SlideShare a Scribd company logo
1 of 2
Assignment 1: White-Collar Crime
Victor and John work as software installers and program
developers in the computer division of the Social Security
Administration (SSA). SSA purchased software which was
customarily installed by both Victor and John. SSA was
licensed to make copies of the software for use by their
employees during their employment, but not for resale to the
public or for profit.
Victor and John are also partners in a small computer business.
Victor started using some SSA software in his business, without
the knowledge or consent of SSA. He told John that he would
use it only for testing and not for profit. However, the "testing"
of the software generated profit for their business. John did not
want to continue using the software without SSA consent.
Victor believed the SSA would not grant permission and
convinced John not to disclose their secret use of the software.
Research business law in regard to software use using your
textbook, the Argosy University online library resources, and
the Internet. Based on the facts of the case and research,
respond to the following questions:
What white-collar crimes, if any, did Victor and John commit?
Explain each individual's crime separately.
What ethical leadership and management violation has Victor
committed? Explain.
What legal protection is available to John if he decides to
inform the SSA about the software use? Explain.
By
Saturday, December 12, 2015
, post your response to the appropriate
Discussion Area
. Through
Wednesday, December 16, 2015
, review and comment on at least two peers' responses.
Use the
Respond
link to post responses and

More Related Content

Similar to Assignment 1 White-Collar CrimeVictor and John work as software i.docx

Smartphones, the Internet, and rapid advancement of technology h
Smartphones, the Internet, and rapid advancement of technology hSmartphones, the Internet, and rapid advancement of technology h
Smartphones, the Internet, and rapid advancement of technology hAlleneMcclendon878
 
the and rapid advancement of technology have come.docx
the and rapid advancement of technology have come.docxthe and rapid advancement of technology have come.docx
the and rapid advancement of technology have come.docxwrite5
 
The following scenario is a discussion post. Therefore, I only need .docx
The following scenario is a discussion post. Therefore, I only need .docxThe following scenario is a discussion post. Therefore, I only need .docx
The following scenario is a discussion post. Therefore, I only need .docxkailynochseu
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone SecurityGuneet Pahwa
 
Case Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queCase Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queogglili
 
Software piracy
Software piracySoftware piracy
Software piracyTi-Sun
 
Case 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docx
Case 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docxCase 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docx
Case 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docxjasoninnes20
 
1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdf1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdfmeejuhaszjasmynspe52
 
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfCase Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfaccuraprintengineers
 
Android App Used by Hackers in Sex Extortion Campaigns
Android App Used by Hackers in Sex Extortion CampaignsAndroid App Used by Hackers in Sex Extortion Campaigns
Android App Used by Hackers in Sex Extortion CampaignsWaqas Amir
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Deeply Inspired Designs Porfolio
Deeply Inspired Designs PorfolioDeeply Inspired Designs Porfolio
Deeply Inspired Designs PorfolioNatalie Acevedo
 
Natalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digitalNatalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digitalNatalie Acevedo
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxjoshua2345678
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
 
On November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfOn November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfaabdin101
 

Similar to Assignment 1 White-Collar CrimeVictor and John work as software i.docx (20)

Smartphones, the Internet, and rapid advancement of technology h
Smartphones, the Internet, and rapid advancement of technology hSmartphones, the Internet, and rapid advancement of technology h
Smartphones, the Internet, and rapid advancement of technology h
 
the and rapid advancement of technology have come.docx
the and rapid advancement of technology have come.docxthe and rapid advancement of technology have come.docx
the and rapid advancement of technology have come.docx
 
The following scenario is a discussion post. Therefore, I only need .docx
The following scenario is a discussion post. Therefore, I only need .docxThe following scenario is a discussion post. Therefore, I only need .docx
The following scenario is a discussion post. Therefore, I only need .docx
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
 
Case Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queCase Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the que
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Case 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docx
Case 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docxCase 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docx
Case 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docx
 
1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdf1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdf
 
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfCase Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
 
Android App Used by Hackers in Sex Extortion Campaigns
Android App Used by Hackers in Sex Extortion CampaignsAndroid App Used by Hackers in Sex Extortion Campaigns
Android App Used by Hackers in Sex Extortion Campaigns
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Deeply Inspired Designs Porfolio
Deeply Inspired Designs PorfolioDeeply Inspired Designs Porfolio
Deeply Inspired Designs Porfolio
 
Natalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digitalNatalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digital
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docx
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
On November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfOn November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdf
 

More from daniatrappit

Assignment 1 Victims’ Rights and the Dos and Don’ts of Interviewing.docx
Assignment 1 Victims’ Rights and the Dos and Don’ts of Interviewing.docxAssignment 1 Victims’ Rights and the Dos and Don’ts of Interviewing.docx
Assignment 1 Victims’ Rights and the Dos and Don’ts of Interviewing.docxdaniatrappit
 
Assignment 1 Trends in the WorkplaceDue Week 3 and worth 200 .docx
Assignment 1 Trends in the WorkplaceDue Week 3 and worth 200 .docxAssignment 1 Trends in the WorkplaceDue Week 3 and worth 200 .docx
Assignment 1 Trends in the WorkplaceDue Week 3 and worth 200 .docxdaniatrappit
 
Assignment 1 The Cold War and U.S. DiplomacyDue 11-02-15 and wort.docx
Assignment 1 The Cold War and U.S. DiplomacyDue 11-02-15 and wort.docxAssignment 1 The Cold War and U.S. DiplomacyDue 11-02-15 and wort.docx
Assignment 1 The Cold War and U.S. DiplomacyDue 11-02-15 and wort.docxdaniatrappit
 
Assignment 1 Socioeconomic StatusInterestingly, researchers have .docx
Assignment 1 Socioeconomic StatusInterestingly, researchers have .docxAssignment 1 Socioeconomic StatusInterestingly, researchers have .docx
Assignment 1 Socioeconomic StatusInterestingly, researchers have .docxdaniatrappit
 
Assignment 1 Trust and BoundariesIn this module, you learned ab.docx
Assignment 1 Trust and BoundariesIn this module, you learned ab.docxAssignment 1 Trust and BoundariesIn this module, you learned ab.docx
Assignment 1 Trust and BoundariesIn this module, you learned ab.docxdaniatrappit
 
Assignment 1 The Problems of Evil and SufferingAll human bein.docx
Assignment 1 The Problems of Evil and SufferingAll human bein.docxAssignment 1 The Problems of Evil and SufferingAll human bein.docx
Assignment 1 The Problems of Evil and SufferingAll human bein.docxdaniatrappit
 
Assignment 1 The Primary Care ClinicDue Week 4 and worth 160 poin.docx
Assignment 1 The Primary Care ClinicDue Week 4 and worth 160 poin.docxAssignment 1 The Primary Care ClinicDue Week 4 and worth 160 poin.docx
Assignment 1 The Primary Care ClinicDue Week 4 and worth 160 poin.docxdaniatrappit
 
Assignment 1 the sociological viewpoint toward social problems (Due.docx
Assignment 1 the sociological viewpoint toward social problems (Due.docxAssignment 1 the sociological viewpoint toward social problems (Due.docx
Assignment 1 the sociological viewpoint toward social problems (Due.docxdaniatrappit
 
Assignment 1 The Role of Weak Institutions in Underdevelopment .docx
Assignment 1 The Role of Weak Institutions in Underdevelopment .docxAssignment 1 The Role of Weak Institutions in Underdevelopment .docx
Assignment 1 The Role of Weak Institutions in Underdevelopment .docxdaniatrappit
 
Assignment 1 Special Interest GroupsGroups advancing specific.docx
Assignment 1 Special Interest GroupsGroups advancing specific.docxAssignment 1 Special Interest GroupsGroups advancing specific.docx
Assignment 1 Special Interest GroupsGroups advancing specific.docxdaniatrappit
 
Assignment 1 Should the U.S. Convert to a Zero Personal Income Ta.docx
Assignment 1 Should the U.S. Convert to a Zero Personal Income Ta.docxAssignment 1 Should the U.S. Convert to a Zero Personal Income Ta.docx
Assignment 1 Should the U.S. Convert to a Zero Personal Income Ta.docxdaniatrappit
 
Assignment 1 Resource and Competitive Position AnalysisUsing your.docx
Assignment 1 Resource and Competitive Position AnalysisUsing your.docxAssignment 1 Resource and Competitive Position AnalysisUsing your.docx
Assignment 1 Resource and Competitive Position AnalysisUsing your.docxdaniatrappit
 
Assignment 1 Research PaperDue Week 3 and worth 200 points.docx
Assignment 1 Research PaperDue Week 3 and worth 200 points.docxAssignment 1 Research PaperDue Week 3 and worth 200 points.docx
Assignment 1 Research PaperDue Week 3 and worth 200 points.docxdaniatrappit
 
Assignment 1 RaceAs you work in the human services delivery secto.docx
Assignment 1 RaceAs you work in the human services delivery secto.docxAssignment 1 RaceAs you work in the human services delivery secto.docx
Assignment 1 RaceAs you work in the human services delivery secto.docxdaniatrappit
 
Assignment 1 Political Belief Profile The relationship betwee.docx
Assignment 1 Political Belief Profile The relationship betwee.docxAssignment 1 Political Belief Profile The relationship betwee.docx
Assignment 1 Political Belief Profile The relationship betwee.docxdaniatrappit
 
Assignment 1 Procedural Law and the Bill of RightsDue Week 4 and .docx
Assignment 1 Procedural Law and the Bill of RightsDue Week 4 and .docxAssignment 1 Procedural Law and the Bill of RightsDue Week 4 and .docx
Assignment 1 Procedural Law and the Bill of RightsDue Week 4 and .docxdaniatrappit
 
Assignment 1 Objectives Log in to and out of a Linux system. U.docx
Assignment 1 Objectives Log in to and out of a Linux system. U.docxAssignment 1 Objectives Log in to and out of a Linux system. U.docx
Assignment 1 Objectives Log in to and out of a Linux system. U.docxdaniatrappit
 
Assignment 1 Linux GUIDue Week 2 and worth 90 pointsAs explaine.docx
Assignment 1 Linux GUIDue Week 2 and worth 90 pointsAs explaine.docxAssignment 1 Linux GUIDue Week 2 and worth 90 pointsAs explaine.docx
Assignment 1 Linux GUIDue Week 2 and worth 90 pointsAs explaine.docxdaniatrappit
 
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docxAssignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docxdaniatrappit
 
Assignment 1 LASA 2 Write Your Own BillScenarioYou are a.docx
Assignment 1 LASA 2 Write Your Own BillScenarioYou are a.docxAssignment 1 LASA 2 Write Your Own BillScenarioYou are a.docx
Assignment 1 LASA 2 Write Your Own BillScenarioYou are a.docxdaniatrappit
 

More from daniatrappit (20)

Assignment 1 Victims’ Rights and the Dos and Don’ts of Interviewing.docx
Assignment 1 Victims’ Rights and the Dos and Don’ts of Interviewing.docxAssignment 1 Victims’ Rights and the Dos and Don’ts of Interviewing.docx
Assignment 1 Victims’ Rights and the Dos and Don’ts of Interviewing.docx
 
Assignment 1 Trends in the WorkplaceDue Week 3 and worth 200 .docx
Assignment 1 Trends in the WorkplaceDue Week 3 and worth 200 .docxAssignment 1 Trends in the WorkplaceDue Week 3 and worth 200 .docx
Assignment 1 Trends in the WorkplaceDue Week 3 and worth 200 .docx
 
Assignment 1 The Cold War and U.S. DiplomacyDue 11-02-15 and wort.docx
Assignment 1 The Cold War and U.S. DiplomacyDue 11-02-15 and wort.docxAssignment 1 The Cold War and U.S. DiplomacyDue 11-02-15 and wort.docx
Assignment 1 The Cold War and U.S. DiplomacyDue 11-02-15 and wort.docx
 
Assignment 1 Socioeconomic StatusInterestingly, researchers have .docx
Assignment 1 Socioeconomic StatusInterestingly, researchers have .docxAssignment 1 Socioeconomic StatusInterestingly, researchers have .docx
Assignment 1 Socioeconomic StatusInterestingly, researchers have .docx
 
Assignment 1 Trust and BoundariesIn this module, you learned ab.docx
Assignment 1 Trust and BoundariesIn this module, you learned ab.docxAssignment 1 Trust and BoundariesIn this module, you learned ab.docx
Assignment 1 Trust and BoundariesIn this module, you learned ab.docx
 
Assignment 1 The Problems of Evil and SufferingAll human bein.docx
Assignment 1 The Problems of Evil and SufferingAll human bein.docxAssignment 1 The Problems of Evil and SufferingAll human bein.docx
Assignment 1 The Problems of Evil and SufferingAll human bein.docx
 
Assignment 1 The Primary Care ClinicDue Week 4 and worth 160 poin.docx
Assignment 1 The Primary Care ClinicDue Week 4 and worth 160 poin.docxAssignment 1 The Primary Care ClinicDue Week 4 and worth 160 poin.docx
Assignment 1 The Primary Care ClinicDue Week 4 and worth 160 poin.docx
 
Assignment 1 the sociological viewpoint toward social problems (Due.docx
Assignment 1 the sociological viewpoint toward social problems (Due.docxAssignment 1 the sociological viewpoint toward social problems (Due.docx
Assignment 1 the sociological viewpoint toward social problems (Due.docx
 
Assignment 1 The Role of Weak Institutions in Underdevelopment .docx
Assignment 1 The Role of Weak Institutions in Underdevelopment .docxAssignment 1 The Role of Weak Institutions in Underdevelopment .docx
Assignment 1 The Role of Weak Institutions in Underdevelopment .docx
 
Assignment 1 Special Interest GroupsGroups advancing specific.docx
Assignment 1 Special Interest GroupsGroups advancing specific.docxAssignment 1 Special Interest GroupsGroups advancing specific.docx
Assignment 1 Special Interest GroupsGroups advancing specific.docx
 
Assignment 1 Should the U.S. Convert to a Zero Personal Income Ta.docx
Assignment 1 Should the U.S. Convert to a Zero Personal Income Ta.docxAssignment 1 Should the U.S. Convert to a Zero Personal Income Ta.docx
Assignment 1 Should the U.S. Convert to a Zero Personal Income Ta.docx
 
Assignment 1 Resource and Competitive Position AnalysisUsing your.docx
Assignment 1 Resource and Competitive Position AnalysisUsing your.docxAssignment 1 Resource and Competitive Position AnalysisUsing your.docx
Assignment 1 Resource and Competitive Position AnalysisUsing your.docx
 
Assignment 1 Research PaperDue Week 3 and worth 200 points.docx
Assignment 1 Research PaperDue Week 3 and worth 200 points.docxAssignment 1 Research PaperDue Week 3 and worth 200 points.docx
Assignment 1 Research PaperDue Week 3 and worth 200 points.docx
 
Assignment 1 RaceAs you work in the human services delivery secto.docx
Assignment 1 RaceAs you work in the human services delivery secto.docxAssignment 1 RaceAs you work in the human services delivery secto.docx
Assignment 1 RaceAs you work in the human services delivery secto.docx
 
Assignment 1 Political Belief Profile The relationship betwee.docx
Assignment 1 Political Belief Profile The relationship betwee.docxAssignment 1 Political Belief Profile The relationship betwee.docx
Assignment 1 Political Belief Profile The relationship betwee.docx
 
Assignment 1 Procedural Law and the Bill of RightsDue Week 4 and .docx
Assignment 1 Procedural Law and the Bill of RightsDue Week 4 and .docxAssignment 1 Procedural Law and the Bill of RightsDue Week 4 and .docx
Assignment 1 Procedural Law and the Bill of RightsDue Week 4 and .docx
 
Assignment 1 Objectives Log in to and out of a Linux system. U.docx
Assignment 1 Objectives Log in to and out of a Linux system. U.docxAssignment 1 Objectives Log in to and out of a Linux system. U.docx
Assignment 1 Objectives Log in to and out of a Linux system. U.docx
 
Assignment 1 Linux GUIDue Week 2 and worth 90 pointsAs explaine.docx
Assignment 1 Linux GUIDue Week 2 and worth 90 pointsAs explaine.docxAssignment 1 Linux GUIDue Week 2 and worth 90 pointsAs explaine.docx
Assignment 1 Linux GUIDue Week 2 and worth 90 pointsAs explaine.docx
 
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docxAssignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
 
Assignment 1 LASA 2 Write Your Own BillScenarioYou are a.docx
Assignment 1 LASA 2 Write Your Own BillScenarioYou are a.docxAssignment 1 LASA 2 Write Your Own BillScenarioYou are a.docx
Assignment 1 LASA 2 Write Your Own BillScenarioYou are a.docx
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 

Recently uploaded (20)

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

Assignment 1 White-Collar CrimeVictor and John work as software i.docx

  • 1. Assignment 1: White-Collar Crime Victor and John work as software installers and program developers in the computer division of the Social Security Administration (SSA). SSA purchased software which was customarily installed by both Victor and John. SSA was licensed to make copies of the software for use by their employees during their employment, but not for resale to the public or for profit. Victor and John are also partners in a small computer business. Victor started using some SSA software in his business, without the knowledge or consent of SSA. He told John that he would use it only for testing and not for profit. However, the "testing" of the software generated profit for their business. John did not want to continue using the software without SSA consent. Victor believed the SSA would not grant permission and convinced John not to disclose their secret use of the software. Research business law in regard to software use using your textbook, the Argosy University online library resources, and the Internet. Based on the facts of the case and research, respond to the following questions: What white-collar crimes, if any, did Victor and John commit? Explain each individual's crime separately. What ethical leadership and management violation has Victor committed? Explain. What legal protection is available to John if he decides to inform the SSA about the software use? Explain. By Saturday, December 12, 2015 , post your response to the appropriate Discussion Area . Through Wednesday, December 16, 2015 , review and comment on at least two peers' responses.
  • 2. Use the Respond link to post responses and