{"id":283,"date":"2017-03-30T19:25:56","date_gmt":"2017-03-31T01:25:56","guid":{"rendered":"https:\/\/www.businesstechnologyassociates.com\/blog\/?p=283"},"modified":"2017-03-30T19:25:56","modified_gmt":"2017-03-31T01:25:56","slug":"privacy-for-all","status":"publish","type":"post","link":"https:\/\/www.businesstechnologyassociates.com\/blog\/2017\/03\/privacy-for-all\/","title":{"rendered":"Privacy for All"},"content":{"rendered":"<p>The <a href=\"https:\/\/en.wikipedia.org\/wiki\/Founding_Fathers_of_the_United_States\" target=\"_blank\">Founding Fathers<\/a> created the Bill of Rights to protect citizens&#8217; rights including the Fourth Amendment (Amendment IV) to the United States Constitution that states:<\/p>\n<blockquote><p>The right of the people to be <strong>secure in their persons, houses, papers, and effects<\/strong>, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.<\/p><\/blockquote>\n<p>Today the Trump Administration has <a href=\"https:\/\/www.eff.org\/deeplinks\/2017\/03\/congress-sides-cable-and-telephone-industry\" target=\"_blank\">given your personal information<\/a> to the cable and telephone industry so they can sell your data and increase their already high profits.\u00a0 Now they can join the new growth industry in the United States of selling citizens data for profit.\u00a0 And I bet these business will not share it with you.<\/p>\n<p>The U.S. government has demanding that Apple create a way for the FBI to break the encryption of an iPhone while at the same time persecuting U.S. citizens for invading the government&#8217;s secret information.<\/p>\n<p>We all have secrets. Many people profess to being an open book, until their wife or husband finds out they are on <a href=\"https:\/\/en.wikipedia.org\/wiki\/Ashley_Madison\" target=\"_blank\">Ashley Madison<\/a>. The U.S. government stated many times the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Patriot_Act\" target=\"_blank\">Patriot Act<\/a> was not being used to <a href=\"http:\/\/www.webcitation.org\/query?url=http%3A%2F%2Fwww.npr.org%2Fsections%2Fthetwo-way%2F2013%2F08%2F06%2F209692380%2Fobama-to-leno-there-is-no-spying-on-americans&amp;date=2016-02-24\" target=\"_blank\">spy on American citizens<\/a>.<\/p>\n<p><strong>Privacy is good for all of us.<\/strong> It is also good for a <span style=\"text-decoration: underline;\">limited time<\/span> for our government in order to prevent tipping off criminals and enemies of the state.\u00a0 But intentionally weakening <a href=\"https:\/\/en.wikipedia.org\/wiki\/Encryption\" target=\"_blank\">encryption<\/a> schemes and eliminating privacy protections will provide limited benefit with widespread and long lasting harm.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Founding Fathers created the Bill of Rights to protect citizens&#8217; rights including the Fourth Amendment (Amendment IV) to the United States Constitution that states: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.businesstechnologyassociates.com\/blog\/2017\/03\/privacy-for-all\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Privacy for All&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30,17],"tags":[],"class_list":["post-283","post","type-post","status-publish","format-standard","hentry","category-privacy","category-security"],"_links":{"self":[{"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/posts\/283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/comments?post=283"}],"version-history":[{"count":5,"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/posts\/283\/revisions"}],"predecessor-version":[{"id":316,"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/posts\/283\/revisions\/316"}],"wp:attachment":[{"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/media?parent=283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/categories?post=283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/tags?post=283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}