SlideShare a Scribd company logo
1 of 22
tmp47759bcb/ABC Business.mov
Scenario: The ACME Company manufactures various electronic
devices for a variety of well-known brands. This includes cell
phones, cameras, camcorders, stereos, computers, tablets, video
games, and more. At any given time, many of these products
are fully assembled and stored at the plant awaiting shipment to
the vendors. Also stored at the plant are the expensive
components used to manufacture the devices. As the Corporate
Security Director for the ACME Company, you have been
alerted that significant inventory shortages have been occurring
for the assembled devices and the stock components used to
manufacture the electronic devices resulting in substantial
company losses. You also have obtained information that these
losses are the result of extensive employee theft.
During previous discussions with private security leaders from
other organizations, you sought more information about the
effectiveness of an administrative search program as an option
to address internal theft. You call a meeting with your security
team and other company directorate heads, to include the
organization’s legal counsel, to discuss possible security
options to thwart the reported losses. The discussion at this
meeting centers on the fact that in private industry/business,
some employers institute an administrative, non-coercive, care
taking search programs to address real or perceived property
losses at the hands of their employees. But in establishing such
a program, there are various issues that must be considered
beyond the impact it might have on employee morale. Everyone
agreed that company executives must thoroughly vet the legality
of an administrative search under consideration and consider the
potential for civil lawsuits filed against the company and its
security operatives for such reasons as invasion of privacy,
assault, false imprisonment, intentional infliction of emotional
distress, and defamation. Everyone was also concerned about
legal claims that may result from the manner in which the
search is conducted. For instance, search protocols that are
found by a court to be unreasonable, discriminatory,
discourteous, unfair, highly intrusive, socially unacceptable
conduct, or instituted for frivolous reasons will likely lead to
successful claims by employees. All participants at the meeting
agreed this would be a significant threat to company assets that
must be avoided.
Writing Assignment: Based on your independent research that
includes at least three sources, in preparation for developing a
possible policy proposal to establish an administrative search
program (not criminal) for presentation to the corporate
executive staff, write an academic paper that explores the use
and legalities of an administrative, non-coercive, care taking
search program instituted by private security operatives to
address real or perceived company losses resulting from
significant internal theft. After reading and evaluating Judge
Edward Weinfeld’s opinion in Chenkin v. BELLEVUE HOSP.
CTR., NYC, ETC., 479 F. Supp. 207 (S.D.N.Y. 1979), found in
the eReadings section of the online classroom, consider the
opinion and respond to the following:
(1) Write a strong introduction, first stating the purpose of the
paper, then providing a succinct recitation of the significant
facts in this case.
(2) Describe the issues related to the search program the court
needed to resolve.
(3) Explain the positions that Chenkin and Bellevue advanced to
the court regarding Chenkin’s claim that the hospital’s package
control system was unconstitutional.
(4) Provide details of the court’s ruling and rationale and be
sure to describe the important features of the search procedure
instituted by Belleville that in the view of the court rejected
Chenkin’s claims.
(5) As a practical matter, evaluate how this court decision
impacts security operations. Be specific and
comprehensive.
(6) Explain how the results of this case will be used in any
policy proposals you make to the corporate executives.
The length of the proposal will be between 1,000 and 1,500
words and students will use and properly cite and reference in
APA format at least three sources, including the court’s
opinion. Course instructional material may be used and cited,
but may not be included in the three sources required.
Source Information: (Should be placed in eReadings)
https://www.courtlistener.com/opinion/2263945/chenkin-v-
bellevue-hosp-ctr-nyc-etc/?
http://www.twc.state.tx.us/news/efte/searches_at_work_legal_is
sues_to_consider.html
http://www.ppspublishers.com/ez/html/060804txtb.html
http:/www.nolo.com/legal-encyclopedia/workplace-searches-
dos-donts-29770.html
http://www.workplacefairness.org/searches
http://definitions.uslegal.com/w/workplace-searches/
You are highly encouraged to use the services of the UMUC
Effective Writing Center (EWC) for this project. Personnel at
the EWC can be contacted using the following website:
http://www.umuc.edu/ewc/.
Formatting Requirements
Use the American Psychological Association (APA) style
manual in writing this paper.
Paper should begin with an appropriate introductory statement
about the topic and a reference page.
You may access the following UMUC website as a reference for
APA style requirements:
http://www.umuc.edu/library/libhow/gethelp-citing.cfm
Paper should be a minimum of 1,000 (minimum) to 1,500
(maximum) words
· · Double space
· · 12 pt. font
· · 1” margins
· · Use APA citations for all sources
· · Include reference page using APA format guidelines (not
included in word count)
Additionally -
· · Create a cover page for your assignment (not included in
word count)
· · Include your name
· · Course title and number
· · Project title
· · Date of submission
Scenario: The ACME Company manufactures various electronic
devices for a variety of well-known brands. This includes cell
phones, cameras, camcorders, stereos, computers, tablets, video
games, and more. At any given time, many of these products
are fully assembled and stored at the plant awaiting shipment to
the vendors. Also stored at the plant are the expensive
components used to manufacture the devices. As the Corporate
Security Director for the ACME Company, you have been
alerted that significant inventory shortages have been occurring
for the assembled devices and the stock components used to
manufacture the electronic devices resulting in substantial
company losses. You also have obtained information that these
losses are the result of extensive employee theft.
During previous discussions with private security leaders from
other organizations, you sought more information about the
effectiveness of an administrative search program as an option
to address internal theft. You call a meeting with your security
team and other company directorate heads, to include the
organization’s legal counsel, to discuss possible security
options to thwart the reported losses. The discussion at this
meeting centers on the fact that in private industry/business,
some employers institute an administrative, non-coercive, care
taking search programs to address real or perceived property
losses at the hands of their employees. But in establishing such
a program, there are various issues that must be considered
beyond the impact it might have on employee morale. Everyone
agreed that company executives must thoroughly vet the legality
of an administrative search under consideration and consider the
potential for civil lawsuits filed against the company and its
security operatives for such reasons as invasion of privacy,
assault, false imprisonment, intentional infliction of emotional
distress, and defamation. Everyone was also concerned about
legal claims that may result from the manner in which the
search is conducted. For instance, search protocols that are
found by a court to be unreasonable, discriminatory,
discourteous, unfair, highly intrusive, socially unacceptable
conduct, or instituted for frivolous reasons will likely lead to
successful claims by employees. All participants at the meeting
agreed this would be a significant threat to company assets that
must be avoided.
Writing Assignment: Based on your independent research that
includes at least three sources, in preparation for developing a
possible policy proposal to establish an administrative search
program (not criminal) for presentation to the corporate
executive staff, write an academic paper that explores the use
and legalities of an administrative, non-coercive, care taking
search program instituted by private security operatives to
address real or perceived company losses resulting from
significant internal theft. After reading and evaluating Judge
Edward Weinfeld’s opinion in Chenkin v. BELLEVUE HOSP.
CTR., NYC, ETC., 479 F. Supp. 207 (S.D.N.Y. 1979), found in
the eReadings section of the online classroom, consider the
opinion and respond to the following:
(1) Write a strong introduction, first stating the purpose of the
paper, then providing a succinct recitation of the significant
facts in this case.
(2) Describe the issues related to the search program the court
needed to resolve.
(3) Explain the positions that Chenkin and Bellevue advanced to
the court regarding Chenkin’s claim that the hospital’s package
control system was unconstitutional.
(4) Provide details of the court’s ruling and rationale and be
sure to describe the important features of the search procedure
instituted by Belleville that in the view of the court rejected
Chenkin’s claims.
(5) As a practical matter, evaluate how this court decision
impacts security operations. Be specific and
comprehensive.
(6) Explain how the results of this case will be used in any
policy proposals you make to the corporate executives.
The length of the proposal will be between 1,000 and 1,500
words and students will use and properly cite and reference in
APA format at least three sources, including the court’s
opinion. Course instructional material may be used and cited,
but may not be included in the three sources required.
Source Information: (Should be placed in eReadings)
https://www.courtlistener.com/opinion/2263945/chenkin-v-
bellevue-hosp-ctr-nyc-etc/?
http://www.twc.state.tx.us/news/efte/searches_at_work_legal_is
sues_to_consider.html
http://www.ppspublishers.com/ez/html/060804txtb.html
http:/www.nolo.com/legal-encyclopedia/workplace-searches-
dos-donts-29770.html
http://www.workplacefairness.org/searches
http://definitions.uslegal.com/w/workplace-searches/
You are highly encouraged to use the services of the UMUC
Effective Writing Center (EWC) for this project. Personnel at
the EWC can be contacted using the following website:
http://www.umuc.edu/ewc/.
Formatting Requirements
Use the American Psychological Association (APA) style
manual in writing this paper.
Paper should begin with an appropriate introductory statement
about the topic and a reference page.
You may access the following UMUC website as a reference for
APA style requirements:
http://www.umuc.edu/library/libhow/gethelp-citing.cfm
Paper should be a minimum of 1,000 (minimum) to 1,500
(maximum) words
· · Double space
· · 12 pt. font
· · 1” margins
· · Use APA citations for all sources
· · Include reference page using APA format guidelines (not
included in word count)
Additionally -
· · Create a cover page for your assignment (not included in
word count)
· · Include your name
· · Course title and number
· · Project title
· · Date of submission
Order #152666300 (Status: Writer Assigned) Legal Challenges
for Private Security (4 pages, 0 slides)
Reassign this order
· Instructions
· Files (4)
· Messages
Type of service:
Writing from scratch
Work type:
Research paper
Deadline:
13 Sep, 02:10 PM (20h) Extend deadline
Academic level:
College (3-4 years: Junior, Senior)
Subject or Discipline:
Criminal Justice
Title:
Legal Challenges for Private Security
Number of sources:
4
Provide digital sources used:
No
Paper format:
APA
# of pages:
4
Spacing:
Double spaced
# of words:
1100
# of slides:
ppt icon 0
# of charts:
0
Paper details:
Legal Challenges for Private Security: Using course material
and additional scholarly sources the student will compose a
1,000 - 1,250 word paper outlining their response as a role
player to a legal issue involving the Security manager and the
need to conduct a search or other intrusive activity in an effort
to curtail internal (employee) theft.
Comments:
#
Files
Who Uploaded
1
152666300_Legal_Chal..._Instructions_2.docx
Guidelines for writing
19 KB
12 Sep, 01:10 AM
Customer
2
152666300_Legal_Chal..._Instructions_1.docx
Guidelines for writing
19 KB
12 Sep, 01:20 AM
Customer
3
152666300_Legal_Chal..._Instructions_1.docx
Guidelines for writing
19 KB
12 Sep, 01:34 AM
Customer
4
152666300_Legal_Chal..._Instructions_1.docx
Guidelines for writing
19 KB
12 Sep, 02:06 AM
Customer
Scenario: The ACME Company manufactures various electronic
devices for a variety of well-known brands. This includes cell
phones, cameras, camcorders, stereos, computers, tablets, video
games, and more. At any given time, many of these products
are fully assembled and stored at the plant awaiting shipment to
the vendors. Also stored at the plant are the expensive
components used to manufacture the devices. As the Corporate
Security Director for the ACME Company, you have been
alerted that significant inventory shortages have been occurring
for the assembled devices and the stock components used to
manufacture the electronic devices resulting in substantial
company losses. You also have obtained information that these
losses are the result of extensive employee theft.
During previous discussions with private security leaders from
other organizations, you sought more information about the
effectiveness of an administrative search program as an option
to address internal theft. You call a meeting with your security
team and other company directorate heads, to include the
organization’s legal counsel, to discuss possible security
options to thwart the reported losses. The discussion at this
meeting centers on the fact that in private industry/business,
some employers institute an administrative, non-coercive, care
taking search programs to address real or perceived property
losses at the hands of their employees. But in establishing such
a program, there are various issues that must be considered
beyond the impact it might have on employee morale. Everyone
agreed that company executives must thoroughly vet the legality
of an administrative search under consideration and consider the
potential for civil lawsuits filed against the company and its
security operatives for such reasons as invasion of privacy,
assault, false imprisonment, intentional infliction of emotional
distress, and defamation. Everyone was also concerned about
legal claims that may result from the manner in which the
search is conducted. For instance, search protocols that are
found by a court to be unreasonable, discriminatory,
discourteous, unfair, highly intrusive, socially unacceptable
conduct, or instituted for frivolous reasons will likely lead to
successful claims by employees. All participants at the meeting
agreed this would be a significant threat to company assets that
must be avoided.
Writing Assignment: Based on your independent research that
includes at least three sources, in preparation for developing a
possible policy proposal to establish an administrative search
program (not criminal) for presentation to the corporate
executive staff, write an academic paper that explores the use
and legalities of an administrative, non-coercive, care taking
search program instituted by private security operatives to
address real or perceived company losses resulting from
significant internal theft. After reading and evaluating Judge
Edward Weinfeld’s opinion in Chenkin v. BELLEVUE HOSP.
CTR., NYC, ETC., 479 F. Supp. 207 (S.D.N.Y. 1979), found in
the eReadings section of the online classroom, consider the
opinion and respond to the following:
(1) Write a strong introduction, first stating the purpose of the
paper, then providing a succinct recitation of the significant
facts in this case.
(2) Describe the issues related to the search program the court
needed to resolve.
(3) Explain the positions that Chenkin and Bellevue advanced to
the court regarding Chenkin’s claim that the hospital’s package
control system was unconstitutional.
(4) Provide details of the court’s ruling and rationale and be
sure to describe the important features of the search procedure
instituted by Belleville that in the view of the court rejected
Chenkin’s claims.
(5) As a practical matter, evaluate how this court decision
impacts security operations. Be specific and
comprehensive.
(6) Explain how the results of this case will be used in any
policy proposals you make to the corporate executives.
The length of the proposal will be between 1,000 and 1,500
words and students will use and properly cite and reference in
APA format at least three sources, including the court’s
opinion. Course instructional material may be used and cited,
but may not be included in the three sources required.
Source Information: (Should be placed in eReadings)
https://www.courtlistener.com/opinion/2263945/chenkin-v-
bellevue-hosp-ctr-nyc-etc/?
http://www.twc.state.tx.us/news/efte/searches_at_work_legal_is
sues_to_consider.html
http://www.ppspublishers.com/ez/html/060804txtb.html
http:/www.nolo.com/legal-encyclopedia/workplace-searches-
dos-donts-29770.html
http://www.workplacefairness.org/searches
http://definitions.uslegal.com/w/workplace-searches/
You are highly encouraged to use the services of the UMUC
Effective Writing Center (EWC) for this project. Personnel at
the EWC can be contacted using the following website:
http://www.umuc.edu/ewc/.
Formatting Requirements
Use the American Psychological Association (APA) style
manual in writing this paper.
Paper should begin with an appropriate introductory statement
about the topic and a reference page.
You may access the following UMUC website as a reference for
APA style requirements:
http://www.umuc.edu/library/libhow/gethelp-citing.cfm
Paper should be a minimum of 1,000 (minimum) to 1,500
(maximum) words
· · Double space
· · 12 pt. font
· · 1” margins
· · Use APA citations for all sources
· · Include reference page using APA format guidelines (not
included in word count)
Additionally -
· · Create a cover page for your assignment (not included in
word count)
· · Include your name
· · Course title and number
· · Project title
· · Date of submission
Scenario: The ACME Company manufactures various electronic
devices for a variety of well-known brands. This includes cell
phones, cameras, camcorders, stereos, computers, tablets, video
games, and more. At any given time, many of these products
are fully assembled and stored at the plant awaiting shipment to
the vendors. Also stored at the plant are the expensive
components used to manufacture the devices. As the Corporate
Security Director for the ACME Company, you have been
alerted that significant inventory shortages have been occurring
for the assembled devices and the stock components used to
manufacture the electronic devices resulting in substantial
company losses. You also have obtained information that these
losses are the result of extensive employee theft.
During previous discussions with private security leaders from
other organizations, you sought more information about the
effectiveness of an administrative search program as an option
to address internal theft. You call a meeting with your security
team and other company directorate heads, to include the
organization’s legal counsel, to discuss possible security
options to thwart the reported losses. The discussion at this
meeting centers on the fact that in private industry/business,
some employers institute an administrative, non-coercive, care
taking search programs to address real or perceived property
losses at the hands of their employees. But in establishing such
a program, there are various issues that must be considered
beyond the impact it might have on employee morale. Everyone
agreed that company executives must thoroughly vet the legality
of an administrative search under consideration and consider the
potential for civil lawsuits filed against the company and its
security operatives for such reasons as invasion of privacy,
assault, false imprisonment, intentional infliction of emotional
distress, and defamation. Everyone was also concerned about
legal claims that may result from the manner in which the
search is conducted. For instance, search protocols that are
found by a court to be unreasonable, discriminatory,
discourteous, unfair, highly intrusive, socially unacceptable
conduct, or instituted for frivolous reasons will likely lead to
successful claims by employees. All participants at the meeting
agreed this would be a significant threat to company assets that
must be avoided.
Writing Assignment: Based on your independent research that
includes at least three sources, in preparation for developing a
possible policy proposal to establish an administrative search
program (not criminal) for presentation to the corporate
executive staff, write an academic paper that explores the use
and legalities of an administrative, non-coercive, care taking
search program instituted by private security operatives to
address real or perceived company losses resulting from
significant internal theft. After reading and evaluating Judge
Edward Weinfeld’s opinion in Chenkin v. BELLEVUE HOSP.
CTR., NYC, ETC., 479 F. Supp. 207 (S.D.N.Y. 1979), found in
the eReadings section of the online classroom, consider the
opinion and respond to the following:
(1) Write a strong introduction, first stating the purpose of the
paper, then providing a succinct recitation of the significant
facts in this case.
(2) Describe the issues related to the search program the court
needed to resolve.
(3) Explain the positions that Chenkin and Bellevue advanced to
the court regarding Chenkin’s claim that the hospital’s package
control system was unconstitutional.
(4) Provide details of the court’s ruling and rationale and be
sure to describe the important features of the search procedure
instituted by Belleville that in the view of the court rejected
Chenkin’s claims.
(5) As a practical matter, evaluate how this court decision
impacts security operations. Be specific and
comprehensive.
(6) Explain how the results of this case will be used in any
policy proposals you make to the corporate executives.
The length of the proposal will be between 1,000 and 1,500
words and students will use and properly cite and reference in
APA format at least three sources, including the court’s
opinion. Course instructional material may be used and cited,
but may not be included in the three sources required.
Source Information: (Should be placed in eReadings)
https://www.courtlistener.com/opinion/2263945/chenkin-v-
bellevue-hosp-ctr-nyc-etc/?
http://www.twc.state.tx.us/news/efte/searches_at_work_legal_is
sues_to_consider.html
http://www.ppspublishers.com/ez/html/060804txtb.html
http:/www.nolo.com/legal-encyclopedia/workplace-searches-
dos-donts-29770.html
http://www.workplacefairness.org/searches
http://definitions.uslegal.com/w/workplace-searches/
You are highly encouraged to use the services of the UMUC
Effective Writing Center (EWC) for this project. Personnel at
the EWC can be contacted using the following website:
http://www.umuc.edu/ewc/.
Formatting Requirements
Use the American Psychological Association (APA) style
manual in writing this paper.
Paper should begin with an appropriate introductory statement
about the topic and a reference page.
You may access the following UMUC website as a reference for
APA style requirements:
http://www.umuc.edu/library/libhow/gethelp-citing.cfm
Paper should be a minimum of 1,000 (minimum) to 1,500
(maximum) words
· · Double space
· · 12 pt. font
· · 1” margins
· · Use APA citations for all sources
· · Include reference page using APA format guidelines (not
included in word count)
Additionally -
· · Create a cover page for your assignment (not included in
word count)
· · Include your name
· · Course title and number
· · Project title
· · Date of submission
Page 1 of 3
Assignment and Submission - MAF307
1 The assignment is compulsory. To reduce our carbon
footprint, all assignments are to be
submitted electronically through dropboxes in Cloud Deakin
(CD). No hardcopy assignment
submission is required.
2. The assignment due date is 11:59pm, 16 September (Friday).
You should be aware of
your eligibility for special consideration (see the Deakin
University Handbook). Otherwise, in
no case will the extension be granted for the assignment
completion and submission.
3. To reflect the manner in which most corporations conduct
business, students shall form
groups of four to handle this assignment. It is up to the students
to form the groups. Faculty
members will not entertain requests relating to group formation.
4. Once a group is formed, you are required to register into a
group under “Groups” on CD,
which also aids you to successfully submit your assignment.
5. If you submit work to be marked after the due date you will
incur a deduction of 20%
from the total marks, for each calendar day of the week the
assignment is late, for up to 5
calendar days. Further, we will not accept any submission after
11:59pm on Wednesday (21
September). For example, if the due date is Friday 16th
September 2016 and you do not
have an extension approval from the Unit Chair and hand your
work in late on the next day
which is Saturday 17th September 2016, 20% of the total marks,
equivalent of 4 marks, will
be deducted. If your work is marked as worthy of a grade of 16,
you will only receive 12 for
it after applying the penalty.
6. CloudDeakin submission: Each group needs submitti ng only
once. Please use your IDs
naming your files, such as
700374***_600039***_210039***_3600589***_MAF307_Rep
ort_2015T1.doc(x).
7. A copy of the assignment must be kept by students to cover
the possibility of lost
assignments.
Good luck.
Page 2 of 3
DEAKIN UNIVERSITY
FACULTY OF BUSINESS & LAW
SCHOOL OF ACCOUNTING ECONOMICS& FINANCE
MAF307 EQUITIES AND INVESTMENT ANALYSIS
ASSIGNMENT - Trimester 2, 2016
This written assignment has three parts:
PART I
In order to approximate business practice, where an individual's
performance evaluation
reflects not only the opinion of supervisors but also that of his
or her peers, group members
shall evaluate one another’s investment journals. Each group
member has to critically
analyse another member’s investment strategy, including, but
not limited to, comparing
their investment performance, return expectations, risk appetite,
frequency of trading,
stock selection decisions, those investment strategies that
worked and those that failed.
Students can choose to make their analysis based on the two
submitted journals, or based
on the entire six weekly journals if a group member happens to
have one.
Students can use this written analysis as the base to articulate
their oral presentation.
Please keep the overall length of your group oral presentation to
approximate five minutes
(Hint: Most estimated the number of words/minute around 100.)
(Word limit guidance - 800, 5 marks)
PART II
(a). Identify the best- and worst-performing shares from your
group members. Assess
whether the different performance is due to the different impact
on the shares brought by
1). macroeconomic environment; 2). industry/sector life cycle;
3) government or the central
bank’s policies; 4). foreign economic influence; 5). firm
specific policy or action, etc.
(b). Use last 2-year daily prices data to calculate the above
shares’ returns and variances or
standard deviations. Examine and comment on whether your
group’s best- and worst-
performing shares can be identified from this information.
(Hint: The daily prices can be
drawn from websites such as Yahoo finance, Google finance or
the Australian Financial
Review, etc.)
(Word limit guidance - 1000, 7 marks)
Page 3 of 3
PART III
As an analyst for Vandelay brokerage firm, your supervisor has
handed you a video clip – an
interview between Ticky Fullerton of The Business of ABC, and
the fund manager, Roger
Montgomery (You need to watch it first. You can access the
video file in the same folder). During the
interview, Roger Montgomery raised several share names in the
data centre storage business. Focus
on the following two stocks, NXT (NextDC) and VOC (Vocus
Communications). Your supervisor
asked you to write a report: i). to find the share prices of the
above two stocks at the time of the
interview (say, around 25th April of 2013) and their current
stock prices. What do you find? ii). to
examine and investigate the background and reasons (or risk
factors) behind this dramatic
share price difference. What are the reasons, if any, resulting in
the price dispersion? iii). to
assess the following statement: share prices fully reflect all
available information on a
particular share according to the efficient market hypothesis
(EMH) (Bodie et al (1997). If
this is the case, can you find any evidence to support that the
market was fully informed?
Does the EMH mean anything to you in explaining the share
price difference? Why and/or
why not? iv). to make a recommendation for both stocks based
on your research on behalf of your
firm to your clients – to buy hold or sell.
(Word limit guidance - 1200, 8 marks)
Reference
Zvi Bodie, Mohamed Arif, Raymond da Silva Rosa, Alex Kane
and Alan J Marcus (2007), Investments,
McGraw-Hill Irwin Australia.

More Related Content

Similar to tmp47759bcbABC Business.movScenario The ACME Company manuf

Assignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docxAssignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docx
annrodgerson
 
Controlling The Cost Of Discovery In A Digital Age.Doc
Controlling The Cost Of Discovery In A Digital Age.DocControlling The Cost Of Discovery In A Digital Age.Doc
Controlling The Cost Of Discovery In A Digital Age.Doc
David Haines
 
Assignment 3 Capstone Research ProjectDue Week 10 and worth 440.docx
Assignment 3 Capstone Research ProjectDue Week 10 and worth 440.docxAssignment 3 Capstone Research ProjectDue Week 10 and worth 440.docx
Assignment 3 Capstone Research ProjectDue Week 10 and worth 440.docx
rock73
 
Term Paper The Rookie Chief Information Security Officer.docx
Term Paper The Rookie Chief Information Security Officer.docxTerm Paper The Rookie Chief Information Security Officer.docx
Term Paper The Rookie Chief Information Security Officer.docx
manningchassidy
 
Submit by 6am on 16th JuneAs a backlash, the professional mode.docx
Submit by 6am on 16th JuneAs a backlash, the professional mode.docxSubmit by 6am on 16th JuneAs a backlash, the professional mode.docx
Submit by 6am on 16th JuneAs a backlash, the professional mode.docx
picklesvalery
 
Business Strategy and Policy (MHRM 612-1)1. An organization’s .docx
Business Strategy and Policy (MHRM 612-1)1. An organization’s .docxBusiness Strategy and Policy (MHRM 612-1)1. An organization’s .docx
Business Strategy and Policy (MHRM 612-1)1. An organization’s .docx
RAHUL126667
 

Similar to tmp47759bcbABC Business.movScenario The ACME Company manuf (16)

Assignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docxAssignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docx
 
Controlling The Cost Of Discovery In A Digital Age.Doc
Controlling The Cost Of Discovery In A Digital Age.DocControlling The Cost Of Discovery In A Digital Age.Doc
Controlling The Cost Of Discovery In A Digital Age.Doc
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
 
Assignment 3 Capstone Research ProjectDue Week 10 and worth 440.docx
Assignment 3 Capstone Research ProjectDue Week 10 and worth 440.docxAssignment 3 Capstone Research ProjectDue Week 10 and worth 440.docx
Assignment 3 Capstone Research ProjectDue Week 10 and worth 440.docx
 
Term Paper The Rookie Chief Information Security Officer.docx
Term Paper The Rookie Chief Information Security Officer.docxTerm Paper The Rookie Chief Information Security Officer.docx
Term Paper The Rookie Chief Information Security Officer.docx
 
Submit by 6am on 16th JuneAs a backlash, the professional mode.docx
Submit by 6am on 16th JuneAs a backlash, the professional mode.docxSubmit by 6am on 16th JuneAs a backlash, the professional mode.docx
Submit by 6am on 16th JuneAs a backlash, the professional mode.docx
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.com
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.com
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.com
 
564 complete class
 564 complete class 564 complete class
564 complete class
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
 
Business Impact Analysis module 3.ppt
Business Impact Analysis module 3.pptBusiness Impact Analysis module 3.ppt
Business Impact Analysis module 3.ppt
 
LAW 531 GREAT WISDOM / snaptutorial.com
LAW 531 GREAT WISDOM / snaptutorial.comLAW 531 GREAT WISDOM / snaptutorial.com
LAW 531 GREAT WISDOM / snaptutorial.com
 
Business Strategy and Policy (MHRM 612-1)1. An organization’s .docx
Business Strategy and Policy (MHRM 612-1)1. An organization’s .docxBusiness Strategy and Policy (MHRM 612-1)1. An organization’s .docx
Business Strategy and Policy (MHRM 612-1)1. An organization’s .docx
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.com
 

More from TakishaPeck109

Unit 1 Module 1 - M1 Assignment 3Assignment 3 Views on Diver.docx
Unit 1 Module 1 - M1 Assignment 3Assignment 3 Views on Diver.docxUnit 1 Module 1 - M1 Assignment 3Assignment 3 Views on Diver.docx
Unit 1 Module 1 - M1 Assignment 3Assignment 3 Views on Diver.docx
TakishaPeck109
 
Unit 1 - Individual ProjectType Individual ProjectDue Date Mon.docx
Unit 1 - Individual ProjectType Individual ProjectDue Date Mon.docxUnit 1 - Individual ProjectType Individual ProjectDue Date Mon.docx
Unit 1 - Individual ProjectType Individual ProjectDue Date Mon.docx
TakishaPeck109
 
Unit 1 Understanding the Tourism and Hospitality Industry with Work.docx
Unit 1 Understanding the Tourism and Hospitality Industry with Work.docxUnit 1 Understanding the Tourism and Hospitality Industry with Work.docx
Unit 1 Understanding the Tourism and Hospitality Industry with Work.docx
TakishaPeck109
 
Understanding the Value of Qualitative ResearchAn important part.docx
Understanding the Value of Qualitative ResearchAn important part.docxUnderstanding the Value of Qualitative ResearchAn important part.docx
Understanding the Value of Qualitative ResearchAn important part.docx
TakishaPeck109
 
UNDERSTANDING HEALTHCARE FINANCIAL MANAGEMENT.docx
UNDERSTANDING HEALTHCARE FINANCIAL MANAGEMENT.docxUNDERSTANDING HEALTHCARE FINANCIAL MANAGEMENT.docx
UNDERSTANDING HEALTHCARE FINANCIAL MANAGEMENT.docx
TakishaPeck109
 
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docxUMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
TakishaPeck109
 

More from TakishaPeck109 (20)

Unit 3 Assignment Instructions Your research paper should be 4–6 pag.docx
Unit 3 Assignment Instructions Your research paper should be 4–6 pag.docxUnit 3 Assignment Instructions Your research paper should be 4–6 pag.docx
Unit 3 Assignment Instructions Your research paper should be 4–6 pag.docx
 
Unit 1 Module 1 - M1 Assignment 3Assignment 3 Views on Diver.docx
Unit 1 Module 1 - M1 Assignment 3Assignment 3 Views on Diver.docxUnit 1 Module 1 - M1 Assignment 3Assignment 3 Views on Diver.docx
Unit 1 Module 1 - M1 Assignment 3Assignment 3 Views on Diver.docx
 
Unit 1 Learning ActivityTo complete this Learning Activity, firs.docx
Unit 1 Learning ActivityTo complete this Learning Activity, firs.docxUnit 1 Learning ActivityTo complete this Learning Activity, firs.docx
Unit 1 Learning ActivityTo complete this Learning Activity, firs.docx
 
Unit 1 - Individual ProjectType Individual ProjectDue Date Mon.docx
Unit 1 - Individual ProjectType Individual ProjectDue Date Mon.docxUnit 1 - Individual ProjectType Individual ProjectDue Date Mon.docx
Unit 1 - Individual ProjectType Individual ProjectDue Date Mon.docx
 
Unit 1 Understanding the Tourism and Hospitality Industry with Work.docx
Unit 1 Understanding the Tourism and Hospitality Industry with Work.docxUnit 1 Understanding the Tourism and Hospitality Industry with Work.docx
Unit 1 Understanding the Tourism and Hospitality Industry with Work.docx
 
Unit 2 Assignment Creating an Effective PresentationPresentatio.docx
Unit 2 Assignment Creating an Effective PresentationPresentatio.docxUnit 2 Assignment Creating an Effective PresentationPresentatio.docx
Unit 2 Assignment Creating an Effective PresentationPresentatio.docx
 
Unit 1 Assignment Computer ComponentsHere is a video introducti.docx
Unit 1 Assignment Computer ComponentsHere is a video introducti.docxUnit 1 Assignment Computer ComponentsHere is a video introducti.docx
Unit 1 Assignment Computer ComponentsHere is a video introducti.docx
 
Unethical Situations in the Workplace  Recall a time when .docx
Unethical Situations in the Workplace  Recall a time when .docxUnethical Situations in the Workplace  Recall a time when .docx
Unethical Situations in the Workplace  Recall a time when .docx
 
Unifying separate countries offers varied unique opportunities for g.docx
Unifying separate countries offers varied unique opportunities for g.docxUnifying separate countries offers varied unique opportunities for g.docx
Unifying separate countries offers varied unique opportunities for g.docx
 
Understanding the Value of Qualitative ResearchAn important part.docx
Understanding the Value of Qualitative ResearchAn important part.docxUnderstanding the Value of Qualitative ResearchAn important part.docx
Understanding the Value of Qualitative ResearchAn important part.docx
 
Understanding cultural phenomena is essential to the completion of a.docx
Understanding cultural phenomena is essential to the completion of a.docxUnderstanding cultural phenomena is essential to the completion of a.docx
Understanding cultural phenomena is essential to the completion of a.docx
 
Understanding the role that coding information plays in health care .docx
Understanding the role that coding information plays in health care .docxUnderstanding the role that coding information plays in health care .docx
Understanding the role that coding information plays in health care .docx
 
Understanding Property RightsExplain a landlord’s legal authorit.docx
Understanding Property RightsExplain a landlord’s legal authorit.docxUnderstanding Property RightsExplain a landlord’s legal authorit.docx
Understanding Property RightsExplain a landlord’s legal authorit.docx
 
Understanding Others’ Cultural PracticesALL WORK MUST BE ORIGI.docx
Understanding Others’ Cultural PracticesALL WORK MUST BE ORIGI.docxUnderstanding Others’ Cultural PracticesALL WORK MUST BE ORIGI.docx
Understanding Others’ Cultural PracticesALL WORK MUST BE ORIGI.docx
 
UNDERSTANDING HEALTHCARE FINANCIAL MANAGEMENT.docx
UNDERSTANDING HEALTHCARE FINANCIAL MANAGEMENT.docxUNDERSTANDING HEALTHCARE FINANCIAL MANAGEMENT.docx
UNDERSTANDING HEALTHCARE FINANCIAL MANAGEMENT.docx
 
Understanding international compensation begins with the recognition.docx
Understanding international compensation begins with the recognition.docxUnderstanding international compensation begins with the recognition.docx
Understanding international compensation begins with the recognition.docx
 
Understanding and Analyzing Arguments  Please respond to the follow.docx
Understanding and Analyzing Arguments  Please respond to the follow.docxUnderstanding and Analyzing Arguments  Please respond to the follow.docx
Understanding and Analyzing Arguments  Please respond to the follow.docx
 
Understand the role of the counselor and community.Understand cris.docx
Understand the role of the counselor and community.Understand cris.docxUnderstand the role of the counselor and community.Understand cris.docx
Understand the role of the counselor and community.Understand cris.docx
 
Under the common law, from the 1500s until today, the law has allow.docx
Under the common law, from the 1500s until today, the law has allow.docxUnder the common law, from the 1500s until today, the law has allow.docx
Under the common law, from the 1500s until today, the law has allow.docx
 
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docxUMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
 

Recently uploaded

ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
ashishpaul799
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
17thcssbs2
 

Recently uploaded (20)

Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
The Ultimate Guide to Social Media Marketing in 2024.pdf
The Ultimate Guide to Social Media Marketing in 2024.pdfThe Ultimate Guide to Social Media Marketing in 2024.pdf
The Ultimate Guide to Social Media Marketing in 2024.pdf
 
factors influencing drug absorption-final-2.pptx
factors influencing drug absorption-final-2.pptxfactors influencing drug absorption-final-2.pptx
factors influencing drug absorption-final-2.pptx
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdfPost Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
 

tmp47759bcbABC Business.movScenario The ACME Company manuf

  • 1. tmp47759bcb/ABC Business.mov Scenario: The ACME Company manufactures various electronic devices for a variety of well-known brands. This includes cell phones, cameras, camcorders, stereos, computers, tablets, video games, and more. At any given time, many of these products are fully assembled and stored at the plant awaiting shipment to the vendors. Also stored at the plant are the expensive components used to manufacture the devices. As the Corporate Security Director for the ACME Company, you have been alerted that significant inventory shortages have been occurring for the assembled devices and the stock components used to manufacture the electronic devices resulting in substantial company losses. You also have obtained information that these losses are the result of extensive employee theft. During previous discussions with private security leaders from other organizations, you sought more information about the effectiveness of an administrative search program as an option to address internal theft. You call a meeting with your security team and other company directorate heads, to include the organization’s legal counsel, to discuss possible security options to thwart the reported losses. The discussion at this meeting centers on the fact that in private industry/business, some employers institute an administrative, non-coercive, care taking search programs to address real or perceived property losses at the hands of their employees. But in establishing such a program, there are various issues that must be considered beyond the impact it might have on employee morale. Everyone agreed that company executives must thoroughly vet the legality of an administrative search under consideration and consider the potential for civil lawsuits filed against the company and its security operatives for such reasons as invasion of privacy, assault, false imprisonment, intentional infliction of emotional
  • 2. distress, and defamation. Everyone was also concerned about legal claims that may result from the manner in which the search is conducted. For instance, search protocols that are found by a court to be unreasonable, discriminatory, discourteous, unfair, highly intrusive, socially unacceptable conduct, or instituted for frivolous reasons will likely lead to successful claims by employees. All participants at the meeting agreed this would be a significant threat to company assets that must be avoided. Writing Assignment: Based on your independent research that includes at least three sources, in preparation for developing a possible policy proposal to establish an administrative search program (not criminal) for presentation to the corporate executive staff, write an academic paper that explores the use and legalities of an administrative, non-coercive, care taking search program instituted by private security operatives to address real or perceived company losses resulting from significant internal theft. After reading and evaluating Judge Edward Weinfeld’s opinion in Chenkin v. BELLEVUE HOSP. CTR., NYC, ETC., 479 F. Supp. 207 (S.D.N.Y. 1979), found in the eReadings section of the online classroom, consider the opinion and respond to the following: (1) Write a strong introduction, first stating the purpose of the paper, then providing a succinct recitation of the significant facts in this case. (2) Describe the issues related to the search program the court needed to resolve. (3) Explain the positions that Chenkin and Bellevue advanced to the court regarding Chenkin’s claim that the hospital’s package control system was unconstitutional. (4) Provide details of the court’s ruling and rationale and be sure to describe the important features of the search procedure instituted by Belleville that in the view of the court rejected Chenkin’s claims. (5) As a practical matter, evaluate how this court decision impacts security operations. Be specific and
  • 3. comprehensive. (6) Explain how the results of this case will be used in any policy proposals you make to the corporate executives. The length of the proposal will be between 1,000 and 1,500 words and students will use and properly cite and reference in APA format at least three sources, including the court’s opinion. Course instructional material may be used and cited, but may not be included in the three sources required. Source Information: (Should be placed in eReadings) https://www.courtlistener.com/opinion/2263945/chenkin-v- bellevue-hosp-ctr-nyc-etc/? http://www.twc.state.tx.us/news/efte/searches_at_work_legal_is sues_to_consider.html http://www.ppspublishers.com/ez/html/060804txtb.html http:/www.nolo.com/legal-encyclopedia/workplace-searches- dos-donts-29770.html http://www.workplacefairness.org/searches http://definitions.uslegal.com/w/workplace-searches/ You are highly encouraged to use the services of the UMUC Effective Writing Center (EWC) for this project. Personnel at the EWC can be contacted using the following website: http://www.umuc.edu/ewc/. Formatting Requirements Use the American Psychological Association (APA) style manual in writing this paper. Paper should begin with an appropriate introductory statement about the topic and a reference page. You may access the following UMUC website as a reference for APA style requirements: http://www.umuc.edu/library/libhow/gethelp-citing.cfm Paper should be a minimum of 1,000 (minimum) to 1,500 (maximum) words · · Double space · · 12 pt. font · · 1” margins
  • 4. · · Use APA citations for all sources · · Include reference page using APA format guidelines (not included in word count) Additionally - · · Create a cover page for your assignment (not included in word count) · · Include your name · · Course title and number · · Project title · · Date of submission Scenario: The ACME Company manufactures various electronic devices for a variety of well-known brands. This includes cell phones, cameras, camcorders, stereos, computers, tablets, video games, and more. At any given time, many of these products are fully assembled and stored at the plant awaiting shipment to the vendors. Also stored at the plant are the expensive components used to manufacture the devices. As the Corporate Security Director for the ACME Company, you have been alerted that significant inventory shortages have been occurring for the assembled devices and the stock components used to manufacture the electronic devices resulting in substantial company losses. You also have obtained information that these losses are the result of extensive employee theft. During previous discussions with private security leaders from other organizations, you sought more information about the effectiveness of an administrative search program as an option to address internal theft. You call a meeting with your security team and other company directorate heads, to include the organization’s legal counsel, to discuss possible security options to thwart the reported losses. The discussion at this meeting centers on the fact that in private industry/business, some employers institute an administrative, non-coercive, care taking search programs to address real or perceived property losses at the hands of their employees. But in establishing such
  • 5. a program, there are various issues that must be considered beyond the impact it might have on employee morale. Everyone agreed that company executives must thoroughly vet the legality of an administrative search under consideration and consider the potential for civil lawsuits filed against the company and its security operatives for such reasons as invasion of privacy, assault, false imprisonment, intentional infliction of emotional distress, and defamation. Everyone was also concerned about legal claims that may result from the manner in which the search is conducted. For instance, search protocols that are found by a court to be unreasonable, discriminatory, discourteous, unfair, highly intrusive, socially unacceptable conduct, or instituted for frivolous reasons will likely lead to successful claims by employees. All participants at the meeting agreed this would be a significant threat to company assets that must be avoided. Writing Assignment: Based on your independent research that includes at least three sources, in preparation for developing a possible policy proposal to establish an administrative search program (not criminal) for presentation to the corporate executive staff, write an academic paper that explores the use and legalities of an administrative, non-coercive, care taking search program instituted by private security operatives to address real or perceived company losses resulting from significant internal theft. After reading and evaluating Judge Edward Weinfeld’s opinion in Chenkin v. BELLEVUE HOSP. CTR., NYC, ETC., 479 F. Supp. 207 (S.D.N.Y. 1979), found in the eReadings section of the online classroom, consider the opinion and respond to the following: (1) Write a strong introduction, first stating the purpose of the paper, then providing a succinct recitation of the significant facts in this case. (2) Describe the issues related to the search program the court needed to resolve. (3) Explain the positions that Chenkin and Bellevue advanced to the court regarding Chenkin’s claim that the hospital’s package
  • 6. control system was unconstitutional. (4) Provide details of the court’s ruling and rationale and be sure to describe the important features of the search procedure instituted by Belleville that in the view of the court rejected Chenkin’s claims. (5) As a practical matter, evaluate how this court decision impacts security operations. Be specific and comprehensive. (6) Explain how the results of this case will be used in any policy proposals you make to the corporate executives. The length of the proposal will be between 1,000 and 1,500 words and students will use and properly cite and reference in APA format at least three sources, including the court’s opinion. Course instructional material may be used and cited, but may not be included in the three sources required. Source Information: (Should be placed in eReadings) https://www.courtlistener.com/opinion/2263945/chenkin-v- bellevue-hosp-ctr-nyc-etc/? http://www.twc.state.tx.us/news/efte/searches_at_work_legal_is sues_to_consider.html http://www.ppspublishers.com/ez/html/060804txtb.html http:/www.nolo.com/legal-encyclopedia/workplace-searches- dos-donts-29770.html http://www.workplacefairness.org/searches http://definitions.uslegal.com/w/workplace-searches/ You are highly encouraged to use the services of the UMUC Effective Writing Center (EWC) for this project. Personnel at the EWC can be contacted using the following website: http://www.umuc.edu/ewc/. Formatting Requirements Use the American Psychological Association (APA) style manual in writing this paper. Paper should begin with an appropriate introductory statement about the topic and a reference page. You may access the following UMUC website as a reference for
  • 7. APA style requirements: http://www.umuc.edu/library/libhow/gethelp-citing.cfm Paper should be a minimum of 1,000 (minimum) to 1,500 (maximum) words · · Double space · · 12 pt. font · · 1” margins · · Use APA citations for all sources · · Include reference page using APA format guidelines (not included in word count) Additionally - · · Create a cover page for your assignment (not included in word count) · · Include your name · · Course title and number · · Project title · · Date of submission Order #152666300 (Status: Writer Assigned) Legal Challenges for Private Security (4 pages, 0 slides) Reassign this order · Instructions · Files (4) · Messages Type of service: Writing from scratch Work type: Research paper Deadline: 13 Sep, 02:10 PM (20h) Extend deadline Academic level: College (3-4 years: Junior, Senior) Subject or Discipline: Criminal Justice
  • 8. Title: Legal Challenges for Private Security Number of sources: 4 Provide digital sources used: No Paper format: APA # of pages: 4 Spacing: Double spaced # of words: 1100 # of slides: ppt icon 0 # of charts: 0 Paper details: Legal Challenges for Private Security: Using course material and additional scholarly sources the student will compose a 1,000 - 1,250 word paper outlining their response as a role player to a legal issue involving the Security manager and the need to conduct a search or other intrusive activity in an effort to curtail internal (employee) theft. Comments: # Files Who Uploaded 1 152666300_Legal_Chal..._Instructions_2.docx Guidelines for writing 19 KB
  • 9. 12 Sep, 01:10 AM Customer 2 152666300_Legal_Chal..._Instructions_1.docx Guidelines for writing 19 KB 12 Sep, 01:20 AM Customer 3 152666300_Legal_Chal..._Instructions_1.docx Guidelines for writing 19 KB 12 Sep, 01:34 AM Customer 4 152666300_Legal_Chal..._Instructions_1.docx Guidelines for writing 19 KB 12 Sep, 02:06 AM Customer Scenario: The ACME Company manufactures various electronic devices for a variety of well-known brands. This includes cell phones, cameras, camcorders, stereos, computers, tablets, video games, and more. At any given time, many of these products
  • 10. are fully assembled and stored at the plant awaiting shipment to the vendors. Also stored at the plant are the expensive components used to manufacture the devices. As the Corporate Security Director for the ACME Company, you have been alerted that significant inventory shortages have been occurring for the assembled devices and the stock components used to manufacture the electronic devices resulting in substantial company losses. You also have obtained information that these losses are the result of extensive employee theft. During previous discussions with private security leaders from other organizations, you sought more information about the effectiveness of an administrative search program as an option to address internal theft. You call a meeting with your security team and other company directorate heads, to include the organization’s legal counsel, to discuss possible security options to thwart the reported losses. The discussion at this meeting centers on the fact that in private industry/business, some employers institute an administrative, non-coercive, care taking search programs to address real or perceived property losses at the hands of their employees. But in establishing such a program, there are various issues that must be considered beyond the impact it might have on employee morale. Everyone agreed that company executives must thoroughly vet the legality of an administrative search under consideration and consider the potential for civil lawsuits filed against the company and its security operatives for such reasons as invasion of privacy, assault, false imprisonment, intentional infliction of emotional distress, and defamation. Everyone was also concerned about legal claims that may result from the manner in which the search is conducted. For instance, search protocols that are found by a court to be unreasonable, discriminatory, discourteous, unfair, highly intrusive, socially unacceptable conduct, or instituted for frivolous reasons will likely lead to successful claims by employees. All participants at the meeting agreed this would be a significant threat to company assets that must be avoided.
  • 11. Writing Assignment: Based on your independent research that includes at least three sources, in preparation for developing a possible policy proposal to establish an administrative search program (not criminal) for presentation to the corporate executive staff, write an academic paper that explores the use and legalities of an administrative, non-coercive, care taking search program instituted by private security operatives to address real or perceived company losses resulting from significant internal theft. After reading and evaluating Judge Edward Weinfeld’s opinion in Chenkin v. BELLEVUE HOSP. CTR., NYC, ETC., 479 F. Supp. 207 (S.D.N.Y. 1979), found in the eReadings section of the online classroom, consider the opinion and respond to the following: (1) Write a strong introduction, first stating the purpose of the paper, then providing a succinct recitation of the significant facts in this case. (2) Describe the issues related to the search program the court needed to resolve. (3) Explain the positions that Chenkin and Bellevue advanced to the court regarding Chenkin’s claim that the hospital’s package control system was unconstitutional. (4) Provide details of the court’s ruling and rationale and be sure to describe the important features of the search procedure instituted by Belleville that in the view of the court rejected Chenkin’s claims. (5) As a practical matter, evaluate how this court decision impacts security operations. Be specific and comprehensive. (6) Explain how the results of this case will be used in any policy proposals you make to the corporate executives. The length of the proposal will be between 1,000 and 1,500 words and students will use and properly cite and reference in APA format at least three sources, including the court’s opinion. Course instructional material may be used and cited, but may not be included in the three sources required. Source Information: (Should be placed in eReadings)
  • 12. https://www.courtlistener.com/opinion/2263945/chenkin-v- bellevue-hosp-ctr-nyc-etc/? http://www.twc.state.tx.us/news/efte/searches_at_work_legal_is sues_to_consider.html http://www.ppspublishers.com/ez/html/060804txtb.html http:/www.nolo.com/legal-encyclopedia/workplace-searches- dos-donts-29770.html http://www.workplacefairness.org/searches http://definitions.uslegal.com/w/workplace-searches/ You are highly encouraged to use the services of the UMUC Effective Writing Center (EWC) for this project. Personnel at the EWC can be contacted using the following website: http://www.umuc.edu/ewc/. Formatting Requirements Use the American Psychological Association (APA) style manual in writing this paper. Paper should begin with an appropriate introductory statement about the topic and a reference page. You may access the following UMUC website as a reference for APA style requirements: http://www.umuc.edu/library/libhow/gethelp-citing.cfm Paper should be a minimum of 1,000 (minimum) to 1,500 (maximum) words · · Double space · · 12 pt. font · · 1” margins · · Use APA citations for all sources · · Include reference page using APA format guidelines (not included in word count) Additionally - · · Create a cover page for your assignment (not included in word count) · · Include your name · · Course title and number · · Project title
  • 13. · · Date of submission Scenario: The ACME Company manufactures various electronic devices for a variety of well-known brands. This includes cell phones, cameras, camcorders, stereos, computers, tablets, video games, and more. At any given time, many of these products are fully assembled and stored at the plant awaiting shipment to the vendors. Also stored at the plant are the expensive components used to manufacture the devices. As the Corporate Security Director for the ACME Company, you have been alerted that significant inventory shortages have been occurring for the assembled devices and the stock components used to manufacture the electronic devices resulting in substantial company losses. You also have obtained information that these losses are the result of extensive employee theft. During previous discussions with private security leaders from other organizations, you sought more information about the effectiveness of an administrative search program as an option to address internal theft. You call a meeting with your security team and other company directorate heads, to include the organization’s legal counsel, to discuss possible security options to thwart the reported losses. The discussion at this meeting centers on the fact that in private industry/business, some employers institute an administrative, non-coercive, care taking search programs to address real or perceived property losses at the hands of their employees. But in establishing such a program, there are various issues that must be considered beyond the impact it might have on employee morale. Everyone agreed that company executives must thoroughly vet the legality of an administrative search under consideration and consider the potential for civil lawsuits filed against the company and its security operatives for such reasons as invasion of privacy, assault, false imprisonment, intentional infliction of emotional distress, and defamation. Everyone was also concerned about legal claims that may result from the manner in which the
  • 14. search is conducted. For instance, search protocols that are found by a court to be unreasonable, discriminatory, discourteous, unfair, highly intrusive, socially unacceptable conduct, or instituted for frivolous reasons will likely lead to successful claims by employees. All participants at the meeting agreed this would be a significant threat to company assets that must be avoided. Writing Assignment: Based on your independent research that includes at least three sources, in preparation for developing a possible policy proposal to establish an administrative search program (not criminal) for presentation to the corporate executive staff, write an academic paper that explores the use and legalities of an administrative, non-coercive, care taking search program instituted by private security operatives to address real or perceived company losses resulting from significant internal theft. After reading and evaluating Judge Edward Weinfeld’s opinion in Chenkin v. BELLEVUE HOSP. CTR., NYC, ETC., 479 F. Supp. 207 (S.D.N.Y. 1979), found in the eReadings section of the online classroom, consider the opinion and respond to the following: (1) Write a strong introduction, first stating the purpose of the paper, then providing a succinct recitation of the significant facts in this case. (2) Describe the issues related to the search program the court needed to resolve. (3) Explain the positions that Chenkin and Bellevue advanced to the court regarding Chenkin’s claim that the hospital’s package control system was unconstitutional. (4) Provide details of the court’s ruling and rationale and be sure to describe the important features of the search procedure instituted by Belleville that in the view of the court rejected Chenkin’s claims. (5) As a practical matter, evaluate how this court decision impacts security operations. Be specific and comprehensive. (6) Explain how the results of this case will be used in any
  • 15. policy proposals you make to the corporate executives. The length of the proposal will be between 1,000 and 1,500 words and students will use and properly cite and reference in APA format at least three sources, including the court’s opinion. Course instructional material may be used and cited, but may not be included in the three sources required. Source Information: (Should be placed in eReadings) https://www.courtlistener.com/opinion/2263945/chenkin-v- bellevue-hosp-ctr-nyc-etc/? http://www.twc.state.tx.us/news/efte/searches_at_work_legal_is sues_to_consider.html http://www.ppspublishers.com/ez/html/060804txtb.html http:/www.nolo.com/legal-encyclopedia/workplace-searches- dos-donts-29770.html http://www.workplacefairness.org/searches http://definitions.uslegal.com/w/workplace-searches/ You are highly encouraged to use the services of the UMUC Effective Writing Center (EWC) for this project. Personnel at the EWC can be contacted using the following website: http://www.umuc.edu/ewc/. Formatting Requirements Use the American Psychological Association (APA) style manual in writing this paper. Paper should begin with an appropriate introductory statement about the topic and a reference page. You may access the following UMUC website as a reference for APA style requirements: http://www.umuc.edu/library/libhow/gethelp-citing.cfm Paper should be a minimum of 1,000 (minimum) to 1,500 (maximum) words · · Double space · · 12 pt. font · · 1” margins · · Use APA citations for all sources · · Include reference page using APA format guidelines (not
  • 16. included in word count) Additionally - · · Create a cover page for your assignment (not included in word count) · · Include your name · · Course title and number · · Project title · · Date of submission Page 1 of 3 Assignment and Submission - MAF307 1 The assignment is compulsory. To reduce our carbon footprint, all assignments are to be submitted electronically through dropboxes in Cloud Deakin (CD). No hardcopy assignment submission is required. 2. The assignment due date is 11:59pm, 16 September (Friday). You should be aware of your eligibility for special consideration (see the Deakin University Handbook). Otherwise, in no case will the extension be granted for the assignment completion and submission. 3. To reflect the manner in which most corporations conduct business, students shall form groups of four to handle this assignment. It is up to the students
  • 17. to form the groups. Faculty members will not entertain requests relating to group formation. 4. Once a group is formed, you are required to register into a group under “Groups” on CD, which also aids you to successfully submit your assignment. 5. If you submit work to be marked after the due date you will incur a deduction of 20% from the total marks, for each calendar day of the week the assignment is late, for up to 5 calendar days. Further, we will not accept any submission after 11:59pm on Wednesday (21 September). For example, if the due date is Friday 16th September 2016 and you do not have an extension approval from the Unit Chair and hand your work in late on the next day which is Saturday 17th September 2016, 20% of the total marks, equivalent of 4 marks, will be deducted. If your work is marked as worthy of a grade of 16, you will only receive 12 for it after applying the penalty. 6. CloudDeakin submission: Each group needs submitti ng only once. Please use your IDs naming your files, such as 700374***_600039***_210039***_3600589***_MAF307_Rep ort_2015T1.doc(x). 7. A copy of the assignment must be kept by students to cover the possibility of lost assignments. Good luck.
  • 18. Page 2 of 3 DEAKIN UNIVERSITY FACULTY OF BUSINESS & LAW SCHOOL OF ACCOUNTING ECONOMICS& FINANCE MAF307 EQUITIES AND INVESTMENT ANALYSIS ASSIGNMENT - Trimester 2, 2016 This written assignment has three parts: PART I In order to approximate business practice, where an individual's performance evaluation reflects not only the opinion of supervisors but also that of his
  • 19. or her peers, group members shall evaluate one another’s investment journals. Each group member has to critically analyse another member’s investment strategy, including, but not limited to, comparing their investment performance, return expectations, risk appetite, frequency of trading, stock selection decisions, those investment strategies that worked and those that failed. Students can choose to make their analysis based on the two submitted journals, or based on the entire six weekly journals if a group member happens to have one. Students can use this written analysis as the base to articulate their oral presentation. Please keep the overall length of your group oral presentation to approximate five minutes (Hint: Most estimated the number of words/minute around 100.) (Word limit guidance - 800, 5 marks) PART II (a). Identify the best- and worst-performing shares from your group members. Assess whether the different performance is due to the different impact on the shares brought by 1). macroeconomic environment; 2). industry/sector life cycle; 3) government or the central bank’s policies; 4). foreign economic influence; 5). firm specific policy or action, etc. (b). Use last 2-year daily prices data to calculate the above
  • 20. shares’ returns and variances or standard deviations. Examine and comment on whether your group’s best- and worst- performing shares can be identified from this information. (Hint: The daily prices can be drawn from websites such as Yahoo finance, Google finance or the Australian Financial Review, etc.) (Word limit guidance - 1000, 7 marks) Page 3 of 3 PART III As an analyst for Vandelay brokerage firm, your supervisor has handed you a video clip – an interview between Ticky Fullerton of The Business of ABC, and the fund manager, Roger Montgomery (You need to watch it first. You can access the video file in the same folder). During the interview, Roger Montgomery raised several share names in the data centre storage business. Focus on the following two stocks, NXT (NextDC) and VOC (Vocus Communications). Your supervisor asked you to write a report: i). to find the share prices of the above two stocks at the time of the interview (say, around 25th April of 2013) and their current
  • 21. stock prices. What do you find? ii). to examine and investigate the background and reasons (or risk factors) behind this dramatic share price difference. What are the reasons, if any, resulting in the price dispersion? iii). to assess the following statement: share prices fully reflect all available information on a particular share according to the efficient market hypothesis (EMH) (Bodie et al (1997). If this is the case, can you find any evidence to support that the market was fully informed? Does the EMH mean anything to you in explaining the share price difference? Why and/or why not? iv). to make a recommendation for both stocks based on your research on behalf of your firm to your clients – to buy hold or sell. (Word limit guidance - 1200, 8 marks)
  • 22. Reference Zvi Bodie, Mohamed Arif, Raymond da Silva Rosa, Alex Kane and Alan J Marcus (2007), Investments, McGraw-Hill Irwin Australia.