This secondary source is from a magazine called the IEEE Computer Society, and it relates to my topic because it talks about the problem of privacy on the web, and the solutions to this problem. The author of this article is a PhD candidate in the Department of Computer Science at Virginia Tech, and one of his current research interests is privacy. This article was written mainly to help people understand what internet privacy is. In this source, privacy is defined as “the right of Web users to conceal their personal information and have some degree of control over the use of any personal information disclosed to others”. Some causes for privacy problems on the web are the open environment of the web, and that there are many web-based transactions that involve personal information transfers. Web user’s personal information can be categorized as personal data, digital behavior, or communication. Violations of a web users privacy can occur because of unapproved information transfer, unsteady security, data magnets, or indirect forms of information collection. On the other hand, there some solutions to protect and individual’s privacy, such as technology-enabled solutions and regulation-enabled solutions. In the author’s opinion, new technologies have not satisfied the challenge of protecting individuals’ data while on the web. This secondary source is an article from a website called the MIT Technology Review. The author is Vivek Wadhwa, a fellow at Arthur & Toni Rembe Rock Center for Corporate Governance, Stanford University. The main idea of this article is that laws can’t keep pace with the many advances of technology that computers are facilitating. This relates to my topic because even though there are some privacy laws, loopholes are created when new technologies are not included in these laws yet. The purpose of this article is to show how technology is having an impact on almost everything in our lives. Specifically, our phones are with us at all times; tracking our habits, exposing our thoughts from our web searches, and even revealing information about our health. This information can even be used when applying for jobs. Employers can use social media as a way to screen job candidates, and as genome testing becomes more common, there are no laws to prevent employers from using genomic data in this way as well. The author believes that it is extremely unethical, and an invasion of privacy. In the author’s opinion, as technology progresses more and more rapidly, the gaps in laws become larger and humans continue to struggle keeping up.This primary source is a law that has been in effect since September 27, 1975, and overall was made to protect individual privacy. This source is related to my topic because it sets privacy standards for a person’s individual records. Overall, the Privacy Act creates a code that regulates the collection, application, maintenance, and distribution of individual information. Under this law, companies are obligated to provide the public with information about their systems of documents by publishing it in the Federal Register. Also, this Act does not allow information about an individual from a system of records to be exposed unless they have the written approval of the individual. Additionally, the Privacy Act gives individuals the power to request access to see, or modify their records, and enacts numerous record-keeping requirements. However, even after over forty years of legal evaluation, several problems in the Privacy Act remain unsettled or unexplored. This corresponds with my source #2 since it exposes how there are issues with this law because technology has changed greatly since 1974, when the Privacy Act was written.