security procedures
Recently Published Documents


TOTAL DOCUMENTS

64
(FIVE YEARS 16)

H-INDEX

4
(FIVE YEARS 1)

2021 ◽  
Vol 2114 (1) ◽  
pp. 012009
Author(s):  
Thuraya A. Abdul Hussian ◽  
Anwar kh. Farman

Abstract Radiation is a form of energy, its emitted either in the form of particles such as α-particles and β-particles (beta particles including the electron and the positron) or waves such as sunlight, X-rays and γ-rays. Radiation found everywhere around us and it comes from many different sources naturally or man-made sources. In this study a questionnaire was distributed to people working in the field of X-rays that used for a medical imaging (X-ray and CT-scan) to evaluate the extent of awareness and knowledge in estimate the damage of ionizing radiation as a result of wrong use. The questionnaire was distributed to medical clinics in Al-Harithiya in Baghdad, which it’s considered as one of the important areas in Iraq to attract and treat patients. It’s found that most of the commitment of radiography clinics by safety and security procedures. Most of the radiology clinics abide by most of the Iraqi Ministry of Health laws. However, some clinics did not implement some of the security and safety conditions


Author(s):  
Сергей Владиславович Владимиров

В статье раскрывается актуальность борьбы с пенитенциарными преступлениями силами и средствами сотрудников уголовно-исполнительной системы, обеспечивающих режим в исправительных учреждениях. Большое значение в повышении эффективности противодействия пенитенциарной преступности имеют результаты проведения досмотра и обыска как режимных мероприятий. Проведено сравнение режимных досмотра и обыска со следственными осмотром и обыском. Указано на значительное сходство в сущности, тактике, порядке оформления и уведомления контролирующих должностных лиц рассматриваемых следственных и режимных мероприятий. Установлено, что для раскрытия и дальнейшего расследования пенитенциарных преступлений важное значение имеет возможность обнаружения, фиксации и изъятия в ходе обыска и досмотра следов преступления. В этом случае акты режимных мероприятий выступают полноценными источниками доказательств при условии составления их в соответствии с нормативно-правовыми актами, в том числе ограниченного пользования. Обоснована необходимость осматривать, фиксировать и изымать следы преступной деятельности в ходе режимных мероприятий в соответствии с криминалистическими требованиями к следственным действиям, поскольку в этом случае доказательственное значение получаемых сведений в ходе режимных мероприятий существенно возрастает. Предложено разработать нормативный акт, регламентирующий порядок предоставления результатов режимных мероприятий в органы уголовной юстиции, что, несомненно, повысит эффективность доказывания пенитенциарных преступлений. The article reveals the relevance of the fight against penitentiary crimes by the forces and means of the employees of the penitentiary system who ensure the regime in correctional institutions. An important role in the effectiveness of countering criminality is played by the results of conducting searches and searches as security measures. A comparison of routine inspections and searches with investigative inspections and searches is made. It is pointed out that there are significant similarities in the nature, tactics, procedure for registration and notification of controlling officials of the investigative and regime measures under consideration. It is established that for the disclosure and further investigation of penitentiary crimes, the possibility of detecting, fixing and removing traces of the crime during the search and inspection is of great importance. In this case, the acts of regime measures act as full-fledged sources of evidence, provided that they are compiled in accordance with regulatory legal acts, including those of limited use. The necessity to examine, record and remove traces of criminal activity during security procedures in accordance with the forensic requirements for investigative actions is justified, since in this case the evidentiary value of the information obtained during security procedures increases significantly. It is proposed to develop a normative act regulating the procedure for submitting the results of security procedures to the criminal justice authorities, which will undoubtedly increase the effectiveness of proving penitentiary crimes.


2021 ◽  
Vol 2 (3) ◽  
pp. 558-562
Author(s):  
Dimas Putra Wicaksana ◽  
Agung Anak Sagung Laksmi Dewi ◽  
Luh Putu Suryani

The responsibility of the National Police in securing the candidates who will be elected as regional heads and also their deputy is a responsible action during the regional head elections, therefore the police apparatus is very important in maintaining security and order during the election. This study examines the form of security for candidates for regional heads and deputy regional heads in Denpasar City and explains the responsibility of the National Police for the security of candidates for regional heads and deputy regional heads in Denpasar City. The research method used is an empirical legal research method, with a statutory approach. The data used are primary and secondary data obtained by interview, observation and documentation techniques. The results of the study indicate that the security procedures for candidates who will be elected as regional heads and also their representatives in Denpasar City are referred to the rules implemented by the Denpasar Police and based on Article 5 paragraph (2) of Law No. 2 of 2002 concerning the Police. While the responsibility of the National Police for the security of candidates who will be elected as regional heads and also their representatives in Denpasar City is as the bearer of obligations, especially under the command of the Chief of Police, one of the main tasks of carrying out these obligations is the role of the Police as an intelligence unit in overcoming potential security disturbances.


Author(s):  
Wojciech Jakubiec

We can certainly say that identity theft on the Internet is a growing criminal phenomenon. The perpetrators’ actions are most often motivated by financial gain. The article discusses selected issues concerning so-called Internet fraudsters. In particular, it draws attention to the actions taken in cyberspace and the risks that accompany such decisions. I point out that the most vulnerable to identity theft are elderly people who do not even know basic security procedures. The article not only draws attention to the dangers themselves but also describes the way criminals act. It also states that in order to minimize the risks faced by network users, attention should be paid to training needs related to with security in cyberspace. An important aspect of this is to draw attention to the risks associated with personal data improperly stored on electronic media integrated into the Internet.


Author(s):  
Ewing Mahoney

This chapter examines the vetting and purging of workers in the private sector. It was the ‘longstanding practice’ even before the Cold War that the purge and other security procedures extended well beyond the civil service into private industry. This ‘longstanding practice’ could operate only because of the surveillance work undertaken by MI5, in both compiling and maintaining the blacklist of Communist Party members. In the case of the private-sector exclusion of Communists, it was left to MI5 to secure the removal of workers to whom the Service objected: MI5 may have had no authority, but it had power. One question for this chapter is thus the legal issues surrounding such intervention and the potential legal liabilities to which it could give rise, while another is the scope of the authority and the manner and circumstances in which intervention might take place. However, the underlying theme is the question of accountability.


Author(s):  
Ewing Mahoney

This chapter focuses on the work of Lord Radcliffe, a member of the Appellate Committee of the House of Lords and evidently a man greatly trusted by government. Lord Radcliffe presided over what was one of the most detailed inquisitions of journalism ever conducted in the United Kingdom, to which the press was legally bound to submit by virtue of the 1921 Act. Some of his judgments on press standards were excoriating. While few would be willing to justify the reporting criticized by Radcliffe, it is to be recalled that there was no evidence of any offence having been committed by any of the newspapers. The chapter also examines two important reports: the Committee on Security Procedures in the Public Service, a censored version of which was published in April 1962; and the detailed report of a Tribunal of Inquiry appointed to inquire into the Vassall case, the complete text of which was published in April 1963.


Sign in / Sign up

Export Citation Format

Share Document