首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The issue of online privacy in the Internet age found new urgency following the Sept. 11 terrorist attacks, sparking debate over
The issue of online privacy in the Internet age found new urgency following the Sept. 11 terrorist attacks, sparking debate over
admin
2022-05-29
42
问题
The issue of online privacy in the Internet age found new urgency following the Sept. 11 terrorist attacks, sparking debate over striking the correct balance between protecting civil liberties and attempting to prevent another tragic terrorist act. While preventing terrorism certainly is of paramount importance, privacy rights should not be deemed irrelevant.
In response to the attacks, Congress quickly passed legislation that included provisions expanding rights of investigators to intercept wire, oral and electronic communications of alleged hackers and terrorists. Civil liberties groups expressed concerns over the provisions and urged caution in ensuring that efforts to protect our nation do not result in broad government authority to erode privacy rights of U. S. citizens. Nevertheless, causing further concern to civil liberties groups, the Department of Justice proposed exceptions to the attorney-client privilege. On Oct. 30, Attorney General John Ashcroft approved an interim agency rule that would permit federal prison authorities to monitor wire and electronic communications between lawyers and their clients in federal custody, including those who have been detained but not charged with any crime, whenever surveillance is deemed necessary to prevent violence or terrorism.
In light of this broadening effort to reach into communications that were previously believed to be "off-limits", the issue of online privacy is now an even more pressing concern. Congress has taken some legislative steps toward ensuring online privacy, including the Children’ s Online Privacy Protection Act, and provided privacy protections for certain sectors through legislation such as the Financial Services Modernization Act. The legislation passed to date does not, however, provide a statutory scheme for protecting general online consumer privacy. Lacking definitive federal law, some states passed their own measures. But much of this legislation is incomplete or not enforced. Moreover, it becomes unworkable when states create different privacy standards; the Internet does not know geographic boundaries, and companies and individuals cannot be expected to comply with differing, and at times conflicting, privacy rules.
An analysis earlier this year of 751 U. S. and international Web sites conducted by Consumers International found that most sites collect personal information but fail to tell consumers how that data will be used, how security is maintained and what rights consumers have over their own information.
At a minimum, Congress should pass legislation requiring Web sites to display privacy policies prominently, inform consumers of the methods employed to collect client data, allow customers to opt out of such data collection, and provide customer access to their own data that has already been collected. Although various Internet privacy bills were introduced in the 107th Congress, the focus shifted to expanding government surveillance in the wake of the terrorist attacks. Plainly, government efforts to prevent terrorism are appropriate. Exactly how these exigent circumstances change the nature of the online privacy debate is still to be seen.
Privacy standards made by individual states are ineffective because________.
选项
A、the standards of different states contradict each other
B、online communication is not restricted to any state
C、these standards ignore the federal law on the matter
D、these standards are only applicable to regional Web sites
答案
B
解析
文章第三段最后两句话“Moreover,it becomes unworkable…the Internet does not know geographic boundaries,and companies and individuals cannot be expected to comply with differing,and at times conflicting,privacy rules. ”这说明各州制定的法律是不好实施的,因为网络是不具有地域限制的。这种法律不能仅仅限制在某个州的范围之内。故应选B。
转载请注明原文地址:https://kaotiyun.com/show/BsPd777K
本试题收录于:
公共英语五级笔试题库公共英语(PETS)分类
0
公共英语五级笔试
公共英语(PETS)
相关试题推荐
ThespeakersaremakingarrangementsforMonday,TuesdayandWednesday.
ThespeakersaremakingarrangementsforMonday,TuesdayandWednesday.
Accordingtothespeaker,whoshouldenjoythefightofAcademicFreedom?
WhichofthefollowingistheacceptabletablemannerinBritain?
AnswerQuestionsbyreferringtoaselectionaboutmobilephonesinthefollowingmagazinearticle.Note:Whenmorethanone
Whatistheauthor’sattitudetowardD’Adamo’sadvice?Accordingtotheauthor,whichofthefollowinghasbeenamplyproved?
Whichofthefollowingservicesisnotofferedbythefederalgovernment?IftheU.S.governmentraisesitstariffs,then______
Themovementofthesuncreatesperiodsof______.
Psychologistssaytherearetwodifferentkindsofloneliness.
随机试题
在Access2010中,文本型字段最多可存储255个字符。
水的衰减系数是
遴选非处方药的原则中不包括
防火阀、排烟防火阀安装的方向、位置应正确,阀门顺气流方向关闭,防火分区隔墙两侧的防火阀距墙端面不应大于()mm。
2018年12月31日,甲公司因交易性金融资产和其他债权投资的公允价值变动,分别确认了20万元的递延所得税资产和40万元的递延所得税负债。甲公司当期应交所得税的金额为300万元。假定不考虑其他因素,甲公司2018年度利润表“所得税费用”项目应列示的金额为(
根据《未成年人保护法》,下列关于未成年人合法权益保护的说法中,正确的是()
下列关于税收概念,理解正确的有()。
原子结构很像太阳系,中心是原子核,周围环绕着一些带负电荷的电子。原子的质量几乎全部集中在原子核,它由一些带正电荷的质子和不带电的中子所组成。对这段话最准确的复述是()。
Spooling技术一般不为()提供虚拟化支持。
安全管理是信息系统安全能动性的组成部分,它贯穿于信息系统规划、设计、运行和维护的各阶段。在安全管理中的介质安全是属于(57)。
最新回复
(
0
)