StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Power, Privilege, Security - Essay Example

Cite this document
Summary
Drug testing in the workplace is an appropriate response when the health and welfare of others is in potential jeopardy. The privacy rights of an employee do not extend to engaging in an activity that can cause direct harm to others. For example, a fork-lift operator in a warehouse is an appropriate candidate for drug testing…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.1% of users find it useful
Power, Privilege, Security
Read Text Preview

Extract of sample "Power, Privilege, Security"

Download file to see previous pages

Privacy does not include the opportunity to cause harm. What the employee does on his personal time that does not present a danger to others in the workplace, e.g., smoking or having unprotected sex, is not the concern of the employer, not directly under the employer's rightful control, and not subject to scrutiny through any means; much less through a device as inconsistent as a polygraph. It is not the responsibility of an employer to supervise its workers on such a microcosmic level. Even Kant, in his most moralistic application of a categorical imperative would find no duty on the part of the employer to police the employees in such an intrusive manner.

Employees are not children and employers are certainly not empowered to treat them as such. As far as the use of a pre-screening process whereby an employer determines what is and what is not acceptable activity in the private lives of its employees, a more arbitrary and capricious means of discrimination could hardly be imagined. Even the libertarian-especially the libertarian-would see such discriminatory practice as rife with the potential for abuse. My Position: I am for the Patriot Act in general because I feel that increasing police powers for the purposes of protecting the American public can be done reasonably and without violating anyone's constitutional rights.

Amendments to section. First, it clarifies the level of detail necessary to obtain a section 206 order, particularly where the target is identified by a description rather than by name. Second, it imposes a "return" requirement on investigators, meaning that in most circumstances the government is required to provide notice to the court within 10 days that surveillance has been directed at a new facility or place.Statement in Support of Section 206. As quoted above, Section 206 provides for the issuance of "an electronic surveillance order that attaches to a particular target rather than a particular phone or computer" (DOJ 1).

This section of the Patriot Act assists federal authorities in focusing their efforts on a suspect individual and monitor communication across all possible areas of communication rather than having to get court authority for each different mode. In the case of Mr. X, who intended to plant a bomb in the main terminal of Grand Central Station in New York, authorities were severely limited in their surveillance abilities. Having sufficient information from a reliable informer, authorities obtained a warrant to tap the home telephone of Mr. X. The terrorist was technologically astute, and discovered the monitoring of his conversations with the co-conspirators.

He immediately began to use a series of cell phones and private chat rooms on the Internet to prevent authorities from stopping his intended attack. Section 206 allows investigative agencies to obtain a warrant for any electronic device that Mr. X might use, and thereby provide a timely response to stop him and his associates from carrying out their plans.Counter Argument. It has been asserted that

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Power, Privilege, Security Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Power, Privilege, Security Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/miscellaneous/1500442-power-privilege-security
(Power, Privilege, Security Essay Example | Topics and Well Written Essays - 750 Words)
Power, Privilege, Security Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/miscellaneous/1500442-power-privilege-security.
“Power, Privilege, Security Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/miscellaneous/1500442-power-privilege-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Power, Privilege, Security

What Is Executive Privilege and When Does It Apply

In the modern context executive privilege is exercised when there is a need to protect national security, to maintain confidentiality of certain deliberations or investigations made in the White House.... ?? Some form of executive privilege has been exercised by Presidents ever since the refusal of George Washington to submit documents of the Jay Treaty to the House of Representatives stating that the House is not involved in the The term executive privilege does not appear in the constitution and it is an implied power that has been derived from Article II....
1 Pages (250 words) Essay

RCP 3 Chapter 3

In view of the numerous information assets that it already owns, Data Mart has no reason to be left out of the organizations already embracing the principle of least privilege.... Have uncontrolled privilege on the operation of the firewall system.... An example of a privilege would be retrieval of the backed-up data following any incidence of loss or damage.... Have wholesome control and privilege on the operation of Data Mart-owned router....
3 Pages (750 words) Coursework

Political Importance of Victims of Crime in England

Traditionally, we have been aware of groups presenting rationales for laws to be ratified in order to proffer them power or advantage.... The writer of the following research seeks to explain why Victims of Crime have become increasingly political importance over the last two decades....
11 Pages (2750 words) Research Paper

Administrators Access Control

he concern over hacking and other outside invasions of the organization's information underrates the power of intrinsic attacks.... The writer of the paper “Administrators Access Control” states that The privileges and rights bestowed upon the administrators raise concerns based on their ability to access any information within the organization's network system....
10 Pages (2500 words) Coursework

Database Security Controls

However, we can see that with all the changes and innovations, the risk on security of the databases is a new challenge and constant concern for everybody in our time.... This paper also outlines the damage, the breach in the security in database can cause.... he aim of this research is to analyze the current attacks and to assess the security of corporate databases and the related issues which are increasingly becoming significant as enterprises are growing and considering the data they have stored in them....
12 Pages (3000 words) Literature review

Executive Privilege in the United States

This paper "Executive privilege in the United States" discusses Nixon's misuse of executive privilege during the Watergate scandal and the following lawsuits which were involved.... Likewise, it will discuss major debates about the use of an executive privilege.... This symbolized a corruption that was beyond the president himself and involved the use of executive powers by various officials in different offices who abused power for various reasons and the attempt played by the president in trying to cover up for the scandal and be the dominant candidate over the congress....
8 Pages (2000 words) Essay

Information Security in Cloud Computing

The focus of this paper "Information security in Cloud Computing" is on the concept of cloud computing that is based on software as a service (SaaS), for example, Web 2.... nbsp; Information security issues related to cloud computingLoss of trustIt is sometimes s hard task for cloud service users to evaluate how trustworthy their service provider is since there is the black-box feature in the cloud services.... There lack the measurements on how to access and analyze the security level of the service provider in a formal manner....
6 Pages (1500 words) Essay

Consequences of Reproduction of Oppression

This has further led to the concept of privilege and oppression.... privilege, on the other hand, is considered as unearned benefits that are conferred upon the members of the dominant or mainstream groups at the expense of others.... iscussionThe theoretical concept of privilege and oppressionOppression is built on systems and institutions such as government and educational systems.... The dominant group is usually granted privilege which leads to the internationalization of supremacy (Ramsay, 2014)....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us