Premium Essay

The Battle over Safe Injection Sites

In:

Submitted By LeanneT
Words 1938
Pages 8
Insite: The Battle over Supervised Injection Sites

In the 1990’s there was an epidemic of HIV outbreaks in the Downtown Eastside of Vancouver. Injection drug users were found to be the leading cause of this, and a public health emergency was declared (Fafard, 2012). The “mortality and morbidity” resulting from this increasing injection drug use became a major political issue. This resulted in the adoption of harm reduction by the government as one of their four pillars of their drug strategy (Fafard, 2012). Harm reduction “is a set of practical strategies and ideas aimed at reducing negative consequences associated with drug use” (Boyd, 2013). In September 2003 Insite, North Americas first harm reduction supervised injection site, was opened (Boyd, 2013). It was a three-year pilot project sanctioned by the Federal government under Canada’s Controlled Drugs and Substance Act. The goal of Insite is to “improve the health and welfare of injection users, reduce the spread of disease through sharing on needles, reducing public injection use, and reducing overdose deaths due to injections” (Boyd, 2013). Since it’s opening it has been under constant political scrutiny. It had support under the Liberal government from 2003-2006, but lost that support once Stephen Harper and the Conservatives secured control (Boyd, 2013). Despite support for Insite from international organizations such the World Health Organization, the Canadian Medical Association, the Canadian Public Health Association, and numerous peer reviewed research published the Conservative government did not want to grant another exemption. They stuck with their belief in prohibition being the best policy (Boyd, 2013). The battle was brought to our court systems and in 2011. The Supreme Court ruled unanimously in favour of Insite and found that under the Charter of Rights closing the program would be

Similar Documents

Premium Essay

Ethical Issues and Principles with Gardasil

...Abstract For the past several years, there has been a growing awareness of the epidemic of sexually transmitted diseases. One disease in particularly, Human Papilloma Virus (HPV), affects over six million individuals every year, comprised mostly of girls between fifteen and twenty-five years of age. Because there are over a hundred strains of this disease, contributing to about 70% of all cervical cancer cases, scientists have researched and developed a vaccine to protect against several strains of HPV. This vaccine is called Gardasil. The research that led to the development of the vaccine started in the 1980s, and finally in June of 2006 a pharmaceutical company, Merck & Co., had the vaccine approved by the Food and Drug Administration. Keywords: epidemic, Human Papilloma Virus, vaccine, Gardasil, Merck & Co Ethical Issues and Principles with Gardasil After 5 years of clinical trial, Gardasil has been proven to protect against four of about 40 types of HPV, according to the CDC's informational brochure. HPV strains 6 and 11 are responsible for 90 % of genital warts diagnosed in the United States, and HPV strains 16 and 18 are responsible for 70 % of cervical cancers (Centers for Disease Control and Prevention, 2013). More specifically, Gardasil is expected to reduce the incidence of HPV related genital disease, including cervical, penile, vulvar, vaginal, anal cancer, precancerous lesions, genital warts, and laryngeal papillomatosis. In order to produce...

Words: 1659 - Pages: 7

Premium Essay

E-Commerce Evolution

...restricted by location, the need for larger amounts of inventory, larger retail space, and more employees to cover customer-service. E-commerce began with the advent of the Internet and started as billboards for information and advertisement purposes. Then as technology developed through the early 1980s, it grew into e-mail purchasing (Compuserve). From there, the World Wide Web, internet browsers (Netscape) and the first security protocol (SSL) were invented. These technologies, combined together, allowed for the safe transmission of data over the Internet and many entrepreneurs looked at new ways to take advantage of these technologies to grow and develop the way they did business. In 1994, the first services for processing online credit card sales were developed along with digital IDs and certificates to verify the identity of online businesses. Then by 1995 Amazon was selling their first products on-line and their customers were from all 50 states and over 45 countries breaking down some of the restrictions of a traditional retail store. With the development of Web 2.0, broad-band services and more affordable and easy-to-use e-commerce solutions, the e-commerce landscape changed from e-tailors such as Amazon and EBay to other types of businesses developing web sales such as large retail stores, on-line malls and other shopping venues. Many new technologies became available for on-line shopping use. These included shopping carts, metasearch engines for comparing on-line...

Words: 2003 - Pages: 9

Free Essay

Hydraulic Fracturing

...controls to create fractures in rock that allow oil and natural gas to escape and flow up out of the ground. While in this process “fracturing fluids” are mixed in using high pressure. This creates fissures that allow resources to move freely from rock pores where they are trapped. (Chesapeake Energy) First, the way hydraulic fracturing works is a production drill is drilled through the rock layers to intersect the coal seem that contains coal bed methane, CBN. Second, fractures are created or existing fractures are enlarged in the coal seem so that the CBM can be drawn from the well and pumped to the surface. These fractures are created or enlarged by using a thick water-based fluid which is gradually increased by rate and pressure. Third, over time the coal seam is unable to keep up with the fracturing fluid which results in high pressure causing the coal to fracture along the weaknesses within. Sand is pumped into these fractures to keep them ‘propped’ open after the pressures are released. After a period of fluid recovery or groundwater extraction is when the extraction of CBM occurs. As pumping continues, the pressure eventually decreases so that the methane desorbs from the coal, flows and is extracted through the production well. The fracture created acts as a conduit in the rock or coal formation, allowing the CBM to flow more freely from the coal seems through the fracture system and...

Words: 1989 - Pages: 8

Premium Essay

Infectious Diseases.Com

...Louis Pasteur. Pasteur identified that pathogens, such as bacteria, cause disease by attacking the body from the outside, BBC (2014). Following on from Pasteur’s germ theory, Robert Koch in 1876, proved specific pathogens caused specific diseases, Stevenson (2014). Pathogens are biological agents that take the form of bacteria, fungi, viruses and protozoa causing infection and illness by challenging our immune system, through killing cells or disrupting the cell function, National Academies (2015). “Only when a microorganism has successfully established a site of infection in the host does disease occur”, Janeaway et al (2001). When working in Mexico, there are certain infectious diseases prevalent, and transmission of these diseases can happen through a variety of methods such as direct contact with other infected humans or animals, indirectly by touching infected objects or via airborne transmission. Reports suggest over one million people die from vector borne diseases every year, such as malaria from mosquitos carrying pathogens from host to host, WHO (2014). Whilst working or travelling, should you succumb to an infection or disease, your body will try to defend itself using non-specific mechanisms, such as mechanical, chemical and biological barriers against pathogens to respond to the infection or disease, Tunkel (2012). However individual behavioural practices, and promotion to others of those practices, can prevent contracting or spreading those infectious diseases....

Words: 2224 - Pages: 9

Free Essay

Pfizer Viagra

...The long and difficult 13-year journey to the marketplace for Pfizer's Viagra Introduction  There  are  many  stories  that  have  emerged  over  the  years  concerning  Pfizer's  product  Viagra.  Some  of  these  are  true  but  many  are  simply  fictional stories developed to try to reinforce a particular argument. One of  the  most  common  is  that  Viagra  was  the  result  of  luck.  This  case  study  explores  the  long  13­year  journey  from  laboratory  to  the  marketplace  and  explores  some  of  the  key  challenges  faced  by  Pfizer;  most  notably,  project  evaluation  considerations,  when  the  available  market  research  evidence  suggests  a  small  market  for  the  product.  And  product  launch  considerations, when impotence is such an unpopular topic that it is almost  impossible  for  advertisers  to  refer  to  it  without  alienating  the  very  con­ sumer base they are trying to reach.  What is Viagra?  Pfizer's Viagra is now part of business folklore in  terms of an example of  a  successful  new  product.  Viagra  is  now  one  of  the  most  recognised  brands  in  the  world;  it  has  become  a  social  icon  with  annuel  sales  in  excess of $1.9  billion.  And  it  has  transformed Pfizer  from  a  medium­sized  pharmaceutical  firm  into  the  world's  leader.  Yet,  Viagra  was  almost  dismissed  during  clinical  trials  as  interesting,  but  not  clinically  or financially  significant.  It  is  true  Viagra  was  something  of ...

Words: 5069 - Pages: 21

Premium Essay

Test Paper

...want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical and security topics and holds several certifications, including CompTIA A+, Network+, Security+, and CASP; (ISC)2 SSCP and CISSP; Microsoft MCSE and MCITP, and ITIL Foundations. In response to repeated requests, Darril created the http://gcgapremium.com/ site where he provides study materials for several certification exams, including the Security+ exam. Darril regularly posts blog...

Words: 125224 - Pages: 501

Premium Essay

Essentials of Management Information Systems

...safeguarding information resources? 2. 3. 4. ISBN 1-256-42913-9 232 Essentials of MIS, Ninth Edition, by Kenneth C. Laudon and Jane P. Laudon. Published by Prentice Hall. Copyright © 2011 by Pearson Education, Inc. C HAPTER O UTLINE Chapter-Opening Case: Boston Celtics Score Big Points Against Spyware 7.1 System Vulnerability and Abuse 7.2 Business Value of Security and Control 7.3 Establishing a Framework for Security and Control 7.4 Technologies and Tools for Protecting Information Resources 7.5 Hands-on MIS Projects Business Problem-Solving Case: Are We Ready for Cyberwarfare? BOSTON CELTICS SCORE BIG POINTS AGAINST SPYWARE While the Boston Celtics were fighting for a spot in the playoffs several years ago, another fierce battle was being waged by its information systems. Jay Wessel, the team’s vice president of technology, was trying to score points against computer spyware. Wessel and his IT staff manage about 100 laptops issued to coaches and scouts, and sales, marketing, and finance employees, and these machines were being overwhelmed by malware (malicious software). Like any sports franchise, the Celtics are on the road a great deal of time during the playing season. Coaches, recruiters, and other staff members are at away games 40 or more times each season, using their mobile laptop computers to review plays and update the status of players. They continually sign onto the Internet and...

Words: 21009 - Pages: 85

Free Essay

Upload

...Practice Test Two Candidate Name _________________ INTERNATIONAL ENGLISH LANGUAGE TESTING SYSTEM LISTENING SECTION TIME: 30 MINUTES INSTRUCTIONS: You must not open the booklet until you are instructed to do so. Write your name and registration number at the top of the page. You should attempt all questions. All recordings will be played only once. Write all your answers on the test paper itself. After the section is over, you will be given ten minutes to transfer your answers to the given answer sheet. You are not permitted to take this exam booklet out of the examination room. There are 40 questions in this section. They are broken up into four parts as follows: Section 1 Section 2 Section 3 Section 4 Questions 1-10 Questions 11-20 Questions 21-30 Questions 31-40 Test 2 LISTENING SECTION 1 Questions 1-10 (CD3 Track 1) Questions 1-2 Choose the correct letters, A, B, or C. Example: What nursery school registration option does the woman choose? A Half-day B Full-day C Full-day plus after school care 1 What is the woman’s husband’s nationality? A Swiss B Swedish C Swazi 2 How is a child’s personal education number normally received? A By post B By e-mail C Picked up from the school Question 3 Choose the correct letters, A, B, or C. 3 Why is the husband out of town? A Vacation B Work C Family reasons Question 4 Choose three letters, A-F 4 Which THREE pieces of information are required to retrieve the child’s personal ...

Words: 5225 - Pages: 21

Premium Essay

Cruel Games

...Katherine Kersey Dec-06-2013 Argument Research Essay English Comp Cruel Games Dogs are human’s best friends. While some people choose to treat dogs with kindness and respect, others are mistreating dogs by using them for their entertainment. Dog fighting is still occurring today. It is big business in many parts of the county. This often happens in areas where there is poverty. Dog fighting is seen as “the quick” money. Some highly organized groups even use a secret dialect called the “Cajon Dictionary” on social network sites to plan fighting events discretely. This cruelty is also most often linked between more crimes including; illegal firearms possession, drug trafficking, gambling, spousal and child abuse, rape, and homicide. Regardless of if you can make money from it or not, dog fighting is a very cruel activity that should never occur anywhere in the world. A dog cannot speak for itself and say, “Stop!” That’s why more people need to be aware of this epidemic and see what is being done to help end it. Ancient Romans pitted dogs against each other in gladiatorial contests, but dogs have also played practical roles in society. Dogs have long been used as hunting companions, defenders of property and protectors of livestock against poachers and wild animals. They play key roles in military and K-9 police units. French bulldogs and Old Boston Bulldogs killed household vermin and therefore made valuable pets. “In England, bulldogs that were crossbred with terriers...

Words: 4374 - Pages: 18

Premium Essay

Alternative Cancer Therapies

...Alternative Cancer Therapies Table of Contents 714-X ABM Mushroom AHCC Aloe Vera Anticoagulants Antineoplastons Antioxidants Anvirzel Artemisinin Asparagus Berries Boluses Bovine Cartilage Cancell Cansema Carnivora Alternative Cancer Therapies Page 1 Updated 05/17/11 Bookmark this page...as we learn of more therapies throug Please report any broken links by contacting info@mnwelldir.org Perhaps we should call these "unproven therapies" since many of them are on the American Cancer Society's infamous black list. Simply because something is "unproven" does not mean that it has been "disproven." And if a therapy fits the following— 1. It works. Castor Oil Packs Cayenne Pepper Chaparral Chinese Bitter Melon Chiropractic Clodronate Coley's Toxins Contortrostatin C-Statin D-limonene DMSO Electrolyzed Water Ellagic Acid Enzyme Therapy Escharotics Essential Oils 2. It's inexpensive. 3. Few, if any, negative side effects. 4. It's not patentable. —odds are it will stay on the black list because no one is going to spend a dime to prove its effectiveness. Medicine is a business. Cancer is a business. The FDA is running a protection racket, protecting drug companies and the AMA from anyone with an inexpensive and effective treatment for money making diseases. The following therapies are not guaranteed to work, at least by us. They are presented to you for information purposes only. For many, their effectiveness has been shown in limited clinical trials, but each one, by itself, is not...

Words: 12249 - Pages: 49

Premium Essay

Information Security

...chapter 2 40 Chapter 2 you. I’ve asked Charlie Moody to come in today to talk about it. He’s waiting to speak with us.” When Charlie joined the meeting Fred said, “Hello, Charlie. As you know, the Board of Directors met today. They received a report on the expenses and lost production from the worm outbreak last month, and they directed us to improve the security of our technology. Gladys says you can help me understand what we need to do about it.” “To start with,” Charlie said, “instead of setting up a computer security solution, we need to develop an information security program. We need a thorough review of our policies and practices, and we need to establish an ongoing risk management program. There are some other things that are part of the process as well, but these would be a good start.” “Sounds expensive,” said Fred. Charlie looked at Gladys, then answered, “Well, there will be some extra expenses for specific controls and software tools, and we may have to slow down our product development projects a bit, but the program will be more of a change in our attitude about security than a spending spree. I don’t have accurate estimates yet, but you can be sure we’ll put cost-benefit worksheets in front of you before we spend any money.” Fred thought about this for a few seconds. “OK. What’s our next step?” Gladys answered, “First, we need to initiate a project plan to develop our new information security program. We’ll use our usual systems development and project...

Words: 24411 - Pages: 98

Premium Essay

Consumer Behavior

...second largest Internet companies, Alibaba is the world's leading small business e-commerce company, Alibaba Group's flagship business. Alibaba market through its three trading around the world to millions of buyers and suppliers engaged in online business.Three online marketplaces: focuses on serving importers and exporters in the international market, domestic trade in China market, and, through an associated company, to promote Japanese exports and the domestic market in Japan.In addition, Alibaba is also on the international market with a global wholesale trading platform for smaller, you need small quantities of goods to buyers fast delivery service.All transactions with the formation of a market more than 240 countries and regions from over 61 million registered users of the online community.In order to be transformed into so small businesses can easily create and manage a comprehensive online business platform, Alibaba also acquired directly or through its network of companies, including China million and an Octopus, domestic traders to provide a wide range of business management software, Internet-based facilities, services and export-related services, and business management professionals with expertise and...

Words: 6708 - Pages: 27

Premium Essay

Capstone

...qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwer...

Words: 3927 - Pages: 16

Premium Essay

Eib Handbook

.................................................................................................................. 1-2 SCORECARDS .......................................................................................................................... 1-3 RISK ASSESSMENT ................................................................................................................. 1-3 CHAPTER 2 – ADMINISTRATION AND PROCEDURES 2-1. 2-2. 2-3. 2-4. 2-5. 2-6. BOARD FUNCTIONS ................................................................................................................. 2-1 PERSONNEL REQUIREMENTS ............................................................................................... 2-2 EQUIPMENT, AMMUNITION, AND SITE REQUIREMENTS...

Words: 42999 - Pages: 172

Premium Essay

Bhopal Info

...Consequently changes in the safety health field are often motivated by great tragedies that focus public attention on risks in the workplace. The Goals of this unit: * Identify the historic trends in industrial safety * Identify events that have impacted industrial safety To complete this unit you must 1. Read the chapter in the book 2. Review the PowerPoint slides 3. Look into the Bhopal accident using the video and searching the Internet to answer the following under the "Assignment tab" for : Session 2: History of Safety. 1. How many died as a result of the accident? 2. What has been the long term effects of the accident on residents 3. Look at the total number of injuries and deaths over for any 2 years on the BLS web site for (Take a look at data from Osha) Use the BLS link to find the data tutorials for: * Manufacturing * Construction * Mining * Agriculture en.wikipedia.org/wiki/Bhopal_disaster‎ Bhopal disaster From Wikipedia, the free encyclopedia Jump to: navigation, search | The neutrality of this article is disputed. Relevant discussion may be found on the talk page. Please do...

Words: 14078 - Pages: 57