SlideShare a Scribd company logo
Assignment 1: White-Collar Crime
Victor and John work as software installers and program
developers in the computer division of the Social Security
Administration (SSA). SSA purchased software which was
customarily installed by both Victor and John. SSA was
licensed to make copies of the software for use by their
employees during their employment, but not for resale to the
public or for profit.
Victor and John are also partners in a small computer business.
Victor started using some SSA software in his business, without
the knowledge or consent of SSA. He told John that he would
use it only for testing and not for profit. However, the "testing"
of the software generated profit for their business. John did not
want to continue using the software without SSA consent.
Victor believed the SSA would not grant permission and
convinced John not to disclose their secret use of the software.
Research business law in regard to software use using your
textbook, the Argosy University online library resources, and
the Internet. Based on the facts of the case and research,
respond to the following questions:
What white-collar crimes, if any, did Victor and John commit?
Explain each individual's crime separately.
What ethical leadership and management violation has Victor
committed? Explain.
What legal protection is available to John if he decides to
inform the SSA about the software use? Explain.
By
Saturday, December 12, 2015
, post your response to the appropriate
Discussion Area
. Through
Wednesday, December 16, 2015
, review and comment on at least two peers' responses.
Use the
Respond
link to post responses and

More Related Content

Similar to Assignment 1 White-Collar CrimeVictor and John work as software i.docx

Smartphones, the Internet, and rapid advancement of technology h
Smartphones, the Internet, and rapid advancement of technology hSmartphones, the Internet, and rapid advancement of technology h
Smartphones, the Internet, and rapid advancement of technology h
AlleneMcclendon878
 
the and rapid advancement of technology have come.docx
the and rapid advancement of technology have come.docxthe and rapid advancement of technology have come.docx
the and rapid advancement of technology have come.docx
write5
 
The following scenario is a discussion post. Therefore, I only need .docx
The following scenario is a discussion post. Therefore, I only need .docxThe following scenario is a discussion post. Therefore, I only need .docx
The following scenario is a discussion post. Therefore, I only need .docx
kailynochseu
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
Lookout
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone SecurityGuneet Pahwa
 
Case Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queCase Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the que
ogglili
 
Software piracy
Software piracySoftware piracy
Software piracy
Ti-Sun
 
Case 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docx
Case 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docxCase 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docx
Case 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docx
jasoninnes20
 
1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdf1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdf
meejuhaszjasmynspe52
 
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfCase Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
accuraprintengineers
 
Android App Used by Hackers in Sex Extortion Campaigns
Android App Used by Hackers in Sex Extortion CampaignsAndroid App Used by Hackers in Sex Extortion Campaigns
Android App Used by Hackers in Sex Extortion Campaigns
Waqas Amir
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Deeply Inspired Designs Porfolio
Deeply Inspired Designs PorfolioDeeply Inspired Designs Porfolio
Deeply Inspired Designs Porfolio
Natalie Acevedo
 
Natalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digitalNatalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digital
Natalie Acevedo
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
SSPTRGCELL
 
The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docx
joshua2345678
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
Kulani Mahadewa
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
Felipe Prado
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
hyacinthshackley2629
 
On November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfOn November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdf
aabdin101
 

Similar to Assignment 1 White-Collar CrimeVictor and John work as software i.docx (20)

Smartphones, the Internet, and rapid advancement of technology h
Smartphones, the Internet, and rapid advancement of technology hSmartphones, the Internet, and rapid advancement of technology h
Smartphones, the Internet, and rapid advancement of technology h
 
the and rapid advancement of technology have come.docx
the and rapid advancement of technology have come.docxthe and rapid advancement of technology have come.docx
the and rapid advancement of technology have come.docx
 
The following scenario is a discussion post. Therefore, I only need .docx
The following scenario is a discussion post. Therefore, I only need .docxThe following scenario is a discussion post. Therefore, I only need .docx
The following scenario is a discussion post. Therefore, I only need .docx
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
 
Case Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queCase Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the que
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Case 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docx
Case 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docxCase 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docx
Case 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docx
 
1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdf1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdf
 
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfCase Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
 
Android App Used by Hackers in Sex Extortion Campaigns
Android App Used by Hackers in Sex Extortion CampaignsAndroid App Used by Hackers in Sex Extortion Campaigns
Android App Used by Hackers in Sex Extortion Campaigns
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Deeply Inspired Designs Porfolio
Deeply Inspired Designs PorfolioDeeply Inspired Designs Porfolio
Deeply Inspired Designs Porfolio
 
Natalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digitalNatalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digital
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docx
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
On November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfOn November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdf
 

More from daniatrappit

Assignment 1 Victims’ Rights and the Dos and Don’ts of Interviewing.docx
Assignment 1 Victims’ Rights and the Dos and Don’ts of Interviewing.docxAssignment 1 Victims’ Rights and the Dos and Don’ts of Interviewing.docx
Assignment 1 Victims’ Rights and the Dos and Don’ts of Interviewing.docx
daniatrappit
 
Assignment 1 Trends in the WorkplaceDue Week 3 and worth 200 .docx
Assignment 1 Trends in the WorkplaceDue Week 3 and worth 200 .docxAssignment 1 Trends in the WorkplaceDue Week 3 and worth 200 .docx
Assignment 1 Trends in the WorkplaceDue Week 3 and worth 200 .docx
daniatrappit
 
Assignment 1 The Cold War and U.S. DiplomacyDue 11-02-15 and wort.docx
Assignment 1 The Cold War and U.S. DiplomacyDue 11-02-15 and wort.docxAssignment 1 The Cold War and U.S. DiplomacyDue 11-02-15 and wort.docx
Assignment 1 The Cold War and U.S. DiplomacyDue 11-02-15 and wort.docx
daniatrappit
 
Assignment 1 Socioeconomic StatusInterestingly, researchers have .docx
Assignment 1 Socioeconomic StatusInterestingly, researchers have .docxAssignment 1 Socioeconomic StatusInterestingly, researchers have .docx
Assignment 1 Socioeconomic StatusInterestingly, researchers have .docx
daniatrappit
 
Assignment 1 Trust and BoundariesIn this module, you learned ab.docx
Assignment 1 Trust and BoundariesIn this module, you learned ab.docxAssignment 1 Trust and BoundariesIn this module, you learned ab.docx
Assignment 1 Trust and BoundariesIn this module, you learned ab.docx
daniatrappit
 
Assignment 1 The Problems of Evil and SufferingAll human bein.docx
Assignment 1 The Problems of Evil and SufferingAll human bein.docxAssignment 1 The Problems of Evil and SufferingAll human bein.docx
Assignment 1 The Problems of Evil and SufferingAll human bein.docx
daniatrappit
 
Assignment 1 The Primary Care ClinicDue Week 4 and worth 160 poin.docx
Assignment 1 The Primary Care ClinicDue Week 4 and worth 160 poin.docxAssignment 1 The Primary Care ClinicDue Week 4 and worth 160 poin.docx
Assignment 1 The Primary Care ClinicDue Week 4 and worth 160 poin.docx
daniatrappit
 
Assignment 1 the sociological viewpoint toward social problems (Due.docx
Assignment 1 the sociological viewpoint toward social problems (Due.docxAssignment 1 the sociological viewpoint toward social problems (Due.docx
Assignment 1 the sociological viewpoint toward social problems (Due.docx
daniatrappit
 
Assignment 1 The Role of Weak Institutions in Underdevelopment .docx
Assignment 1 The Role of Weak Institutions in Underdevelopment .docxAssignment 1 The Role of Weak Institutions in Underdevelopment .docx
Assignment 1 The Role of Weak Institutions in Underdevelopment .docx
daniatrappit
 
Assignment 1 Special Interest GroupsGroups advancing specific.docx
Assignment 1 Special Interest GroupsGroups advancing specific.docxAssignment 1 Special Interest GroupsGroups advancing specific.docx
Assignment 1 Special Interest GroupsGroups advancing specific.docx
daniatrappit
 
Assignment 1 Should the U.S. Convert to a Zero Personal Income Ta.docx
Assignment 1 Should the U.S. Convert to a Zero Personal Income Ta.docxAssignment 1 Should the U.S. Convert to a Zero Personal Income Ta.docx
Assignment 1 Should the U.S. Convert to a Zero Personal Income Ta.docx
daniatrappit
 
Assignment 1 Resource and Competitive Position AnalysisUsing your.docx
Assignment 1 Resource and Competitive Position AnalysisUsing your.docxAssignment 1 Resource and Competitive Position AnalysisUsing your.docx
Assignment 1 Resource and Competitive Position AnalysisUsing your.docx
daniatrappit
 
Assignment 1 Research PaperDue Week 3 and worth 200 points.docx
Assignment 1 Research PaperDue Week 3 and worth 200 points.docxAssignment 1 Research PaperDue Week 3 and worth 200 points.docx
Assignment 1 Research PaperDue Week 3 and worth 200 points.docx
daniatrappit
 
Assignment 1 RaceAs you work in the human services delivery secto.docx
Assignment 1 RaceAs you work in the human services delivery secto.docxAssignment 1 RaceAs you work in the human services delivery secto.docx
Assignment 1 RaceAs you work in the human services delivery secto.docx
daniatrappit
 
Assignment 1 Political Belief Profile The relationship betwee.docx
Assignment 1 Political Belief Profile The relationship betwee.docxAssignment 1 Political Belief Profile The relationship betwee.docx
Assignment 1 Political Belief Profile The relationship betwee.docx
daniatrappit
 
Assignment 1 Procedural Law and the Bill of RightsDue Week 4 and .docx
Assignment 1 Procedural Law and the Bill of RightsDue Week 4 and .docxAssignment 1 Procedural Law and the Bill of RightsDue Week 4 and .docx
Assignment 1 Procedural Law and the Bill of RightsDue Week 4 and .docx
daniatrappit
 
Assignment 1 Objectives Log in to and out of a Linux system. U.docx
Assignment 1 Objectives Log in to and out of a Linux system. U.docxAssignment 1 Objectives Log in to and out of a Linux system. U.docx
Assignment 1 Objectives Log in to and out of a Linux system. U.docx
daniatrappit
 
Assignment 1 Linux GUIDue Week 2 and worth 90 pointsAs explaine.docx
Assignment 1 Linux GUIDue Week 2 and worth 90 pointsAs explaine.docxAssignment 1 Linux GUIDue Week 2 and worth 90 pointsAs explaine.docx
Assignment 1 Linux GUIDue Week 2 and worth 90 pointsAs explaine.docx
daniatrappit
 
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docxAssignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
daniatrappit
 
Assignment 1 LASA 2 Write Your Own BillScenarioYou are a.docx
Assignment 1 LASA 2 Write Your Own BillScenarioYou are a.docxAssignment 1 LASA 2 Write Your Own BillScenarioYou are a.docx
Assignment 1 LASA 2 Write Your Own BillScenarioYou are a.docx
daniatrappit
 

More from daniatrappit (20)

Assignment 1 Victims’ Rights and the Dos and Don’ts of Interviewing.docx
Assignment 1 Victims’ Rights and the Dos and Don’ts of Interviewing.docxAssignment 1 Victims’ Rights and the Dos and Don’ts of Interviewing.docx
Assignment 1 Victims’ Rights and the Dos and Don’ts of Interviewing.docx
 
Assignment 1 Trends in the WorkplaceDue Week 3 and worth 200 .docx
Assignment 1 Trends in the WorkplaceDue Week 3 and worth 200 .docxAssignment 1 Trends in the WorkplaceDue Week 3 and worth 200 .docx
Assignment 1 Trends in the WorkplaceDue Week 3 and worth 200 .docx
 
Assignment 1 The Cold War and U.S. DiplomacyDue 11-02-15 and wort.docx
Assignment 1 The Cold War and U.S. DiplomacyDue 11-02-15 and wort.docxAssignment 1 The Cold War and U.S. DiplomacyDue 11-02-15 and wort.docx
Assignment 1 The Cold War and U.S. DiplomacyDue 11-02-15 and wort.docx
 
Assignment 1 Socioeconomic StatusInterestingly, researchers have .docx
Assignment 1 Socioeconomic StatusInterestingly, researchers have .docxAssignment 1 Socioeconomic StatusInterestingly, researchers have .docx
Assignment 1 Socioeconomic StatusInterestingly, researchers have .docx
 
Assignment 1 Trust and BoundariesIn this module, you learned ab.docx
Assignment 1 Trust and BoundariesIn this module, you learned ab.docxAssignment 1 Trust and BoundariesIn this module, you learned ab.docx
Assignment 1 Trust and BoundariesIn this module, you learned ab.docx
 
Assignment 1 The Problems of Evil and SufferingAll human bein.docx
Assignment 1 The Problems of Evil and SufferingAll human bein.docxAssignment 1 The Problems of Evil and SufferingAll human bein.docx
Assignment 1 The Problems of Evil and SufferingAll human bein.docx
 
Assignment 1 The Primary Care ClinicDue Week 4 and worth 160 poin.docx
Assignment 1 The Primary Care ClinicDue Week 4 and worth 160 poin.docxAssignment 1 The Primary Care ClinicDue Week 4 and worth 160 poin.docx
Assignment 1 The Primary Care ClinicDue Week 4 and worth 160 poin.docx
 
Assignment 1 the sociological viewpoint toward social problems (Due.docx
Assignment 1 the sociological viewpoint toward social problems (Due.docxAssignment 1 the sociological viewpoint toward social problems (Due.docx
Assignment 1 the sociological viewpoint toward social problems (Due.docx
 
Assignment 1 The Role of Weak Institutions in Underdevelopment .docx
Assignment 1 The Role of Weak Institutions in Underdevelopment .docxAssignment 1 The Role of Weak Institutions in Underdevelopment .docx
Assignment 1 The Role of Weak Institutions in Underdevelopment .docx
 
Assignment 1 Special Interest GroupsGroups advancing specific.docx
Assignment 1 Special Interest GroupsGroups advancing specific.docxAssignment 1 Special Interest GroupsGroups advancing specific.docx
Assignment 1 Special Interest GroupsGroups advancing specific.docx
 
Assignment 1 Should the U.S. Convert to a Zero Personal Income Ta.docx
Assignment 1 Should the U.S. Convert to a Zero Personal Income Ta.docxAssignment 1 Should the U.S. Convert to a Zero Personal Income Ta.docx
Assignment 1 Should the U.S. Convert to a Zero Personal Income Ta.docx
 
Assignment 1 Resource and Competitive Position AnalysisUsing your.docx
Assignment 1 Resource and Competitive Position AnalysisUsing your.docxAssignment 1 Resource and Competitive Position AnalysisUsing your.docx
Assignment 1 Resource and Competitive Position AnalysisUsing your.docx
 
Assignment 1 Research PaperDue Week 3 and worth 200 points.docx
Assignment 1 Research PaperDue Week 3 and worth 200 points.docxAssignment 1 Research PaperDue Week 3 and worth 200 points.docx
Assignment 1 Research PaperDue Week 3 and worth 200 points.docx
 
Assignment 1 RaceAs you work in the human services delivery secto.docx
Assignment 1 RaceAs you work in the human services delivery secto.docxAssignment 1 RaceAs you work in the human services delivery secto.docx
Assignment 1 RaceAs you work in the human services delivery secto.docx
 
Assignment 1 Political Belief Profile The relationship betwee.docx
Assignment 1 Political Belief Profile The relationship betwee.docxAssignment 1 Political Belief Profile The relationship betwee.docx
Assignment 1 Political Belief Profile The relationship betwee.docx
 
Assignment 1 Procedural Law and the Bill of RightsDue Week 4 and .docx
Assignment 1 Procedural Law and the Bill of RightsDue Week 4 and .docxAssignment 1 Procedural Law and the Bill of RightsDue Week 4 and .docx
Assignment 1 Procedural Law and the Bill of RightsDue Week 4 and .docx
 
Assignment 1 Objectives Log in to and out of a Linux system. U.docx
Assignment 1 Objectives Log in to and out of a Linux system. U.docxAssignment 1 Objectives Log in to and out of a Linux system. U.docx
Assignment 1 Objectives Log in to and out of a Linux system. U.docx
 
Assignment 1 Linux GUIDue Week 2 and worth 90 pointsAs explaine.docx
Assignment 1 Linux GUIDue Week 2 and worth 90 pointsAs explaine.docxAssignment 1 Linux GUIDue Week 2 and worth 90 pointsAs explaine.docx
Assignment 1 Linux GUIDue Week 2 and worth 90 pointsAs explaine.docx
 
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docxAssignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
 
Assignment 1 LASA 2 Write Your Own BillScenarioYou are a.docx
Assignment 1 LASA 2 Write Your Own BillScenarioYou are a.docxAssignment 1 LASA 2 Write Your Own BillScenarioYou are a.docx
Assignment 1 LASA 2 Write Your Own BillScenarioYou are a.docx
 

Recently uploaded

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

Assignment 1 White-Collar CrimeVictor and John work as software i.docx

  • 1. Assignment 1: White-Collar Crime Victor and John work as software installers and program developers in the computer division of the Social Security Administration (SSA). SSA purchased software which was customarily installed by both Victor and John. SSA was licensed to make copies of the software for use by their employees during their employment, but not for resale to the public or for profit. Victor and John are also partners in a small computer business. Victor started using some SSA software in his business, without the knowledge or consent of SSA. He told John that he would use it only for testing and not for profit. However, the "testing" of the software generated profit for their business. John did not want to continue using the software without SSA consent. Victor believed the SSA would not grant permission and convinced John not to disclose their secret use of the software. Research business law in regard to software use using your textbook, the Argosy University online library resources, and the Internet. Based on the facts of the case and research, respond to the following questions: What white-collar crimes, if any, did Victor and John commit? Explain each individual's crime separately. What ethical leadership and management violation has Victor committed? Explain. What legal protection is available to John if he decides to inform the SSA about the software use? Explain. By Saturday, December 12, 2015 , post your response to the appropriate Discussion Area . Through Wednesday, December 16, 2015 , review and comment on at least two peers' responses.
  • 2. Use the Respond link to post responses and