Monday, February 24, 2020

Answer the question Assignment Example | Topics and Well Written Essays - 250 words - 5

Answer the question - Assignment Example The case was against the state where Batson v. was a defendant from the U.S supreme court acting as the defendant. He had a great argument that the blacks were of the same fitness as the white people to have a place in the judiciary. The case was first filled in Kentucky, in the state court of petitioner. This case was then discussed in many other courts like the United States’ Supreme Court. Joe Gutmann, who was a prosecutor, agreed that Supreme Court made a good decision since it prohibited lawyers from discerning in jury assortment. He said that the reason of him removing the black was as they were youthful and they might have sympathized with Batson. The case took almost a year to be decided. It was in the U.S Supreme court where the case was decided. Finally, the black society had the right and positions in the judiciary. The violation of their rights as the black was no longer there. Black venire men have excited (Overland,

Saturday, February 8, 2020

Essay topic in reference to Personally Identifiable Information and

Topic in reference to Personally Identifiable Information and ethics - Essay Example This paper describes ethical issues and their relationship to the use of information technology the paper delves trends as well as impacts of the ethics of individuals and organizations Ethical actions of a person are defined as activities that are performed with a particular criterion of what is good. It thus relates to the question of what is regarded as good or bad by humans. Just like the other fields, information technology is aided by a particular code of ethics (Floridi, 2008). Privacy is an issue that has both external as well as internal implications. Keeping in mind that all organizations often collect their employee’s data, data that is not safeguarded properly can lead to various implications to an individual. Such information includes background data, compensation, and personal identification data such as account identifiers and social security numbers. This type  of information is maintained as well as accessed by authorized personnel. Systems that are used in tracking sensitive information are secured, though at some point data must be used in other systems. To ensure that information is secured, operational procedures and policies are used to handle data, in case these policies and procedures are not properly enforced, they can be accessed by unauthorized personnel and can be used to commit crimes. All Employees activities as well as the use of technologies are monitored by their organizations. Thus, employees are notified that when they are using organizational assets, they should not expect any privacy; such corporate assets include network and internet access. Even without such disclaimers, there is no need to notify that they are being monitored (Mason, 2006). The major issues in monitoring of employees activities include whether organizations have obligations to notify their employees the extent of