How does technology produce an opportunity to compromise privacy?

How does technology produce an opportunity to compromise privacy? Be sure to include examples found through original research.

APA FORMAT