SlideShare a Scribd company logo
1 of 8
LEG 500 Assignment 2 The Value of Digital
Privacy in an Information Technology Age
TO Buy the Tutorial Visit Our Website
Research Websites and other technologies that
provide private information on U.S. citizens.
Write a 3-4 page paper in which you
1.List and describe at least three (3) technologies
that allow an individual to research citizens’
private data.
2.Discuss the advantages and disadvantages of
public access to this information, both for the
researchers and those who are being “
investigated”.
3.Determine what measures citizens can take to
protect private information or information they
do not want to be disclosed.
4.Discuss a federal law that grants the federal
government the legal right to make private
information on U.S. citizens available to the
public, and whether or not you agree with this
law.
5.Determine whether there are “electronic privacy
laws” that can prevent others from having access
to “private information” as well as how effective
they are.
The specific course learning outcomes associated
with this LEG 500 Assignment are
Analyze employee and consumer privacy under
the law.
Use technology and information resources to
research issues in law, ethics, and corporate
governance.
Write clearly and concisely about law, ethics,
and corporate governance using proper writing
mechanics.
Grading for this LEG 500 Assignment will be based
on answer quality, logic / organization of the paper,
and language and writing skills, using the following
rubric.
Points
100
LEG 500
Assignme
nt 2 The
Value of
Digital
Privacy in
an
Informati
on
Technolo
gy Age
Criteria
Unaccept
able
Below
70% F
Fair
70-79%
C
Proficien
t
80-89%
B
Exempla
ry
90-100%
A
1. List
and
describe
at least
three (3)
technolog
ies that
allow an
individua
l to
research
citizens’
private
data.
Weight
15%
Did not
submit or
incomplet
ely listed
and
described
at least
three (3)
technologi
es that
allow an
individual
to research
citizens’
private
data.
Partially
listed and
described
at least
three (3)
technolog
ies that
allow an
individual
to
research
citizens’
private
data.
Satisfacto
rily listed
and
described
at least
three (3)
technolog
ies that
allow an
individual
to
research
citizens’
private
data.
Thorough
ly listed
and
described
at least
three (3)
technolog
ies that
allow an
individual
to
research
citizens’
private
data.
2.
Discuss
the
advantag
Did not
submit or
incomplet
ely
Partially
discussed
the
advantage
Satisfacto
rily
discussed
the
Thorough
ly
discussed
the
es and
disadvant
ages of
public
access to
this
informati
on, both
for the
researche
rs and
those
who are
being “
investigat
ed”.
Weight
20%
discussed
the
advantage
s and
disadvanta
ges of
public
access to
this
informatio
n, both for
the
researcher
s and
those who
are being
“investigat
ed”.
s and
disadvant
ages of
public
access to
this
informati
on, both
for the
researche
rs and
those
who are
being “
investigat
ed”.
advantage
s and
disadvant
ages of
public
access to
this
informati
on, both
for the
researcher
s and
those who
are being
“
investigat
ed”.
advantage
s and
disadvant
ages of
public
access to
this
informati
on, both
for the
researche
rs and
those who
are being
“
investigat
ed”.
3.
Determin
e what
measures
citizens
can take
Did not
submit or
incomplet
ely
determine
d what
Partially
determine
d what
measures
citizens
can take
Satisfacto
rily
determine
d what
measures
citizens
Thorough
ly
determine
d what
measures
citizens
to protect
private
informati
on or
informati
on they
do not
want to
be
disclosed.
Weight
15%
measures
citizens
can take to
protect
private
informatio
n or
informatio
n they do
not want
to be
disclosed.
to protect
private
informati
on or
informati
on they
do not
want to
be
disclosed.
can take
to protect
private
informati
on or
informati
on they
do not
want to
be
disclosed.
can take
to protect
private
informati
on or
informati
on they
do not
want to
be
disclosed.
4.
Discuss a
federal
law that
grants the
federal
governme
nt the
legal
right to
make
private
Did not
submit or
incomplet
ely
discussed
a federal
law that
grants the
federal
governme
nt the
legal right
Partially
discussed
a federal
law that
grants the
federal
governme
nt the
legal
right to
make
private
Satisfacto
rily
discussed
a federal
law that
grants the
federal
governme
nt the
legal right
to make
private
Thorough
ly
discussed
a federal
law that
grants the
federal
governme
nt the
legal right
to make
private
informati
on on
U.S.
citizens
available
to the
public
and
whether
or not
you agree
with this
law.
Weight
15%
to make
private
informatio
n on U.S.
citizens
available
to the
public and
whether or
not you
agree with
this law.
informati
on on
U.S.
citizens
available
to the
public
and
whether
or not
you agree
with this
law.
informati
on on
U.S.
citizens
available
to the
public
and
whether
or not
you agree
with this
law.
informati
on on
U.S.
citizens
available
to the
public
and
whether
or not
you agree
with this
law.
5.
Determin
e whether
there are
“electroni
c privacy
laws” that
can
prevent
Did not
submit or
incomplet
ely
determine
d whether
there are
“electronic
privacy
Partially
determine
d whether
there are
“electroni
c privacy
laws” that
can
prevent
Satisfacto
rily
determine
d whether
there are
“electroni
c privacy
laws” that
can
Thorough
ly
determine
d whether
there are
“electroni
c privacy
laws” that
can
others
from
having
access to
“private
informati
on” as
well as
how
effective
they are.
Weight
15%
laws” that
can
prevent
others
from
having
access to “
private
informatio
n” as well
as how
effective
they are.
others
from
having
access to
“private
informati
on” as
well as
how
effective
they are.
prevent
others
from
having
access to
“private
informati
on” as
well as
how
effective
they are.
prevent
others
from
having
access to
“private
informati
on” as
well as
how
effective
they are.
6. Clarity,
writing
mechanic
s, and
formattin
g
requirem
ents
Weight
10%

More Related Content

What's hot

Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
Freedom House
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
andrewdyoung
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
Emily Võ
 
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Digital Methods Initiative
 

What's hot (16)

Polinter07
Polinter07Polinter07
Polinter07
 
Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese Internet
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillance
 
Ethics of computer
Ethics of computerEthics of computer
Ethics of computer
 
Rogers studyingpoliticalissues mar2014_optimized_ii_
Rogers studyingpoliticalissues mar2014_optimized_ii_Rogers studyingpoliticalissues mar2014_optimized_ii_
Rogers studyingpoliticalissues mar2014_optimized_ii_
 
Dressler Kristof The Right to be Forgotten and Digital Collections
Dressler Kristof The Right to be Forgotten and Digital CollectionsDressler Kristof The Right to be Forgotten and Digital Collections
Dressler Kristof The Right to be Forgotten and Digital Collections
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Privacy and Libraries
Privacy and LibrariesPrivacy and Libraries
Privacy and Libraries
 
Murray Privacy in the Context of Content Platforms & Discovery Tools
Murray Privacy in the Context of Content Platforms & Discovery ToolsMurray Privacy in the Context of Content Platforms & Discovery Tools
Murray Privacy in the Context of Content Platforms & Discovery Tools
 
Internet
InternetInternet
Internet
 
Jenkins jr edu600 ip 3 digital research
Jenkins jr edu600 ip 3 digital researchJenkins jr edu600 ip 3 digital research
Jenkins jr edu600 ip 3 digital research
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State Filter
 
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
 

Similar to Leg 500 assignment 2 the value of digital privacy in an information technology age

1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx
teresehearn
 
1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx
aulasnilda
 
Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...
https://writeessayuk.com/
 
Information Inflation Can The Legal System Adapt
Information Inflation Can The Legal System AdaptInformation Inflation Can The Legal System Adapt
Information Inflation Can The Legal System Adapt
legalservices
 
Proposed Rule Aliens; Legal Assistance Restrictions Negotiated Rulemaking Wor...
Proposed Rule Aliens; Legal Assistance Restrictions Negotiated Rulemaking Wor...Proposed Rule Aliens; Legal Assistance Restrictions Negotiated Rulemaking Wor...
Proposed Rule Aliens; Legal Assistance Restrictions Negotiated Rulemaking Wor...
legalservices
 
Information Inflation Can The Legal System Adapt
Information Inflation Can The Legal System AdaptInformation Inflation Can The Legal System Adapt
Information Inflation Can The Legal System Adapt
legalwebsite
 
How To Legally Beat Debt Collectors
How To Legally Beat Debt CollectorsHow To Legally Beat Debt Collectors
How To Legally Beat Debt Collectors
legalinfo
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
Micah Altman
 
A human rights approach to the mobile network
A human rights approach to the mobile networkA human rights approach to the mobile network
A human rights approach to the mobile network
Dr Lendy Spires
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
toltonkendal
 

Similar to Leg 500 assignment 2 the value of digital privacy in an information technology age (20)

The Value of Digital Privacy in an Information Technology AgeRes.docx
The Value of Digital Privacy in an Information Technology AgeRes.docxThe Value of Digital Privacy in an Information Technology AgeRes.docx
The Value of Digital Privacy in an Information Technology AgeRes.docx
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016
 
1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx
 
1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx
 
Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...
 
Information Inflation Can The Legal System Adapt
Information Inflation Can The Legal System AdaptInformation Inflation Can The Legal System Adapt
Information Inflation Can The Legal System Adapt
 
Proposed Rule Aliens; Legal Assistance Restrictions Negotiated Rulemaking Wor...
Proposed Rule Aliens; Legal Assistance Restrictions Negotiated Rulemaking Wor...Proposed Rule Aliens; Legal Assistance Restrictions Negotiated Rulemaking Wor...
Proposed Rule Aliens; Legal Assistance Restrictions Negotiated Rulemaking Wor...
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
Information Inflation Can The Legal System Adapt
Information Inflation Can The Legal System AdaptInformation Inflation Can The Legal System Adapt
Information Inflation Can The Legal System Adapt
 
How To Legally Beat Debt Collectors
How To Legally Beat Debt CollectorsHow To Legally Beat Debt Collectors
How To Legally Beat Debt Collectors
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
 
Institution bulletin volume 3 issue 3
Institution bulletin volume 3 issue 3Institution bulletin volume 3 issue 3
Institution bulletin volume 3 issue 3
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
 
A human rights approach to the mobile network
A human rights approach to the mobile networkA human rights approach to the mobile network
A human rights approach to the mobile network
 
Young Adults And On Line Privacy
Young Adults And On Line PrivacyYoung Adults And On Line Privacy
Young Adults And On Line Privacy
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and ProvocationsYale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocations
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 

Leg 500 assignment 2 the value of digital privacy in an information technology age

  • 1. LEG 500 Assignment 2 The Value of Digital Privacy in an Information Technology Age TO Buy the Tutorial Visit Our Website Research Websites and other technologies that provide private information on U.S. citizens. Write a 3-4 page paper in which you 1.List and describe at least three (3) technologies that allow an individual to research citizens’ private data. 2.Discuss the advantages and disadvantages of public access to this information, both for the
  • 2. researchers and those who are being “ investigated”. 3.Determine what measures citizens can take to protect private information or information they do not want to be disclosed. 4.Discuss a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public, and whether or not you agree with this law. 5.Determine whether there are “electronic privacy laws” that can prevent others from having access to “private information” as well as how effective they are. The specific course learning outcomes associated with this LEG 500 Assignment are Analyze employee and consumer privacy under the law.
  • 3. Use technology and information resources to research issues in law, ethics, and corporate governance. Write clearly and concisely about law, ethics, and corporate governance using proper writing mechanics. Grading for this LEG 500 Assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points 100 LEG 500 Assignme nt 2 The Value of Digital Privacy in an Informati on Technolo gy Age
  • 4. Criteria Unaccept able Below 70% F Fair 70-79% C Proficien t 80-89% B Exempla ry 90-100% A 1. List and describe at least three (3) technolog ies that allow an individua l to research citizens’ private data. Weight 15% Did not submit or incomplet ely listed and described at least three (3) technologi es that allow an individual to research citizens’ private data. Partially listed and described at least three (3) technolog ies that allow an individual to research citizens’ private data. Satisfacto rily listed and described at least three (3) technolog ies that allow an individual to research citizens’ private data. Thorough ly listed and described at least three (3) technolog ies that allow an individual to research citizens’ private data. 2. Discuss the advantag Did not submit or incomplet ely Partially discussed the advantage Satisfacto rily discussed the Thorough ly discussed the
  • 5. es and disadvant ages of public access to this informati on, both for the researche rs and those who are being “ investigat ed”. Weight 20% discussed the advantage s and disadvanta ges of public access to this informatio n, both for the researcher s and those who are being “investigat ed”. s and disadvant ages of public access to this informati on, both for the researche rs and those who are being “ investigat ed”. advantage s and disadvant ages of public access to this informati on, both for the researcher s and those who are being “ investigat ed”. advantage s and disadvant ages of public access to this informati on, both for the researche rs and those who are being “ investigat ed”. 3. Determin e what measures citizens can take Did not submit or incomplet ely determine d what Partially determine d what measures citizens can take Satisfacto rily determine d what measures citizens Thorough ly determine d what measures citizens
  • 6. to protect private informati on or informati on they do not want to be disclosed. Weight 15% measures citizens can take to protect private informatio n or informatio n they do not want to be disclosed. to protect private informati on or informati on they do not want to be disclosed. can take to protect private informati on or informati on they do not want to be disclosed. can take to protect private informati on or informati on they do not want to be disclosed. 4. Discuss a federal law that grants the federal governme nt the legal right to make private Did not submit or incomplet ely discussed a federal law that grants the federal governme nt the legal right Partially discussed a federal law that grants the federal governme nt the legal right to make private Satisfacto rily discussed a federal law that grants the federal governme nt the legal right to make private Thorough ly discussed a federal law that grants the federal governme nt the legal right to make private
  • 7. informati on on U.S. citizens available to the public and whether or not you agree with this law. Weight 15% to make private informatio n on U.S. citizens available to the public and whether or not you agree with this law. informati on on U.S. citizens available to the public and whether or not you agree with this law. informati on on U.S. citizens available to the public and whether or not you agree with this law. informati on on U.S. citizens available to the public and whether or not you agree with this law. 5. Determin e whether there are “electroni c privacy laws” that can prevent Did not submit or incomplet ely determine d whether there are “electronic privacy Partially determine d whether there are “electroni c privacy laws” that can prevent Satisfacto rily determine d whether there are “electroni c privacy laws” that can Thorough ly determine d whether there are “electroni c privacy laws” that can
  • 8. others from having access to “private informati on” as well as how effective they are. Weight 15% laws” that can prevent others from having access to “ private informatio n” as well as how effective they are. others from having access to “private informati on” as well as how effective they are. prevent others from having access to “private informati on” as well as how effective they are. prevent others from having access to “private informati on” as well as how effective they are. 6. Clarity, writing mechanic s, and formattin g requirem ents Weight 10%