首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The issue of online privacy in the Internet age found new urgency following the Sept. 11 terrorist attacks, sparking debate over
The issue of online privacy in the Internet age found new urgency following the Sept. 11 terrorist attacks, sparking debate over
admin
2019-09-17
59
问题
The issue of online privacy in the Internet age found new urgency following the Sept. 11 terrorist attacks, sparking debate over striking the correct balance between protecting civil liberties and attempting to prevent another tragic terrorist act. While preventing terrorism certainly is of paramount importance, privacy rights should not be deemed irrelevant.
In response to the attacks, Congress quickly passed legislation that included provisions expanding rights of investigators to intercept wire, oral and electronic communications of alleged hackers and terrorists. Civil liberties groups expressed concerns over the provisions and urged caution in ensuring that efforts to protect our nation do not result in broad government authority to erode privacy rights of U. S. citizens. Nevertheless, causing further concern to civil liberties groups, the Department of Justice proposed exceptions to the attorney-client privilege. On Oct. 30, Attorney General John Ashcroft approved an interim agency rule that would permit federal prison authorities to monitor wire and electronic communications between lawyers and their clients in federal custody, including those who have been detained but not charged with any crime, whenever surveillance is deemed necessary to prevent violence or terrorism.
In light of this broadening effort to reach into communications that were previously believed to be "off-limits", the issue of online privacy is now an even more pressing concern. Congress has taken some legislative steps toward ensuring online privacy, including the Children’ s Online Privacy Protection Act, and provided privacy protections for certain sectors through legislation such as the Financial Services Modernization Act. The legislation passed to date does not, however, provide a statutory scheme for protecting general online consumer privacy. Lacking definitive federal law, some states passed their own measures. But much of this legislation is incomplete or not enforced. Moreover, it becomes unworkable when states create different privacy standards; the Internet does not know geographic boundaries, and companies and individuals cannot be expected to comply with differing, and at times conflicting, privacy rules.
An analysis earlier this year of 751 U. S. and international Web sites conducted by Consumers International found that most sites collect personal information but fail to tell consumers how that data will be used, how security is maintained and what rights consumers have over their own information.
At a minimum, Congress should pass legislation requiring Web sites to display privacy policies prominently, inform consumers of the methods employed to collect client data, allow customers to opt out of such data collection, and provide customer access to their own data that has already been collected. Although various Internet privacy bills were introduced in the 107th Congress, the focus shifted to expanding government surveillance in the wake of the terrorist attacks. Plainly, government efforts to prevent terrorism are appropriate. Exactly how these exigent circumstances change the nature of the online privacy debate is still to be seen.
Privacy standards made by individual states are ineffective because______.
选项
A、the standards of different states contradict each other
B、online communication is not restricted to any state
C、these standards ignore the federal law on the matter
D、these standards are only applicable to regional Web sites
答案
B
解析
文章第三段最后两句话“Moreover,it becomes unworkable…the Internet does not know geographic boundaries,and companies and individuals cannot be expected to comply with differing,and at times conflicting.privacy rules.”这说明各州制定的法律是不好实施的,因为网络是不具有地域限制的。这种法律不能仅仅限制在某个州的范围之内。故应选B。
转载请注明原文地址:https://www.kaotiyun.com/show/vfWd777K
本试题收录于:
公共英语五级笔试题库公共英语(PETS)分类
0
公共英语五级笔试
公共英语(PETS)
相关试题推荐
Accordingtotheauthor,anation’swealthdependsupon______.WhichofthefollowingaboutBritain’swealthisTRUEaccording
WhichofthefollowingstatementsaboutthetelephoneofthefutureisNOTtrue?
Whatdoesthespeakersuggestthatthestudentsshoulddoduringtheterm?
Theenvironmentiseverythingthatsurroundsusandcanaffectusinsomeway.
Theenvironmentiseverythingthatsurroundsusandcanaffectusinsomeway.
Whatdoesthespeakersuggestthatthestudentsshoulddoduringtheterm?
Psychologistssaytherearetwodifferentkindsofloneliness.
Themovementofthesuncreatesperiodsof______.
Themovementofthesuncreatesperiodsof______.
随机试题
purchaseattempt(s)
组成核酸分子的碱基主要有A.2种B.3种C.4种D.5种E.6种
A公司为支付货款,于2011年3月1日向B公司签发一张金额为50万元、见票后1个月付款的银行承兑汇票。B公司取得汇票后,将汇票背书转让给C公司。C公司在汇票的背面记载“不得转让”字样后,将汇票背书转让给D公司。其中,D公司将汇票背书转让给E公司,但D公司在
某民营企业是从一个仅有几十名员工的小作坊式机电企业发展起来的,目前已拥有3000多名员工,年销售额达几千万元,其组织结构属于比较典型的直线职能制形式。随着本行业的技术更新和竞争的加剧,高层领导者开始意识到,企业必须向产品多元化方向发展。其中一个重要的决策是
企业为客户提供的现金折扣应冲减当期收入。()
2010年3—12月中,汽车单月产量超过150万辆的月份有()个。
某企业采用防火墙保护内部网络安全。与外网的连接丢包严重,网络延迟高,且故障持续时间有2周左右。技术人员采用如下步骤进行故障检测:1.登录防火墙,检查(55),发现使用率较低,一切正常。2.查看网络内各设备的会话数和吞吐量,发现只有一台设备异常,连接数有
WhatisaprisonerinanopenprisonNOTallowedtodo?
OneofMy______cametoseeMeonSundayMorning.
Thismonthisexpectedtoseethatseminal(有创意的)momentwhendigitalcinemawilloutstripthe35mmtechnologythathasbeenthed
最新回复
(
0
)