StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Certificates in Law - Research Paper Example

Cite this document
Summary
The paper "Security Certificates in Law" focuses upon sіecurity certificates, which have been in use in the Canadian governmental system. Since it gives the government the power to detain non-citizen individuals indefinitely without trial, it is only used when necessary…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Security Certificates in Law
Read Text Preview

Extract of sample "Security Certificates in Law"

Security Certificates in Law Security Certificates in Law While security certificates have been in use in the Canadian governmental system for a while, they have pros and cons. Since it gives the government the power to detain non-citizen individuals indefinitely without trial, it is only used when necessary. This springs the first con of the security certificates. The government can take advantage of these provisions to detain individuals wrongly. The other con is the fact that it can be used as a tool for facilitating racism.

Since it mostly affects the non-citizens, the government can wage its own war against foreigners in the name of a law. Another con is the fact that this law violates freedom rights that dictate that a person must be taken to a court of law within a short period. Lastly, the certificates deny the individual involved the access to the information submitted to the judge. In fact, even the representative of the accused does not have access to the evidence used in detaining the person. This is morally wrong as the information could be erroneous by far (What is a security certificate? n.d).

For a person to be detained, the government only needed reasonable grounds, which were not defined. When the reasonable ground is found, the certificate case is immediately converted to a deportation. However, there is one key pro, which is to protect the people of Canada from potential criminals. Deportation of suspected individuals protects the public from harm that would come through allowing suspected individuals to continue functioning freely. Very few people have ever been subjected to a certificate hearing implying that critical evidence is used to subject an individual to these hearings.

In certain instances, the person subjected to certificate hearing has an opportunity to involve witnesses to petition their release. This is also a benefit. Due to the nature of the security certificates, it is hard to imagine that they would operate without violating some crucial laws. Specifically, it violates some sections of the Charter of Rights and Freedoms. These sections include denial of a fair trial, which is a major human right, civil rights with respect to international politics, and the inability to guarantee safe deportation.

These are important laws that need to be observed. The Canadian Supreme Court allowed some Charter rights to be limited in the case of exceptional circumstances. These circumstances were not defined, and secrecy surrounds the cases that have been taken to certificate hearings. In addition, the Supreme Court had found that a framework of protecting classified information with immigration proceedings as consistent with the country’s Charter of Rights and Freedoms. The Court allowed the limitation with the argument that terrorism ought to be dealt with in any way possible.

Therefore, the safety of the Canadian citizens was the main concern that led to limiting some Charter rights. Moreover, the Court determined that detention was limiting a person’s liberties by a significant restraint indicating that limiting the Charter rights was, therefore, constitutional and ought to be followed for the sake of the nation’s security. References What is a security certificate? (n.d). Retrieved from http://www.adilinfo.org/en/what-is-a-security-certificate

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Certificates in Law Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Security Certificates in Law Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/law/1700813-security-certificates-in-law
(Security Certificates in Law Research Paper Example | Topics and Well Written Essays - 500 Words)
Security Certificates in Law Research Paper Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/law/1700813-security-certificates-in-law.
“Security Certificates in Law Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/law/1700813-security-certificates-in-law.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Certificates in Law

Notarial Practice: Duties and Responsibilities of a Notary

The law is quite equivocal in this regard.... The law is so stern about this identification process that it is not enough that the signatory to the document is known to the notary personally or makes an appearance before the notary.... (Supreme Court of the Philippines) An evidence of identity that could satisfy a notary is a driver's license, a passport, a social security card or a voter's ID....
9 Pages (2250 words) Essay

Briefing on Crime Prevention - The Rehabilitation of Offenders

To this day, lawlessness and order continue to co-exist. … There is liberty, peace of mind and reward for the law-abiding citizen.... As late as the mid-20th century, courts were unwilling to set standards for treatment of prisoners, claiming the issues of custody, discipline, security, punishment and limited resources made the situation far too complex for any effective standards to be put in place....
6 Pages (1500 words) Essay

Vulnerabilities of Networks and Internet

The paper ''Vulnerabilities of Networks and Internet'' presents a clear view of the issues involving computer networks and their security.... The good practice of info- security in the preservation of data and its role in effective network management.... Technology, manufacturers and the government work hand in hand to fortify the network structure and further enhance network security management.... The various networking security strategies are discussed along with alternatives....
7 Pages (1750 words) Essay

Sport, Leisure and Coaching Law

As per the law the person who is responsible for the safety of the ground should apply to the concerned authority for getting such certificate.... For ensuring the safety of sports grounds, the Safety of sports grounds act 1975 have given powers to the Secretary of state to issue special safety certificates or General safety certificate as an when required....
9 Pages (2250 words) Essay

Advantages of Having a Malta Flags

Again, a foreign shipping company can save a large sum of money as the minimum capital required by Maltese law is as low as with an authorised capital of £ 1250 of which a minimum of £ 250 must be paid-up.... They can register a shipping company by operating remotely by forwarding a power of attorney to their legal representative in Malta, which is generally a law firm....
8 Pages (2000 words) Essay

Types of Letters of Credit

This helps the buyer in many different cases and gives him security for his payment (Warner, 2011).... It is the type of security to the seller (Warner, 2011).... This essay "Letter of Credit" analyzes a document from a bank guaranteeing the seller that payment would be made available to the seller by the specified time....
6 Pages (1500 words) Essay

Business Data Communication and Networking

The paper "Business Data Communication and Networking" supports the argument that common security flaws for network design is also depending on users to deploy security patches.... Network deployments are currently adapting the use of WSUS to patch network workstations....
5 Pages (1250 words) Coursework

IP-SEC Site to Site VPN Connectivity

Virtual Private Network provides its users with security, functionality, and network management.... … IntroductionA Virtual Private Network (VPN) refers to a network technology developed for creating a network connection that is secure over a public network such as service provider owned private networks and the internet....
11 Pages (2750 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us