Megan’s Law: Protection Or Invasion Of Privacy

1166 words - 5 pages

Megan’s Law: Protection or Invasion of Privacy
The controversy over Megan’s Law has always been about the invasion of privacy of past sex offenders who must register with local authorities who make the information available to the public. There are different mediums of which the information is disclosed, the internet being a hot topic of the on-going argument. Megan’s Law was placed with the intentions of protecting communities from convicted sex offenders committing more crimes.
In 1994, seven year old Megan Kanka of New Jersey was sexually assaulted and murdered by her neighbor who had previously been a convicted sex offender. Her parents had been unaware of his past crimes. The brutality of this crime helped provide the case of mandating registration of past convicted offenders (jrank.org). During former President Bill Clinton’s presidency in 1996, he had signed legislation that required states to adopt the statutes of Megan’s Law (EPIC).
This allowed states to use discretion in establishing which information is disclosed, and compels them to make information that is both private and personal available to the public. This information is said to assist law enforcement in investigations, establish legal grounds to hold known offenders, discourage sex offenders from committing new offenses, and offers information to use to protect children from victimization (www.about-megans-law.com).
Opposition however fights that though the intent of Megan’s Law is to protect the community, some states have published offender information where anyone can access. This access can lead to “witch hunts” by parents, students, etc. showing how the law has backfired (Repeal Adam Walsh Act Laws!).
The basis of the law was meant for communities to be able to better protect their children if informed of their whereabouts of high-risk offenders. The leased information enables law enforcement to obtain legal grounds for detaining past offenders. This law was quickly fired at by opponents speaking out that the laws would only lead to vigilantism or ‘witch hunts’ and prevents the person’s chance at merging back into society. If the offender, the offender’s family, or employer, however, was vandalized, threatened in anyway, or physically abused would lead to arrest and prosecution for criminal actions (law.jrank.org).
The laws have gone under many adoptions and differ to the way states have adopted but are forced to register if they have been charged with the conviction of sexual assault, endangerment of impairing or debauching a child’s morals, kidnapping, criminal restraint, and false imprisonment. The determination of the risk of re-offense are listed guidelines in Megan’s Law which include; post-incarceration supervision., status of counseling or therapy, criminal background, degree of remorse, substance abuse, psychiatric profile, history of stalking where children congregate. The registries upon which the offenders must register include their names,...

Find Another Essay On Megan’s Law: Protection or Invasion of Privacy

Technology and the Invasion of Privacy

735 words - 3 pages , creating a vicious cycle. Without technology an invader could not enter that of a stranger’s life. Conversely, without technology that same criminal would evade the law enforcers. So does technology protect citizens’ privacy, or does it expose one’s entire life? In regards to this question, one must consider: before the rise of the world of technology, privacy invasion was not a common issue. With this fact in mind it is not difficult to determine

RFID Tags and Invasion of Personal Privacy

663 words - 3 pages progression in information processing, and benefit life in public as a citizen.  Conversely, RFIDs confront the basic American right to privacy, and ones personal uniqueness.  Regardless of RFID benefits, legislation and citizen awareness will need to advance along with this technology in turn to protect themselves from invasion of their personal right to privacy. RFID tags essentially provide a way for a third party, such as a government agency or

Camera Phones and Invasion of Privacy

1070 words - 4 pages Camera Phones and Invasion of Privacy   “New technology has…….placed all of us in an electronic fishbowl in which our habits, tastes and activities are watched and recorded.” as told by Simson Garfinkel (Ojeda). In the 21st century it is easy to awe people with new technology. Take two popular gadgets, merge them into a single point-and-click device, and then watch the world go nuts over it. This is a fact that will never change. Technology

Online Data Tracking: An Invasion of Privacy?

1588 words - 6 pages , Google, and Amazon allow third parties advertising sites—you may have never heard about—to track your data and make it hard to control and inability to opt out. Tracking can occur without the knowledge of the data provider and is nearly impossible for users to recognize that a third party is tracking him or her. (Dagar) Online advertisers feel that 68 percent of Americans are not fans of targeted advertising and view it as an invasion of privacy

Invasion from Mars or Invasion of Vulnerability?

608 words - 2 pages Invasion from Mars or Invasion of Vulnerability?Orson Welles' broadcast of War of the Worlds set precedent for probably the biggest radio hoax of all time. Looking back today on the broadcast, without being exposed to the historical and cultural aspects of the time which greatly inspired the hysterical reaction, we find it harder to consider that something like that would cause such effect. During the time of the broadcast, however, America was

Technology and the Invasion of Privacy

1255 words - 6 pages actually private and personal. The Constitution grants civil liberties such as the right to privacy and should not be disregarded by the NSA. An internal audit leaked to the Washington Post revealed that the NSA breaks the law thousands of times a year. This May 2012 audit suggests that the NSA is abusing their power and blatantly ignoring the laws of the United States. The NSA claims it is nearly impossible to operate such technologically advanced

Essay on Internet Privacy - Invasion of Privacy on the Internet

990 words - 4 pages key recovery and controls over the strength of encryption are a grave danger to the privacy of law-abiding citizens and businesses, not only in the United States but all over the world. This compromises freedom and sacrifices basic privacy rights.   A new law, Senate bill 6027 (the E-Privacy Act), is trying to combat these sacrifices. This law would prohibit indirect controls or ties to encryption used for authentication or integrity

Privacy Protection Through a Code of Conduct

935 words - 4 pages In an effort to develop a viable privacy culture within the organization, the first step to achieve the enhancement of a culture of privacy protection within the department would be to develop a code of conduct. Based on the reality that such a code, usually referred to as a code of ethics is seen to be the basis of any ethics program it would only be prudent to institute the development of the same as a starting point. Such a code of conduct

The Invasion of Privacy in 1984 by George Orwell

1525 words - 6 pages Nineteen Eighty-Four was meant to bring the mid twentieth century reader a novel full of intensity, love, and manipulation but also brought something greater than all of these things. Nineteen Eighty-Four created a way for people to look into a future created by Orwell himself, a future that slowly became a reality in the years since it was written. One reality is that personal space and privacy is never granted in the novel Nineteen Eighty-Four

The Protection of the Environment Through Law

1452 words - 6 pages The protection of the environment through law is unsuccessful; as the protection of the environment has just recently begun to take affect. The protection and conservation of the environment has been a concern since the 1880’s; when European settlers came to Canada, and discovered its wealth of natural resources. The protection of the environment however has just recently become the major issue that it is in today’s society. People worldwide

Legality of the Patriot Act - A Theft of Civil Liberties or The Protection Of American Life

4600 words - 18 pages 1st Amendment rights of the American public, equal protection under the law for all races, genders, sexual orientation, and religions, the right to due process, and the right to privacy (About Us). Most of the ACLU's members are Democrats because of the beliefs the group supports including being pro-choice, as well as advocates of gay and individual rights. The ACLU is supported by annual payments from its members, as well as grants and

Similar Essays

Invasion Of Personal Privacy Essay

1407 words - 6 pages -homeland-security-dhs-routinely-spes-upon-and-disrupts-occupy-protests/5335715 Mould, John. (2010) ATA Magazine, 91(1), 12-16. Retrieved from http://search.proquest.com/docview/761339749?accountid=40611 Parker, Ian. 6 February 2012. The Story of Suicide. Retrieved from http://www.newyorker.com/reporting/2012/02/06/120206fa_fact_parker Wade, A. E. (2010) A NEW AGE OF PRIVACY PROTECTION: A Proposal for an International Personal Data Privacy Treaty. The George Washington International Law Review, 42(3), 659-685. Retrieved from http://search.proquest.com/docview/895062538?accountid=40611

Libel And Invasion Of Privacy Essay

1188 words - 5 pages Libel and Invasion of Privacy Libel and invasion of privacy are two very important issues dealing with broadcast media. The two are very similar but different from each. Libel deals more with what was actually printed or broadcast, where as invasion of privacy deals with how the information was actually gathered. Both have laws to regulate and influence what kind of information is gathered and, how it is actually obtained. Libel simply

Surveillance Cameras: Invasion Of Privacy Essay

957 words - 4 pages camera safety because security cameras can help but they can also see what you are doing it could be personal documents that get captured on these security cameras. Security cameras are now in HD formats making pictures crystal clear making it really easy to read or see text messages phone calls and numbers I like to see this as a big time invasion of privacy for anyone even if the cameras has sound they can pick up what you are saying or if that

Fire Protection Needs Protection Of The Law

1505 words - 6 pages Fire Protection needs Protection of the Law In 1864 Major Stewart Harrison, an English Engineer, gave to the world the first Automatic Sprinkler Head, his design was also in fact superior to many that followed it. But, as so often happens, it was not Mr. Harrison who gave the automatic sprinkler a practical