in the name of safety and security. The work below analyses the rights versus safety.
Constitution and Technology
According to Sharp (2013), the USA constitution provides for the rights to privacy of
individuals in a clause of the 14
th
amendment. The amendment inhibits all states from making or
enforcing any law that abridges the privileges or immunities of Americans; there should also be
no law that deprives liberty, life or property without due process of the law. Further, the Supreme
Court interpreted the bill of rights to contain a zone of privacy where the state has no business to
know for example what movie one is watching in his house at home. Another example is Federal
Trade Commission (FTC) that imposes the privacy rights on different privacy statements and
privacy policies. Now, I believe the constitution has slightly deviated from protecting such rights
by providing strict surveillance that is busy watching what I do, where I do it and how.
An Issue that has been in the News
In 2013 Edward Snowden, a government contractor then leaked that National Security
Agency was doing surveillance on Americans phone communications and online. The NSA in
the name of providing security seeks to get data on how individuals communicate behave with
their phones; this in an aim to be able to identify leads to criminal activities on time and take
actions. I believe this is a blatant violation of human rights as it contravenes the “right to be left
alone” as Justice Brandeis described it (Todd 1964).
3
SCHOLARLY ACTIVITY
My View on Rights Invasion
I don't agree with it. Everybody deserves to communicate in private, and no one wants to
realize whatever he says someone else is listening to especially if they relate to personal life
issues such relationships or business deals. A line should be drawn when one's privacy interferes
with the safety of other people. Individuals with criminal records involving privacy deserve to be
put under strict surveillance; this is because they have proved they cannot be trusted when left on
their own; otherwise, the innocent ones should not be punished based on this.
Historical Thought and Tradition
Different thoughts have emerged about NSA infringement of people’s privacy. Pew
Research Center (2016) researched this issue; one key finding was that most American wanted
the spy to conduct on others but not American citizens. On another note, US has had a tradition
where individuals wish to no state interference; they don't like to be bothered but left alone.
These thoughts and tradition are harsh critics of the use of the surveillance. Therefore, rights to
privacy and liberties are left protected.
Consequences of Crossing the Line
Well, crossing the line means risking the security and safety of fellow citizens; this,
therefore, means they deserve the punishment where all their communication calls, messages,
and online activities are monitored. Another consequence could be to deny the offenders right to
communicate through internet or phone since they have proved they don't deserve it by
criminalizing or planning crimes.
Conclusion
Safety of Americans versus privacy is in contention here. Both of the two are proving to
be essential and deserve attention. Therefore, while Americans indeed need their confidentiality
reserved, their security too should not be underrated. What is necessary is now to find how to
incorporate the two; protecting while preserving rights to liberty and so on.
4
SCHOLARLY ACTIVITY
References
Sharp, T. (2013) Rights to privacy: Constitutional Rights and Privacy Laws. Retrieved on 14
April 2018 at https://www.livescience.com/37398-right-to-privacy.html
Pew Research Center. (2016) The state of privacy in post-Snowden America. Retrieved on 14
April 2018 at www.pewresearch.org/fact-tank/2016/09/21/the-state-of-privacy-in-
america
Todd, A. (1964) Justice on Trial: The case of Louis D. Brandeis. New York: McGraw-Hill

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.