StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security vs Human Privacy - Essay Example

Cite this document
Summary
The paper "Security vs Human Privacy" states that after 9/11, the federal government of the USA has tried to balance the security requirements with individual requirements. To ensure the government surveillance balances the different requirements, three sources of these powers have been identified…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Security vs Human Privacy
Read Text Preview

Extract of sample "Security vs Human Privacy"

The directives are aimed at providing means in which certain persons are defied such as “certain non-citizens” who are believed to cause harm. The three definitions of “certain non-citizens” bring into consideration the characteristics and behavior of an individual such as being a member of al-Qaida who has engaged or participated in terrorism-related activities and has harbored individuals with terrorism-related activities. After identification of these persons, the persons are incarcerated based on the acts performed.

The detention and treatment of detainees process have provided means and mechanisms in which persons are treated humanely without incorporating discrimination factors. Moreover, persons detained shall be allowed the freedom to religion, arrested and detained based on legislations in place and afforded adequate basic needs that include medical treatment, clothing, shelter, drinking water and adequate food. These different provisions are aimed at ensuring someone is presumed innocent until proven guilty.

Generally, after the 9/11 incident, different governments across the world have instituted different measures to address security-related issues and provide the suspects with appropriate measures to sustain these requirements. The three sources of legislation on security power and individual privacy are important in sustaining the requirements of human rights.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Identify and describe the significance of the three sources that have Essay”, n.d.)
Retrieved from https://studentshare.org/law/1631667-identify-and-describe-the-significance-of-the-three-sources-that-have-affected-the-balance-between-security-and-rights-in-the-detention-of-terrorist-suspects-since-911
(Identify and Describe the Significance of the Three Sources That Have Essay)
https://studentshare.org/law/1631667-identify-and-describe-the-significance-of-the-three-sources-that-have-affected-the-balance-between-security-and-rights-in-the-detention-of-terrorist-suspects-since-911.
“Identify and Describe the Significance of the Three Sources That Have Essay”, n.d. https://studentshare.org/law/1631667-identify-and-describe-the-significance-of-the-three-sources-that-have-affected-the-balance-between-security-and-rights-in-the-detention-of-terrorist-suspects-since-911.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security vs Human Privacy

Data Privacy and Security

In case of computer systems and information technology, integrity, privacy, and legality are considered as the most frightening factors for a computer user.... For the daily internet users, the security and privacy of computer are considered as the most vital area of computer security.... This essay discusses that at the present computer security has become a very critical issue.... security refers to the technique to discover as well as stop illicit utilization of our secret information or computer....
8 Pages (2000 words) Research Paper

Network Security

human threats subsequently can be broken into two categories: malicious and non-malicious.... The Internet has become a staple of the business world today It is because of this that a company should remain continually up to date with the latest security measures.... ulnerabilities due to designs flaws,poor security management can contribute to the loss of company assets.... The Internet has become a staple of the business world today It is because of this that a company should remain continually up to date with the latest security measures....
3 Pages (750 words) Case Study

Biometric Security and Privacy

This essay "Biometric Security and privacy" is being undertaken to analyze how predominant the role of technology happens to be in handling the security issue in general and how biometric technology has helped the security system in dealing with difficult circumstances.... A similar situation exists in matters concerning security and privacy.... As of now, it is being said that it'll be almost impossible to change the biometric features of the human body, which in turn will help the security people to prepare a reliable database and identify people with criminal backgrounds....
18 Pages (4500 words) Essay

Privacy in Electronic Commerce

The present research paper "privacy in Electronic Commerce" is focused on the technological revolution that spearheaded by the invention of the internet, and the subsequent development of electronic commerce has posed a significant threat to the conventional methods of business.... In order for individuals and firms to operate smoothly and safely in such a high tech environment, it is inevitable for those at the helm of affairs, to afford simple yet effective laws which ensure the protection of their data and maintains their privacy in this highly vulnerable virtual world....
16 Pages (4000 words) Research Paper

LOVE Individual privacy vs. national security

The individual privacy vs.... This implies that compromise of individual privacy and LOVE" Individual privacy vs.... The individual privacy vs.... national security research project will seek to establish whether the imposed anti-terrorism measure will compromise people's freedom and privacy.... This implies that compromise of individual privacy and freedom in pursuit of national security is a global as well as a national issue....
1 Pages (250 words) Essay

Surveillance Technology: Paradox in Private Security

Surveillance technique may contain qualities that potentially violate the core principals of privacy rights, but in return, there is an assumption that it has the ability to build national security assurance.... Together with the rise of surveillance technology are the consequent rackets created by privacy advocates who question the moral and legal implications brought by the rising popularity of surveillance technology.... privacy, in this discussion, evolves on the liberty of executing activities with little restrictions....
8 Pages (2000 words) Research Paper

Data Privacy and Security

This essay "Data privacy and Security" presented some of the important features of computer security those need to be maintained for the sake of effective security management.... n the case of computer systems and information technology, integrity, privacy, and legality are considered as the most frightening factors for a computer user.... For the daily internet users, the security and privacy of computer are considered as the most vital area of computer security....
8 Pages (2000 words) Essay

Making a Security Strategy for Securing Client Details of BioMed Company

"Making a security Strategy for Securing Client Details of BioMed Company" paper discusses the information of BioMed Company that needs to be secure to retain their client details for the upcoming development of a new product.... The company requires an intelligence security manager to secure information.... According to the security manager, the company should use private data that will protect its information.... The security manager is concerned about security effectiveness and how private data works with a smartphone....
13 Pages (3250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us