Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Protecting a child - Essay Example

Comments (1) Cite this document
This should be the case for any child regardless of whether they live with their real parents or are adopted. The safety of the minor is of utmost…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Protecting a child
Read TextPreview

Extract of sample "Protecting a child"

Protecting the Child In order to ensure a healthy and proper childhood, parents should ensure that their children are in a loving and safe environment. This should be the case for any child regardless of whether they live with their real parents or are adopted. The safety of the minor is of utmost importance in any family because it ensures proper social and physical development thus general healthy growth in a child.
In case one there are a number of issues that need to be addressed regarding John and Sheila Baldinucci and the surrogate mother of the child they claimed. First of all, it was not ethically right that there was no careful screening of the commissioning couple to ascertain their suitability over custody of the child. Even though John and Sheila Baldinucci have been married for ten years are comfortable in their relationship in addition to being well educated professionals that are respected by the community, they should have been thoroughly questioned. Issues such as unnoticed psychotic tendencies in one of the partners may affect the safety of the child in its new family. According to Dresser (2009), ‘the best way to prevent harm to children, prospective and surrogate parents is to require screening before the pregnancy begins. The intended social parent, as well as the surrogate and anyone else who might be assigned a parental role should meet standards for parental fitness.’ Even though the surrogate mother may be willing to carry the child, she may be having some problems that would affect the health of the child. As such, proper screening should be ensured.
After the court grants the Baldinucci family the custody of the child, they return to the United States with the child whom they have not legally adopted. This way, the rights of the child are not ensured since it does not have proper citizenship of the country where it is being taken. In case of any problem, the safety of the child would be at stake since it is not a citizen of the states. According to the Child Welfare Information Gateway (2012), ‘an adopted child is treated by law as if he or she had been born to the adopting parents upon the entry of the final adopting decree. Therefore, the adopted child gains the right to inherit from the adoptive parents and the adoptive parents’ relatives’ (1). With regard to these sentiments, the future comfortability of the child is at stake when it comes to inheritance of property. There being no legal documents to prove the adoption, the child may be locked out of inheritance in case there was no will upon demise. As such, it was unethical for the Baldinucci’s to overlook the correct adoption procedure.
According to the International Social Service, 1999, professionals engaged in adoption proceedings should be guided as a priority, in the perception of their work and in their practice by the needs of the child (3). The agency did not consider the privacy thus wellbeing of the child when it refused to pay the surrogate mother because she made money from her story. This only worked to expose the child even more. It means that there was uproar of the case and the child may have been affected if he or she got wind of it. However, it there was a breach of contract by her selling the story and it was explicitly stated within the contract then I agree with the agencies’ decision. In addition to this, the surrogate was completely unethical with her decision to use the photo; this may have even resulted to bullying of the child in school something that could affect her physically and mentally.
Adoption and surrogacy are sensitive issues in the society and all the parties involved must ensure utmost confidentially while putting the safety of the child in place. Proper screening should be done to ensure that the adopting as well as surrogate parents are fit to be given the parenting role. In this case, the good of the child was not exceptionally protected a factor that was not ethically right.
Works Cited
Child Welfare Information Gateway. Intestate Inheritance Rights for Adopted Persons, (2012) Retrieved on 30th November 2012 from
Dresser, Rebecca. Screen the Parents, (2009) Retrieved on 30th November, 2012 from
International Social Service. The Rights of the Child in Internal and Inter Country Adoption, (1999) Retrieved on 30th November 2012 from http://www.iss- Guide/Ethical%20Guide%2004%20ENG.pdf Read More
Cite this document
  • APA
  • MLA
(“Protecting a child Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Protecting a child Essay Example | Topics and Well Written Essays - 500 words. Retrieved from
(Protecting a Child Essay Example | Topics and Well Written Essays - 500 Words)
Protecting a Child Essay Example | Topics and Well Written Essays - 500 Words.
“Protecting a Child Essay Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
binsjustina added comment 20 hours ago
Student rated this paper as
The topic of "protecting a child" is quite often seen among the tasks in college. Still, this text opens a new perspective of seeing the issue. I’ll use the manner for my own research.

CHECK THESE SAMPLES OF Protecting a child

Protecting the homeland

...? Protecting the Homeland Your Full Your Protecting the Homeland Preparedness is a concept that defines readiness or being prepared for what is coming. There are several ways of implementing a preparedness plan for federal agencies. Homeland Security regulates strict quarters on dealing with the control of minimizing possible terrorist attacks. However, there is on segment of United States soil that can be considered a wild card against upcoming attacks by terrorists. That wild card would be the United States Federal Prison System. Discussion Being able to comprehend the extent to which preparedness has to be integrated one must understand that it is not a definite means to an ends. There is no specific...
12 Pages(3000 words)Essay

Protecting our Boaders

...? One of the most politicizing issues in American politics today is that of protecting American borders. Aside from border patrol issues and immigration debates, the changing approach of airport security has been both scolded and applauded. This issue is important to Americans because it affects citizens every day as they enter airports and board flights, all under the observation of the Transportation Security Administration. TSA has changed in recent years, modifying its mission to include searching passengers at random, prohibiting certain items, and beefing up security in general with an overall goal of providing more comprehensive security for passengers. American opinion on this aspect of border...
5 Pages(1250 words)Term Paper

Protecting our Environment

...? Protecting our Environment Larry Buenafe LIB 320 Prof. Samilia Amanyroufpoor January 30 Protecting our Environment “Mankind is systematically destroying the sensitive ecosystems which support life on earth. To date, very little effort is being made to stop and correct the damage being done” (Butisingh, 2008). Environmental protection is one of the hotly debated topics in the world at present. Majority of the human activities are negatively affecting our environment in one way or other ways. Heavy Industrialization, increased, automobile use, increased usages of fertilizers, chemicals and pesticides in agricultural lands, dumping of toxic substances like e-wastages etc are polluting, our...
9 Pages(2250 words)Essay

Securing and Protecting Information

...? Security and Protecting Information Securing and protecting information Development of information securitystrategies protecting complex data and information across a wide network while also improving system performance as well as ensuring easy data retrieval when necessary is one of the most challenging tasks in network design (Dhillon, 2007). This is even made worse by the porous and complex nature of modern transactions and the increasing demand for safe and secure information storage and retrieval mechanisms. The process of securing and protecting information refers to defending data and information from unauthorized access, disclosure, modification, inspection, use...
3 Pages(750 words)Essay

Protecting asylum seekers

...PROTECTING ASYLUM SEEKERS The European Convention on Human Rights 1950 Versus UN Convention on Status of Refugees 1951". Introduction The provisions of European Conventions on Human Rights, 1950 vis-'-vis those in UN Convention on Status of Refugees, 1951 have been found to be more effective in providing protection for the asylum seekers within European countries. In most countries, an individual appeal to an international tribunal can only be done under provisions of European convention on Human Rights, 1950. This is the most effective safeguard for asylum seekers and refugees despite it giving priority to individuals over the state. Many principles laid down by the Court have played a significant role in securing the rights... of...
10 Pages(2500 words)Article

Protecting Intellectual Property

...Essay plan: Protecting Intellectual Property Marjorie Allen Although businesses should take as much care of their ideas as they do the rest of their property, they frequently fail to do so. (Essay title A) Ideas can be considered intellectual property if they are developed into a specific plan from idea to useful structure. By looking into all aspects of the way in which the idea can be presented in the workplace and protecting that presentation through copyright, patent, design rights, or trademarks (Business Link: Protecting Your Intellectual Property, 2005), the idea then becomes an intellectual property with the owner holding certain exclusive rights depending on the method of protection that is chosen. Because protection... of...
6 Pages(1500 words)Essay

Protecting Homeland Security

...Protecting Homeland Security The U.S. Homeland had faced gargantuan challenges in the recent years. The tasks involved in protecting our nation have been daunting. The magnitude of the repercussions derived from the 9/11 experience, we have realized that U.S. is not invincible. Indeed, the U.S. armed forces need to be restructured in order to more effectively prepare for threats to national security in the 21st century. To enhance military preparedness, officials advocate a process known as "military transformation", whereby the U.S. armed forces would modify nearly every aspect of their identity, from how they plan and manage wars to how they train troops and where they maintain military...
2 Pages(500 words)Essay

Protecting and Improving Quality

...Protecting and Improving Quality Protecting and Improving Quality A report on the of health services revealed many discrepancies in the American health sector. A number of questions service qualities in hospital were put forth. Citizens were frustrated because they were yearning for better services and had many expectations from health providers. Various strategies were put forth on the plan on how they could transform the sector amid a lot of criticism from different sectors. It came up with six objectives that needed to be improved for quality services to be enhanced. These aims are providing safety for patients, equity in the provision of health services, efficient utilization of resources,...
1 Pages(250 words)Assignment

Protecting Private Property

...Protecting Private Property Hitler appeared to adopt a capitalist stance here by emphasizing and elevating the value of private property. It is a known fact that capitalism derives from the need to provide individuals with the opportunity to enrich themselves using whatever means possible as well as the need to create classes of people depending on access to wealth and resources (Sen 14). Capitalism also derives from the need to develop fast and efficient manufacturing and production methods to support rapid growth. In the process, it creates, directly or indirectly, clear distinctions between various classes of people. It is quite surprising that Hitler used this phrase; there are several ironies in such an utterance...
5 Pages(1250 words)Term Paper

Protecting Information Resources

...Protecting Information Resources Two examples of a computer crime or fraud include infiltrating computer system and inserting a virus or other pollutant into a computer network. One recommendation for preventing or reducing ID theft is protecting one’s Social Security Card by refraining from carrying it when not necessary. Holders should not carry their Social Security Cards in their wallets or purses. Writing one’s social security number on a cutout paper and putting it in a wallet or purse is just as risky. Another recommendation is safeguarding one’s PINs. ATM cards, social security cards, online bank accounts, and registration cards have personal identity numbers that on should always secure. A...
1 Pages(250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Protecting a child for FREE!

Contact Us