WRITING TASK 2 You should spend about 40 minutes on this task. Some people believe that governments should have access to people’s mobile phone call records and messages for safety reasons. Others believe that this information is private and should not be available without permission. Discuss both these views and give your opinion. Give reasons for your answer and include any relevant examples from your own knowledge or experience. Write at least 250 words

People
have different opinions about the
access
to individuals' mobile phones.
While
some
people
believe that the government should monitor phone calls and
messages
, I believe that everybody has the right to privacy and that information should not be available without consent. Having
access
to individuals' call
records
and
messages
is something that the governments can review to protect the public.
Furthermore
, different governments can listen to the call
records
or download your
messages
when the keywords activate the system because are suspicious of committing a crime.
For instance
, in my country, the
police
can use
this
system, one day they opened an investigation against an individual who was a suspect of committing paedophilia. After a few months of thorough investigation and reviewed call
records
and
messages
, the
police
could imprison
this
person and stop his unlawful activity.
Although
discovering criminal activities is a good reason to
access
the public's information, I believe that the right to privacy should be present and the authority must ask for permission.
In addition
,
people
are not committing crimes daily, and
that is
the reason that the ministry should implement a system to detect illegitimate
people
.
Nevertheless
, the ministry should ask for permission to read
people
's generated data if they do not have enough exhibits of criminal activity.
For example
, the news talked about a
police
department that was listening to call
records
of someone who was acting suspiciously in the town.
However
, they realized when all the
police
department appeared in his house that the person in question, was preparing a surprise party for his wife.
To conclude
, even though the government wants to
access
people
's information for safety reasons, I believe that they should ask for permission or have enough criminal exhibits to review individuals' data generated.
Submitted by jessica.pastor.87 on

Unauthorized use and/or duplication of this material without express and written permission from this site’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Writing9 with appropriate and specific direction to the original content.

task achievement
Ensure that every argument you present is clearly backed up with relevant details or examples. While your current examples are relevant, further clarification or additional cases could enhance the strength of your arguments.
task achievement
Work on the precision of your language to avoid any potential misunderstandings or inaccuracies. This will ensure that your argument is portrayed as professionally and effectively as possible.
coherence and cohesion
Consider using more varied transitional phrases to enhance the coherence of your essay. While the current transitions are effective, incorporating a greater variety can further improve the logical flow between points.
task achievement
The essay provides a balanced discussion of both viewpoints, showcasing a thorough understanding of the topic.
coherence and cohesion
Your introduction and conclusion are clear and effectively frame your argument, guiding the reader well through your essay.
task achievement
You have effectively used relevant examples to illustrate your points, which enriches the discussion.
coherence and cohesion
The main points are logically structured and are easy to follow, which contributes positively to the coherence of your essay.
Topic Vocabulary:
  • Surveillance
  • Civil liberties
  • Oversight
  • Intrusion
  • National security
  • Counterterrorism
  • Wiretapping
  • Data encryption
  • Privacy rights
  • Authorized access
  • Judicial oversight
  • Illegal monitoring
  • Telecommunication data
  • Personal communications
  • Unwarranted intrusion
  • Transparency
  • Accountability
  • Civilian oversight
What to do next:
Look at other essays: