Explosive growth in the use of tools such as computer databases, the Internet, and mobile telephones has sparked new questions about the boundaries of electronic privacy. This book offers easy-to-find information, as familiar finding tools are used to guide the reader.