首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The issue of online privacy in the Internet age found new urgency following the Sept. 11 terrorist attacks, sparking debate over
The issue of online privacy in the Internet age found new urgency following the Sept. 11 terrorist attacks, sparking debate over
admin
2019-09-17
29
问题
The issue of online privacy in the Internet age found new urgency following the Sept. 11 terrorist attacks, sparking debate over striking the correct balance between protecting civil liberties and attempting to prevent another tragic terrorist act. While preventing terrorism certainly is of paramount importance, privacy rights should not be deemed irrelevant.
In response to the attacks, Congress quickly passed legislation that included provisions expanding rights of investigators to intercept wire, oral and electronic communications of alleged hackers and terrorists. Civil liberties groups expressed concerns over the provisions and urged caution in ensuring that efforts to protect our nation do not result in broad government authority to erode privacy rights of U. S. citizens. Nevertheless, causing further concern to civil liberties groups, the Department of Justice proposed exceptions to the attorney-client privilege. On Oct. 30, Attorney General John Ashcroft approved an interim agency rule that would permit federal prison authorities to monitor wire and electronic communications between lawyers and their clients in federal custody, including those who have been detained but not charged with any crime, whenever surveillance is deemed necessary to prevent violence or terrorism.
In light of this broadening effort to reach into communications that were previously believed to be "off-limits", the issue of online privacy is now an even more pressing concern. Congress has taken some legislative steps toward ensuring online privacy, including the Children’ s Online Privacy Protection Act, and provided privacy protections for certain sectors through legislation such as the Financial Services Modernization Act. The legislation passed to date does not, however, provide a statutory scheme for protecting general online consumer privacy. Lacking definitive federal law, some states passed their own measures. But much of this legislation is incomplete or not enforced. Moreover, it becomes unworkable when states create different privacy standards; the Internet does not know geographic boundaries, and companies and individuals cannot be expected to comply with differing, and at times conflicting, privacy rules.
An analysis earlier this year of 751 U. S. and international Web sites conducted by Consumers International found that most sites collect personal information but fail to tell consumers how that data will be used, how security is maintained and what rights consumers have over their own information.
At a minimum, Congress should pass legislation requiring Web sites to display privacy policies prominently, inform consumers of the methods employed to collect client data, allow customers to opt out of such data collection, and provide customer access to their own data that has already been collected. Although various Internet privacy bills were introduced in the 107th Congress, the focus shifted to expanding government surveillance in the wake of the terrorist attacks. Plainly, government efforts to prevent terrorism are appropriate. Exactly how these exigent circumstances change the nature of the online privacy debate is still to be seen.
Privacy standards made by individual states are ineffective because______.
选项
A、the standards of different states contradict each other
B、online communication is not restricted to any state
C、these standards ignore the federal law on the matter
D、these standards are only applicable to regional Web sites
答案
B
解析
文章第三段最后两句话“Moreover,it becomes unworkable…the Internet does not know geographic boundaries,and companies and individuals cannot be expected to comply with differing,and at times conflicting.privacy rules.”这说明各州制定的法律是不好实施的,因为网络是不具有地域限制的。这种法律不能仅仅限制在某个州的范围之内。故应选B。
转载请注明原文地址:https://kaotiyun.com/show/vfWd777K
本试题收录于:
公共英语五级笔试题库公共英语(PETS)分类
0
公共英语五级笔试
公共英语(PETS)
相关试题推荐
Theauthorpointsoutatthebeginningthat______.Accordingtothe"gene-culturecoevolution"model,whichofthefollowingwo
Accordingtotheauthor,anation’swealthdependsupon______.WhichofthefollowingaboutBritain’swealthisTRUEaccording
Itcanbeinferredthatthefootballgamewasplayedin______onthatSundayafternoon.WhichofthefollowingstatementsisTRU
Whatdoesthespeakermainlydiscuss?
Theenvironmentiseverythingthatsurroundsusandcanaffectusinsomeway.
Psychologistssaytherearetwodifferentkindsofloneliness.
Psychologistssaytherearetwodifferentkindsofloneliness.
ThespeakerknowsafewChinesestudents.
Duringtheperiod1490~1979themainprogressmentionedinthispassagewas______.Theword"scuba"is______.
随机试题
流行;货币n.c______
Liketheold,______respectedinourcountry.
血管相关性感染的预防措施不包括
PHA刺激法可用于
在研究后阶段,主要任务是形成价值工程研究报告,包括所有提案的详细介绍和概括介绍,然后提交()审核决定是否采纳。若决定采纳,则开始实施,并且跟踪、检查、鉴定与总结。
上海公民孙某2015年8月从中国境内取得的收入情况如下:(1)取得工资收入10000元。(2)一次性取得演讲收入20000元。(3)出版学术专著一部,出版社支付稿酬90000元。(4)到期国债利息收入1286元。(5)在A国讲学取得收入40000
企业进行外部招聘的缺点有()。
如果2002年、2011年我国国内生产总值分别为115000亿元、470000亿元.那么2011年第三产业生产总值是2002年的()倍。
DNS正向搜索的功能是将域名解析为IP地址,Windows系统中可测试该功能的命令是()。
线性表的顺序存储结构和线性表的链式存储结构分别是()
最新回复
(
0
)