Free Essay

Privacy vs. National Security

In:

Submitted By 17auguryan
Words 2059
Pages 9
Staff Goal & Performance Review Checklist
2015-2016 (due January 29, 2016)

To better assist with the dialogue regarding job performance between staff member and supervisor, we are instituting several changes to this revised Staff Goal & Performance Review Checklist (SGPRC) as follows:

* Staff members will meet with their supervisor as a department and individually to review the past year’s goals and to set goals for the new fiscal year. Both the supervisor and staff member must agree upon the goals set keeping in mind the department’s objectives as set forth in the Strategic Plan. In order to encourage more communication between staff member and supervisor, this new goal setting procedure and review will allow for more staff input and supervisor feedback and will occur annually at the beginning of the fiscal year.

* The annual Staff Goal & Performance Reviews will occur mid- fiscal year in January which will allow the staff member and supervisor the opportunity to assess the status of goal objectives as well as completing the Performance Review checklist. By conducting the annual review earlier, the staff member and supervisor will be able to assess goal and performance achievements and recommend any adjustments or plans of action sooner than under the present review schedule. At the beginning of the next fiscal year, supervisor and staff member will engage in a discussion as a department and/or individually and review the past year’s goals and proceed to set goals for the upcoming fiscal year.

* The ratings selections have been expanded to allow both supervisor and staff member more options in evaluating skills and accomplishments. These ratings include: Clearly Exceeds Expectation (defined as exceeding expectations consistently or on a regular basis), Above Expectation (defined as exceeding expectations occasionally but always meeting expectations), Meets Expectation (defined as regularly and consistently fulfilling job duties), Below Expectation (defined as occasionally not fulfilling job duties), and Fails to Meet Expectations (defined as failing to meet expectations on a regular or consistent basis).

The intent of the revised SGPRC is to further encourage open communication between staff and supervisor by creating goals for each fiscal year, examining those goals mid-fiscal year during the annual performance evaluation, and reviewing the past year’s goals at fiscal year end. Although this new review process will require two meetings annually, it should not be considered the supervisor’s only communication tool. Open lines of communication throughout the year are necessary. As in the past, the SGPRC will not be used in determining merit pay raises. The success of this SGPRC depends on the supervisor and staff member’s willingness to work together in determining appropriate goals and objectives, conducting a thorough and open review of those goals along with the Performance Review Checklist mid-fiscal year, and meeting at the start of the new fiscal year to review the past year’s goal assessment and to develop appropriate goals consistent with the Strategic Plan for the next fiscal year.

STAFF MEMBER’S Information | Name | Dennis Augustine | Today’s Date | 1/19/16 | Job Title | Custodian | Review Period | 1/16 to 1/17 | Department | FMO | Supervisor | Vicky Booth |

DIRECTIONS for Staff Members (All Staff) 1. In July, meet with your supervisor to set department with/or individual goals. The Current Goal section is the only section to be competed at this time. After the goal setting section is completed, the supervisor should retain this document until it is time for mid-year Performance Review where the SGPRC is returned to the staff member for completion. 2. At mid-year, the staff member should complete the Performance Review portion of the SGPRC and submit to the staff member’s supervisor for the their evaluation/meeting with the staff member

DIRECTIONS for Supervisors 1. In July, meet with the staff member and set mutually agreed upon individual and/or department goals on the SGPRC form. The supervisor should retain this completed portion of the SGPRC until it is time for the mid-year Performance Review. The SGPRC is returned to the staff member for completion of the Performance Review portion of the SGPRC. 2. Mid-year, review the staff member’s completed SGPRC, check columns that the supervisor disagrees with the staff member’s evaluation, add comments, if necessary, and initialize the area that was edited. Review the goals set by the staff member and provide additional or different goals you believe are appropriate. 3. Meet face-to-face with the staff member to have a dialogue about the SGPRC. The meeting should take approximately 15-20 minutes. a. If the staff member and supervisor agree that the staff member ‘meets expectations’ or higher the process is complete and both parties should sign the SGPRC. The supervisor should submit the signed copy of the SGPRC to the OHR for filing. COPIES of this SGPRC should remain with the staff member and supervisor. b. If the supervisor identifies an area(s) that is ‘below expectation’ or “fails to meet expectation”, the supervisor should complete the IMPROVEMENTS section explaining a detailed action plan and timeline. A follow-up meeting should be scheduled 90-120 days from the date of the original meeting to review performance. Both parties should sign the SGPRC and this copy should be sent to the OHR for filing. After the follow-up meeting is held, a detailed memo explaining the improvement(s) should be prepared, both parties should sign the document and the memo should be submitted to the OHR.

I. Current Year’s Goals
Please set goals you would like to meet before the end of the 2015-2016 fiscal year. If you set goals with your supervisor this fiscal year, please comment on the status of the performance of these goals by you. If goals were not set previously, please provide goals you would like to set. Your supervisor will review these goals with you and may recommend additional goals for you or the department.

Goal 1: To continue to perform my job duties with quality and efficiency. | Staff Member’s Assessment: | Supervisor’s Assessment: |

Goal 2: To continue to learn and be able to help with coworkers’ job duties and responsibilities. | Staff Member’s Assessment: | Supervisor’s Assessment: |

Goal 3: To follow the mission of St Vincent College in my everyday duties. | Staff Member’s Assessment: | Supervisor’s Assessment: |

Section 2 – Performance Review (December 2015/January 2016)

1. Quality, Productivity, and Knowledge of Job – Understands and performs duties as contained in the position description which must be attached to this evaluation. The job functions are performed at the appropriate output of work; work product is accurate and conforms to established standards or to specific instruction and direction. Clearly Exceeds Expectations (exceeding expectations consistently or on a regular basis) (supporting documentation required) Above Expectations (exceeds expectations but always meeting expectations) Meets Expectations (regularly and consistently fulfilling job duties) Below Expectations (occasionally not fulfilling job duties) Fails to Meet Expectations (fails to meet expectations on a regular or consistent basis) (supporting statement/documentation required) | Comments | 2. Professionalism, Teamwork, and Cooperation – Conduct and appearance fosters a positive working relationship with department and all constituencies consistent with the mission of this Catholic, Benedictine institution. Demonstrates desire to create a collaborative atmosphere and teamwork including interacting with others that may have conflicting opinions or views. Clearly Exceeds Expectations (exceeding expectations consistently or on a regular basis) (supporting documentation required) Above Expectations (exceeds expectations but always meeting expectations) Meets Expectations (regularly and consistently fulfilling job duties) Below Expectations (occasionally not fulfilling job duties) Fails to Meet Expectations (fails to meet expectations on a regular or consistent basis) (supporting statement/documentation required) | Comments | 3. Accountability and Dependability – Contributes to the effectiveness of the department by being a responsible team member in fulfilling job duties and expectations. Participates in problem solving, demonstrates flexibility in the work environment, and recognizing the needs of the institution. Clearly Exceeds Expectations (exceeding expectations consistently or on a regular basis) (supporting documentation required) Above Expectations (exceeds expectations but always meeting expectations) Meets Expectations (regularly and consistently fulfilling job duties) Below Expectations (occasionally not fulfilling job duties) Fails to Meet Expectations (fails to meet expectations on a regular or consistent basis) (supporting statement/documentation required) | Comments | 4. Initiative, Innovation and Creativity – Ability to develop new ideas and alternative methods to improve existing processes. Desire to promote creativity in order to achieve overall improvement of the department for the benefit of the institution. Clearly Exceeds Expectations (exceeding expectations consistently or on a regular basis) (supporting documentation required) Above Expectations (exceeds expectations but always meeting expectations) Meets Expectations (regularly and consistently fulfilling job duties) Below Expectations (occasionally not fulfilling job duties) Fails to Meet Expectations (fails to meet expectations on a regular or consistent basis) (supporting statement/documentation required) | Comments | 5. Decision Making and Problem Solving – Demonstrates willingness to problem solve regardless of area of responsibility in an effort to achieve department goals. Ability to make sound and logical job-related decisions while following department procedures and policies. Clearly Exceeds Expectations (exceeding expectations consistently or on a regular basis) (supporting documentation required) Above Expectations (exceeds expectations but always meeting expectations) Meets Expectations (regularly and consistently fulfilling job duties) Below Expectations (occasionally not fulfilling job duties) Fails to Meet Expectations (fails to meet expectations on a regular or consistent basis) (supporting statement/documentation required) | Comments |

PERFORMANCE CRITERIA FOR ** MANAGERIAL POSITIONS ** (VP’s, Deans, Directors) If this section is NOT applicable to you, please proceed to page 5 to complete the SPRC. | 1. Human Resource Management – Actively advances the College’s Catholic, Benedictine mission by creating and encouraging a supportive and respectful work environment. Demonstrates an open and transparent management style with all staff members and encourages open communication within the department. Clearly Exceeds Expectations (exceeding expectations consistently or on a regular basis) (supporting documentation required) Above Expectations (exceeds expectations but always meeting expectations) Meets Expectations (regularly and consistently fulfilling job duties) Below Expectations (occasionally not fulfilling job duties) Fails to Meet Expectations (fails to meet expectations on a regular or consistent basis) (supporting statement/documentation required) | Comments | 2. Leadership – Utilizes the Strategic Plan in setting appropriate goals and benchmarks for staff members. Inspires and motivates staff to achieve goals by setting clear direction in an organized and coherent manner. Ability to anticipate the need for change and help staff understand and deal with necessary change in a pro-active manner. Clearly Exceeds Expectations (exceeding expectations consistently or on a regular basis) (supporting documentation required) Above Expectations (exceeds expectations but always meeting expectations) Meets Expectations (regularly and consistently fulfilling job duties) Below Expectations (occasionally not fulfilling job duties) Fails to Meet Expectations (fails to meet expectations on a regular or consistent basis) (supporting statement/documentation required) | Comments | 3. Fiscal Responsibility/Compliance – Demonstrates effective management of resources, supplies, equipment, and personnel. Supports the overall sound fiscal management of the institution and participates actively in the budget process. Keeps staff informed and updated on all relevant policies, regulations, etc. and effectively monitors/enforces compliance by staff members. Clearly Exceeds Expectations (exceeding expectations consistently or on a regular basis) (supporting documentation required) Above Expectations (exceeds expectations but always meeting expectations) Meets Expectations (regularly and consistently fulfilling job duties) Below Expectations (occasionally not fulfilling job duties) Fails to Meet Expectations (fails to meet expectations on a regular or consistent basis) (supporting statement/documentation required) | Comments |

PERFORMANCE SUMMARY | The staff member and supervisor should use this section to make any additional comments and provide a summary of the staff member’s performance over the past year. | Supervisor’s Performance Summary | | Staff Member’sPerformance Summary | | IMPROVEMENTS - OPTIONAL | If the results indicate that there is an area(s) where the staff member has performed ‘Below Expectations’ a plan of action to address the deficiencies should be developed below. Additional pages should be attached, as necessary. Also, a follow-up meeting with the supervisor should be scheduled 90-120 days from today to address the status of the plan of action(s). | Supervisor’s Feedback | | Staff Member’sFeedback | | Plan of Action Review Date | | Verification of Review | By signing this form, you confirm that you have discussed this review in detail with your supervisor. Signing this form does not necessarily indicate that you agree with this evaluation. After signing, the supervisor should make two copies (1) for the supervisor and (1) to be given to the employee. The supervisor should submit the signed original SGPRC to the OHR for filing in the staff’s personnel file. | Staff Member’s Signature | | Date | | Supervisor’s Signature | | Date | |

Similar Documents

Premium Essay

Privacy vs National Security

...The need to protect National Security is far more important than individual privacy. The greatest part of living in the United States of America is the freedom that we have. That freedom and the right to live freely is protected by various government agencies. From time to time, the privacy a person has may have to be invaded to guarantee the security of the country and other citizens. Everyone has the right to not have their life controlled by the government, but it has the right to make sure that citizens are not doing anything to threaten the security of the country. Our freedom also comes at a price; that price is the need of the government to monitor some of the things we do so ensure that the United States is not in danger of a terrorist attack or an attempted overthrow of the government. The most glaring example of how National Security is more important than the privacy of an individual is September 11, 2001. The terrorist attacks that day have changed how Americans see our National Security and it must take precedence over anything else. One definition found for national security is: “The measures taken by the state to ensure the security of itself, or its citizens or subjects.” (Thomas, 2007) He goes on to explain that is both a right and a responsibility for a state to protect its citizens. Thomas also writes that there is a fine line to be established between maintaining peace and order and the level of tolerance citizens will have to tolerate to...

Words: 299 - Pages: 2

Premium Essay

Privacy vs National Security

...Privacy Rights The privacy of the individual is the most important right. Without privacy, the democratic system that we know would not exist. Privacy is one of the fundamental values on which our country was founded. There are exceptions to privacy rights that are created by the need for defense and security. When our country was founded, privacy was not an issue. The villages then were small and close. Most people knew their neighbors and what was going on in the community. They did not have drunk drivers, terrorist, or any other threat of changing the way they lived. The transportation that most people had access to were horses. Today there are autos that can be fatal if not controlled. Speed limits and licenses are two examples. The government we have in place maintains and organizes our society. The elements of control are often viewed as violations of privacy. These elements are meant to protect us from irresponsible people and from hurting themselves. The laws that are in place still give privacy without invading personal lives. Privacy is only violated when people feel they are being violated. Jonathan Franzen writes this example of his feelings about privacy. “One of my neighbors in the apartment building across the street spends a lot of time at her mirror examining her pores, and I can see her doing it, just as she can undoubtedly see me sometimes. But our respective privacies remain intact as long as neither of us feels seen.” If people...

Words: 637 - Pages: 3

Premium Essay

Individual Privacy vs National Security

...Individual Privacy vs. National Security Anthony Sifuentes ENG 122 English Composition II Instructor vonFrohling February 13, 2012 Individual Privacy vs. National Security The need to protect National Security is far more important than individual privacy. The greatest part of living in the United States of America is the freedom that we have. That freedom and the right to live freely is protected by various government agencies. From time to time, the privacy a person has may have to be invaded to guarantee the security of the country and other citizens. Everyone has the right to not have their life controlled by the government, but it has the right to make sure that citizens are not doing anything to threaten the security of the country. Our freedom also comes at a price; that price is the need of the government to monitor some of the things we do so ensure that the United States is not in danger of a terrorist attack or an attempted overthrow of the government. The most glaring example of how National Security is more important than the privacy of an individual is September 11, 2001. The terrorist attacks that day have changed how Americans see our National Security and it must take precedence over anything else. One definition found for national security is: “The measures taken by the state to ensure the security of itself, or its citizens or subjects.” (Thomas, 2007) He goes on to explain that is both a right and a responsibility for a state to protect its...

Words: 2496 - Pages: 10

Premium Essay

Dont Read

...Balancing between national security and individual privacy is seemingly a daunting task that does not promise an amicable solution in the near future. There are so many controversies surrounding this issue where people with opposing opinions are striving to ensure that their views dominate. The question about which between the two should be prioritized is not relevant compared to the effects either of the alternatives will have in the lives of citizens. The issue is complicated further by the sensitive nature of both national security and individual privacy. There is a close association between the two, thus making it hard for policy makers to alter either of them without touching the other. However, it is a fact that as much as many people want to have full right to individual privacy, they will also be keen to ensure that their security is guaranteed. In other words, the two must be provided without necessarily causing collusion between the two. National security is prioritized compared to individual privacy given the fact that people universally value national security. Legal status of the Individual Privacy vs. National Security issue Controversies surrounding national security and individual privacy came at the limelight after the September 11, 2001 terrorist attacks in the United States. However, this issue has been in existence for a longer time although it has had minimal effect on individual privacy. This paper will focus on recent events since little was heard...

Words: 1286 - Pages: 6

Premium Essay

The Commodification of Free Speech

...Benjamin Marchman English 122 Cathryn Lawson The Value of Online Privacy Since the September 11th terrorist attacks the United Sates and the world at large has officially entered into an age of counter-terrorism. While the more obvious aspects of this effort against violent extremism, which violate human and constitutional rights, such as drone strikes, waterboarding, and black prison sites, are specifically targeted toward a specific population, it is the subtler aspects of mass surveillance and corporate and governmental intrusion of privacy which present an overwhelming threat to human rights and quality of life. As has been made clear by recent revelations of the scope and depth of these intrusions, internet users specifically have many reasons to suspect that private information entered online is vulnerable to un-ethical intrusions by third parties. However, many groups and individuals have come together to bring resolution to the issue of personal privacy and national security. According to article 12 of the Universal Declaration of Human Rights, no one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, or to attacks upon his honor and reputation (Lachmayer 749). However, the more subtle aspects of the new counter-terrorism age include a heightened amount of internet surveillance, video surveillance of public spaces, electronic eavesdropping, and data retention. Additionally governments have access to bank accounts,...

Words: 2685 - Pages: 11

Premium Essay

Information Security

...Security Issues in Legal Context Discussion 5.1: Privacy in the Workplace The Children's Online Privacy Protection Act, which went into effect date, April 21, 2000, affects U. S. commercial Web sites and third-party commercial Web sites that schools permit their students to access. "COPPA requires "operators of websites or online services directed to children and operators of websites or online services who have actual knowledge that the person from whom they seek information is a child (1) To post prominent links on their websites to a notice of how they collect, use, and/or disclose personal information from children; (2) With certain exceptions, to notify parents that they wish to collect information from their children and obtain parental consent prior to collecting, using, and/or disclosing such information; (3) Not to condition a child's participation in online activities on the provision of more personal information than is reasonably necessary to participate in the activity; (4) To allow parents the opportunity to review and/or have their children's information deleted from the operator’s database and to prohibit further collection from the child; and (5) To establish procedures to protect the confidentiality, security, and integrity of personal information they collect from children. Non-profit sites are not included in the act; however, many are voluntarily complying. The Children's Internet Protection Act went into effect April 20, 2001...

Words: 2799 - Pages: 12

Premium Essay

Argumentative Essay On Security Vs Freedom

...Security versus Freedom For years the controversial topic of security versus freedom has divided our nation. For centuries the United States has prided itself on being a free country where people are allowed to do things like vote, voice their opinions, peacefully protest, and much more. While freedom vs security has always been an issue, only recently has it become a such a complex and important debate. After September 11th, 2001 happened, the government made drastic security changes in hopes of making America safer for its citizens. Some of those changes had citizens wondering if they were giving up some of their rights in exchange for national security. Security has also been brought up more recently with the rise of technology. Adding technology to the...

Words: 938 - Pages: 4

Premium Essay

The Importance Of Internet Privacy

...In the modern world, our privacy is constantly being violated without our consent. This is due to information that is easily available. Whether you’re walking down the street, taking the subway, purchasing online items or in a store, chatting online, we are constantly under someone’s watch. Hacking, picture leaks and theft of private information are becoming recurrent issues in the 21st century. Some believe this may not be an issue but others are concerned with the impact it could have on our lives. The twentieth century was particularly marked by the growth of the Internet and the rise of social media programs. This has raised the population’s awareness about their privacy rights. A lot of information can be found online including credit...

Words: 1336 - Pages: 6

Free Essay

Privacy in Today’s Society: the Government Is Watching

...Privacy in Today’s Society: The Government is watching ENG 122 Prof. Shannon Bilunas 02/28/13 Privacy in Today’s Society: The Government is watching The thought of someone watching my every move is not only scary but also annoying. It's like living in a house with no doors. Everyone needs privacy in his or her life. I've always heard people refer to the government as "Big Brother". Big brothers are supposed to protect their younger siblings. Is "Big Brother" protecting us? Or just out right being nosey & invading our privacy? In our society today everything we do is being tracked. There's video surveillance everywhere we turn. Every click of a mouse or push of a button on the Internet is being tracked & logged. Almost everything today is GPS enabled. The government can access these records, videos, and locate people from their GPS enabled device without their knowledge. Scott McNealy couldn’t have said it any better “You have zero privacy anyway. Get over it” (Sprenger, 1999, para.1). The evolution of technology has made it easier for Big Brother to watch us. Our privacy against government intrusion is virtually impossible because technology has provided more access than our judicial, legislative and political systems have developed restrictions. After 9/11 The Patriot Act was one of many surveillance laws that made it easier for the government to keep an eye on us. The change in this law gave the government more authority to check any citizen’s Internet...

Words: 1152 - Pages: 5

Premium Essay

Does Emr Protect Patient Privacy?

..."Does the EMR actually protect patient privacy and what are the regulatory ramifications in the US on EMR implementation?” Table of Contents: INTRODUCTION LITERATURE REVIEW ANALYSIS I. MEDICAL RECORDS THEN AND NOW A. Paper-Based Medical Records VS. Electronic Medical Records B. Benefits, Potential Problems and Cost of
 the EMR II. HEALTH CARE PRIVACY LAW A. HIPAA 1.What is HIPAA? 2. HIPPA Privacy & Security B. HIPAA and EMR III. CAN ANYTHING BE DONE TO PROTECT PATIENT CONFIDENTIALITY/ PRIVACY? A. Why Should Patient Privacy Be Afforded Privacy Protection Regulation? B. Patient Privacy Within EMR IV. SPANNING THE MILES Intranet & Extranet Software & IM/IT CONCLUSION GLOSSARY REFERENCES Introduction: Healthcare companies all over the world are slowly recognizing the benefits on an EMR. Although EMR’s were implemented over 30 years ago but as of 2006 fewer than 10% of hospitals were utilizing the system. In 2009 the he U.S. Department of Health and Human Services enacted a privacy rule under the Health Insurance Portability and Accountability Act (HIPAA) in an attempt to protect the privacy of patients medical records. But one question still arises; “Does the EMR actually protect patient privacy and what are the regulatory ramifications in the US on EMR implementation?” In this paper I will address EMR, patient privacy and the regulatory ramifications of EMR implementation. Literature Review The literature shows that there is...

Words: 1873 - Pages: 8

Free Essay

Surveillance: a Double Edged Sword

...of law and order is that they will help us to exercise and enjoy these powers. Security from threats is another expectation that we demand from the keepers of law. Obviously, in order to provide us security from outside threat the law keepers need to exercise some special powers and the basics of that is “Surveillance”. Surveillance in ordinary language means “the close inspection of a suspect”. To conduct the Surveillance there are different ways & most commonly used ways include the monitoring of telephone records, spy camera, email and newly and most recent way is through digital media. Now the question arises that if surveillance is being conducted does it not comprise with the basic rights for national that is the “privacy”? The NSA and other agencies has produced some occurrences that clearly shows that it has some time stepped over the line and violated the privacy of nationals. The age of digital media justifies this yet people have other view. This makes the Surveillance a double edged sword hanging on the citizens. They can’t deny it yet they can’t take it. The problem In age of technological development you can never be sure that who is keeping a eye on us. The security agencies give a valid explanation that it is their duty to provide the security to the nation and so they need to perform these actions. The citizens can’t even oppose that because if it’s a matter of national security but obviously they feel that some guidelines need to be set. The Law makers intervened...

Words: 577 - Pages: 3

Premium Essay

Health Care Information Systems Terms Hcs 483

...University of Phoenix Material Health Care Information Systems Terms Define the following terms. Your definitions must be in your own words; do not copy them from the textbook. After you define each term, describe in 40 to 60 words the health care setting in which each term would be applied. Include at least two research sources to support your position—one from the University Library and the other from the textbook. Cite your sources in the References section consistent with APA guidelines. |Term |Definition |How It Is Used in Health Care | |Health Insurance Portability and |The HIPAA Act was established in 1996 to |The Health Insurance Portability and | |Accountability Act |protect personal, identifiable information |Accountability Act is used in health care | | |of patient’s from third parties not |by patients having to sign a HIPAA form | | |involved in the treatment of the patient. |that makes patients aware of their rights | | | |and the protection of their individual | | | |protected health information. | |Electronic medical record |Electronic...

Words: 1044 - Pages: 5

Premium Essay

Protection to Bankers

...to public  Banking is one of the most risky sectors as far as privacy is concerned due to the highly sensitive and personal nature of information which is often exchanged, recorded and retained. Although India has RBI guidelines and legislations to protect data, this blog post looks at the extent of those protections, and what are the areas that still need to be addressed. Introduction Banking is one of the most at risk sectors for privacy violations due to the sensitive, and highly personal nature of information that is exchanged, recorded, and retained. Individuals must trust banks with personal identifying information, their financial records, the access information to their accounts,  and their credit history. Thus, privacy violations are not taken lightly and heavily impact the individual whose privacy was violated. Ways in which a violation of privacy can take place in the banking sector include: sharing personal information with third parties without consent  for marketing purposes, stolen or lost banking number or card, sharing personal information or allowing access to third parties without informed consent, inadequate notification  to an individual concerning what will be done with their data, collecting more personal data than is necessary, refusal to provide financial records upon request by client, incorrectly recording personal information, and loss of  a clients personal data due to improper security measures.  banker's duty of confidentiality to the customer It...

Words: 2508 - Pages: 11

Premium Essay

Freedom Vs. Security

...Freedom versus security is a major issue we have when constructing new laws dealing with national security. Where should the line be drawn and when do our freedoms and rights as American citizens go under fire due to terrorist paranoia? After reading David Haynes’s “ Liberty vs. security: An old debate renewed in the age of terror” I felt highly upset discovering I was being spied through my IPhone in high school. The National Security Agency conducted a mass eavesdropping operation which allowed them to listen to your phone calls with the hopes to catch unexpected terrorist activity. Being in the military I do know there is always a sacrifice for freedom because even though is sounds ironic, freedom is not free sad to say. Every person...

Words: 281 - Pages: 2

Premium Essay

Privacy

...Running Head: THE EXISTENCE OF PRIVACY WITH TECHNOLOGY THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Obediah Howard Bellevue University   THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Abstract This research paper will discuss the relationship between privacy and technology. It will attempt to ascertain if technology and privacy can share the same plane of existence. Benefits and deficiencies of a particular technology are not hereditary to that technology, but are depend on their application. The public insists on accountability of technological innovation and assurance that privacy will remain intact. Striking a balance between enabling technology to enrich lives and restricting it from invading privacy has to be addressed. Implementing controls to protect private data is imperative. Technological advances over the years have challenged the public’s perception and expectation of privacy. Technology and one of its preeminent by-products, convenience, will continue to grow exponentially for the foreseeable future; there is no evidence to suggest otherwise. Privacy finds itself in a precarious position in the face of evolving technology. The collective concept of privacy has to be revisited. With the advent of technological innovations and the accessibilities they bring, privacy in its purest form does not exist. From an anthropological perspective, privacy is a relatively modern development. Ancient cultures practiced communal...

Words: 1783 - Pages: 8