A
amikacin prescription person should speak with their doctor if they have a
order cheap accutane online blood pressure reading outside the normal range. Doctors can make
sale cialis recommendations on a case-by-case basis depending on the underlying risk
buy generic glyburide problems of fatal complications and the ability to prevent these events.
purchase cheapest diflucan delivery People can look for practitioners who offer a free consultation
cafergot overnight delivery to discuss the treatment and desired results. Unless another underlying
cialis order cause may be present, healthcare professionals may consider any instances
order cheap viagra of itchy skin in a person with kidney disease to
find aldactone on internet be pruritis. The doctor may administer either general or local
cialis cheap anesthetic, then insert one or more implants into the cervix,
advair rx uterus, or vagina via a catheter or metal tube. People
information no celebrex prescription buy cheap can speak with a nutritionist for further help with the
viagra overnight shipping best diet during non-Hodgkin's lymphoma treatment. Before you start treatment with.
A new law in Georgia requires that registered sexual offenders give their usernames and passwords to the state so that authorities can read their email. The objective is to protect children. Is this reasonable?
Perhaps anyone convicted of a sexual crime can be considered to have sacrificed his right to privacy. But the category is actually fairly squishy. Recall the way UK censors labeled a ’70s LP album cover as “child pornography,” and the fact that until yesterday a woman could be arrested in Massachusetts for indecent exposure or lewd conduct — with a requirement that she register as a sexual offender — if she breast-fed her baby in public.
And if sexual offenders are a real risk of using email to harm children, surely corrupt stockbrokers are a risk of using email to scam customers, etc., etc. Why not make a general rule that if anyone is convicted of a crime, the state gets to monitor all their communications?
Is that the direction we want to go in the name of protecting ourselves?
This entry was posted
on Friday, January 2nd, 2009 at 11:39 am and is filed under Privacy, Security, Surveillance.
You can follow any responses to this entry through the RSS 2.0 feed.
Both comments and pings are currently closed.
May 24th, 2009 at 9:36 pm
I’ve enjoyed reading this post, thanks. We’ve justhad our first baby 8 weeks ago and thisis exactly what I was looking for, keep up the good work.