SlideShare a Scribd company logo
1 of 8
1
WIC Drug Enforcement Policy
WIC Drug Enforcement Policy
Women, Infants and Children (WIC) program is a health
initiative by the government aimed at safeguarding the interests
of women and children especially in the dimension of health and
wellbeing. Its mission is to uphold the health of infants, low-
income women, and children at risk of or experiencing poor
nutrition. In order to succeed in the mission to protect the
health interest of the target populations, WIC has established its
policy on drug abuse for the target populations and people
around them such as parents or guardians. The policy on drugs
stipulates that current recipients of the benefits of the WIC
program and new applicants must be screened for drug use. In
case there is reasonable suspicion of drug use among such
individuals, the recipients or applicants must take drug tests to
ascertain their drug-abuse status (Vargas & Pirog, 2016). If the
eligible recipients of the WIC benefits or applicants for the
program declines to take the drug test, or accepts but tests
positive their eligibility for benefits or acceptance of their
application in the case of new applicants is declined for a period
of not less than six months (Vargas & Pirog, 2016).
Additionally, legal action can be taken against applicants and
recipients who test positive in the drug test depending on their
general conduct especially when their behaviors towards women
and children negatively impact on the latter’s physical,
emotional, and mental health.
If the individuals who have failed the drug test are immigrants,
they are at risk of deportation. Factors to be considered herein
include the severity of their drug-abuse problem, and the extent
to which their drug abuse-related behaviors impact negatively
on the others especially WIC’s populations of interest (Vargas
& Pirog, 2016). Adherence to the policy on drugs has been
associated with better health outcomes such as higher birth
weights during pregnancy, reduced fatal deaths, and better
newborn-babies’ health (Pecora et al., 2018). Furthermore, the
drug policy has significantly prevented incidences of domestic
violence, negligence of dependent women and children, and
better health outcomes by increasing responsible behaviors
among the beneficiary of the WIC program and their caregivers.
References
Pecora, P. J., Whittaker, J. K., Barth, R. P., Borja, S., &
Vesneski, W. (2018). The child welfare challenge:
Policy, practice, and research. New York: Routledge.
Vargas, E. D., & Pirog, M. A. (2016). Mixed‐status families and
WIC uptake: The effects of risk of deportation on program
use. Social Science Quarterly, 97(3), 555-572.
Running head: POOR IMPLEMENTED DATABASE 1
POOR IMPLEMENTED DATABASE 4
Poor Database Implementation:
Implementing a protected database is vital for every business
organization. As the major field of information communication
technologies (ICT) advances every day, some key security
threats also rise. Many attacks are done effectively. Hence, for
poorly implemented databases, the business risks are very high.
The business organization will be at the threat of losing data
and revealing their customer’s details to individuals who may
do them more harm. Thus, it is vital to keep updated the
database of the business. There are many cases whereby
businesses have run into major losses or have been revealed to
lose crucial information because of the poor database
implementation.
Moreover, one of the key poorly implemented databases I have
even read about is the data exposure of “Exactis.” It is a
marketing company that went through a big challenge. The
company left an estimated amount of around three hundred and
forty million data highly exposed. Anyone who had great access
to their computer servers would get info about their customers.
It was a major case of poor planning of the database. Hence,
this incidence did not even lead to the loss of key detailed
documents’ data like credit cards, and it was a higher exposure
to business attacks (Hashim, 2018).
The main cause of the problem that was encountered by Exactis,
i.e., the failure to install data security measures such as firewall
layer to keep the data. However, it shows that the company’s
security team not ever monitored their common site regularly to
understand the business risks they were putting their customer’s
information. Through constant monitoring of the database, it
was even possible to notice numerous errors that were created
and potentially rectified them. After being informed of their
unprotected database, the company took a step and fixed data
security measures to keep the data hide from being highly
accessed through the public. Thus, in the Exactis case, malware
hackers not ever got their method into the system; it was a
corrupt practice as far as obtaining the database is highly
concerned. So, the key potential solution to protect the Exactis
data from the attackers was to use strong passwords and
controlled the major use of computers (Mosheshe, 2017).
References
Hashim, H. B. (2018). Challenges and security vulnerabilities to
impact on database systems. Al-Mustansiriyah Journal of
Science, 29(2). Retrieved from
https://www.researchgate.net/publication/329025438_Challenge
s_and_Security_Vulnerabilities_to_Impact_on_Database_Syste
ms
Mosheshe, J. (2017). The effect of increased reliance on
information systems and relational databases in airline
industries: a case study of british airways. Journal of Computer
Engineering & Information Technology, 6(5). Retrieved from
https://www.scitechnol.com/peer-review/the-effect-of-
increased-reliance-on-information-systems-and-relational-
databases-in-airline-industries-a-case-study-of-british-air-
B6vI.php?article_id=6608
HCA 498 Final Term Paper Requirements
You are required to complete a term project for this course, in
which you will apply the
information you have covered throughout the course.
In preparation for your term paper, research and compare
different health policies or
programs in the U.S., on the local, state, or the federal level.
Next, choose one policy or
program. Write a paper exploring the planning, implementation,
and evaluation that went
into the policy or program.
The final term paper will describe the Program planning and
policies process including
the benefits of incorporating components of various approaches
to conducting a needs
assessment, selecting the appropriate statistics for analysis of
data and the target
audience for the program and how this is relevant to the Saint
Leo University Core
Values of Excellence and Integrity in the context of health care
policy analysis.
There will be only one topic per student. To prevent duplication
of papers, please post
your paper topic under the Module 2, Project Topic item in the
navigation tree no later
than 11:59 PM on Sunday of Module 2. You may post your topic
earlier, if you wish.
Please review your peers' topics before posting yours, to ensure
you do not duplicate
one already selected by someone else.
You will submit your project titled “Final Term Paper” to the
Chalk and Wire no later
than 11:59 PM on Sunday of Module 7. The Term Paper Chalk
and Wire link is located
in the Module 7 folder. Students who do not submit the
assignment to Chalk and Wire
will receive a zero. This is a key program assessment; the
results are used to ensure
students are meeting program goals. Video and PDF instructions
can be found on the
course home page. PDF instructions are also located in the Start
Here folder. (Chalk
and Wire is linked to Turnitin.)
Your paper must:
• be 8–10 ten pages in length
• be double-spaced
• use 1-inch margins left, right, top, and bottom
• use 12 point font
The cover sheet, table of contents, index, pictures, long
quotations, or multiple
quotations will count toward the 8–10 pages. APA format is
required.
If you need further assistance with APA formatting and style,
there is a Writing Format
and Style Guides under Resources in the Course Home menu.
Statement on writing requirements:
Your writing reflects your ideas and communicates your
understanding of the topic to the
instructor. This assignment will be graded on the composition
elements listed below, as
well as your understanding of the content:
Successful writing should demonstrate
• Proofreading skills
• Correct grammar and punctuation
• Logical organization
• Proper content presentation (introduction, body, conclusion)
• Correct formatting for citations, references, and headings

More Related Content

Similar to 1WIC Drug Enforcement Policy.docx

Week 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxWeek 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
philipnelson29183
 
Please respond to each of the 3 posts with 3 APA sources no older th
Please respond to each of the 3 posts with 3 APA sources no older thPlease respond to each of the 3 posts with 3 APA sources no older th
Please respond to each of the 3 posts with 3 APA sources no older th
maple8qvlisbey
 
Signature Assignment Environment ScanningMGT498Ma.docx
Signature Assignment Environment ScanningMGT498Ma.docxSignature Assignment Environment ScanningMGT498Ma.docx
Signature Assignment Environment ScanningMGT498Ma.docx
maoanderton
 
Please respond to each of the 3 posts with 3.docx
Please respond to each of the 3 posts with 3.docxPlease respond to each of the 3 posts with 3.docx
Please respond to each of the 3 posts with 3.docx
bkbk37
 
Suggested ResourcesThe resources provided here are optional. You.docx
Suggested ResourcesThe resources provided here are optional. You.docxSuggested ResourcesThe resources provided here are optional. You.docx
Suggested ResourcesThe resources provided here are optional. You.docx
deanmtaylor1545
 
Running head HEALTH-COP COMPANY .docx
Running head HEALTH-COP COMPANY                                  .docxRunning head HEALTH-COP COMPANY                                  .docx
Running head HEALTH-COP COMPANY .docx
jeanettehully
 
1.  Patient Safety is a health care professionals’ duty. A sur.docx
1.    Patient Safety is a health care professionals’ duty. A sur.docx1.    Patient Safety is a health care professionals’ duty. A sur.docx
1.  Patient Safety is a health care professionals’ duty. A sur.docx
SONU61709
 
Big Data Plays a Vital Role in Healthcare Sector Discussion.pdf
Big Data Plays a Vital Role in Healthcare Sector Discussion.pdfBig Data Plays a Vital Role in Healthcare Sector Discussion.pdf
Big Data Plays a Vital Role in Healthcare Sector Discussion.pdf
bkbk37
 
The Anotated bilography should look like this Social1) S.docx
The Anotated bilography should look like this Social1) S.docxThe Anotated bilography should look like this Social1) S.docx
The Anotated bilography should look like this Social1) S.docx
mattinsonjanel
 
infosecurity-magazine.com httpwww.infosecurity-magazine.com.docx
infosecurity-magazine.com httpwww.infosecurity-magazine.com.docxinfosecurity-magazine.com httpwww.infosecurity-magazine.com.docx
infosecurity-magazine.com httpwww.infosecurity-magazine.com.docx
carliotwaycave
 
HC4110_FinalPaper_NewModelEHR_SmithKR_05062016
HC4110_FinalPaper_NewModelEHR_SmithKR_05062016HC4110_FinalPaper_NewModelEHR_SmithKR_05062016
HC4110_FinalPaper_NewModelEHR_SmithKR_05062016
Kathlene Smith
 
Case study 7 chapter 141. 2. Answer the Case Study Questions (.docx
Case study 7 chapter 141. 2. Answer the Case Study Questions (.docxCase study 7 chapter 141. 2. Answer the Case Study Questions (.docx
Case study 7 chapter 141. 2. Answer the Case Study Questions (.docx
wendolynhalbert
 

Similar to 1WIC Drug Enforcement Policy.docx (19)

Cats Corporate Presentation
Cats Corporate PresentationCats Corporate Presentation
Cats Corporate Presentation
 
Informatics.docx
Informatics.docxInformatics.docx
Informatics.docx
 
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxWeek 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
 
Please respond to each of the 3 posts with 3 APA sources no older th
Please respond to each of the 3 posts with 3 APA sources no older thPlease respond to each of the 3 posts with 3 APA sources no older th
Please respond to each of the 3 posts with 3 APA sources no older th
 
Signature Assignment Environment ScanningMGT498Ma.docx
Signature Assignment Environment ScanningMGT498Ma.docxSignature Assignment Environment ScanningMGT498Ma.docx
Signature Assignment Environment ScanningMGT498Ma.docx
 
Please respond to each of the 3 posts with 3.docx
Please respond to each of the 3 posts with 3.docxPlease respond to each of the 3 posts with 3.docx
Please respond to each of the 3 posts with 3.docx
 
An Industry Collaboration's Perspectives on the Value of Patient Support Prog...
An Industry Collaboration's Perspectives on the Value of Patient Support Prog...An Industry Collaboration's Perspectives on the Value of Patient Support Prog...
An Industry Collaboration's Perspectives on the Value of Patient Support Prog...
 
Suggested ResourcesThe resources provided here are optional. You.docx
Suggested ResourcesThe resources provided here are optional. You.docxSuggested ResourcesThe resources provided here are optional. You.docx
Suggested ResourcesThe resources provided here are optional. You.docx
 
Running head HEALTH-COP COMPANY .docx
Running head HEALTH-COP COMPANY                                  .docxRunning head HEALTH-COP COMPANY                                  .docx
Running head HEALTH-COP COMPANY .docx
 
1.  Patient Safety is a health care professionals’ duty. A sur.docx
1.    Patient Safety is a health care professionals’ duty. A sur.docx1.    Patient Safety is a health care professionals’ duty. A sur.docx
1.  Patient Safety is a health care professionals’ duty. A sur.docx
 
WK11HIT
WK11HITWK11HIT
WK11HIT
 
Big Data Plays a Vital Role in Healthcare Sector Discussion.pdf
Big Data Plays a Vital Role in Healthcare Sector Discussion.pdfBig Data Plays a Vital Role in Healthcare Sector Discussion.pdf
Big Data Plays a Vital Role in Healthcare Sector Discussion.pdf
 
The Anotated bilography should look like this Social1) S.docx
The Anotated bilography should look like this Social1) S.docxThe Anotated bilography should look like this Social1) S.docx
The Anotated bilography should look like this Social1) S.docx
 
infosecurity-magazine.com httpwww.infosecurity-magazine.com.docx
infosecurity-magazine.com httpwww.infosecurity-magazine.com.docxinfosecurity-magazine.com httpwww.infosecurity-magazine.com.docx
infosecurity-magazine.com httpwww.infosecurity-magazine.com.docx
 
HC4110_FinalPaper_NewModelEHR_SmithKR_05062016
HC4110_FinalPaper_NewModelEHR_SmithKR_05062016HC4110_FinalPaper_NewModelEHR_SmithKR_05062016
HC4110_FinalPaper_NewModelEHR_SmithKR_05062016
 
Case study 7 chapter 141. 2. Answer the Case Study Questions (.docx
Case study 7 chapter 141. 2. Answer the Case Study Questions (.docxCase study 7 chapter 141. 2. Answer the Case Study Questions (.docx
Case study 7 chapter 141. 2. Answer the Case Study Questions (.docx
 
How a Revamped Data Analytics Approach Can Mitigate Healthcare Disparities.pdf
How a Revamped Data Analytics Approach Can Mitigate Healthcare Disparities.pdfHow a Revamped Data Analytics Approach Can Mitigate Healthcare Disparities.pdf
How a Revamped Data Analytics Approach Can Mitigate Healthcare Disparities.pdf
 
A BIG DATA REVOLUTION IN HEALTH CARE SECTOR: OPPORTUNITIES, CHALLENGES AND TE...
A BIG DATA REVOLUTION IN HEALTH CARE SECTOR: OPPORTUNITIES, CHALLENGES AND TE...A BIG DATA REVOLUTION IN HEALTH CARE SECTOR: OPPORTUNITIES, CHALLENGES AND TE...
A BIG DATA REVOLUTION IN HEALTH CARE SECTOR: OPPORTUNITIES, CHALLENGES AND TE...
 
0401 1 Denis Costello - Patient Generated Data
0401 1 Denis Costello - Patient Generated Data0401 1 Denis Costello - Patient Generated Data
0401 1 Denis Costello - Patient Generated Data
 

More from jesusamckone

3-4 pages Explain Internal and External recruiting. Discuss the pro.docx
3-4 pages Explain Internal and External recruiting. Discuss the pro.docx3-4 pages Explain Internal and External recruiting. Discuss the pro.docx
3-4 pages Explain Internal and External recruiting. Discuss the pro.docx
jesusamckone
 
3 Vision Visioning is relatively easy. Casting a shared and clea.docx
3 Vision Visioning is relatively easy. Casting a shared and clea.docx3 Vision Visioning is relatively easy. Casting a shared and clea.docx
3 Vision Visioning is relatively easy. Casting a shared and clea.docx
jesusamckone
 
2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx
2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx
2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx
jesusamckone
 
3 Law peer reviewed references needed.Answer the Discussion Board bo.docx
3 Law peer reviewed references needed.Answer the Discussion Board bo.docx3 Law peer reviewed references needed.Answer the Discussion Board bo.docx
3 Law peer reviewed references needed.Answer the Discussion Board bo.docx
jesusamckone
 
3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx
3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx
3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx
jesusamckone
 
2To ADD names From ADD name Date ADD date Subject ADD ti.docx
2To  ADD names From  ADD name Date  ADD date Subject  ADD ti.docx2To  ADD names From  ADD name Date  ADD date Subject  ADD ti.docx
2To ADD names From ADD name Date ADD date Subject ADD ti.docx
jesusamckone
 
2Running head THE JONES ACTThe Jones Act 2.docx
2Running head THE JONES ACTThe Jones Act 2.docx2Running head THE JONES ACTThe Jones Act 2.docx
2Running head THE JONES ACTThe Jones Act 2.docx
jesusamckone
 
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
jesusamckone
 
2BUS 503 JOURNAL .docx
2BUS 503 JOURNAL                                 .docx2BUS 503 JOURNAL                                 .docx
2BUS 503 JOURNAL .docx
jesusamckone
 
2Fifth Edition COMMUNITY PSYCHOLOGY.docx
2Fifth Edition   COMMUNITY PSYCHOLOGY.docx2Fifth Edition   COMMUNITY PSYCHOLOGY.docx
2Fifth Edition COMMUNITY PSYCHOLOGY.docx
jesusamckone
 
293Peter Singer has written about assisted reproduction, a.docx
293Peter Singer has written about assisted reproduction, a.docx293Peter Singer has written about assisted reproduction, a.docx
293Peter Singer has written about assisted reproduction, a.docx
jesusamckone
 
26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx
26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx
26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx
jesusamckone
 
2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx
2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx
2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx
jesusamckone
 

More from jesusamckone (20)

3 templates are due based on the focus review. Attached are the temp.docx
3 templates are due based on the focus review. Attached are the temp.docx3 templates are due based on the focus review. Attached are the temp.docx
3 templates are due based on the focus review. Attached are the temp.docx
 
3-4 pages Explain Internal and External recruiting. Discuss the pro.docx
3-4 pages Explain Internal and External recruiting. Discuss the pro.docx3-4 pages Explain Internal and External recruiting. Discuss the pro.docx
3-4 pages Explain Internal and External recruiting. Discuss the pro.docx
 
3-4 page essayInequality of income is greater in the United Sta.docx
3-4 page essayInequality of income is greater in the United Sta.docx3-4 page essayInequality of income is greater in the United Sta.docx
3-4 page essayInequality of income is greater in the United Sta.docx
 
3 Vision Visioning is relatively easy. Casting a shared and clea.docx
3 Vision Visioning is relatively easy. Casting a shared and clea.docx3 Vision Visioning is relatively easy. Casting a shared and clea.docx
3 Vision Visioning is relatively easy. Casting a shared and clea.docx
 
3 Power points on nutrition while home schooling1 for elementary.docx
3 Power points on nutrition while home schooling1 for elementary.docx3 Power points on nutrition while home schooling1 for elementary.docx
3 Power points on nutrition while home schooling1 for elementary.docx
 
3 paragraph minimum, in text references, and scholarly references. .docx
3 paragraph minimum, in text references, and scholarly references. .docx3 paragraph minimum, in text references, and scholarly references. .docx
3 paragraph minimum, in text references, and scholarly references. .docx
 
2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx
2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx
2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx
 
3 page essay In-text scholar references in APA formatI.docx
3 page essay In-text scholar references in APA formatI.docx3 page essay In-text scholar references in APA formatI.docx
3 page essay In-text scholar references in APA formatI.docx
 
3 Law peer reviewed references needed.Answer the Discussion Board bo.docx
3 Law peer reviewed references needed.Answer the Discussion Board bo.docx3 Law peer reviewed references needed.Answer the Discussion Board bo.docx
3 Law peer reviewed references needed.Answer the Discussion Board bo.docx
 
3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx
3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx
3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx
 
2To ADD names From ADD name Date ADD date Subject ADD ti.docx
2To  ADD names From  ADD name Date  ADD date Subject  ADD ti.docx2To  ADD names From  ADD name Date  ADD date Subject  ADD ti.docx
2To ADD names From ADD name Date ADD date Subject ADD ti.docx
 
3 page essay regarding civil liberties, civil rights, and the presid.docx
3 page essay regarding civil liberties, civil rights, and the presid.docx3 page essay regarding civil liberties, civil rights, and the presid.docx
3 page essay regarding civil liberties, civil rights, and the presid.docx
 
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
 
2Running head THE JONES ACTThe Jones Act 2.docx
2Running head THE JONES ACTThe Jones Act 2.docx2Running head THE JONES ACTThe Jones Act 2.docx
2Running head THE JONES ACTThe Jones Act 2.docx
 
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
 
2BUS 503 JOURNAL .docx
2BUS 503 JOURNAL                                 .docx2BUS 503 JOURNAL                                 .docx
2BUS 503 JOURNAL .docx
 
2Fifth Edition COMMUNITY PSYCHOLOGY.docx
2Fifth Edition   COMMUNITY PSYCHOLOGY.docx2Fifth Edition   COMMUNITY PSYCHOLOGY.docx
2Fifth Edition COMMUNITY PSYCHOLOGY.docx
 
293Peter Singer has written about assisted reproduction, a.docx
293Peter Singer has written about assisted reproduction, a.docx293Peter Singer has written about assisted reproduction, a.docx
293Peter Singer has written about assisted reproduction, a.docx
 
26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx
26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx
26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx
 
2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx
2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx
2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx
 

Recently uploaded

Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 

Recently uploaded (20)

An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 

1WIC Drug Enforcement Policy.docx

  • 1. 1 WIC Drug Enforcement Policy WIC Drug Enforcement Policy Women, Infants and Children (WIC) program is a health initiative by the government aimed at safeguarding the interests of women and children especially in the dimension of health and wellbeing. Its mission is to uphold the health of infants, low- income women, and children at risk of or experiencing poor nutrition. In order to succeed in the mission to protect the health interest of the target populations, WIC has established its policy on drug abuse for the target populations and people
  • 2. around them such as parents or guardians. The policy on drugs stipulates that current recipients of the benefits of the WIC program and new applicants must be screened for drug use. In case there is reasonable suspicion of drug use among such individuals, the recipients or applicants must take drug tests to ascertain their drug-abuse status (Vargas & Pirog, 2016). If the eligible recipients of the WIC benefits or applicants for the program declines to take the drug test, or accepts but tests positive their eligibility for benefits or acceptance of their application in the case of new applicants is declined for a period of not less than six months (Vargas & Pirog, 2016). Additionally, legal action can be taken against applicants and recipients who test positive in the drug test depending on their general conduct especially when their behaviors towards women and children negatively impact on the latter’s physical, emotional, and mental health. If the individuals who have failed the drug test are immigrants, they are at risk of deportation. Factors to be considered herein include the severity of their drug-abuse problem, and the extent to which their drug abuse-related behaviors impact negatively on the others especially WIC’s populations of interest (Vargas & Pirog, 2016). Adherence to the policy on drugs has been associated with better health outcomes such as higher birth weights during pregnancy, reduced fatal deaths, and better newborn-babies’ health (Pecora et al., 2018). Furthermore, the drug policy has significantly prevented incidences of domestic violence, negligence of dependent women and children, and better health outcomes by increasing responsible behaviors among the beneficiary of the WIC program and their caregivers.
  • 3. References Pecora, P. J., Whittaker, J. K., Barth, R. P., Borja, S., & Vesneski, W. (2018). The child welfare challenge: Policy, practice, and research. New York: Routledge. Vargas, E. D., & Pirog, M. A. (2016). Mixed‐status families and WIC uptake: The effects of risk of deportation on program use. Social Science Quarterly, 97(3), 555-572. Running head: POOR IMPLEMENTED DATABASE 1 POOR IMPLEMENTED DATABASE 4 Poor Database Implementation: Implementing a protected database is vital for every business organization. As the major field of information communication technologies (ICT) advances every day, some key security threats also rise. Many attacks are done effectively. Hence, for poorly implemented databases, the business risks are very high. The business organization will be at the threat of losing data and revealing their customer’s details to individuals who may do them more harm. Thus, it is vital to keep updated the database of the business. There are many cases whereby businesses have run into major losses or have been revealed to lose crucial information because of the poor database implementation.
  • 4. Moreover, one of the key poorly implemented databases I have even read about is the data exposure of “Exactis.” It is a marketing company that went through a big challenge. The company left an estimated amount of around three hundred and forty million data highly exposed. Anyone who had great access to their computer servers would get info about their customers. It was a major case of poor planning of the database. Hence, this incidence did not even lead to the loss of key detailed documents’ data like credit cards, and it was a higher exposure to business attacks (Hashim, 2018). The main cause of the problem that was encountered by Exactis, i.e., the failure to install data security measures such as firewall layer to keep the data. However, it shows that the company’s security team not ever monitored their common site regularly to understand the business risks they were putting their customer’s information. Through constant monitoring of the database, it was even possible to notice numerous errors that were created and potentially rectified them. After being informed of their unprotected database, the company took a step and fixed data security measures to keep the data hide from being highly accessed through the public. Thus, in the Exactis case, malware hackers not ever got their method into the system; it was a corrupt practice as far as obtaining the database is highly concerned. So, the key potential solution to protect the Exactis data from the attackers was to use strong passwords and controlled the major use of computers (Mosheshe, 2017). References Hashim, H. B. (2018). Challenges and security vulnerabilities to impact on database systems. Al-Mustansiriyah Journal of Science, 29(2). Retrieved from https://www.researchgate.net/publication/329025438_Challenge s_and_Security_Vulnerabilities_to_Impact_on_Database_Syste ms Mosheshe, J. (2017). The effect of increased reliance on
  • 5. information systems and relational databases in airline industries: a case study of british airways. Journal of Computer Engineering & Information Technology, 6(5). Retrieved from https://www.scitechnol.com/peer-review/the-effect-of- increased-reliance-on-information-systems-and-relational- databases-in-airline-industries-a-case-study-of-british-air- B6vI.php?article_id=6608 HCA 498 Final Term Paper Requirements You are required to complete a term project for this course, in which you will apply the information you have covered throughout the course. In preparation for your term paper, research and compare different health policies or programs in the U.S., on the local, state, or the federal level. Next, choose one policy or program. Write a paper exploring the planning, implementation, and evaluation that went into the policy or program. The final term paper will describe the Program planning and policies process including the benefits of incorporating components of various approaches
  • 6. to conducting a needs assessment, selecting the appropriate statistics for analysis of data and the target audience for the program and how this is relevant to the Saint Leo University Core Values of Excellence and Integrity in the context of health care policy analysis. There will be only one topic per student. To prevent duplication of papers, please post your paper topic under the Module 2, Project Topic item in the navigation tree no later than 11:59 PM on Sunday of Module 2. You may post your topic earlier, if you wish. Please review your peers' topics before posting yours, to ensure you do not duplicate one already selected by someone else. You will submit your project titled “Final Term Paper” to the Chalk and Wire no later than 11:59 PM on Sunday of Module 7. The Term Paper Chalk and Wire link is located in the Module 7 folder. Students who do not submit the assignment to Chalk and Wire
  • 7. will receive a zero. This is a key program assessment; the results are used to ensure students are meeting program goals. Video and PDF instructions can be found on the course home page. PDF instructions are also located in the Start Here folder. (Chalk and Wire is linked to Turnitin.) Your paper must: • be 8–10 ten pages in length • be double-spaced • use 1-inch margins left, right, top, and bottom • use 12 point font The cover sheet, table of contents, index, pictures, long quotations, or multiple quotations will count toward the 8–10 pages. APA format is required. If you need further assistance with APA formatting and style, there is a Writing Format and Style Guides under Resources in the Course Home menu.
  • 8. Statement on writing requirements: Your writing reflects your ideas and communicates your understanding of the topic to the instructor. This assignment will be graded on the composition elements listed below, as well as your understanding of the content: Successful writing should demonstrate • Proofreading skills • Correct grammar and punctuation • Logical organization • Proper content presentation (introduction, body, conclusion) • Correct formatting for citations, references, and headings