Free Essay

File

In: Business and Management

Submitted By tony92
Words 2131
Pages 9
Summary
“Privacy is something cherished by almost all Americans. It is the right to live life without the government prying into what we done right to be let alone. Privacy allows us to develop into individuals with our own thoughts, beliefs, hopes, and dreams. It permits us to decide how to live our lives in our own homes. Privacy allows adults to decide who to marry, whether to have children, and how to raise a family. The right to privacy restricts how the government can investigate our lives.” – Ellen Alderman
Today, when voyeurs, marketers, and the curious are invading so many aspects of what has traditionally been considered the individual's inviolate personal domain, this book is a God- send in helping us understand what it is we have with the right to privacy, and also in helping us to focus on what is so much at risk. While the word "privacy" appears nowhere in our
Constitution, a majority of Americans fervently believe that their right to privacy is a key element which is central to the way they live their public and personal lives, and that it is also key to the viability of the democratic system. Given the fact that it is a somewhat abstract, ambiguous, and difficult idea to define, privacy is indeed seen as being a critical and irreplaceable basic right of individuals.
For example, the freedoms of expression and religion in the First Amendment protect the right to have private thoughts and ideas. The Fourth Amendment says the government may not arrest a person or search his house without good reasons. The Fifth Amendment says a criminal defendant does not have to testify against himself at trial. That means he can keep private any information about the crime he is charged with committing. These Amendments, however, do not say Americans have a general right to privacy. Where, then, does the right of privacy come from? The Supreme Court developed it through decades of interpreting the U.S. Constitution.
In this wonderful, eminently accessible, and very readable book, Ellen Alderman and
Caroline Kennedy, produce a gem of a work that offers a thoughtful, absorbing, and provocative overview of what the generally perceived right to privacy means for us as citizens and individuals. Using a well-integrated series of landmark cases, trial decisions, and an entertaining plethora of anecdotal situations, the authors render this abstract, complicated, and critically important legal right much more understandable and comprehensible.

JOAN W. v. CITY OF CHICAGO
The Strip Search Cases Joan, a physician in her mid-thirties practicing in Chicago, was arrested for a traffic violation on January 28, 1978. Five female police department employees (the matrons), strip searched her. During the search, Joan was forced to remove her clothing and to expose the vaginal and anal areas of her body. The matrons threatened her when she initially refused to comply, used vulgar language, and laughed at her. Joan testified that the incident caused her emotional distress that manifested itself in reduced socializing, poor work performance, paranoia, suicidal feelings, depression, and an inability to disrobe in any place other than a closet. She introduced evidence tending to show that she was peculiarly sensitive to the kind of physical violation she had endured because she was a private person who even during high school gym classes could not completely disrobe in front of others and was conscious of her physical disabilities caused by her chronic arthritis. According to the book, a federal district court decided that, even in the form described by the city, the strip search policy was unconstitutional. The court did say that a strip search may be justified if it were reasonable grounds to believe that a woman was hiding contraband in a body cavity. But a strip search of a woman arrested only for traffic violation was unreasonable under the Fourth Amendment. Furthermore, the women of the 1978 Chicago case trials were awarded an over $100,00 by the court for damages that the matrons had committed. Although the women went home with a “flagrantly extravagant” amount of cash, they also went home angry for what the matrons had caused them emotionally. I agree with the court in deciding to give the women a large amount of money for what they had gone through, but I disagree with them for not putting a tougher strip search policy.
Also, they judges did nothing to the matrons who had been a part on strip searching women for little causes.

FROM GRISWOLD TO CASEY
The Contraception and Abortion Cases
If privacy protects the right to avoid getting pregnant by using birth control, does it protect a right to end pregnancy by having abortion? This is one of the most fiercely debated questions in the United States. Abortion rights activists say women, whose bodies are the ones affected by pregnancy, have a constitutional right to have an abortion. They say the medical risks and long term consequences of having a baby give women this right. Opponents of abortion say an unborn fetus is a living person with a right to life.
For them, abortion is murder. In the landmark decision of Roe v. Wade (1973), the
Supreme Court said privacy protects the right to have an abortion until the fetus, the unborn, can live outside the mother's womb. At that point, the state can protect the unborn's life by preventing abortion unless it is necessary to save the mother's life. After Roe, people continue to argue, sometimes violently, about whether abortion should be legal. I don’t/do agree with Roe v. Wade judge decision for personal beliefs. I agree a woman should only be given the right to abort in events where she has been raped and/or sexually abused. Unless the unborn fetus was a cause of unprotected sex, then I disagree, the woman should not have a right to kill an unborn life. I also agree that an underage girl who has been sexually abuse or raped should undergo the decision to abortion with parental approval. QUILL v. KOPPELL
The Right-to-Die Cases
The last case was the issue in Cruzan v. Director, Missouri Department of Health (1990).
After an automobile accident in 1983, Nancy Cruzan was alive but unable to move, speak, or communicate almost no hope of recovery. Believing Nancy would not want to live like that, her family decided to shut off her life support system. The State of Missouri would not allow it, so
Nancy's family took the case to the U.S. Supreme Court.
Although the Supreme Court decided in Missouri's favor, it also said Americans have a right to refuse unwanted medical treatment, even if it will result in death. In other words, the right of privacy includes a right to die. Nancy's family was allowed to remove the life support system only after coming up with more evidence that Nancy would not want to live that way.
The right of privacy lets Americans decide how to live. Does it also protect a right to die?
If a person has only six painful months to live while dying from cancer, does she have a right to end her life to avoid the pain. Can a family shut off the life support system for someone who will be in a coma for the rest of her life?
The right to die came up again in Washington v. Glucksberg (1997). Washington, like most states, had a law making it illegal to help someone end her life. A group of physicians and terminally ill patients filed a lawsuit saying the law interfered with the right to die. They argued that people who are dying from painful illnesses have a right to end their lives with dignity rather than suffer until death. The Supreme Court disagreed. It said the right to die in Cruzan was a right to refuse medical treatment. The right of privacy does not include a right to be killed with medical assistance. I agree with the judges’ decision to involve family members in order to allow the state to separate an individual from life support only if the victim wants to and is allowing it. I also agree with the judge to make sure that the victim gives a sign to approve the removal of life support.
What I don’t agree is the judges’ decision to allow the medical staff to slowly deteriorate the victims health with medicinal procedures. The medical staff and hospital should not be allowed to slowly kill a victim by giving them medicine. It’s against the constitutional law.

SHOARS v. EPSON AMERICA, INC.
High-Tech Monitoring
Accoring to the book, Americans are protected by privacy laws to a certain degree. The federal Omnibus Crime Control and Safe Streets Act of 1968 regulates the government's use of wiretapping to listen to telephone conversations. The Privacy Protection Act of 1974 and the
Freedom of Information Act require the government to be fair when it collects, uses, and discloses private information. Sometimes, however, people file lawsuits saying the government has gone too far with an investigation.
That was the case in Watkins v. United States (1957). In the 1950s, Congress was investigating communist activity in the United States. Communists were members of a political party that wanted to overthrow the federal government. John T. Watkins, a labor union official, was called before Congress to testify about known communists. Watkins refused to identify people who used to be, but no longer were, members of the Communist party. Watkins was convicted of contempt of Congress for refusing to answer such questions, but the Supreme Court reversed his conviction. The Court said Congress does not have unlimited power to investigate the private lives of American citizens.
The end of the twentieth century has been called the beginning of the Information Age.
Computers store vast amounts of information about people. Americans naturally are concerned about private information becoming available to the public. They also fear invasion of privacy by governmental agents trying to investigate criminal activity. At the same time, the government needs to investigate and catch criminals to bring them to justice.
Right to privacy cases came into the Information Age in Whalen v. Roe (1977). New
York State had a computer system that stored the names and addresses of patients who received prescription medicines and drugs. The system was designed to control the illegal use of such drugs. Patients filed a lawsuit saying the computer system violated their right to privacy. The patients were afraid they would be called drug addicts if the public got access to the prescription information. The U.S. Supreme Court said the computer system did not violate the right of privacy because the law required New York to keep the prescription information secret. As computers become more powerful and store ever increasing amounts of information, Americans need to work harder to protect their right to privacy. I agree with the judges’ decision to deny the lawsuit. Every person is required to filed information in order to keep medicinal substances in check. Computers maintain drugs in check according to names, symptoms and addresses. It provides a good service for people who try to corrupt the system when trying to get drugs. On the other hand, I disagree with the judges’ decision with allowing the federal government to allow a full detention and suppression on a person who wouldn’t provide names of members of a communist party. It is against the constitutional rights to privacy of identity.

Personal Note
The book examines six general areas of tension and concern regarding the right to privacy; privacy versus law enforcement, privacy and yourself, privacy versus the press, privacy versus the voyeur, privacy in the workplace, and privacy versus information. In examining each of these issues, the authors engage what the right to privacy means in practical terms. For example, can one refuse to comply if a police officer asks permission to look through one's luggage? Does your employer have a right to know your sexual orientation? Can the electronic media invade your home in pursuit of a hot story? In each of these cases, they also show how the rights to privacy must be seen and understood in the context of other public and individual rights and prerogatives.
In all this cogent and compelling narrative, one hear the consistent voice of caution and reason, for the authors are mindful of the fact that we live in a society in which our individual rights as citizens and individuals are under continuing assault, and are very much under threat from other competing needs and concerns. This is an extremely thoughtful, straightforward, and an eminently compelling argument on behalf of public education and enlightened self-interest.
This is a wonderful book, and one I highly recommend. Enjoy.

Similar Documents

Free Essay

File

...The first thing that most new users shifting from Windows find confusing is navigating the Linux file system. The Linux file system functions differently than the Windows file system. I will compare and contrast the differences of both and takes you through the layout input/output systems of both. In Linux, there is only a single hierarchal directory structure. Everything begins from the root directory which is represented by the symbol /, which then expands into sub-directories. Windows includes various partitions and then directories under those partitions; Linux places all the partitions underneath the root directory by mounting them in specific directories. In contrast, Windows uses the letter C as its root directory. In Windows, various partitions are detected during the boot process and are assigned a drive letter. Under Linux, the system must mount partitions and devices during the boot process; otherwise it will be unaware of its existence. This might not seem very convenient to provide access to your partitions or devices, but it offers greater flexibility. This is known as the unified file system in Linux which offers several advantages over the Windows file system. For example, let's examine the /usr directory. This directory resides off the root directory and contains most of the system executables. With the Linux file system, you can choose to mount it off another partition or even off another machine over a network connection. The underlying system will...

Words: 309 - Pages: 2

Premium Essay

File Management

...File Management The File System Manager (also called the File Manager or File Management System) is the software responsible for creating, deleting, modifying, and controlling access to files – as well as for managing the resources used by the files. The File Manager provides support for the libraries of programs and data to online users, for spooling operations, and for interactive computing. These functions are performed in collaboration with the I/O Manager or Device Manager. ➢ Responsibilities of the File System Manager: The File System Manager has a complete job. It’s in charge of the system’s physical components, its information resources, and the policies used to store and distribute the files. To carry out its responsibilities, it must perform these four tasks: 1. Keep track of where each file is stored. 2. Use a policy that will determine where and how the files will be stored, making sure to efficiently use the available storage space and provide efficient access to the files. 3. Allocate each file when a user has been cleared for access to it, then record its use. 4. Deallocate the file when the file is to be returned to storage, and communicate its availability to others who may be waiting for it. The File System Manager’s policy determines where each file is stored and how the system, and its users, will be able to access them simply – via commands that are independent from device details. In addition, the policy must...

Words: 2584 - Pages: 11

Free Essay

Batch Files

...Batch Files: What is it and its harm Devry University The early business computers systems developed in the 1950’s showed how efficient they were by processing large group of records. They did all of this in batches. In the 1960s, computer engineers introduced interactive terminals. This would allow users to input for the very first time. Now today, even with use of laptops, home computers, and mobile devices. Most of the business and organizations still use some type of batch file processing for most of their applications. A batch file is a collection of commands that are processed in a certain order sometimes requiring the user to input information. With a computer using an operating system like Windows. A batch file is stored in a .bat file extension format. Most other operating systems may determine a batch file in a command file, using two or more commands that are processed one right after another. Just to perform the task at hand. Batch files are normally used to load programs, run different task at one time, and to perform repetitive tasks. An example of a batch file could be to back up files from different computers to a storage device or run the diagnostics on a system or process some type of log files. Batch files can start working at any time and can be left completely alone until the process is finished. The one of the main advantages to using batch files is the accessibility. A person can make the file entry themselves and...

Words: 710 - Pages: 3

Premium Essay

File Access

...File Access Computers have become an important tool for the companies. They are used as time clocks, keep track of inventory, to communicate with customers and to do research. In some cases, the computer is used to assign tasks and inform employees of upcoming events. Though computers are good tool and resource, there is the potential an employee may misuse or access files they have no clearance to access. For this reason there is a need to restrict access. If a company has 5000 employees who have access to the computer system and there is a need to restrict 10 users from accessing a specific file, there is a need to establish protocols to prevent access. How this is done differs in each operating system. In Unix there are ways to set parameters for the 4990 users to access a single file. These are set within the types of files. They are called regular, directory, special, named pipes, links and symbolic links. Unix operating systems operate these files and routes them into a uniformed system that operates in the background supporting files and giving disk space as needed for files. This is done by using inode (Index node) which controls information the system needed for a specific file. Multiple files can be connected to one inode, but if active the inode will only be associated with one file and a file will be controlled by one inode. A file’s attributes, permissions, and control information are stored within the inode. In the FreeBSD inode for example has...

Words: 654 - Pages: 3

Premium Essay

File Management

...File Management Nina N. Rountree POS 355 Terrence Carlson June 10, 2013 Operating systems that have numerous users with various security level clearances will require file protection. A UNIX operating system with 5,000 users could implement conventional UNIX file access controls if 4,990 of those users share the same level of security clearance. By means of a file access control structure on the UNIX operating system, each individual user is given a user ID (special user identification number). Users on a UNIX operating system will be allocated to a main class and possibly a variety of classes that will be associated with a unique class ID. Whenever a user creates a file, it is indicated by the individual’s unique user ID along with the user’s main class ID. Each individual user's accessibility is managed by the administrator with a file access control security type structure. The administrator can manage the permissions of all three main classes; read, write, and execute. Access is permitted to three types of users: the creator or owner of the file, the class the file belongs to, and various users with access to the system despite their class. The access control policy affects the level of access that is permitted by whom and under what conditions. Discretionary Access Control (DAC) manages permissions based on the requester’s identity and the regulations linked to access and permissions. Mandatory Access Control (MAC) manages permissions based on assessing protection...

Words: 526 - Pages: 3

Free Essay

File Management

...might think security will all be the same but there are difference between each one. As you read more you will understand the security and the difference between a MAC, UNIX/LINUX and Windows systems and how each one works.       Access control goal is to protect a resource from unauthorized access while facilitating seamless and legitimate use of such resources. Presently, each day users hold the need to access to those resources through a broad line of devices, such as PCs, laptops, PDA, smartphones and kiosks. Most organizations need to provide protection for their files and allow the correct people to access. The fundamental goal of an Access management system is to maintain confidentiality of user information and access, integrity of information control, availability of information and resources and accountability for knowing who holds the access to such information. File Management File management and file systems are a core part of the user experience for most users. They provide many...

Words: 2672 - Pages: 11

Premium Essay

File Managment

...File Management (Option 1) POS 355 July 29, 2015 Peng File Management (Option 1) Access Rights is an accommodating tool that can be used to allow users on a network to file share (Stallings, 2015, p. 541). In most systems, users and groups of users have a certain granted access to files. There are many different access rights that can be assigned and are assigned based on the level of the user. Specifying which users can access one file in a system being supported by 5,000 users can be done by creating an access control list with the names of the 4,990 users who need access. Another way to allow the 4,990 users to access the files would be to put them all in one group and set the group access level accordingly. An access control list specifies which users are granted or denied access to certain files, and can be granted to individual users, or groups (Stallings, 2015, p. 525). In most multiuser systems, access control is enforced, and only certain users are allowed access and to perform certain actions on certain files. Access control information may include the owner, access information, and permitted actions. The owner is the individual who has control over the file, and who can grant or deny access to other users. Access information includes each of the user’s name and password. Some permitted actions that can be granted to users include reading, writing, executing, and transmission over a network (Stallings, 2015, p. 537). The owner of the file can grant all of these...

Words: 403 - Pages: 2

Free Essay

File Management

...Stephen Sylvester File Management POS:335 John Demory May 26th 2014 In this paper on file access I will be covering two different ways that a system that can support 5,000 users, specifically a protection scheme in UNIX. Please note that out of these 5,000 users, only 4,990 of those users will have access to a specific file. I will first begin with the explanation of one of the ways that a system can support 5,000 users and then move on to the second way that a system can support 5,000 users. The first way that a system can support 5,000 users is for the administrator or facilitator to set up an access control list of all 4,990 users that he or she wants to have access to the specific file. A great real world example of controlled access would be at my current place of employment at the Department of Veteran’s Affairs. Every employee within the company is assigned user roles. These user roles reflect their job position within the company. Every employee has access to our shared drive folder on our network based on the employee’s credentials and need to know privileges (based on their specific duties and user role). Based on their credentials it will grant that employee access to specific folders. I personally deal with medical records and often, at times the doctors use our network shared drive to upload patient information to be indexed into our system. The doctors must be on the access control list in order to access our shared network drive. Being that I...

Words: 654 - Pages: 3

Premium Essay

File Management

...File Management Paper When dealing with the file management concept of computers and operating systems there are always multiple options and preferences that are available. One method of file storing is when an operating system detects the type of file; the type of program used to access it and saves it as such with pathways and locations filled out. A second method is to allow the pathways and file types to be set by the user, allowing for any program or file extension that is available to be used. A third method is for the operating system to not allow the saving of file type or file extensions, but to assign a specific code related to that operating system that allows it to determine the file type. These three methods all have their benefits and drawbacks referring to ease of access, ease of storage, and the structure of the file system. As each of these methods provides a specific purpose the use of one method over another will depend on how a computer filing system is designed and also how it is utilized by frequent and authorized users. In an operating system that detects the file type when it is being stored the system is recognizing what application is being used to access that file and saving it in storage under a file directory that will open the file with that type or certain program. For example if a user is accessing a text document and saves it, the operating system will detect the word processing application and save the file in a directory or pathway that will...

Words: 885 - Pages: 4

Premium Essay

File Management

...File Management POS/355 Brandon Elizaldi Steven Kernan File Management File management and file systems are a core part of the user experience for most users. They provide many essential and necessary functions for the user as well as almost anyone else working with a computer system. They provide anything from long term existence to the ability to create and delete stored data. Some of the benefits to the user are long term existence, the ability to be shared between processes and structure. Long term existence is an important aspect because it can be stored and recalled in the future. Imagine being stuck in the days the original Nintendo for example. You could play a game and get deep into game play but if you didn’t have time to finish the game you had to start all over again. This was due to the fact that there was no file system built in due to the fact a storage device was not available for the system. This is one of the great things about current game systems that have file systems and storage capacity. Another benefit is the ability to share files between processes. This has streamlined new software creation because the program doesn’t have to be built as a standalone. This keeps programmers from having to reinvent the wheel every time they write a program making them cheaper and easier to write. This also saves disk space on the users system. The next benefit is structure which provides a hierarchy within a file system allowing for more complex structures...

Words: 705 - Pages: 3

Premium Essay

File Management

...File Management By: Amy Gonzales POS/355 File Management The data we work with on a computer is kept in a hierarchical file system, the way an operating system has there file management set up effects the user’s ability in accessing and using those folders. According to "Webopedia" (2015), "File management system is the system that an operating system or program uses to organize and keep track of files. For example, a hierarchical file system is one that uses directories to organize files into a tree structure.” If you have ever downloaded a software on your computer you may have noticed how you can find it in the C drive under Program files. The root of this file is the C:\ portion which then stems off into one folder after another to form a tree like structure. For businesses this can be a huge impact on them; without even realizing it they are impacted by the operating system file management they use from storage to security to network. The following paragraphs will say how UNIX file management is set up, along with how it would work in a large company, and also an alternative to the UNIX file management for a large company. First we will start off with how UNIX uses their file management system with another operating system such as Windows. Unlike Windows UNIX has a unique directory structure. In Windows the user will be seeing common file names such as Program File or Users, but in UNIX stuff like a particular application would be scattered into multiple folders....

Words: 836 - Pages: 4

Free Essay

File Management

...File Management UNIX systems are based on the access control of files scheme which was introduced in the very early versions of UNIX. The way this works is that each UNIX user has an assigned unique user identification number which also puts this user ID into a primary group as well as other groups if the user ID needs it. These groups are identified, like the user’s ID, with a group ID. When a user creates a file, it is designated as owned solely by that user and marked with that user’s ID. This file can also be associated with a group with a unique group ID. This file is protected by a set of 12 protection bits. These bits along with the group and owner ID are part of the file’s index node or inode. This inode is a data structure that houses all the information about a file system object except the data content and name. Nine of these protection bits specify execute, write and read permissions for the owner of the file, the other members of the group and all other users. The remaining three outline special behavior for files and directories. A particular user ID is the superuser. This superuser ID is freed from the normal file access control constraints and also has system wide access. Whenever a file or program is set as owned by the superuser, the superuser potentially has unrestricted access to the system and to the users that are using the program. This scheme is acceptable when file access requirements are the same with users and a large number of groups of...

Words: 550 - Pages: 3

Free Essay

File Retention

...Employee Files and Retention In Human Resources the managers must make sure the files are maintained properly, stored properly, and the documents are filed in the appropriate files within the company. There are state laws that have to be followed. When determining where to place a document, the HR department has to consider what information the document contains. Personnel files cannot have documentation with medical, social security numbers or sensitive information (Personnel Records: What should, and should not, be included in the personnel file?, 2015). Most employers have three or four different employment record filing systems (Audit: Personnel Files: Employment (Personnel) Records Audit Checklist (Including Form to Audit Individual Employee Personnel Files), 2014). Personnel files contains employee performance information; confidential records contain non job-related or confidential information; payroll records are usually maintained by the payroll department; I-9 files are filed separately. Personnel records can be maintained by paper or electronically maintained by scanning into a secured system. Personnel Files * Employee applications/Resumes (online applications retention 2 years from the date of personnel action) * Job description. * Pay compensation information. * Letter of Recognition. * Records relating to job such as promotions, demotions, layoffs, training and education. * Warnings, counseling, or disciplinary notes. * Termination...

Words: 537 - Pages: 3

Free Essay

File Management

...File Management Paper There are issues that arise concerning file sharing in a multiuser system, and that is access rights and the management of simultaneous access. Access rights to a file is granted unique users whether singular or grouped. A flexible tool is provided to allow extensive file sharing among the users while providing a number of options so that certain access can be harnessed or controlled (Stallings , 2012). Although a wide range of access is being used, there is still a list of representatives with access rights that can be designated to a certain user for a unique file. One way is masking the existence of the file, leaving the user oblivious to its existence. If by chance the user gain knowledge of the files existence and owner identification, a petition to the owner can be put in place to gain additional access rights. There are ways where the user can load and execute a program with copy restrictions. Propriety programs are an example of this because they are made accessible to users with this restriction (Stallings, 2012). The only user with full access rights and the power to grant rights to others is the owner of the file created. There are also three classes of users provided said access by the owner. One- third of the class is a specific user, which are individual users who are assigned by a user id. User groups is the another class with a set of users that are not defined individually. The final class is granted to all users because the files are...

Words: 793 - Pages: 4

Premium Essay

File Management

...File Management File management systems have come a long way since the gigantic filing cabinets. Society has come a long way in an effort to save paper, space, and time. With modern technology and computers in most homes and workplaces file management systems are standard among operating systems. This capability gives businesses and individuals the ability to be organized and successfully archive important documents, images, and videos essential to a company a family or an individual. In the next couple of paragraphs one will read about file management systems the functions of file management systems and how it has made our society more efficient. When talking about file management it used to mean huge filing cabinets loaded with folders marked and organize so that one can easily find documents stuffed in said folders. In today’s world when talking about file management one is referring to electronic file management systems. File management systems are one of the most important aspects of a computer. File management systems have enabled the common person to organize documents images or videos however they see fit. File management systems use hardware components of a computer to save and store data. The hardware components that may be used are hard disk, CD-ROM, external hard drives and so forth. No matter what operating system used whether it’s Linux, Windows, or Mac file management system performs certain duties. One of the duties of a file management system is creating...

Words: 870 - Pages: 4