1. |
We have no interest in the secrets and crimes of people and no
use for them.
|
2. |
Security checking is often done without regard to the point
where the person feels better and so became overrun.
|
3. |
Security checking is often done in disregard of the state of a
person's case.
|
4. |
Low level cases do not react on actual crimes and so the
“security” furnished is often a false security.
|
5. |
There is public criticism of security checking as a practice. |
6. |
The existence of lists of crimes in folders often makes it
necessary to destroy the folders which may contain other technical
data which is constructive and valuable. |
7. |
If a person is a criminal or has overt acts which affect his
case, and speaks of them to an auditor of his own volition, the
auditor is bound by the Auditor's Code not to publish, use or
reveal them.
|