Privacy+Topic+Responses+by+U.S.A.+Period+2

= = Students from Patrick Henry High School, in California, U.S.A., will share American facts and their own ideas concerning __the privacy topics__ given out in class relating to George Orwell's book, //1984.//

__Student responses to these main topics:__ Student responses: A driver who wishes to remain anonymous has used a hidden camera mounted in the dash of his car to record instances with police as a protection against potential harassment or any violation of rights.
 * __Number 1:__** Unobtrusive (hidden) cameras placed in public and private places watching and taping people.

Denver - A former general manager of a major national retailer hides a video camera and records a 19-year-old girl undressing. The apparents predator used a video camera that records onto a hard drive and not a video tape.

This shows that hidden cameras are placed in such places as cars and even stores changing rooms. To me the camera recording the girl undressing is very disturbing because it is an invasion of privacy and very sick. I would not like a predator to record me changing in a store and is scary to think that people can do such a thing. There is no reason to record in the changing room in a store and will only cause legal problems and make people feel like their being watched. The hidden camera in the car to me would be a good thing in case you ever get in an accident, robbed, or even your car stolen. You also might get harassed by a police officer and be able to catch that on camera. This shows that cameras in your car can benefit you while hidden cameras in changing rooms are wrong!

Submitted by David Brown and Brian Humble References: http://www.jonesreport.com/articles/141206_hidden_camera.html http://www.thedenverchannel.com/7newsinvestigates/13245866/detail.html

Today we can't do anything or we can't walk in the streets without being recorded by the cameras hidden in many places of town. In some case it would be a good idea because the police can control the security of the city, but it isn't enough. In other case it is annoying being always controled by other in anything you do. This cameras are used for other aim, for exemple to spy the people illigally invading their privacy and some videos of these, sometimes, are put on internet. The cameras can use in a good way, if they are used by the police to control the order of the city,and in a wrong way if they are used to spy other for a private use. The cameras must be used only to control the security of the people, but we can't invade the privacy. Sorry for my mistakes. Monica

I think that hidden cameras are useful in order to prevent robberies and thefts in public places, like shops or banks, and in this way they're necessary for the public safety; but sometimes they could be obtrusive and invade people's privacy, especially if they are also used for taping and not only for controlling people. nevertheless I think that they're too much useful for the society and also for our personal safety, and in my opinion it's more important to avoid crimes than to protect people's privacy. submitted by_luca schiavini

__**Number 2:**__ Parents use GPS (Global Positional System) to keep track of their children. Student response:

Submitted by C.J.Doughty, Cathy Garcia, and Kevin R. Our topic is about parents using GPS (Global Positional System) to keep track of their children. Some companies are even making clothes with GPS sewn into the clothing. Also Radio chips are sewn into clothing to track a person but for pet animals, it is placed under their skin permanently. Also, parents are starting to buy certain cell phones that have tracking devices to monitor and know their children's where abouts. As a result, this could be both beneficial but also have its faults.

This could be beneficial to our society. The reason we say this is because say your child is kidnapped or is missing and no one could find your child, if you have something that could track your child down then you could easily find your child. You think to yourself that there is a rare chance of this happening to your child, but in reality, you never really know. Also, say your child tells you that their going to their friend's house but they really go out to a party or doesn't even end up going to that friend's house, and is up to no good. By having a tracking system on them you could find out whether they are lying to you or not. This shows some of the benefits or having a tracking device on your child. As a result, there are many beneficial factors to having a tracking device on your child whether it will be for safety or just deciding whether you can trust him/her.

The GPS system can also be viewed as hazardous because there are many parents who will use this system to spy on their children. instead of a cell phone greeting being "how are you?" it will become "where are you?". The line of trust between a parent and their children will soon be non-exisistant. Helicopter parents are turning into black-helicopter parents and the image of parents hovering over their kids is morphing into the darker image of parents spying on their kids. According to Danah Boyd, a fellow at Harvard's Berkman Center for Internet and Society says, "The culture of fear says that if you are not monitoring, you are a bad parent. Apparently, we're supposed to be stalking our kids." Companies with the GPS systems seem to be turning parents into private eyes. When parents begin to track instead of talk, it is time to say, "Black Helicopter down.

A lot of parents utilize the GPS system to "spy on" their child. They do that because they don't trust in our society. In fact today there are a lot of dangers also in common place and so the parents utilise these technologicals systems in phones, computers and so on, so as they could find easily their childrens. In my opinion the parents could learn to trust in thier children, in fact in doing it they encroach also their privacy.

Student response:
 * __Number 3:__** Employers that use GPS (Global Positioning System) and hidden cameras to keep track of their employees.

The topic is based around the idea of employers monitoring their employee's actions after work. This has been the topic of much controversy due to privacy issues. One believes that they should be entitled to privacy, employers have no right to get involved with the personal lives of their workers. I thought background checks should be enough, now to monitor them while they live their daily lives is a little extreme. An employer should not be concerned about their employee's habits and more about their production value. Although there is some level of negativity to this method of tracking it does bring some benefits, for example if an employer of the U.S. Treasury all of a sudden goes missing. The Gov might want to know both the whereabouts of the victim and the last time they were seen. The CIA and FBI use tracking devices to locate their employees if one goes missing or to track them on a mission so that they can get Intel information. Parents put tracking devices on there children by buying them the Disney cell phone which lets them know where there child is with a push of a button.

Where's the privacy and trust? To be able to be tracked and located in a second is sort of annoying because you have to watch your every step and move because you could be watched.That's evasion of privacy. Submitted by Juan Alonso Reference ^_^http://www.amanet.org/press/amanews/ems05.htm

Student response: People can now look up other people through google or several different websites by simply paying a $39.99 membership cost. With that membership people can find out many things about people such as crime records, phone numbers, addresses, and much more personal information. Hacking and uploading Trojan horses can also help people steal important personal information through online computer databases. Other methods of identity theft consist of dumpster diving, pickpocketing, advertising bogus job offers, and browsing social networks such as myspace and facebook. This problem is now bigger than ever even though most people don't realize it. Reference: www.wikipedia.com search identity theft Submitted by: Jame Hernandez & Daniel Hird
 * __Number 4:__** Online data mining of people's personal information.

Student response:
 * __Number 5:__** Online data mining of people's consumer information.

__Student response:__ Yes, the phone tapping is a good idea. The government isn't really looking into everything we do everyday, they are only looking into those people who seem suspicious. Unless you have something to hide, the Patriot Act isn't really a big deal. Only if the school has had problems in the past, should their students be searched. One example would be like what happened at Patrick Henry during the 06-07 year where there was a threat that put the students in danger after the Virginia Tech incident. There was writing found in a bathroom that threatened to have a shooting at school the next day. No search was done, but several students didn't go to school the following day. The same concept goes with the shopping malls. Even after the shooting at an indoor shopping mall, people definitely didn't go to shopping malls for a while. For more information go to [|http://www.aclu.org/safefree/resources/17343res20031114.html]or Google "patriot act". Submitted By: Rachel Rigg, and Jeff Robinson
 * __Number 6:__** Collection of personal information, secretly, by government FBI or other agencies to fight terrorism; allowing private citizens to have their house or cell phones tapped or using electronic devices to search people's background.


 * __Number 7:__** Internet online safety concerns for children. Many companies sell blocking systems to various organizations and private groups.

The Internet is wonderful for children it is used for research for school reports, talking to other teacher online and online games.Any child can access the highway of information. But, there is also a hazard imagine if your 7 year old child typed in "Lego's" in a search engine but 1 mistyped letter it could be "legs" there might be 1000 pages some might contain pornographic material. -Dan Nguyen

Internet filtering systems prevent or block users from accessing unsuitable material. When the filtering system is turned on, users cannot open or link to sites that the filtering system recognizes as unsuitable. Many filtering systems will also provide facilities to filter incoming and outgoing email. Schools and parents should have a blocking system for their students and children. Schools should use the blocking system to prevent students from getting distracted while they are on the Internet so the students can focus on their assignment. Parents should also use blocking systems to prevent their children from accessing inappropriate material online.

-Jason Nguyen, Fitsum Mesfun

Student response: Since September 11, 2001, a randomly created list of people who, when attempting to use airlines and check their name through the airport database, are considered by the government to be security risks and are detained, searched, questioned, and only allowed to fly once to police have checked the names through a “master FBI list”. But is such a thing really making society safer? It could be possible but because we as the public don't know or have any way of knowing how a name is placed on the list or how a name can be taken off. Innocent people are deemed as hazardous to society or even considered terrorist and have no way of knowing how they got on the list and can't do much to change it. Because of this, the list itself is hazardous to us as a people because of unjustified secret accusations that cannot be fought and can happen to anybody. It can only be possibly beneficial if perhaps a person can be proved to be not a threat to society, or if the list had a factual and reliable reference to find out who the terrorists in the country really are. Unless these are recognized by the government and they admit to the fallacies then this controversy remains as it is. No further laws need to be created because Big Brother is already too powerful with the ability to record classified or untrue information about anybody and hold it against them. Reference: http://www.aclu.org/privacy/spying/15290pub20030701.html Submitted by: Kyle Dramer
 * __Number 8:__** The government has a "Government no-fly list" that identifies people that are not allowed to fly on an airplanes.

__Student response:__
 * __Number 9:__** Cell-phone cameras and how they can be used on people without their permission.

The topic is explaining how with current technology in cell-phones and even with cameras getting more compact and detailed it allows citizens to become spies and allows them to capture something going on around them like crime. The problems come in when people take this technology too far and use it to spy on neighbors and use pictures to blackmail. Opinions: - People are always going to take things too far and abuse what is disposed to them but saying that camera-phones and phones that can record video are invading privacy of others is going too far. In my opinion society is becoming far too paranoid with things that do not matter. The phones were not invented as a way to spy on people that is not why a phone company made them. - Cameras on cell phones is a good thing because for everyday use it is good so that you can send pictures instead of trying to explain something. If someone gets mad because their doing something stupid and someone takes a picture, its their fault they were doing something stupid and shouldn't get angry. Cameras and camera phones are the same thing and no one ever complained about cameras so they should shut up about it. Facts: - Information on spying with cell phones have leaked out into society for example in the //Oakland Tribune,// Hewlett-Packard let out that Oakland Tribune)

(This response doesn't seem to be finished...... Please finish it, Davis, Matt, and Jessica. From Mrs. Pauchnick)

Davis Bunone

Social networking sites such as FaceBook and MySpace can be corrupted by false information. Should there be some sort of Social Networking Police?

__Student response: Maria Beltrami__

In the last century, the most important invention was mobile-phone.In particular ,after some examples of telephone box, cell-phones become tiny and with other functions. In fact mobile-phones have also camera to take a pictures or to make a videos. But sometimes these new functions are used in a wrong way. In particular, these important inventions are problems because the most of people become spies and use cellular phones to keep track other people. The more important problems are this phenomenon is very developped and is difficult to control. So, also for police is a problem to create laws that talk out of committing privacy crime. Only measures that authority can take are to punish all people that upload all videos and pictuers ,taken with their cell-phone, on the net. In my opinion, phones are created to call and not to spy other people. cell-phone cameras are usefull but if people use its to personal uses.

__**Number 10:**__ False Identities

In the modern age of technology where instant gratification is the norm, there are many sites out there that are comparable to the wild west; untamed and ill maintained there is little that can be done, besides relaying on common sense to see you through to the next day unscathed. But in the end it should only relay on common sense and good parenting to monitor sites such as facebook.com and myspace.com, and not government intervention to prevent kidnappings, suicides, and abominations such as "to catch a predator" from happening over silly websites. Sadly in this world of technology and instant gratification, there is a serve shortage of these essential traits in the society of today, making the world of tomorrow seem a bleak and cold existence for the generations to come. -Jared N. Brandon M. and Damon S.

__Student response:__ Jordan- In my opinion I don't think there should be any "Network Police". One reason I think that there should not be any "Network Police" is there are way to many things on the Internet to be monitored. The other reason is because a lot of people lie on the Internet. I even do, on my Myspace my age is not my actual age. Anyone can put anything on the Internet. For example Wikipedia is an online encyclopedia that anyone can use and anyone can put there own things on the website. whether it is true or false it can be put on the Internet. Having "Network Police" would solve 1 of billions of problems with the Internet.
 * __Another Response to Number 10.__** Social networking sites such as FaceBook and MySpace can be corrupted by false information. Should there be some sort of Social Networking Police?

Sharaya- Even if there was Networking Police, it would take hours and time to search everyone who uses MySpace and FaceBook. If these "Networking Police" want to take time out of there day to see if people are telling the truth they can go for it. But I think it's a waste of time and pretty pathetic. If someone was to put a wrong age, what would their consequence be? But if there was some type of Networking Police then there wouldn't be predators. If there was a Networking Police I wouldn't mind. I don't have anything to hide.

Marian- Having a "social networking police" is a stupid idea. There is absolutely no possible way that a team of people would be able to control EVERYTHING on the Internet. The time, money, and effort that would have to be put into it would only be to save someone from being embarrassed by a stupid photo, or a comment made about them. If you want your personal life separate from the Internet don't put stuff up there. Networking police would not be able to even scratch the surface of the problems with the Internet. This idea would be a waste of our governments money.

Just today on January 15'Th, 2008 in our San Diego news paper we had an article about Myspace being safer. It talks about how Myspace is promising to be safer.

Reference to: [|http://www.ou.edu/oupd/kidsafe/start.htm]

Student response: People often times don't like taking time out of their day to go to the doctors so they just think going in the Internet will be a help to find out what is wrong with them or information on specific medication. Every time a person needs to get information on a specific type of medication or a disease, they will just run to theInternet. Well, the Internet is not always the right choice to go to. Once you type in what you are looking for, it will show thousands of pages regarding that topic. Some information may be bogus and some may be right but how are you suppose to know what is right and what is wrong? A lot of people once they read something think it's right and they will follow what it says which may lead to some kind of problem. Although, if you are lucky, some information will be true and it will help them out with the problem that they have. Going to the Internet for health information is hazardous to an individual. In some instances, this can be very helpful but it is hard to determine whether the information is the truth or not. It's important to be suspicious of products that claim to cure a wide range of unrelated diseases especially, serious diseases, such as cancer and diabetes. " ... extremely beneficial in the treatment of rheumatism, arthritis ... infections ... prostate problems, ulcers ... cancer, heart trouble, hardening of the arteries, diabetes and more. ... " No product can treat every disease and condition, and for many serious diseases, there are no cures, only therapies to help manage them.If people could just take a few minutes out of their day to pick up the phone or go into the doctors office, they wouldn't risk getting useless information that could eventually be harmful to their health. Since it is the responsibility of the individual to do what he or she wants, laws on what can be published on the Internet do not need to be enforced. People know the Internet is open for anyone to make web pages so they know their are risks at believing everything you see.
 * __Number 11:__** People becoming their own doctors by researching diseases on the Internet and possibly following wrong medical advice.

References: How to Spot Health Fraud, Jan. 14, 2008, [|http://www.fda.gov/Fdac/features/1999/699_fraud.html] Submitted By: Sarah N., Jessica G., Idin R.

People often go to internet to looking for a medical treatment. in internet there are a lot of information, some are true but some no. Lot of people seek to find a cure because they have no time to go to see the doctor or because they think theirs desease in't serius and they want healt themself. but is very important to ask for a medical opinion because in iternet is described a general instance that in many case isn't our case. it can be very dangerous because we can have some allergy that we don't know or we can have some secondary consequence that a doctor can keeps of. Moreover a doctor knows our life and feature so he can suggest a cure propet to our situation that can solve the desease as soon as possible. sorry for my mistakes!!!!!!!!!!!!!!!!!!

submitted by Francesca B.

__**Number 12:**__ Identify theft is becoming a serious problem. Research how often this occurs, how horrendous it is, and what safety guidelines people should follow to prevent this.

Identity theft is very a dangerous thing that can happen on the Internet that can hurt a persons position in life. Identity theft is especially common on the Internet were it is hard to regulate. A person surfing the Internet must therefore understand how identity theft works and how to prevent it. According to MSNBC.com (an Internet news source) 1 out of 5 Americans are victimized by identity theft. This is surprisingly high number of people victimized and obviously shows just how easy it is for a person to steal ones identity. The most common identity theft is credit theft. Credit theft involves taking or stealing ones credit card number or social then buying items or in the case of a social security number, register credit cards under ones name. This is very basic to prevent, just do not give out vital information to websites that you do not trust. One may also use a middleman such as pay-pal to complete a transaction which only allows a thief to steal whats in your account. One should also not post any credit card information in a wireless network that is not encrypted because it would be easy for someone in the network to view what information you are putting up. Savvy burglars also know how to use what is known as a Trojan horse. A Trojan horse is a program that once uploaded on a victims computer allows a intruder to view as-well as control ones computer. Anti Trojans are a must if you are to do any heavy buying online, and will find and destroy any threats. There are many ways to identify a potential identity thief. The Number one way to identify one is that the site that you frequent hides its true address. Since burglars refuse to get caught many will do this so the authorities can not track the info back to a specific person. To avoid this use anti-phis-hing tools which will notify you if this phenomena happens. There are also many sites that track habits of such companies and confirm whether the billing address is the same as that started company address. Identity theft is also less dangerous now even if one does not identity the source because technologies like the smart card. Smart cards are like the average American credit card except with one difference they also store unique pins and biometric data which adds another layer of protection. Although credit card theft is common if you take the steps mentioned it can be easily prevented.Education is an important measure in fixing this problem, and if schools took a few simple steps these problems could be easily be prevented [|http://www.privacyrights.org/fs/fs17-it.htm]
 * Student response # 1:**


 * Submitted by: Lucas .S. Taro .S.**

Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes. The FTC estimates that as many as 9 million Americans have their identities stolen each year.Some hazardous is spend hundreds of dollars and many days repairing damage to their good name and credit record. Some consumers victimized by identity theft may lose out on job opportunities, or be denied loans. The way people get identity theft are by this things and correcting this four things could help redouce indentity theft**.Dumpster Diving.** They rummage through trash looking for bills or other paper with your personal information on it.**Skimming.** They steal credit/debit card numbers by using a special storage device when processing your card**.Phishing.** They pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information. for education, housing or cars because of negative information on their credit reports. In rare cases, they may even be arrested for crimes they did not commit.**Old-Fashioned Stealing**. They steal wallets and purses; mail, including bank and credit card statements; pre-approved credit offers and new checks or tax information.The ways to prevent the Identity theft is by ripping your papers in little pieces also another way is just to protect your wallet purses to prevent your credit cards and other things that they can use for identity theft.
 * Student response # 2:**
 * Submitted by: Audel Talamantes, Elisua Felix, and Mario Franco**