专八题目:

Does Personal Information Inquiry Personal Privacy?

专八范文:

With the gradual awareness of personal privacyand the consequences resulting from privacyintrusions, more and more people become cautiousabout their privacy protection. However, recently,one can have access to any person’s detailedinformation. By inputting a person’s name and his orher ID number, we will confirm whether the itemsmatch each other. If the two match, we will see the picture of its owner. We can also bind ourmobile phone numbers, email accounts, and other information with the general identitynumbers in the system.

随着人们个人隐私意识的加强,以及人们对隐私泄露后果的认识,越来越多的人开始加强了对隐私的保护。但是,现在人们可以了解别人的详细情况。他们会输入人名,或是他们的身份证号,我们将会确认这些信息是否匹配。如果信息匹配,那么,我们将看到他人的照片。我们还能看到他人的手机号码、邮箱、以及其他信息,他人的个人信息都将显示在系统中。

Under the authorization of us, any person can have access to our detailed information.Although according to the personal information inquiry service provider it satisfies the currentneeds of our society, some people hold the opinion that the service will intrude personalprivacy. As for me, I agree with the latter opinion.

有了我们的授权,任何人都能够看到他人的详细信息。根据私人信息询问服务人员,这些信息满足了社会的需要,许多人认为这种服务侵占了他人的个人隐私。我本人认同后一种观点。

Firstly, as the service is based on its database connected to the Internet, it is likely that hackerswillhave easy access to anyone’s personal information at will. This concern is not anexaggeration. Even the claimed most secure pentagon website has frequent unwantedvisitors, that is, hackers, how can we trust that the service is able to protect our personalinformation from being exposed to hackers? Besides, as our privacies have been converted toa form of commodities, it is likely that motivated by money, employees ofthe service providermay sell our “privacy products” for their own benefits.

首先,这种服务是基于与互联网相连的数组网,黑客会很容易地了解个人的详细信息。这不是夸大其词。甚至五角大楼的网站也经常有黑客的身影,这就是黑客,那么,我们又如何能够相信这种服务能够保护我们的隐私不受黑客的侵害呢?此外,我们的隐私已经转变成了一种商品,这样的举动很有可能是通过金钱而驱使的,服务人员很有可能会因为金钱而出卖他人的个人信息。

Secondly, while the service provider boosts that it is reliable in that it will not provide personalinformation without due authorization of the person, we must bear in our mind that someChinese people are excellent at making fake certificates and authorization documents. As therequired procedure indicates, anyonecan manage to know what he desires to know if he canprocure his target’s authorization and a copy of thetarget’s ID card. As a matter of fact, it isonly a technical matter for some malicious guys to obtain a copy of his target’s ID card, andmake a fake authorization document.

第二,这种服务声称是可靠的,并说这种服务在没有本人的授权下是无法获取的,我们必须要记住的是许多人很擅长造假学历以及假授权书。就像这一流程所显示的,任何人都能够知道他想知道的,前提是他能够获得本人的授权,或者是本人的身份证复印件。事实上,对于一些坏人来说,获取本人的身份证复印件或是授权书只是技术问题。

In sum, as the real world is teeming with malicious people driven by money, and the Internetsmart hackers, our privacies are likely to be put at the mercy of those guys. The serviceprovider seemingly contributes a lot to telling those malicious guys where to find our personalinformation. Finally, I can not help wondering why the service provider is able to collect ourpersonal information without our authorization. Have not our privacies been intruded?

总结,现实世界充斥着为了金钱无恶不作的坏人,还有一些网络黑客,我们的隐私很有可能掌握在这些人的手中。这样的服务似乎在帮助那些想要获取他人个人信息的坏人。最后,我不禁要想为什么这些服务人员能够收集他人的个人信息,而没有通过本人的授权。我们的个人信息被侵犯了吗?