We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Case study - legislation and security in zoos - Essay Example

Comments (0)
WESTERN LOWLAND GORILLAS IN ZOOS Customer Inserts His/Her Name Customer Inserts Institution Name Customer Inserts Date: Introduction Throughout history, facilities that exhibit wild animals to the public have always existed. The term zoo was first coined by newspapers in 1847 to describe the Clifton zoo and has since been used to describe confinement facilities for displaying animals to the public…
Download full paper
Case study - legislation and security in zoos
Read TextPreview

Extract of sample
Case study - legislation and security in zoos

Download file to see previous pages... 2) notes that it is possible that the UK has the highest level of Animal Welfare Legislation in the world. The western lowland gorillas are a subspecies of Gorilla that resides in lowland swamps, primary and secondary forests in central Africa. At the moment, the western lowland gorillas face extinction due to a number of factors. Some of the factors include poaching, deforestation, and disease outbreak especially Ebola. The Western Lowland Gorilla was classified as a critically endangered species on 2007 based on a reduction of population of over 80% over three generations (Genton 2013, pp. 2). Several legislations have been put in place to conserve wild animal all over the world, especially those designated as critically endangered. In the UK various laws have been put in place to protect critically endangered animals put in zoos. These legislations include: Cruelty to animals act, 1876 Protection of animals act, 1911 Dangerous wild animals act, 1976 Endangered species (import and export) act, 1976 Animals health act, 1981 Zoo licensing act, 1981 European Council Zoos Directive 1999/22/EC In 1896, the UK parliament passed the Cruelty to Animals act that defined limits on animal experimentation and established a licensing system for this experimentation. It instituted that researchers faced prosecution for cruelty if they did not conform to its provisions that required painful experimentation on animals to be carried out only when the proposed experiments are critically essential to save or prolong human life (Cruelty to Animals Act 1876, c.77). The Protection of Animals Act is legislation passed by the UK parliament and received the Royal Assent in 1911. It is basically a consolidation of various legislations, repelling other legislations such as the Wild Animals in Captivity Protection Act 1900 and the Cruelty to Animals Act 1849. This legislation however has largely been repealed by the Animal welfare Act 2006. The Dangerous Wild Animals Act 1976 was enacted to ensure that dangerous wild animals kept by private individuals (as was the fad in the late 1960s and early 1970s), were kept in circumstances that did not endanger the public while also safeguarding the welfare of the animals (Dangerous Wild Animals Act 1976, c. 38). The Endangered Species (import and export) Act 1976 is a legislation of the UK parliament that seeks to restrict the importation, exportation and sale of certain animals and plants deemed endangered as well as their derivatives such as elephant tusks (Endangered Species (Import and Export) Act 1976, c. 72). The Animal Health Act 1981 is a legislation enacted to prevent and deal with various diseases affecting animals under human care. It established inspection regulations by approved government official and also set up a means with which the government can aid in preventing and curing animal diseases (Animals Health Act 1981, c. 22). The Zoo Licensing Act was established by the parliament to regulate zoos through registration with local authorities. The act requires all zoos to be inspected and licensed thus ensuring that animals confined in enclosures are provided with a suitable environment that ensures that they can express their normal behavior. The act also lays out conditions that zoos must keep to prevent escape leading to captive animal being injured or compromising public safety (Zoo ...Download file to see next pagesRead More
Comments (0)
Click to create a comment or rate a document
Security Case Study
Like many organizations, the top management of Walter Widget focuses on the safety and security of manufacturing plant. As the thefts are on the rampant, the worries of Walter Widget are on the verge of increase. To address this issue Walter Widget and the members of business communities are in favor of having an effective security plan to eliminate the chances of stealing factory assets.
10 Pages(2500 words)Research Paper
The information security policy will provide a potent shield against threats, mitigation of vulnerabilities and resolution of the weaknesses while providing the framework for the build-up of its information technology infrastructure (Andress). The information security policy will also provide the strategic parameters and guiding principles of the operation of CMS that is geared towards securing information assets (Whitman and Mattord).
10 Pages(2500 words)Essay
Information Security Management ( Study Case )
Nowadays, information security has gained so much popularity and in number of cases, it’s giving an extra advantage to organizations. Not only employees need to understand the importance of information technology but top management must be willing to adopt an IT environment in their organization (Chapter 3).
7 Pages(1750 words)Essay
Case Study 3: Mobile Devices Security
In addition to that, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user’s credentials and ultimately money. It can also be seen that mobile devices can also spread malware.
8 Pages(2000 words)Essay
Case Study in Comuter Security
The MPS staff members are faced with multiple identities resulting due to the different job role they play, but they can make use of Claims-based identity and the Role-Based Access Control (RBAC) to solve the problem. Security Token Service (STS) How it works Claims-based identity entails a common way of using applications to acquire required identity information about users within their organizations, from other organizations, or from the internet.
8 Pages(2000 words)Essay
Information security legislation
Organization currently need standards, in the past many organization mostly tended to use a single information security standard for example BS 7799 part 2 (an
19 Pages(4750 words)Essay
Case Study - Homeland Security Issue
Statement of the Purpose. The purpose of the research is to determine the relationship of the Homeland Security policy and the terrorist group responsible
11 Pages(2750 words)Essay
Case study/Presentation of social welfare legislation
The man slaps her wife around, and threatens to kill her by using a kitchen knife. The man, on most occasions sexually abuses his wife, and uses extreme violence such as pulling his wife’s hair. However the woman is reluctant to press charges
6 Pages(1500 words)Assignment
The Narcotic Addict Rehabilitation Act of 1966
Analysis of drug use in U.S. and social factors is considered to be broad aspects. The history of drug abuse has shown the details attached to particular drug use and patterns are determined by how people interpret everyday life. In today’s world, controlled
5 Pages(1250 words)Research Paper
Security Incident Case Study
Given that the extent of the danger cannot be ascertained, United States has taken costly measures, in variety of ways so as to re-establish safety. Terrorism has proven to be a global problem and in order to curb it, strict measures have been enacted in the process of
1 Pages(250 words)Essay
Let us find you another Essay on topic Case study - legislation and security in zoos for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us