SlideShare a Scribd company logo
1 of 2
Victor and John work as software installers and program
developers in the computer division of the Social Security
Administration (SSA). SSA purchased software which was
customarily installed by both Victor and John. SSA was
licensed to make copies of the software for use by their
employees during their employment, but not for resale to the
public or for profit.
Victor and John are also partners in a small computer business.
Victor started using some SSA software in his business, without
the knowledge or consent of SSA. He told John that he would
use it only for testing and not for profit. However, the "testing"
of the software generated profit for their business. John did not
want to continue using the software without SSA consent.
Victor believed the SSA would not grant permission and
convinced John not to disclose their secret use of the software.
Research business law in regard to software use using your
textbook, the Argosy University online library resources, and
the Internet. Based on the facts of the case and research,
respond to the following questions:
What white-collar crimes, if any, did Victor and John commit?
Explain each individual's crime separately.
What ethical leadership and management violation has Victor
committed? Explain.
What legal protection is available to John if he decides to
inform the SSA about the software use? Explain.
Victor and John work as software installers and program developers i.docx

More Related Content

Similar to Victor and John work as software installers and program developers i.docx

the and rapid advancement of technology have come.docx
the and rapid advancement of technology have come.docxthe and rapid advancement of technology have come.docx
the and rapid advancement of technology have come.docx
write5
 
Smartphones, the Internet, and rapid advancement of technology h.docx
Smartphones, the Internet, and rapid advancement of technology h.docxSmartphones, the Internet, and rapid advancement of technology h.docx
Smartphones, the Internet, and rapid advancement of technology h.docx
pbilly1
 
Smartphones, the Internet, and rapid advancement of technology h
Smartphones, the Internet, and rapid advancement of technology hSmartphones, the Internet, and rapid advancement of technology h
Smartphones, the Internet, and rapid advancement of technology h
AlleneMcclendon878
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
Guneet Pahwa
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
hyacinthshackley2629
 
1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdf1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdf
meejuhaszjasmynspe52
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
victoriahoo
 
Case Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queCase Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the que
ogglili
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
Rahuljain40418
 
Risk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docxRisk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docx
SUBHI7
 
Pedophile Reporter Internet explorer plugin
Pedophile Reporter Internet explorer pluginPedophile Reporter Internet explorer plugin
Pedophile Reporter Internet explorer plugin
Joe Seanor
 

Similar to Victor and John work as software installers and program developers i.docx (20)

the and rapid advancement of technology have come.docx
the and rapid advancement of technology have come.docxthe and rapid advancement of technology have come.docx
the and rapid advancement of technology have come.docx
 
Spyware
SpywareSpyware
Spyware
 
Smartphones, the Internet, and rapid advancement of technology h.docx
Smartphones, the Internet, and rapid advancement of technology h.docxSmartphones, the Internet, and rapid advancement of technology h.docx
Smartphones, the Internet, and rapid advancement of technology h.docx
 
Smartphones, the Internet, and rapid advancement of technology h
Smartphones, the Internet, and rapid advancement of technology hSmartphones, the Internet, and rapid advancement of technology h
Smartphones, the Internet, and rapid advancement of technology h
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
 
Android App Used by Hackers in Sex Extortion Campaigns
Android App Used by Hackers in Sex Extortion CampaignsAndroid App Used by Hackers in Sex Extortion Campaigns
Android App Used by Hackers in Sex Extortion Campaigns
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdf1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdf
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Case Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queCase Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the que
 
Software piracy
Software piracySoftware piracy
Software piracy
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
 
Risk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docxRisk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docx
 
Is Big Data A Risky Business in Isaca Journal
Is Big Data A Risky Business in Isaca JournalIs Big Data A Risky Business in Isaca Journal
Is Big Data A Risky Business in Isaca Journal
 
Auto Response System for Legal Consultation
Auto Response System for Legal ConsultationAuto Response System for Legal Consultation
Auto Response System for Legal Consultation
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
 
Pedophile Reporter Internet explorer plugin
Pedophile Reporter Internet explorer pluginPedophile Reporter Internet explorer plugin
Pedophile Reporter Internet explorer plugin
 
spy after employees
spy after employeesspy after employees
spy after employees
 

More from nealwaters20034

FIN 336 Milestone Two Guidelines and Rubric Economic Envir.docx
FIN 336 Milestone Two Guidelines and Rubric Economic Envir.docxFIN 336 Milestone Two Guidelines and Rubric Economic Envir.docx
FIN 336 Milestone Two Guidelines and Rubric Economic Envir.docx
nealwaters20034
 
FIN 402 Week 3 Case ProblemsCase Problem 6.1 Sara Decides to Tak.docx
FIN 402 Week 3 Case ProblemsCase Problem 6.1 Sara Decides to Tak.docxFIN 402 Week 3 Case ProblemsCase Problem 6.1 Sara Decides to Tak.docx
FIN 402 Week 3 Case ProblemsCase Problem 6.1 Sara Decides to Tak.docx
nealwaters20034
 
Fieldwork Research Primary SourcesThis assignment assumes 4.docx
Fieldwork Research Primary SourcesThis assignment assumes 4.docxFieldwork Research Primary SourcesThis assignment assumes 4.docx
Fieldwork Research Primary SourcesThis assignment assumes 4.docx
nealwaters20034
 
ffirs.qxd 1313 348 PM Page iPROJECTMANAGEM.docx
ffirs.qxd  1313  348 PM  Page iPROJECTMANAGEM.docxffirs.qxd  1313  348 PM  Page iPROJECTMANAGEM.docx
ffirs.qxd 1313 348 PM Page iPROJECTMANAGEM.docx
nealwaters20034
 
Feminist & Empowerment TheoriesFeminist theory can be applie.docx
Feminist & Empowerment TheoriesFeminist theory can be applie.docxFeminist & Empowerment TheoriesFeminist theory can be applie.docx
Feminist & Empowerment TheoriesFeminist theory can be applie.docx
nealwaters20034
 
Feminist Family TherapyPresentation originally given by Allen.docx
Feminist Family TherapyPresentation originally given by Allen.docxFeminist Family TherapyPresentation originally given by Allen.docx
Feminist Family TherapyPresentation originally given by Allen.docx
nealwaters20034
 
Federalism Comparing Government Response in Hurricane Katrina vs..docx
Federalism Comparing Government Response in Hurricane Katrina vs..docxFederalism Comparing Government Response in Hurricane Katrina vs..docx
Federalism Comparing Government Response in Hurricane Katrina vs..docx
nealwaters20034
 
Federalism Comparing Government Response in Hurricane Katrina v.docx
Federalism Comparing Government Response in Hurricane Katrina v.docxFederalism Comparing Government Response in Hurricane Katrina v.docx
Federalism Comparing Government Response in Hurricane Katrina v.docx
nealwaters20034
 
Feedback for 4 Milestone Two Research and SupportPlease addre.docx
Feedback for 4 Milestone Two Research and SupportPlease addre.docxFeedback for 4 Milestone Two Research and SupportPlease addre.docx
Feedback for 4 Milestone Two Research and SupportPlease addre.docx
nealwaters20034
 
Federal Budget SpeechDo you want to know who you are Don.docx
Federal Budget SpeechDo you want to know who you are Don.docxFederal Budget SpeechDo you want to know who you are Don.docx
Federal Budget SpeechDo you want to know who you are Don.docx
nealwaters20034
 
February is Black History Month. In great honor of this month, y.docx
February is Black History Month. In great honor of this month, y.docxFebruary is Black History Month. In great honor of this month, y.docx
February is Black History Month. In great honor of this month, y.docx
nealwaters20034
 
Fe.docx
Fe.docxFe.docx
FC305 Essay’s Guidelines March Start cohort Deadline Mond.docx
FC305 Essay’s Guidelines March Start cohort Deadline Mond.docxFC305 Essay’s Guidelines March Start cohort Deadline Mond.docx
FC305 Essay’s Guidelines March Start cohort Deadline Mond.docx
nealwaters20034
 
Faster Computing has contacted Go2Linux and requested a brief  p.docx
Faster Computing has contacted Go2Linux and requested a brief  p.docxFaster Computing has contacted Go2Linux and requested a brief  p.docx
Faster Computing has contacted Go2Linux and requested a brief  p.docx
nealwaters20034
 
Faster Computing was impressed with your presentation. The compa.docx
Faster Computing was impressed with your presentation. The compa.docxFaster Computing was impressed with your presentation. The compa.docx
Faster Computing was impressed with your presentation. The compa.docx
nealwaters20034
 

More from nealwaters20034 (20)

FIN 336 Milestone Two Guidelines and Rubric Economic Envir.docx
FIN 336 Milestone Two Guidelines and Rubric Economic Envir.docxFIN 336 Milestone Two Guidelines and Rubric Economic Envir.docx
FIN 336 Milestone Two Guidelines and Rubric Economic Envir.docx
 
files may help with writing paperEvaluation Essay Topic Sho.docx
files may help with writing paperEvaluation Essay Topic Sho.docxfiles may help with writing paperEvaluation Essay Topic Sho.docx
files may help with writing paperEvaluation Essay Topic Sho.docx
 
FIN 402 Week 3 Case ProblemsCase Problem 6.1 Sara Decides to Tak.docx
FIN 402 Week 3 Case ProblemsCase Problem 6.1 Sara Decides to Tak.docxFIN 402 Week 3 Case ProblemsCase Problem 6.1 Sara Decides to Tak.docx
FIN 402 Week 3 Case ProblemsCase Problem 6.1 Sara Decides to Tak.docx
 
Film Review Select a contemporary English film of your choice that .docx
Film Review Select a contemporary English film of your choice that .docxFilm Review Select a contemporary English film of your choice that .docx
Film Review Select a contemporary English film of your choice that .docx
 
Fieldwork Research Primary SourcesThis assignment assumes 4.docx
Fieldwork Research Primary SourcesThis assignment assumes 4.docxFieldwork Research Primary SourcesThis assignment assumes 4.docx
Fieldwork Research Primary SourcesThis assignment assumes 4.docx
 
Field TripAssist the cooperating teacher for the age you are obs.docx
Field TripAssist the cooperating teacher for the age you are obs.docxField TripAssist the cooperating teacher for the age you are obs.docx
Field TripAssist the cooperating teacher for the age you are obs.docx
 
Field of study ( Interdisciplinary studies)Choose a piece of w.docx
Field of study ( Interdisciplinary studies)Choose a piece of w.docxField of study ( Interdisciplinary studies)Choose a piece of w.docx
Field of study ( Interdisciplinary studies)Choose a piece of w.docx
 
ffirs.qxd 1313 348 PM Page iPROJECTMANAGEM.docx
ffirs.qxd  1313  348 PM  Page iPROJECTMANAGEM.docxffirs.qxd  1313  348 PM  Page iPROJECTMANAGEM.docx
ffirs.qxd 1313 348 PM Page iPROJECTMANAGEM.docx
 
Feminist & Empowerment TheoriesFeminist theory can be applie.docx
Feminist & Empowerment TheoriesFeminist theory can be applie.docxFeminist & Empowerment TheoriesFeminist theory can be applie.docx
Feminist & Empowerment TheoriesFeminist theory can be applie.docx
 
Feminist Family TherapyPresentation originally given by Allen.docx
Feminist Family TherapyPresentation originally given by Allen.docxFeminist Family TherapyPresentation originally given by Allen.docx
Feminist Family TherapyPresentation originally given by Allen.docx
 
Felicia makes fabulous fried foods that she sells to family and .docx
Felicia makes fabulous fried foods that she sells to family and .docxFelicia makes fabulous fried foods that she sells to family and .docx
Felicia makes fabulous fried foods that she sells to family and .docx
 
Federalism Comparing Government Response in Hurricane Katrina vs..docx
Federalism Comparing Government Response in Hurricane Katrina vs..docxFederalism Comparing Government Response in Hurricane Katrina vs..docx
Federalism Comparing Government Response in Hurricane Katrina vs..docx
 
Federalism Comparing Government Response in Hurricane Katrina v.docx
Federalism Comparing Government Response in Hurricane Katrina v.docxFederalism Comparing Government Response in Hurricane Katrina v.docx
Federalism Comparing Government Response in Hurricane Katrina v.docx
 
Feedback for 4 Milestone Two Research and SupportPlease addre.docx
Feedback for 4 Milestone Two Research and SupportPlease addre.docxFeedback for 4 Milestone Two Research and SupportPlease addre.docx
Feedback for 4 Milestone Two Research and SupportPlease addre.docx
 
Federal Budget SpeechDo you want to know who you are Don.docx
Federal Budget SpeechDo you want to know who you are Don.docxFederal Budget SpeechDo you want to know who you are Don.docx
Federal Budget SpeechDo you want to know who you are Don.docx
 
February is Black History Month. In great honor of this month, y.docx
February is Black History Month. In great honor of this month, y.docxFebruary is Black History Month. In great honor of this month, y.docx
February is Black History Month. In great honor of this month, y.docx
 
Fe.docx
Fe.docxFe.docx
Fe.docx
 
FC305 Essay’s Guidelines March Start cohort Deadline Mond.docx
FC305 Essay’s Guidelines March Start cohort Deadline Mond.docxFC305 Essay’s Guidelines March Start cohort Deadline Mond.docx
FC305 Essay’s Guidelines March Start cohort Deadline Mond.docx
 
Faster Computing has contacted Go2Linux and requested a brief  p.docx
Faster Computing has contacted Go2Linux and requested a brief  p.docxFaster Computing has contacted Go2Linux and requested a brief  p.docx
Faster Computing has contacted Go2Linux and requested a brief  p.docx
 
Faster Computing was impressed with your presentation. The compa.docx
Faster Computing was impressed with your presentation. The compa.docxFaster Computing was impressed with your presentation. The compa.docx
Faster Computing was impressed with your presentation. The compa.docx
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Victor and John work as software installers and program developers i.docx

  • 1. Victor and John work as software installers and program developers in the computer division of the Social Security Administration (SSA). SSA purchased software which was customarily installed by both Victor and John. SSA was licensed to make copies of the software for use by their employees during their employment, but not for resale to the public or for profit. Victor and John are also partners in a small computer business. Victor started using some SSA software in his business, without the knowledge or consent of SSA. He told John that he would use it only for testing and not for profit. However, the "testing" of the software generated profit for their business. John did not want to continue using the software without SSA consent. Victor believed the SSA would not grant permission and convinced John not to disclose their secret use of the software. Research business law in regard to software use using your textbook, the Argosy University online library resources, and the Internet. Based on the facts of the case and research, respond to the following questions: What white-collar crimes, if any, did Victor and John commit? Explain each individual's crime separately. What ethical leadership and management violation has Victor committed? Explain. What legal protection is available to John if he decides to inform the SSA about the software use? Explain.