What are prison rehabilitation and/or re-entry programs?

Part A:
1.  What are prison rehabilitation and/or re-entry programs?  Write a paragraph describing your understanding of the meaning and purpose of these programs.
2. After watching the Ted Talk , “Felony. Re-entry. Your community. And you,” with Shawn Stoner:  
– What is one concept mentioned that you think is most relevant to working in the subfield of corrections in the  criminal justice system?
Why/how so?
– What does Shawn Stoner say about prisoners’ mindsets?   What do you think of Mr. Stoner’s approach to this mindset? Do you agree with him? If so, why? If not, what would you do differently?
3. After watching the three videos:
– What is the First Step Act?  Read the provisions of the federal law passed in 2018 and the video about this federal legislation. 
– What does this law do for prison reform and re-entry programs in the area of federal corrections and who benefits from this law?
 4.  What is Project Rebound?  What is its mission?  Why do you think about the fact that there is a 0% recidivism rate among graduates of this program? 
5.  After watching the videos about California Department of Corrections.
-What re-entry programs are available to prisoners through the California Department of Corrections? What is your opinion of these programs? Explain the reasons for your response.

Part B: (these are discussion replies, use your opinion)
1. “The most concern with my data and the ability to keep it private is that the more we go technologically advanced the more likely it will be harder to protect that data and have that data be private. I believe that if a generation is not trained or educated enough it will be really easy to manipulate and gain data, which gives someone power at the tip of their fingertips. If someone posted all my content from my phone to the internet, I would be fine because I don’t really use it as much or for anything important. It would be devastating obviously and important things could be on it, but it depends on the factors and situations. If I made poor choices and took the thing lightly, I made myself more susceptible to being hacked, targeted. Personally, I find it weird that these companies can hold our data when they feel like it because not many people can be trusted. I do believe that the government should make better policies to protect its citizens’ information as their personal freedoms and wills. However, I do not want a government that seeks to gain control of its people through manipulation or having data that they shouldn’t have. It all depends on factors and situations such as what if they caught a criminal or killer. I believe that if there are stronger policies to protect data rather than keep it would be beneficial. I, also, believe that a company and government should be held accountable for the data and what they do with it by the public in such a way that the public is also held accountable. I believe that the public should have the basic procedures of what to do and what is best to prevent such criminalistic activities to happen, but that they are checked so as not to be infiltrators such as spies from other countries for personal gain as mentioned by the Chinese hackers.”
2. “Data privacy is a colossal public issue of today, to some extent since data breaks keep uncovering the individual information of millions of individuals. Indeed, even a solitary penetrate can have genuine effects: Individuals can endure wholesale fraud or coercion, while organizations hazard monetary expenses alongside harm to public, financial investor and client trust. Governments don’t have the assets or the speed needed to respond to cyber crime. Much of the time, organizations come up short on the motivations to zero in on this point. Shoppers figure they ought to be liable for their own safety on the web, yet most don’t have the information or inspiration to handle it. Shoppers are additionally starting to see IoT gadgets as a significant resource as well as a danger to their protection. Gadget security has become a danger that may prompt protection breaks and customers are getting progressively mindful of these dangers. Today, there is no agreement on who is liable for information security. A few shoppers agree that the duty lies with them, yet others think governments or organizations are better furnished to manage this intricate issue. Associated purchasers are beginning to avoid potential risk, not with standing. With no satisfactory protection and security accessible on close to home or administrative levels, they start to consider if the tradeoff among security and accommodation is awesome. Companies might be held obligated when an information security break happens as a result of specific variables related with the wrongdoing, for example, how the data was put away and how well it was ensured before the interruption. Organizations may likewise face potential issues with these examples when the break is because of a representative that is sending touchy data through email or has taken secret records of customers and clients. Different issues emerge when these people are not annihilating the information appropriately, such as, destroying actual records. Nonetheless, if an outsider merchant or hack happens, the organizations might be considered responsible for the break.”

Part C: (ignore this part for now, will add later on)

Part D: (ignore this part for now, will add later on)

find the cost of your paper