Keeping My Army ID Card Safe And Essay

PAGES
4
WORDS
1068
Cite
Related Topics:

¶ … Keeping My Army ID Card Safe and Secure Whenever something occurs, especially one that may have dire consequences or effects, the first instance of which can be deemed as an "accident" or something that just so happens by mistake. When the similar event ensue a second time around, then there is already a trend and fault should be accorded to the person who committed the same flaw twice. The reason for not letting the fault pass a second time around is that the mere fact there was a reoccurrence of the event, the person has not learned the lesson at the first instance. Consequently, provision of punishment or penalty that is commensurate to the infraction is apropos in order for the person who committed the act to finally learn the wrongness of is way. Absent any sanction, then the person may again repeat the same mistake over and over until it becomes not only a trend but a very bad habit that would cause not only detrimental effects but injuries to the person, those who the person works with and for, as well as the organization where the person belongs to. For my part, the mistake or fault that I committed twice was leaving my military identification card still in one of the Common Access Card (CAC) readers in the clinic I am assigned.

The CAC is the standard identification card in used in the military and provided to personnel who has business with the United States Department of Defense. The CAC is a smart card that contains vital information (i.e. name, service number, etc.) on the personnel it is assigned to. Aside from being a form of identification,...

...

As an Army Medic, I used the military's information systems to deal with patient information, make and manage appointments, do online training and a host of other tasks relevant and necessary to the performance of my duties in my specific military occupation specialty. Thus, the importance of securing and ensuring the safety of the identification card cannot be emphasized enough. I have gone to an intensive training and have been briefed extensively on the criticality of ensuring that the card is not compromise in various ways such as theft, misused, loss, others. I have been made to understand the policies, guidelines, regulations and statutes related to the identification card and I have signed various forms and documents attesting to my understanding and acknowledgment of these rules. Accordingly, my leaving my identification card still in one of the card readers was in direct contravention to the legal documents that I attested to.
Although I may be mitigating the circumstances with having completed a 24-hour shift and I was exhausted, this is still no excuse because I have still been remiss in the execution of my duties responsibilities, and obligations not only to the military service but to the patients I serve as an Army Medic. Numerous things could have happened or have gone wrong whilst my identification was in the card reader during my absence. Primarily, the card could have been stolen my mischievous…

Cite this Document:

"Keeping My Army ID Card Safe And" (2011, July 18) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/keeping-my-army-id-card-safe-and-51544

"Keeping My Army ID Card Safe And" 18 July 2011. Web.19 April. 2024. <
https://www.paperdue.com/essay/keeping-my-army-id-card-safe-and-51544>

"Keeping My Army ID Card Safe And", 18 July 2011, Accessed.19 April. 2024,
https://www.paperdue.com/essay/keeping-my-army-id-card-safe-and-51544

Related Documents
Espionage Study Guide
PAGES 34 WORDS 9330

Espionage Burds, Chapter 19 Golden Age of Soviet "Illegals" Cambridge Five: Burgess, Blunt, Maclean, Philby and Cairncross These five were all discovered to be spying for the Soviets. Cairncross was never caught. He supplied Stalin with secrets that helped the Soviets stay ahead of British Intelligence, especially at the Battle of Kursk Cairncross also informed Stalin of ULTRA, when Churchill was hiding ULTRA from Stalin Cairncross supplied a total of 5832 documents to the Soviets Cairncros had been

(MACV Dir 381-41) This document is one of the first confidential memorandums associated with the Phoenix Program, which details in 1967 the mostly U.S. involvement in counterinsurgency intelligence and activities and discusses the future training and development of South Vietnam forces to serve the same function, that had been supported by the U.S. In civilian (mostly CIA) and military roles. The document stresses that the U.S. role is to

RFID Technology in the Military Radio frequency identification (RFID) Radio frequency identification (RFID) is a term used to refer to an electronic system that transmits in form of serial numbers that are distinct, the identity of a person or an object in a wireless manner with the aid of radio frequencies. The RFID is categorized under the wider automatic identification technologies category (Association of Automatic Identification and Mobility, 2011). The RFID are

Released by the FBI and
PAGES 65 WORDS 17274

" Human development- behavioral shifts in human being that tae place during the course of an entire lifespan ("Human Behavior"). Risk Analysis- the activity of determining and analyzing the dangerous natural and human caused negative events. This analysis takes into consideration the risks these event pose to businesses individuals and governments. Within the domain of information technology risk analysis reports are utilized to tailor technology-related objectives with a an organization's business objectives.

The subjects were 613 injured Army personnel Military Deployment Services TF Report 13 admitted to Walter Reed Army Medical Center from March 2003 to September 2004 who were capable of completing the screening battery. Soldiers were assessed at approximately one month after injury and were reassessed at four and seven months either by telephone interview or upon return to the hospital for outpatient treatment. Two hundred and forty-three soldiers

The scanner's ability to translate typewriter characters into bit-mapped image into ASCII text depends on a number of factors, including the sensitivity of the device itself and the legibility and method of preparation of the original document; however, improvements are being made all of the time and even formerly graphic-based scanning systems such as Adobe's notoriously slow PDF applications have incorporated character recognition systems that allow for textual scanning.