SlideShare a Scribd company logo
Assignment 1: White-Collar Crime
Victor and John work as software installers and program
developers in the computer division of the Social Security
Administration (SSA). SSA purchased software which was
customarily installed by both Victor and John. SSA was
licensed to make copies of the software for use by their
employees during their employment, but not for resale to the
public or for profit.
Victor and John are also partners in a small computer business.
Victor started using some SSA software in his business, without
the knowledge or consent of SSA. He told John that he would
use it only for testing and not for profit. However, the "testing"
of the software generated profit for their business. John did not
want to continue using the software without SSA consent.
Victor believed the SSA would not grant permission and
convinced John not to disclose their secret use of the software.
Research business law in regard to software use using your
textbook, the Argosy University online library resources, and
the Internet. Based on the facts of the case and research,
respond to the following questions:
What white-collar crimes, if any, did Victor and John commit?
Explain each individual's crime separately.
What ethical leadership and management violation has Victor
committed? Explain.
What legal protection is available to John if he decides to
inform the SSA about the software use? Explain.

More Related Content

Similar to Assignment 1 White-Collar CrimeVictor and John work as software i.docx

Smartphones, the Internet, and rapid advancement of technology h
Smartphones, the Internet, and rapid advancement of technology hSmartphones, the Internet, and rapid advancement of technology h
Smartphones, the Internet, and rapid advancement of technology h
AlleneMcclendon878
 
the and rapid advancement of technology have come.docx
the and rapid advancement of technology have come.docxthe and rapid advancement of technology have come.docx
the and rapid advancement of technology have come.docx
write5
 
The following scenario is a discussion post. Therefore, I only need .docx
The following scenario is a discussion post. Therefore, I only need .docxThe following scenario is a discussion post. Therefore, I only need .docx
The following scenario is a discussion post. Therefore, I only need .docx
kailynochseu
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
Guneet Pahwa
 
Case Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queCase Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the que
ogglili
 
Case 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docx
Case 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docxCase 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docx
Case 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docx
jasoninnes20
 
1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdf1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdf
meejuhaszjasmynspe52
 
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfCase Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
accuraprintengineers
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
Tharaka Mahadewa
 
The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docx
joshua2345678
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
hyacinthshackley2629
 
On November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfOn November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdf
aabdin101
 

Similar to Assignment 1 White-Collar CrimeVictor and John work as software i.docx (20)

Smartphones, the Internet, and rapid advancement of technology h
Smartphones, the Internet, and rapid advancement of technology hSmartphones, the Internet, and rapid advancement of technology h
Smartphones, the Internet, and rapid advancement of technology h
 
the and rapid advancement of technology have come.docx
the and rapid advancement of technology have come.docxthe and rapid advancement of technology have come.docx
the and rapid advancement of technology have come.docx
 
The following scenario is a discussion post. Therefore, I only need .docx
The following scenario is a discussion post. Therefore, I only need .docxThe following scenario is a discussion post. Therefore, I only need .docx
The following scenario is a discussion post. Therefore, I only need .docx
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
 
Case Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queCase Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the que
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Case 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docx
Case 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docxCase 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docx
Case 14-2 You Are Not Hurt Good—You’re Fired!CEO Ashley Chen fo.docx
 
1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdf1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdf
 
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfCase Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
 
Android App Used by Hackers in Sex Extortion Campaigns
Android App Used by Hackers in Sex Extortion CampaignsAndroid App Used by Hackers in Sex Extortion Campaigns
Android App Used by Hackers in Sex Extortion Campaigns
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Deeply Inspired Designs Porfolio
Deeply Inspired Designs PorfolioDeeply Inspired Designs Porfolio
Deeply Inspired Designs Porfolio
 
Natalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digitalNatalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digital
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docx
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
On November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfOn November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdf
 

More from annrodgerson

Assignment 2 Exploring the Art of Indigenous Cultures Part 1All .docx
Assignment 2 Exploring the Art of Indigenous Cultures Part 1All .docxAssignment 2 Exploring the Art of Indigenous Cultures Part 1All .docx
Assignment 2 Exploring the Art of Indigenous Cultures Part 1All .docx
annrodgerson
 
Assignment 2 Ethical (Moral) RelativismIn America, many are comfo.docx
Assignment 2 Ethical (Moral) RelativismIn America, many are comfo.docxAssignment 2 Ethical (Moral) RelativismIn America, many are comfo.docx
Assignment 2 Ethical (Moral) RelativismIn America, many are comfo.docx
annrodgerson
 
Assignment 2 Discussion—Risk Factors and Protective FactorsResear.docx
Assignment 2 Discussion—Risk Factors and Protective FactorsResear.docxAssignment 2 Discussion—Risk Factors and Protective FactorsResear.docx
Assignment 2 Discussion—Risk Factors and Protective FactorsResear.docx
annrodgerson
 
Assignment 2 Discussion—The Impact of CommunicationRemember a tim.docx
Assignment 2 Discussion—The Impact of CommunicationRemember a tim.docxAssignment 2 Discussion—The Impact of CommunicationRemember a tim.docx
Assignment 2 Discussion—The Impact of CommunicationRemember a tim.docx
annrodgerson
 
Assignment 2 Directions Enter your Name Here =è XXXXXXXXXX.docx
Assignment 2 Directions Enter your Name Here =è XXXXXXXXXX.docxAssignment 2 Directions Enter your Name Here =è XXXXXXXXXX.docx
Assignment 2 Directions Enter your Name Here =è XXXXXXXXXX.docx
annrodgerson
 
Assignment 2 Demographic TransitionsDemographic transition is the.docx
Assignment 2 Demographic TransitionsDemographic transition is the.docxAssignment 2 Demographic TransitionsDemographic transition is the.docx
Assignment 2 Demographic TransitionsDemographic transition is the.docx
annrodgerson
 
Assignment 2 Current Events and U.S. DiplomacyThis paper will be .docx
Assignment 2 Current Events and U.S. DiplomacyThis paper will be .docxAssignment 2 Current Events and U.S. DiplomacyThis paper will be .docx
Assignment 2 Current Events and U.S. DiplomacyThis paper will be .docx
annrodgerson
 
Assignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docxAssignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docx
annrodgerson
 
Assignment 2 Court StandardsTasksExplore court standards, rule.docx
Assignment 2 Court StandardsTasksExplore court standards, rule.docxAssignment 2 Court StandardsTasksExplore court standards, rule.docx
Assignment 2 Court StandardsTasksExplore court standards, rule.docx
annrodgerson
 
Assignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docx
Assignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docxAssignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docx
Assignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docx
annrodgerson
 
Assignment 2 Construction Law PaperIn this assignment, you wi.docx
Assignment 2 Construction Law PaperIn this assignment, you wi.docxAssignment 2 Construction Law PaperIn this assignment, you wi.docx
Assignment 2 Construction Law PaperIn this assignment, you wi.docx
annrodgerson
 
Assignment 2 Community Prevention ProgramAfter hearing that a nei.docx
Assignment 2 Community Prevention ProgramAfter hearing that a nei.docxAssignment 2 Community Prevention ProgramAfter hearing that a nei.docx
Assignment 2 Community Prevention ProgramAfter hearing that a nei.docx
annrodgerson
 

More from annrodgerson (20)

Assignment 2 Explain the difference between the following 1. A .docx
Assignment 2 Explain the difference between the following 1. A .docxAssignment 2 Explain the difference between the following 1. A .docx
Assignment 2 Explain the difference between the following 1. A .docx
 
Assignment 2 Exploring the Art of Indigenous Cultures Part 1All .docx
Assignment 2 Exploring the Art of Indigenous Cultures Part 1All .docxAssignment 2 Exploring the Art of Indigenous Cultures Part 1All .docx
Assignment 2 Exploring the Art of Indigenous Cultures Part 1All .docx
 
Assignment 2 Ethical (Moral) RelativismIn America, many are comfo.docx
Assignment 2 Ethical (Moral) RelativismIn America, many are comfo.docxAssignment 2 Ethical (Moral) RelativismIn America, many are comfo.docx
Assignment 2 Ethical (Moral) RelativismIn America, many are comfo.docx
 
Assignment 2 Discussion—Risk Factors and Protective FactorsResear.docx
Assignment 2 Discussion—Risk Factors and Protective FactorsResear.docxAssignment 2 Discussion—Risk Factors and Protective FactorsResear.docx
Assignment 2 Discussion—Risk Factors and Protective FactorsResear.docx
 
Assignment 2 Discussion—The Impact of CommunicationRemember a tim.docx
Assignment 2 Discussion—The Impact of CommunicationRemember a tim.docxAssignment 2 Discussion—The Impact of CommunicationRemember a tim.docx
Assignment 2 Discussion—The Impact of CommunicationRemember a tim.docx
 
Assignment 2 Discussion—Migration and ImmigrationGlobalization .docx
Assignment 2 Discussion—Migration and ImmigrationGlobalization .docxAssignment 2 Discussion—Migration and ImmigrationGlobalization .docx
Assignment 2 Discussion—Migration and ImmigrationGlobalization .docx
 
Assignment 2 Discussion Research Questions for Correlational and.docx
Assignment 2 Discussion Research Questions for Correlational and.docxAssignment 2 Discussion Research Questions for Correlational and.docx
Assignment 2 Discussion Research Questions for Correlational and.docx
 
Assignment 2 Discussion QuestionCorporate leaders often encount.docx
Assignment 2 Discussion QuestionCorporate leaders often encount.docxAssignment 2 Discussion QuestionCorporate leaders often encount.docx
Assignment 2 Discussion QuestionCorporate leaders often encount.docx
 
Assignment 2 DiscussionDuring Module 5, we have studied socia.docx
Assignment 2 DiscussionDuring Module 5, we have studied socia.docxAssignment 2 DiscussionDuring Module 5, we have studied socia.docx
Assignment 2 DiscussionDuring Module 5, we have studied socia.docx
 
Assignment 2 Discussion Question Comparison of Theories on Anxie.docx
Assignment 2 Discussion Question Comparison of Theories on Anxie.docxAssignment 2 Discussion Question Comparison of Theories on Anxie.docx
Assignment 2 Discussion Question Comparison of Theories on Anxie.docx
 
Assignment 2 Discussion - Global ManagementThis assignment is d.docx
Assignment 2 Discussion - Global ManagementThis assignment is d.docxAssignment 2 Discussion - Global ManagementThis assignment is d.docx
Assignment 2 Discussion - Global ManagementThis assignment is d.docx
 
Assignment 2 Directions Enter your Name Here =è XXXXXXXXXX.docx
Assignment 2 Directions Enter your Name Here =è XXXXXXXXXX.docxAssignment 2 Directions Enter your Name Here =è XXXXXXXXXX.docx
Assignment 2 Directions Enter your Name Here =è XXXXXXXXXX.docx
 
Assignment 2 Demographic TransitionsDemographic transition is the.docx
Assignment 2 Demographic TransitionsDemographic transition is the.docxAssignment 2 Demographic TransitionsDemographic transition is the.docx
Assignment 2 Demographic TransitionsDemographic transition is the.docx
 
Assignment 2 Current Events and U.S. DiplomacyThis paper will be .docx
Assignment 2 Current Events and U.S. DiplomacyThis paper will be .docxAssignment 2 Current Events and U.S. DiplomacyThis paper will be .docx
Assignment 2 Current Events and U.S. DiplomacyThis paper will be .docx
 
Assignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docxAssignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docx
 
Assignment 2 Decision-making and Philosophy Part II Philosophy and.docx
Assignment 2 Decision-making and Philosophy Part II Philosophy and.docxAssignment 2 Decision-making and Philosophy Part II Philosophy and.docx
Assignment 2 Decision-making and Philosophy Part II Philosophy and.docx
 
Assignment 2 Court StandardsTasksExplore court standards, rule.docx
Assignment 2 Court StandardsTasksExplore court standards, rule.docxAssignment 2 Court StandardsTasksExplore court standards, rule.docx
Assignment 2 Court StandardsTasksExplore court standards, rule.docx
 
Assignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docx
Assignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docxAssignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docx
Assignment 2 Controversy Surrounding the Patriot ActThe USA Patri.docx
 
Assignment 2 Construction Law PaperIn this assignment, you wi.docx
Assignment 2 Construction Law PaperIn this assignment, you wi.docxAssignment 2 Construction Law PaperIn this assignment, you wi.docx
Assignment 2 Construction Law PaperIn this assignment, you wi.docx
 
Assignment 2 Community Prevention ProgramAfter hearing that a nei.docx
Assignment 2 Community Prevention ProgramAfter hearing that a nei.docxAssignment 2 Community Prevention ProgramAfter hearing that a nei.docx
Assignment 2 Community Prevention ProgramAfter hearing that a nei.docx
 

Recently uploaded

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
parmarsneha2
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 

Recently uploaded (20)

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 

Assignment 1 White-Collar CrimeVictor and John work as software i.docx

  • 1. Assignment 1: White-Collar Crime Victor and John work as software installers and program developers in the computer division of the Social Security Administration (SSA). SSA purchased software which was customarily installed by both Victor and John. SSA was licensed to make copies of the software for use by their employees during their employment, but not for resale to the public or for profit. Victor and John are also partners in a small computer business. Victor started using some SSA software in his business, without the knowledge or consent of SSA. He told John that he would use it only for testing and not for profit. However, the "testing" of the software generated profit for their business. John did not want to continue using the software without SSA consent. Victor believed the SSA would not grant permission and convinced John not to disclose their secret use of the software. Research business law in regard to software use using your textbook, the Argosy University online library resources, and the Internet. Based on the facts of the case and research, respond to the following questions: What white-collar crimes, if any, did Victor and John commit? Explain each individual's crime separately. What ethical leadership and management violation has Victor committed? Explain. What legal protection is available to John if he decides to inform the SSA about the software use? Explain.