Some people believe that government access to phone call records and messages will contribute to safety and
security
. Use synonyms
However
, Linking Words
this
Linking Words
also
poses a risk of breaching the personal life and liberty of the public, which would be unconstitutional and dangerous. Linking Words
This
essay will Linking Words
further
provide reasons to support both sides and will offer an opinion Linking Words
at the end
.
The government is responsible for the safety and Linking Words
security
of the people within its jurisdiction and to uphold Use synonyms
this
, they may practice Linking Words
security
measures that involve breaching personal data. The state might need Use synonyms
such
information to maintain national sovereignty or when there is a national threat. Linking Words
For example
, Israel developed software named "Pegasus" that can be used to extract personal information and is used by the state to remove threats within the country or at the international level.
Linking Words
On the other hand
, people Linking Words
also
have the right to life, which is a constitutional right stating that their personal data cannot be used by the country in any form unless there is a Linking Words
security
issue. The power should not be absolute as it could be used negatively, with state officials potentially using it to suppress opposition and remain in power. Use synonyms
For example
, in India, some opposition leaders alleged that their phones were hacked by the government and were warned by Apple about Linking Words
this
. In my opinion, there should be a limit to the extraction of mobile phone data and it should not be used as a method to control the public.
Linking Words
To conclude
, it should be kept in mind by the departments that practice Linking Words
such
methods that they should only be used to uphold the sovereignty of the country and not for personal gain by any political party in power.Linking Words
mannadarshpal13