SlideShare a Scribd company logo
1 of 8
LEG 500 Assignment 2 The Value of Digital
Privacy in an Information Technology Age
TO Buy the Tutorial Visit Our Website
www.leg500.com
Tutorial Purchased: 2 Times, Rating: A
Research Websites and other technologies that
provide private information on U.S. citizens.
Write a 3-4 page paper in which you
1.List and describe at least three (3) technologies
that allow an individual to research citizens’
private data.
2.Discuss the advantages and disadvantages of
public access to this information, both for the
researchers and those who are being “
investigated”.
3.Determine what measures citizens can take to
protect private information or information they
do not want to be disclosed.
4.Discuss a federal law that grants the federal
government the legal right to make private
information on U.S. citizens available to the
public, and whether or not you agree with this
law.
5.Determine whether there are “electronic privacy
laws” that can prevent others from having access
to “private information” as well as how effective
they are.
The specific course learning outcomes associated
with this LEG 500 Assignment are
Analyze employee and consumer privacy under
the law.
Use technology and information resources to
research issues in law, ethics, and corporate
governance.
Write clearly and concisely about law, ethics,
and corporate governance using proper writing
mechanics.
Grading for this LEG 500 Assignment will be based
on answer quality, logic / organization of the paper,
and language and writing skills, using the following
rubric.
Points
100
LEG 500
Assignme
nt 2 The
Value of
Digital
Privacy in
an
Informati
on
Technolo
gy Age
Criteria
Unaccept
able
Below
70% F
Fair
70-79%
C
Proficien
t
80-89%
B
Exempla
ry
90-100%
A
1. List
and
describe
at least
three (3)
technolog
ies that
allow an
individua
l to
research
citizens’
private
data.
Weight
15%
Did not
submit or
incomplet
ely listed
and
described
at least
three (3)
technologi
es that
allow an
individual
to research
citizens’
private
data.
Partially
listed and
described
at least
three (3)
technolog
ies that
allow an
individual
to
research
citizens’
private
data.
Satisfacto
rily listed
and
described
at least
three (3)
technolog
ies that
allow an
individual
to
research
citizens’
private
data.
Thorough
ly listed
and
described
at least
three (3)
technolog
ies that
allow an
individual
to
research
citizens’
private
data.
2.
Discuss
the
advantag
Did not
submit or
incomplet
ely
Partially
discussed
the
advantage
Satisfacto
rily
discussed
the
Thorough
ly
discussed
the
es and
disadvant
ages of
public
access to
this
informati
on, both
for the
researche
rs and
those
who are
being “
investigat
ed”.
Weight
20%
discussed
the
advantage
s and
disadvanta
ges of
public
access to
this
informatio
n, both for
the
researcher
s and
those who
are being
“investigat
ed”.
s and
disadvant
ages of
public
access to
this
informati
on, both
for the
researche
rs and
those
who are
being “
investigat
ed”.
advantage
s and
disadvant
ages of
public
access to
this
informati
on, both
for the
researcher
s and
those who
are being
“
investigat
ed”.
advantage
s and
disadvant
ages of
public
access to
this
informati
on, both
for the
researche
rs and
those who
are being
“
investigat
ed”.
3.
Determin
e what
measures
citizens
can take
Did not
submit or
incomplet
ely
determine
d what
Partially
determine
d what
measures
citizens
can take
Satisfacto
rily
determine
d what
measures
citizens
Thorough
ly
determine
d what
measures
citizens
to protect
private
informati
on or
informati
on they
do not
want to
be
disclosed.
Weight
15%
measures
citizens
can take to
protect
private
informatio
n or
informatio
n they do
not want
to be
disclosed.
to protect
private
informati
on or
informati
on they
do not
want to
be
disclosed.
can take
to protect
private
informati
on or
informati
on they
do not
want to
be
disclosed.
can take
to protect
private
informati
on or
informati
on they
do not
want to
be
disclosed.
4.
Discuss a
federal
law that
grants the
federal
governme
nt the
legal
right to
make
private
Did not
submit or
incomplet
ely
discussed
a federal
law that
grants the
federal
governme
nt the
legal right
Partially
discussed
a federal
law that
grants the
federal
governme
nt the
legal
right to
make
private
Satisfacto
rily
discussed
a federal
law that
grants the
federal
governme
nt the
legal right
to make
private
Thorough
ly
discussed
a federal
law that
grants the
federal
governme
nt the
legal right
to make
private
informati
on on
U.S.
citizens
available
to the
public
and
whether
or not
you agree
with this
law.
Weight
15%
to make
private
informatio
n on U.S.
citizens
available
to the
public and
whether or
not you
agree with
this law.
informati
on on
U.S.
citizens
available
to the
public
and
whether
or not
you agree
with this
law.
informati
on on
U.S.
citizens
available
to the
public
and
whether
or not
you agree
with this
law.
informati
on on
U.S.
citizens
available
to the
public
and
whether
or not
you agree
with this
law.
5.
Determin
e whether
there are
“electroni
c privacy
laws” that
can
prevent
Did not
submit or
incomplet
ely
determine
d whether
there are
“electronic
privacy
Partially
determine
d whether
there are
“electroni
c privacy
laws” that
can
prevent
Satisfacto
rily
determine
d whether
there are
“electroni
c privacy
laws” that
can
Thorough
ly
determine
d whether
there are
“electroni
c privacy
laws” that
can
others
from
having
access to
“private
informati
on” as
well as
how
effective
they are.
Weight
15%
laws” that
can
prevent
others
from
having
access to “
private
informatio
n” as well
as how
effective
they are.
others
from
having
access to
“private
informati
on” as
well as
how
effective
they are.
prevent
others
from
having
access to
“private
informati
on” as
well as
how
effective
they are.
prevent
others
from
having
access to
“private
informati
on” as
well as
how
effective
they are.
6. Clarity,
writing
mechanic
s, and
formattin
g
requirem
ents
Weight
10%

More Related Content

Viewers also liked

Raport upgrade yourself
Raport upgrade yourselfRaport upgrade yourself
Raport upgrade yourselfBogdan Negru
 
Microscope LCD screen
 Microscope LCD screen  Microscope LCD screen
Microscope LCD screen Motic
 
Leg 500 assignment 4 products liability research paper
Leg 500 assignment 4 products liability research paperLeg 500 assignment 4 products liability research paper
Leg 500 assignment 4 products liability research papermunnaslid2
 
Article upgrade yourself or stay unemployed
Article   upgrade yourself or stay unemployedArticle   upgrade yourself or stay unemployed
Article upgrade yourself or stay unemployedBogdan Negru
 
Leg 500 assignment 1 employment
Leg 500 assignment 1 employmentLeg 500 assignment 1 employment
Leg 500 assignment 1 employmentmunnaslid2
 
Beacon cosign overview-25022016
Beacon cosign overview-25022016Beacon cosign overview-25022016
Beacon cosign overview-25022016Yaniv Ben-Itzhak
 
Leg 500 assignment 3 employment
Leg 500 assignment 3 employmentLeg 500 assignment 3 employment
Leg 500 assignment 3 employmentmunnaslid2
 
Проект "Патриот" (стратегия развития РФ до 2025 года)
Проект "Патриот" (стратегия развития РФ до 2025 года)Проект "Патриот" (стратегия развития РФ до 2025 года)
Проект "Патриот" (стратегия развития РФ до 2025 года)Sergey Grim
 
Do you know this car brand?
Do you know this car brand?Do you know this car brand?
Do you know this car brand?Sergey Grim
 
Госдолг США и Росси
Госдолг США и РоссиГосдолг США и Росси
Госдолг США и РоссиSergey Grim
 
Миф о заправке принтеров марки Kyocera
Миф о заправке принтеров марки KyoceraМиф о заправке принтеров марки Kyocera
Миф о заправке принтеров марки Kyoceraoleg_q2
 
Are you aware of the manifest and latent
Are you aware of the manifest and latentAre you aware of the manifest and latent
Are you aware of the manifest and latentfranciscadallo
 
Understanding Digital Marketing
Understanding Digital MarketingUnderstanding Digital Marketing
Understanding Digital Marketingprabakarankandan
 
Рынок online кинотеатров
Рынок online кинотеатров Рынок online кинотеатров
Рынок online кинотеатров Sergey Grim
 
Why we need to save medicare english
Why we need to save medicare englishWhy we need to save medicare english
Why we need to save medicare englishboscokool
 
Ida m Cannon
Ida m CannonIda m Cannon
Ida m Cannonboscokool
 

Viewers also liked (16)

Raport upgrade yourself
Raport upgrade yourselfRaport upgrade yourself
Raport upgrade yourself
 
Microscope LCD screen
 Microscope LCD screen  Microscope LCD screen
Microscope LCD screen
 
Leg 500 assignment 4 products liability research paper
Leg 500 assignment 4 products liability research paperLeg 500 assignment 4 products liability research paper
Leg 500 assignment 4 products liability research paper
 
Article upgrade yourself or stay unemployed
Article   upgrade yourself or stay unemployedArticle   upgrade yourself or stay unemployed
Article upgrade yourself or stay unemployed
 
Leg 500 assignment 1 employment
Leg 500 assignment 1 employmentLeg 500 assignment 1 employment
Leg 500 assignment 1 employment
 
Beacon cosign overview-25022016
Beacon cosign overview-25022016Beacon cosign overview-25022016
Beacon cosign overview-25022016
 
Leg 500 assignment 3 employment
Leg 500 assignment 3 employmentLeg 500 assignment 3 employment
Leg 500 assignment 3 employment
 
Проект "Патриот" (стратегия развития РФ до 2025 года)
Проект "Патриот" (стратегия развития РФ до 2025 года)Проект "Патриот" (стратегия развития РФ до 2025 года)
Проект "Патриот" (стратегия развития РФ до 2025 года)
 
Do you know this car brand?
Do you know this car brand?Do you know this car brand?
Do you know this car brand?
 
Госдолг США и Росси
Госдолг США и РоссиГосдолг США и Росси
Госдолг США и Росси
 
Миф о заправке принтеров марки Kyocera
Миф о заправке принтеров марки KyoceraМиф о заправке принтеров марки Kyocera
Миф о заправке принтеров марки Kyocera
 
Are you aware of the manifest and latent
Are you aware of the manifest and latentAre you aware of the manifest and latent
Are you aware of the manifest and latent
 
Understanding Digital Marketing
Understanding Digital MarketingUnderstanding Digital Marketing
Understanding Digital Marketing
 
Рынок online кинотеатров
Рынок online кинотеатров Рынок online кинотеатров
Рынок online кинотеатров
 
Why we need to save medicare english
Why we need to save medicare englishWhy we need to save medicare english
Why we need to save medicare english
 
Ida m Cannon
Ida m CannonIda m Cannon
Ida m Cannon
 

Similar to Leg 500 assignment 2 the value of digital privacy in an information technology age

The Value of Digital Privacy in an Information Technology AgeRes.docx
The Value of Digital Privacy in an Information Technology AgeRes.docxThe Value of Digital Privacy in an Information Technology AgeRes.docx
The Value of Digital Privacy in an Information Technology AgeRes.docxpelise1
 
1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docxteresehearn
 
1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docxaulasnilda
 
Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...https://writeessayuk.com/
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Zohaib Arshid
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Designgloriakt
 
Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerCharleston Conference
 
Young Adults And On Line Privacy
Young Adults And On Line PrivacyYoung Adults And On Line Privacy
Young Adults And On Line PrivacyRecrue
 
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxWeek 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxphilipnelson29183
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxtoltonkendal
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)ProductNation/iSPIRT
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)inventionjournals
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPMicah Altman
 
1)  Your Research Project on the surveillance state consists of .docx
1)  Your Research Project on the surveillance state consists of .docx1)  Your Research Project on the surveillance state consists of .docx
1)  Your Research Project on the surveillance state consists of .docxcroftsshanon
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
Research proposal
Research proposalResearch proposal
Research proposalSaba Afaq
 

Similar to Leg 500 assignment 2 the value of digital privacy in an information technology age (20)

The Value of Digital Privacy in an Information Technology AgeRes.docx
The Value of Digital Privacy in an Information Technology AgeRes.docxThe Value of Digital Privacy in an Information Technology AgeRes.docx
The Value of Digital Privacy in an Information Technology AgeRes.docx
 
1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx
 
1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx
 
Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 
Institution bulletin volume 3 issue 3
Institution bulletin volume 3 issue 3Institution bulletin volume 3 issue 3
Institution bulletin volume 3 issue 3
 
Young Adults And On Line Privacy
Young Adults And On Line PrivacyYoung Adults And On Line Privacy
Young Adults And On Line Privacy
 
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxWeek 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
 
1)  Your Research Project on the surveillance state consists of .docx
1)  Your Research Project on the surveillance state consists of .docx1)  Your Research Project on the surveillance state consists of .docx
1)  Your Research Project on the surveillance state consists of .docx
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Research proposal
Research proposalResearch proposal
Research proposal
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 

Recently uploaded (20)

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 

Leg 500 assignment 2 the value of digital privacy in an information technology age

  • 1. LEG 500 Assignment 2 The Value of Digital Privacy in an Information Technology Age TO Buy the Tutorial Visit Our Website www.leg500.com Tutorial Purchased: 2 Times, Rating: A Research Websites and other technologies that provide private information on U.S. citizens. Write a 3-4 page paper in which you 1.List and describe at least three (3) technologies that allow an individual to research citizens’ private data. 2.Discuss the advantages and disadvantages of public access to this information, both for the
  • 2. researchers and those who are being “ investigated”. 3.Determine what measures citizens can take to protect private information or information they do not want to be disclosed. 4.Discuss a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public, and whether or not you agree with this law. 5.Determine whether there are “electronic privacy laws” that can prevent others from having access to “private information” as well as how effective they are. The specific course learning outcomes associated with this LEG 500 Assignment are Analyze employee and consumer privacy under the law.
  • 3. Use technology and information resources to research issues in law, ethics, and corporate governance. Write clearly and concisely about law, ethics, and corporate governance using proper writing mechanics. Grading for this LEG 500 Assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points 100 LEG 500 Assignme nt 2 The Value of Digital Privacy in an Informati on Technolo gy Age
  • 4. Criteria Unaccept able Below 70% F Fair 70-79% C Proficien t 80-89% B Exempla ry 90-100% A 1. List and describe at least three (3) technolog ies that allow an individua l to research citizens’ private data. Weight 15% Did not submit or incomplet ely listed and described at least three (3) technologi es that allow an individual to research citizens’ private data. Partially listed and described at least three (3) technolog ies that allow an individual to research citizens’ private data. Satisfacto rily listed and described at least three (3) technolog ies that allow an individual to research citizens’ private data. Thorough ly listed and described at least three (3) technolog ies that allow an individual to research citizens’ private data. 2. Discuss the advantag Did not submit or incomplet ely Partially discussed the advantage Satisfacto rily discussed the Thorough ly discussed the
  • 5. es and disadvant ages of public access to this informati on, both for the researche rs and those who are being “ investigat ed”. Weight 20% discussed the advantage s and disadvanta ges of public access to this informatio n, both for the researcher s and those who are being “investigat ed”. s and disadvant ages of public access to this informati on, both for the researche rs and those who are being “ investigat ed”. advantage s and disadvant ages of public access to this informati on, both for the researcher s and those who are being “ investigat ed”. advantage s and disadvant ages of public access to this informati on, both for the researche rs and those who are being “ investigat ed”. 3. Determin e what measures citizens can take Did not submit or incomplet ely determine d what Partially determine d what measures citizens can take Satisfacto rily determine d what measures citizens Thorough ly determine d what measures citizens
  • 6. to protect private informati on or informati on they do not want to be disclosed. Weight 15% measures citizens can take to protect private informatio n or informatio n they do not want to be disclosed. to protect private informati on or informati on they do not want to be disclosed. can take to protect private informati on or informati on they do not want to be disclosed. can take to protect private informati on or informati on they do not want to be disclosed. 4. Discuss a federal law that grants the federal governme nt the legal right to make private Did not submit or incomplet ely discussed a federal law that grants the federal governme nt the legal right Partially discussed a federal law that grants the federal governme nt the legal right to make private Satisfacto rily discussed a federal law that grants the federal governme nt the legal right to make private Thorough ly discussed a federal law that grants the federal governme nt the legal right to make private
  • 7. informati on on U.S. citizens available to the public and whether or not you agree with this law. Weight 15% to make private informatio n on U.S. citizens available to the public and whether or not you agree with this law. informati on on U.S. citizens available to the public and whether or not you agree with this law. informati on on U.S. citizens available to the public and whether or not you agree with this law. informati on on U.S. citizens available to the public and whether or not you agree with this law. 5. Determin e whether there are “electroni c privacy laws” that can prevent Did not submit or incomplet ely determine d whether there are “electronic privacy Partially determine d whether there are “electroni c privacy laws” that can prevent Satisfacto rily determine d whether there are “electroni c privacy laws” that can Thorough ly determine d whether there are “electroni c privacy laws” that can
  • 8. others from having access to “private informati on” as well as how effective they are. Weight 15% laws” that can prevent others from having access to “ private informatio n” as well as how effective they are. others from having access to “private informati on” as well as how effective they are. prevent others from having access to “private informati on” as well as how effective they are. prevent others from having access to “private informati on” as well as how effective they are. 6. Clarity, writing mechanic s, and formattin g requirem ents Weight 10%