Upload
rose-klein
View
219
Download
0
Embed Size (px)
Citation preview
8/14/2019 Personal Privacy in the Information age
1/3
Personal Privacy in the Age of Information
We are constantly leaving trails of information behind us - we give our Social Security
Numbers, credit information and phone numbers; we post on facebook, twitter, and google.
What keeps us safe? What stops people from using that information against us?1We need
guaranteed protection of personal privacy in our laws. We need to build a state and nation in
which we expect and receive a certain level of privacy.
Privacy is an essential underpinning of human dignity and free expression. Itencompasses not just physical privacy, but the freedom to control your cultural
presence, and manage the information and identity that surrounds you. A trusting andfree democratic society cannot function without the protection of a person's private lifeand sphere. Surreptitious and intrusive surveillance is toxic to trust, social harmony andthe integrity of the state.2- Pirate Party platform
The September 11th, 2001 attacks on the United States was one of the most tragic events inrecent history. It changed the lives of many people, instilled a sense of fear, and created a
common enemy in the minds of the American public. This sense of fear, this common enemy,
was used by many as a justification for surveillance. However, we cannot let one attack change
the ideals by which the government makes legislation. We cannot let the fear of another attack
stop the forward progress of our freedoms.
Since the 9/11 attacks, the United States has been going backwards, instead of
forwards, in regards to civil rights. The governments under both President Bush and Obama
have disproportionately taken away civil liberties in favor of building the infrastructure of national
security, and the culture of politics has evolved to reflect this. President Obama recently spoke
about making a choice between privacy and security.3Governor Walker, in a forum withgovernor Chris Christie, agreed with the latter that the safety of the people is the number one
priority of the government.4Looking back to the words of Franklin, we can see that this is not the
framers intent. The first priority of the government should be instead to keep our liberties intact.
Only after defending these essential liberties can we move on to the security of the people. The
lesson we take from the 9/11 attacks cannot be for us to fear others and to give up our rights
instead our response must be to work together to build our communities back to what they once
werewe must work to thrive despite the horrors of that day.
We as people have rightsrights inherent to our persons and guaranteed by the
constitutions of both the United States and Wisconsin. These rights should be interpreted
broadly. We must take each part of the constitution and interpret it such that the rights of thepeople are maximized.5These rights, of course, include the right to personal privacy. While not
specifically guaranteed by any of the constitutional amendments, privacy is something that the
majority of Americans believe can be established as a right because of the 9th amendment. The
United States Supreme Court has agreed with this stance because of this necessity of broad
interpretation (Griswold v. Connecticut).6
Our right to privacy, then, is guaranteed by the 9th amendment. The people should not
have to make a choice between privacy and security. Since the events of 9/11, the NSA has
8/14/2019 Personal Privacy in the Information age
2/3
become a key national player in the invasion of that privacy.7The public is fed up with this
creation of a surveillance state, and fed up with making a choice between two necessities. While
there have been many public outcries for the NSA to stop keeping secrets, they have continued
to deny the people. In the past week, there was yet another information release on the
ridiculous lengths to which the NSA has gone violating our privacy.8
There is a problem with the national governmentthey are not only keeping secretsfrom us, but they are also taking our private information. What then, can we do as a state? It
would almost seem that this is solely a national problem, and thus requires a national solution.
There are, in fact, things the state can do to change this; however, there are very few
effective ways to do so directly (barring a constitution convention). Instead, the state must take
on a different approach to solving this national problem. Wisconsin must build herself as an
example of privacy protection. Our state must pressure the national government to stop the
surveillance of her citizens, and must make all attempts to protect that privacy which is their
right. Thankfully, Wisconsin has already taken many steps in that direction. In 1977, the state
passed Statute 995.50, which specifically recognizes the citizens right to privacy.9In addition,
there has been an attempt in recent years to create pieces of legislation that work to increase
civilians right of privacy.10
This was done because of an accident that occurred under the Doyle administration. A
series of Social Security Number releases by state departments shocked the Wisconsin public.
The state has since then taken actions to ensure that this does not happen again and that the
privacy of individuals in Wisconsin remain intact. Some of the broader legislation enacted by the
state legislature is something which Wisconsinites should be proud of.
We can continue this trend by working with the legislature to increase the level of privacy
protections. We can advocate on a national scale for the NSA to stop its unwanted and
unconstitutional surveillance of Wisconsins citizens. As a people, we can work to pressure the
national government to find a solution, and we can set an example for the rest of the country tostrive toward.
Francis J. Klein
Pirate Party candidate for governor
8/14/2019 Personal Privacy in the Information age
3/3
Sources:
1.https://www.aclu.org/technology-and-liberty/internet-privacy
2.http://pirateparty.org.au/wiki/Platform#Privacy
3.http://www.huffingtonpost.com/2013/06/07/obama-defends-nsa_n_3406448.html
4.http://www.youtube.com/watch?v=d1AVj9Ysczo 5.http://thomas.loc.gov/home/histdox/fed_84.html
6.http://law2.umkc.edu/faculty/projects/ftrials/conlaw/rightofprivacy.html
7.http://online.wsj.com/news/articles/SB10001424127887324094704579067422990999360
8.http://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-
data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-
d89d714ca4dd_story.html
9.http://docs.legis.wisconsin.gov/statutes/statutes/995.pdf
10.http://legis.wisconsin.gov/lrb/pubs/wb/08wb9.pdf
Additional Resources:
Multiple surveys of public opinion on personal privacy:
http://epic.org/privacy/survey/
NSA instance of privacy violation:
http://online.wsj.com/news/articles/SB10001424127887324094704579067422990999360
Spying done on Chancellor Merkel:
http://www.bbc.co.uk/news/world-europe-24690055
https://www.aclu.org/technology-and-liberty/internet-privacyhttps://www.aclu.org/technology-and-liberty/internet-privacyhttps://www.aclu.org/technology-and-liberty/internet-privacyhttp://pirateparty.org.au/wiki/Platform#Privacyhttp://pirateparty.org.au/wiki/Platform#Privacyhttp://pirateparty.org.au/wiki/Platform#Privacyhttp://www.huffingtonpost.com/2013/06/07/obama-defends-nsa_n_3406448.htmlhttp://www.huffingtonpost.com/2013/06/07/obama-defends-nsa_n_3406448.htmlhttp://www.huffingtonpost.com/2013/06/07/obama-defends-nsa_n_3406448.htmlhttp://www.youtube.com/watch?v=d1AVj9Ysczohttp://www.youtube.com/watch?v=d1AVj9Ysczohttp://www.youtube.com/watch?v=d1AVj9Ysczohttp://thomas.loc.gov/home/histdox/fed_84.htmlhttp://thomas.loc.gov/home/histdox/fed_84.htmlhttp://thomas.loc.gov/home/histdox/fed_84.htmlhttp://law2.umkc.edu/faculty/projects/ftrials/conlaw/rightofprivacy.htmlhttp://law2.umkc.edu/faculty/projects/ftrials/conlaw/rightofprivacy.htmlhttp://law2.umkc.edu/faculty/projects/ftrials/conlaw/rightofprivacy.htmlhttp://online.wsj.com/news/articles/SB10001424127887324094704579067422990999360http://online.wsj.com/news/articles/SB10001424127887324094704579067422990999360http://online.wsj.com/news/articles/SB10001424127887324094704579067422990999360http://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.htmlhttp://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.htmlhttp://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.htmlhttp://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.htmlhttp://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.htmlhttp://docs.legis.wisconsin.gov/statutes/statutes/995.pdfhttp://docs.legis.wisconsin.gov/statutes/statutes/995.pdfhttp://docs.legis.wisconsin.gov/statutes/statutes/995.pdfhttp://legis.wisconsin.gov/lrb/pubs/wb/08wb9.pdfhttp://legis.wisconsin.gov/lrb/pubs/wb/08wb9.pdfhttp://legis.wisconsin.gov/lrb/pubs/wb/08wb9.pdfhttp://epic.org/privacy/survey/http://epic.org/privacy/survey/http://online.wsj.com/news/articles/SB10001424127887324094704579067422990999360http://online.wsj.com/news/articles/SB10001424127887324094704579067422990999360http://www.bbc.co.uk/news/world-europe-24690055http://www.bbc.co.uk/news/world-europe-24690055http://www.bbc.co.uk/news/world-europe-24690055http://online.wsj.com/news/articles/SB10001424127887324094704579067422990999360http://epic.org/privacy/survey/http://epic.org/privacy/survey/http://legis.wisconsin.gov/lrb/pubs/wb/08wb9.pdfhttp://docs.legis.wisconsin.gov/statutes/statutes/995.pdfhttp://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.htmlhttp://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.htmlhttp://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.htmlhttp://online.wsj.com/news/articles/SB10001424127887324094704579067422990999360http://law2.umkc.edu/faculty/projects/ftrials/conlaw/rightofprivacy.htmlhttp://thomas.loc.gov/home/histdox/fed_84.htmlhttp://www.youtube.com/watch?v=d1AVj9Ysczohttp://www.huffingtonpost.com/2013/06/07/obama-defends-nsa_n_3406448.htmlhttp://pirateparty.org.au/wiki/Platform#Privacyhttps://www.aclu.org/technology-and-liberty/internet-privacy