Example of a Title Page
DATA SURVEILLANCE: The Threat to Personal Privacy
by
Sandra
Blickenstaff
Submitted To:
Rep. Pat Roberts
United States Congress
Date Submitted:
July 23, 1984
top
Example of a Table of Contents
TABLE OF CONTENTS
INTRODUCTION....................................................1
Purpose.......................................................1
Problem.......................................................1
Scope.........................................................1
THE CONCEPT OF PRIVACY..........................................2
Privacy is a Basic Need.......................................2
Privacy in Modern Society.....................................3
A Definition of Privacy.......................................3
The Importance of Privacy.....................................3
DATA SURVEILLANCE...............................................4
Government Agencies...........................................4
The IRS.....................................................5
The FBI.....................................................6
The Census Bureau...........................................6
Private Industries............................................7
Credit Bureaus..............................................7
Banks.......................................................8
CONCLUSIONS.....................................................9
The Threat to Privacy.........................................9
The Impacts on Society........................................9
RECOMMENDATIONS................................................11
top
If you have used tables or figures, you should list them in a separate table of contents called the list of illustrations. This list, like the table of contents, has its title at the top and the names of illustrations along the left column with page numbers to the right. However, a list of illustrations is divided into two parts. The first subpart lists all the tables you have used in the report. The second subpart lists all the figures (any graphs, drawings, or photographs) you have used.
Example of an Abstract
This report is about personal privacy and computerized information. The report is broken onto five main parts: The introduction, the concept of privacy, data surveillance, conclusions, and recommendations.
The introduction attempts to identify the problems of privacy that now exist. The rapid growth of computerized information has caused the Privacy Act of 1974 to become obsolete. There are definite gaps in the existing privacy laws. The focus of this report is data surveillance, the practice of accumulating, interpreting, and basing conclusions on computerized personal data. The report specifically looks into the IRS, the FBI, the Census Bureau, credit Bureaus, and banks.
The first section deals with the concept of privacy. It is important to understand privacy in order to understand the implications of this report. Privacy is a basic human need that is present in virtually every society. Privacy means the right to control personal information. The right to decide who knows what. Privacy is very important in a democratic society. Without privacy, the democratic process is likely to fall apart. Lack of privacy is often used as a means of control over citizens under tolatarian governments.
Data surveillance studies three government agencies and two private industries. These five were chosen because they represent both the largest data bases and the most serious threat to personal privacy.
It is estimated that the federal government maintains an average of fifteen files on each American. The IRS is currently buying computerized lists of information from private industries. They are using computer matching techniques to help them detect tax fraud. The information on these lists is often very personal or sensitive. The majority of the FBI's files can be accessed by police across the country. The threat here is the investigative lists and sensitive information the FBI is now attempting to computerize. The Census Bureau is the only government agency whose primary purpose is to gather information. They probably have the most sensitive personal information but they also have the best record of protecting it.
Credit bureaus have files on over 150,000,000 Americans. TRW, a large credit bureau, refuses to take any responsibility for the accuracy of the information. Banks are seen by many to be the most serious threat to privacy. Confidentiality is a myth in banking. The banks records are routinely seen by both government and private investigators. The proposal of a real-time funds transfer system is especially ominous, used for the wrong purpose it could become a very effective surveillance system.
The sections of a report are like chapters. They are usually a shorter than book chapters and they are introduced with headings that indicate their nature. Different kinds of reports call for different kinds of sections. For a list of typical formal report formats, see the templates listed on the page linked in this line. Each section should start with a topic sentence that explains the section's purpose. The rest of the section should develop the message of that topic sentence in detail.
References are a list of all the outside sources used in the report. Different
disciplines use different reference systems. For instance, some use the MLA
format, some the APA format, and some the Chicago style. Technical reports,
however, often use a numbering system. The first citation to appear is
reference one, and the second is reference two and so on. The number appears
on the page where the citation appears (right after the cite)
and then again on the reference page,
which appears at the end of the report.
Example of a Reference Page
1. Westin, Alan F. Privacy and Freedom. New York: Atheneum,
1967.
2. Samuels, D.J. "Privacy in 1984: The Dark Side of the
Computer," USA Today, 112(March,1984), 32-36.
3. Wellborn, Stanley N. "Big Brothers Tools Are Ready, but,"
US News and World Report, 52(Dec. 26,1983; Jan. 2,1984), 88-93.
4. "Computers Threaten Your Privacy," US News and World Report,
52(April 30,1984), 45-46.
5. Smith, Robert E. Privacy, How to Protect What's Left of it.
Garden Cuty, New York: Anchor Press/Doubleday, 1979.
6. Miller, Arthur R. The Assault on Privacy. Ann Arbor: The
University of Michigan Press, 1971.
7. Burnham, David. "Tales of a Computer State," The Nation,
236(April 30,1983), 537-541.
8. "The Right to Privacy," USA Today 112(April,1984)2467, 6-7.
9. "Science, Technology, and Human Rights," UN Monthly
Chronicle, 4(April,1983), 53-62.
10. Evans, Christopher. The Micro Millennuim. New York: The
Viking Press, 1979.
11. "The High-Tech Threat to your Privacy," Changing Times,
37(April,1983)4, 60-63.
The Introduction and Sections
The main body of a formal report is divided into the introduction and the sections. The intro is usually divided into a purpose statement, a problem statement and a scope statement. The purpose statement indicates what the purpose of the report is; the problem statement explains the situation in the world that called for the writing of the report; and the scope statement indicates what will and will not be covered in the report. The scope statement also serves to preview the sections of the report.
References
Appendices
Appendices (or appendix for singular) appear at the end of a report and
contain material too bulky for the report proper. Often technical reports
must contain extensive data tables or design drawings that would
break up the flow of the report if they were inserted in the body. Even
though this material is not very readable, it needs to be there for
documentation purposes. Thus, appendices are almost like files to
be consulted for specific information. The page numbering which
began in the report continues through the appendices, but each new appendix
receives a new letter. The first appendix is Appendix A, the second
Appendix B, and so on.