The US Patriot Act of 2001 and the Homeland Security Act of 2002 HCA 450. Kristy D. Robinson. December 12, 2014

Similar documents
Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

CITIZEN ADVOCACY CENTER

CATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C.

Name. September 11, 2001: A Turning Point

TEACHER SUPPORT PAGES

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges

H. R SEC DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

USA PATRIOT ACT: Protecting National Security or Violating Civil Liberties?

Subject: National Preparedness

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

In an age where so many businesses and systems are reliant on computer systems,

troinet.com When It Comes to HIPAA Compliance, Ignorance of the Law Is No Excuse

DRAFT Syllabus Managing Homeland Security: PUAD 637 School of Policy, Government, and International Affairs

Privacy versussecurity: Moral disagreements in the context of surveillance

Barbara M. Jones, Ph.D. International Library Consultant, USA Former University Librarian Wesleyan University (Connecticut)

PREAMBLE. THE GOVERNMENT OF THE UNITED STATES OF AMERICA and THE GOVERNMENT OF CANADA (hereinafter "the Parties");

MINA'BENTE SITE NA LIHESLATURAN GUAHAN 2005 (FIRST) REGULAR SESSION

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

These are just two examples of the opportunities and privacy risks involved in U.S. fusion centers.

SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon

The FBI and the Internet

NATIONAL HEALTHCARE SAFETY NETWORK USER RULES OF BEHAVIOR. Version /08/05

Managing Homeland Security: PUAD 637 School of Policy, Government, and International Affairs George Mason University Spring Semester 2015

National Security Agency

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

Houston Regional Intelligence Service Center (Fusion Center) Privacy Policy. Privacy, Civil Rights, and Civil Liberties Policy

The George Washington University Graduate School of Political Management Summer 2013

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Key Concepts Chart (The United States after the Cold War)

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division

Unofficial translation of AML/ CFT Regulations for Banks

MONROE TOWNSHIP PUBLIC SCHOOLS WILLIAMSTOWN, NEW JERSEY. Law Enforcement

COMPUTER AND NETWORK USAGE POLICY

WHAT BUSINESSES SHOULD KNOW ABOUT CYBERTERRORISM

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

MPS GROUP GLOBAL ANTI-MONEY LAUNDERING POLICY

Exclusive: Storm over Big Brother database

HIPAA PRIVACY AND SECURITY AWARENESS

I. WHAT IF THE POLICE, FBI OR DHS AGENTS CONTACT ME?

FORENSIC DNA COLLECTION: A CITIZEN S GUIDE TO YOUR RIGHTS SCENARIOS AND RESPONSES

JOINT STATEMENT OF ELISEBETH COLLINS COOK ASSISTANT ATTORNEY GENERAL AND VALERIE CAPRONI GENERAL COUNSEL FEDERAL BUREAU OF INVESTIGATION BEFORE THE

Homeland Security Presidential Directive/HSPD-5 1

Cloud Computing Risks & Reality. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

H. R. ll IN THE HOUSE OF REPRESENTATIVES A BILL

Cybersecurity Executive Order

El Camino College Homeland Security Spring 2016 Courses

Politics and Cryptography in the United States. Outline. What are Your Rights? Syvale Lee April 11, 2006

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY

Information Security Policy

Homeland Security from Citizens Perspective

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

Northrop Grumman White Paper

Law & Ethics, Policies & Guidelines, and Security Awareness

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE PERIOD

HIPAA RULES AND REGULATIONS

Classroom Activities Are We Safer?

I. U.S. Government Privacy Laws

DEBATE IN THE HOUSE OF REPRESENTATIVES ON THE USA PATRIOT ACT OF 2001

Balancing Privacy & Security: The Role of Privacy and Civil Liberties in the Information Sharing Environment

The Need to Share: The U.S. Intelligence Community and Law Enforcement

CONSULTATION PAPER ON A CODE OF PRACTICE FOR VOLUNTARY RETENTION OF COMMUNICATIONS DATA

South Dakota Department of Public Safety Office of Homeland Security Senior Advisory Committee Charter

Crimes (Computer Hacking)

THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

THE UK S ANTI-MONEY LAUNDERING LEGISLATION AND THE DATA PROTECTION ACT 1998 GUIDANCE NOTES FOR THE FINANCIAL SECTOR. April 2002

TOOLBOX. ABA Financial Privacy

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

) ) ) SENATE S. NO; 2_8_0_' Introduced by Senator Antonio "Sonny" F. Trillanes IV. Explanatory Note

CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE

California Statewide Survey Results

OCR s Anatomy: HIPAA Breaches, Investigations, and Enforcement

Subject: Critical Infrastructure Identification, Prioritization, and Protection

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

UFF Position Statement: Fire and Smoke as a Weapon

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

CONDUCT A NEBRASKA SEARCH AND SEIZURE OF YOUR HOME?

Department of Defense DIRECTIVE

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

M.P.S. in Legislative Affairs Semester: Summer 2015 May 18 June 25. Course Name LGAF 6270.LH1 Congress and Homeland Security 3 Credits

New York: Center of the World Teacher s Guide

Appendix : Business Associate Agreement

YPRES SALIENT Besieged city

S. ll IN THE SENATE OF THE UNITED STATES

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

UK Cloud Computing Interception - nothing new. Clive Gringras. Olswang LLP

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

CRIMINAL INVESTIGATION IN THE SLOVAK REPUBLIC

Purpose of the Governor s strategy. Guiding Principles

Data controllers and data processors: what the difference is and what the governance implications are

FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE

Homeland Security in Michigan: A Cooperative Network of Local, State, and Federal Action

AN ACT. To create and establish the Office of Homeland Security in the Governor s Office; and for other purposes.

S AN ACT. To codify an existing operations center for cybersecurity.

Transcription:

The US Patriot Act of 2001 and the Homeland Security Act of 2002 HCA 450 Kristy D. Robinson December 12, 2014

Introduction: On September 11, 0f 2014 a horrific tragedy struck the nation when terrorist attacks of extremists altered the future of the United States of America. This group by the name of Al Qaeda unleashed destruction and mayhem on the World Trade Center towers in New York City and brought them down to rubble and ashes (History, 2014). In addition to this, another plane hit the Pentagon and as a result of these terrorists actions over 3,000 people died and forever changed the lives of Americans across the country. The way US citizens lived their lives would never be the same. As a result, the US Patriot Act was created to combat terrorism to prevent anything of this magnitude from occurring again. The US Patriot Act of 2001: The US Patriot Act of 2001was signed into effect by the former president George Bush to aid in fighting against terrorism (Justice.gov, 2014). The purpose of this act was to give law enforcement more power and tools to aid in monitoring, and preventing future acts of terrorism to prevent that sort of tragedy from occurring again. The law enables law enforcement to act on any instances that they deem suspicious. This may be appear to be justified, however the vagueness of this act allowed the enforcers of the law a lot of room to decide what they deem suspicious. As a result many civilians not committing criminal activity may be unjustly monitored by police or government officials when it is not warranted. This is considered a violation of privacy and often times ones civil rights and has become a nuisance to some citizens. Unfortunately, the Patriot Act did not come without consequences even to the average US citizen. As a sort of side effect of this act, citizens are not subject to intrusive and now standard procedures, like searches at airports, monitoring private phone calls and emails as well. Many

challenge the depths of how far the intrusion goes as the public generally feel as though the Patriot Act oversteps its boundaries rather than protect the best interest of the country. Many innocent citizens have been subject to a great deal of delays, and flight denials for the wrong reason. There have been times that public opinion has been divided on the subject of The Patriot act, and this is understandable. The Homeland Security Act: The Homeland Security Act of 2002, is quite similar in its agenda in that it is geared toward thwarting terrorist attacks on United States soil with the added benefit of reducing the vulnerably level of the country as well (DHS.gov, 2012). This Act is also designed to support and investigations necessary in preventing attacks against this country. That would include obtaining personal health information on those suspected of having plans to commit terroristic acts. This caused confusion in the healthcare arena for many healthcare providers receiving requests for PII on suspects were concerned that they were violating HIPAA laws by doing so. As a result an amendment had to be enacted to justify the release of this information, letting healthcare providers off the hook and assuring them that this was not a violation of privacy laws (AHIMA, 2014). This act also supports the rebuilding of areas that have been affected by terrorist acts such as the World Trade Center. While the twin towers were not restored to their original architecture, they were rebuilt to commemorate and honor those who lost their lives during the tragedy. In addition to innocent civilians, many law enforcement and fire and rescue personnel have lost their lives as well. Although these laws were enacted to protect the citizens of the United States, the rights of others are in fact violated to protect these rights. The irony of this scenario is not

lost, for it appears that the law decides who is and is not protected and therefore justified in violation ones rights to protect those of another. Conclusion: In conclusion, the US Patriot Act of 2001, and the Homeland Security Act of 2002 both go hand in hand with one another and were designed to aid in protecting the boarders of this country. While citizens have protested the lengths of intrusion and have expressed discomfort at many of the inconveniences that have accompanied these acts, the majority of the country largely supports the necessity of making a safer land. The mindset that the ends justifies the means allows US citizens to sleep at night, over the reality that the privacy rights of all have been taken away, as well as the human rights of those placed under the suspicion of being terrorist.

Bibliography AHIMA. (2014, December 13). AHIMA. Retrieved from Homeland Security Act, Patriot Act, Freedom of Information Act, and HIM (Updated): http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_048641.hcsp?ddocnam e=bok1_048641 DHS.gov. (2012, July 12). Homeland Security Act of 2002. Retrieved from Homeland Security: http://www.dhs.gov/homeland security act 2002 History. (2014, December 12). 9/11 Attacks. Retrieved from History: http://www.history.com/topics/9 11 attacks Justice.gov. (2014, December 12). The USA PATRIOT Act: Preserving Life and Liberty. Retrieved from Preserving Life and Liberty: http://www.justice.gov/archive/ll/highlights.htm