Running Head: Employee Use Of Internet At Work: Policy Proposals
1
Employee Use Of Internet At Work: Policy Proposals
10
INTRODUCTION
This paper talks more about the policy proposals about the use of internet at work. It surveys the possible torts that employees who use the internet could commit. It looks at the possible crimes that could be perpetrated by employees who use the internet at work. These crimes will be indicated as to whether they are white collar or blue collar. The liability of the corporation versus the responsibility of the individual employee through the commission of torts or crimes using the internet at work will be analyzed. Further analysis of whether violations of the duty of care or duty of loyalty could exist through the use of social media sites at work will be given. It explores the employee privacy rights that exist regarding the use of internet at work. The employment laws that protect the employee or employer on the utilization of the web at work will be discussed.
The possible torts that can be committed by employees through the utilization of the web include obstruction of justice. This happens where the government is investigating as an aspect of the company’s operations and staff decides out of motives of loyalty or self-preservation to cover things up. They can cover things up through hiding or destroying documents. This can amount to obstruction of justice and can multiply the consequences to the company of the original misconduct. Many materials are held electronically, and any obstacle will likely use the company’s technology.
Another tort that can be committed by employees is copyright violations. This happens when employees create and distribute multiple copies of protected material more than fair use using employer’s technology. This can lead to suits by the owner of the copyrighted material. Sabotage is another tort that can be committed by employees. This is mostly done by a disgruntled employee or former employees with technical expertise to create disruption which could last for some time and cause economic losses. Sabotage can happen through stealing information or maliciously publicizing it or deleting or overwriting company files. Another way of sabotage by deletion could be saving deliberately of documents that intend to be destroyed under a document retention program whether maliciously or otherwise.
Fraud is another common tort that may be committed by employees. Through the use of technology, employees can penetrate company operations and commit offenses like embezzlement, defrauding the company and corruption of business records. Misconduct due to fraud can be prematurely recognizing revenue, overvaluing goodwill, managing earnings and other accounting malpractices, self-dealing by the management and giving and accepting kickbacks for orders.
A significant tort that may be committed by employees is the misappropriation of trade secrets. This is possible because they a ...
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docxjeanettehully
Running head: EMPLOYEE WORKPLACE PRIVACY 1
Employee Privacy in the Workplace
gggggggggggggggggg
Florida State College at Jacksonville
EMPLOYEE WORKPLACE PRIVACY 2
When you go to work and walk through the doors of your employer, they can monitor
your activities without your knowledge. There are laws for federal jobs regarding employee
privacy in the workplace. However, there are no regulations that pertain to the private sector.
Frederick S. Lane (2003) revealed:
“In Schowengerdt v. General Dynamics Corp. … the privacy rights of an
employee at a secret weapons facility were not violated when the employer
searched his office, desk, and credenza. Specifically, the court found that the
employer had clearly warned employees that due to the sensitive nature of the
work being done at the facility, both scheduled and random searches would be
conducted. As a result, the Ninth Circuit said the employee had no reasonable
expectation of privacy” [emphasis added] (chap 10).
Some employees think it is a violation of their rights for employers to monitor their
activities while at work. DesJardins & Hartman (2011) noted the USA Patriot Act expanded
employer’s right to monitor employees at work. Employees do not fully understand their rights
to privacy at work, or the Fourth Amendment which prohibits unreasonable search and seizure.
Privacy can be defined as a human right not to violate someone’s personal space, or it can be
characterized as keeping personal information to oneself (DesJardins & Hartman, 2011).
When you are hired at an organization, human resources require personal information to
be documented. According to Lane (2003), Health Insurance Portability and Accountability Act
(HIPPA) require these records to be safeguarded by human resources because they may contain
sensitive medical information. This information may list medical conditions, medications taken,
drug test results, beneficiaries, and the next of kin. In addition, human resources will provide
newly hired workers with an employee handbook. Reading the employee handbook is essential
EMPLOYEE WORKPLACE PRIVACY 3
because it outlines company policies and goals, what is expected of the employee, and how to
handle certain situations. The employee’s handbook implemented by human resources should be
aligned with an organization’s objectives (Gerhart, Hollenbeck, Noe, & Wright, 2014). Along
with the employee handbook, human resources may present new hires with a monitoring and
surveillance disclaimer. This disclaimer allows the employer to monitoring employee activities at
work. Sometimes the issue of employee privacy begins years later when an employee becomes
absentminded about the disclaimer. The employee may get complacent, forget the disclaimer,
and begin to use the employer’s technology for personal reasons.
Today’s employers cannot be competitive in any industry without the use of techno ...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward F. T. Charfauros
Edward F. T. Charfauros, inspiring author, assists fellow students with their presentation for a successful grade. He also blogs upon his own inspiring blog, where you'll discover life changing stuff. Sign up for his blog by sending him an email~
Copyright 2013 Edward F. T. Charfauros. Reference, www.YourBlogorResume.net.
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docxjeanettehully
Running head: EMPLOYEE WORKPLACE PRIVACY 1
Employee Privacy in the Workplace
gggggggggggggggggg
Florida State College at Jacksonville
EMPLOYEE WORKPLACE PRIVACY 2
When you go to work and walk through the doors of your employer, they can monitor
your activities without your knowledge. There are laws for federal jobs regarding employee
privacy in the workplace. However, there are no regulations that pertain to the private sector.
Frederick S. Lane (2003) revealed:
“In Schowengerdt v. General Dynamics Corp. … the privacy rights of an
employee at a secret weapons facility were not violated when the employer
searched his office, desk, and credenza. Specifically, the court found that the
employer had clearly warned employees that due to the sensitive nature of the
work being done at the facility, both scheduled and random searches would be
conducted. As a result, the Ninth Circuit said the employee had no reasonable
expectation of privacy” [emphasis added] (chap 10).
Some employees think it is a violation of their rights for employers to monitor their
activities while at work. DesJardins & Hartman (2011) noted the USA Patriot Act expanded
employer’s right to monitor employees at work. Employees do not fully understand their rights
to privacy at work, or the Fourth Amendment which prohibits unreasonable search and seizure.
Privacy can be defined as a human right not to violate someone’s personal space, or it can be
characterized as keeping personal information to oneself (DesJardins & Hartman, 2011).
When you are hired at an organization, human resources require personal information to
be documented. According to Lane (2003), Health Insurance Portability and Accountability Act
(HIPPA) require these records to be safeguarded by human resources because they may contain
sensitive medical information. This information may list medical conditions, medications taken,
drug test results, beneficiaries, and the next of kin. In addition, human resources will provide
newly hired workers with an employee handbook. Reading the employee handbook is essential
EMPLOYEE WORKPLACE PRIVACY 3
because it outlines company policies and goals, what is expected of the employee, and how to
handle certain situations. The employee’s handbook implemented by human resources should be
aligned with an organization’s objectives (Gerhart, Hollenbeck, Noe, & Wright, 2014). Along
with the employee handbook, human resources may present new hires with a monitoring and
surveillance disclaimer. This disclaimer allows the employer to monitoring employee activities at
work. Sometimes the issue of employee privacy begins years later when an employee becomes
absentminded about the disclaimer. The employee may get complacent, forget the disclaimer,
and begin to use the employer’s technology for personal reasons.
Today’s employers cannot be competitive in any industry without the use of techno ...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward F. T. Charfauros
Edward F. T. Charfauros, inspiring author, assists fellow students with their presentation for a successful grade. He also blogs upon his own inspiring blog, where you'll discover life changing stuff. Sign up for his blog by sending him an email~
Copyright 2013 Edward F. T. Charfauros. Reference, www.YourBlogorResume.net.
Managing Social Media Risks for Municipalities (and More)Dan Michaluk
This is a 45 minute presentation I gave at a government liability conference when asked to deal with social media risk management and data breach management.
Dmytro talked on an OSAC quarterly meeting and explained legal background for monitoring of employees correspondence, phone calls, spy after employees. He compared Ukrainian legislation and rare Ukrainian enforcement experience with US laws and court practice.
Social media & data protection policy v1.0 141112 Dave Shannon
Presentation presented to employees in a previous role. Unfortunately corporate identity has had to be removed, however content is still relevant to policies and legislation
Briefly describe the research design
Who the target population
Was the sampling method and the sample size appropriate? Why?
Any selection bias in sampling and representativeness?
Does the article you selected have a model specification? If yes, is the specified model congruent with the conceptual framework? If no, what went wrong?
What method of data analysis did the author(s) use? Is it appropriate
As an employer, you have more authority to monitor employee communications than you might think. It depends in large measure on the level of privacy you have led employees to expect, whether explicitly or implicitly. Managing those expectations is the key to maintaining your rights. For more information, please visit http://www.hrp.net/2017/06/can-you-monitor-your-employees-communications/
Social Media in the Workplace
Linky Trott
Abstract
There is no doubt that most businesses use social media and collaboration tools
such as social business software of some kind or another and embrace the
benefits that these can bring. In a 2009 a global Manpower survey, businesses
identified the main benefits of using social media as; brand building, fostering
collaboration and communication, as way of recruiting new talent, improving
employee engagement and driving innovation.
But there are also risks. This article examines the main legal risks that can arise
in the workplace as between a business and its workforce and considers how
the Courts and Tribunals are responding to social media issues arising in the
workplace.
Introduction
If a business has a concern about the use of social media, a blanket ban is
clearly an option. Whilst that may feel like the most simple approach, it is
unlikely to be practical. Even as far back as 2009, the Manpower survey
observed that “the younger generation consider social media tools as a
Biography
Linky Trott is a Partner at law firm, Edwin Coe. She provides day to day advice on a
comprehensive range of employment issues for established corporate clients including
the negotiation and provision of strategic advice on severance arrangements, bullying
and harassment claims, the management of ill health and capability dismissals, dealing
with allegations of discrimination, collective redundancies and Board disputes.
Linky also undertakes High Court injunctive work to enforce or resist post termination
restraints and the protection of confidential information. Working with Senior
Executives and Board Directors, Linky regularly advises and helps to negotiate terms
of Executive service agreements to include bonus schemes, guaranteed payments and
share options in regulated and non regulated industries. She has provided strategic
advice on a number of successful team moves within the communications and financial
sector acting for both the poaching competitor and the individuals being approached.
Linky also advises on data protection, commercial agents and the Conduct of
Employment Businesses and Employment Agency issues.
Linky sits on the Employment Committee of the Law Society and is Chair on the In and
Around Covent Garden Business Forum. She is also a member of the Employment
Lawyers Association, and has appeared on ITV and Channel 4 commenting on
Employment Law issues arising in the news and is a regular speaker at conferences on
employment issues.
Linky Trott
Partner
Edwin Coe
Keywords Risk, Rewards, Safeguards, Recruitment, Human Rights Act 1998
Paper type Opinion
23 Credit Control
Legal Aspects
prerequisite for doing business” and with generation Y having been in the
workplace for around ten years, it is unlikely that staff will tolerate a blanket ban.
Time wasters
Employers can of course monitor an employe.
SPT 208 Final Project Guidelines and Rubric Overview .docxsusanschei
SPT 208 Final Project Guidelines and Rubric
Overview
Marketing and advertising are often used interchangeably, yet throughout this course you have learned that marketing is a much larger concept that requires a
strong understanding of consumer behavior, products and services, and often the greater economic environment. Marketing is applicable to every industry and
discipline in one way or another, but within the sport industry we have the chance to see the application of marketing concepts as if under a spotlight due to the
industry’s global reach and importance to society.
Your final project is the creation of an Opportunity and Consumer Analysis. You will select a sport team, individual, facility, or organization as the focus of your
consumer and opportunity analysis. When selecting your area of focus, think about your interests and career aspirations. As you progress through the course,
you will have the opportunity to practice the skills required for this project in several milestone activities. Your final deliverable will include a strengths,
weaknesses, opportunities, and threats (SWOT) analysis of your selected focus; a consumer analysis; an analysis of successful marketing and media strategies;
and a brief 1-, 3-, and 5-year plan that allows you to explain your intended use of a proven marketing strategy and various media opportunities. Please note that
your Opportunity and Consumer Analysis will be an eligible artifact to include in your program portfolio, as it will highlight your ability to recognize consumer
characteristics and opportunities for brand improvement.
The project is divided into two milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Modules Three and Five. The final Opportunity and Consumer Analysis will be submitted in Module Seven.
This assessment addresses the following course outcomes:
• Analyze consumer behaviors for the influence of political, cultural, and social events on consumer motivation at the local, national, or international
levels within the sport industry
• Illustrate the application of key marketing strategies in successful sport-specific marketing campaigns
• Identify proven marketing strategies that can be successfully applied to specific sport marketing scenarios to attract consumers
• Compare media opportunities for successfully communicating and marketing towards specific consumers within the sport industry
Prompt
Develop a comprehensive Opportunity and Consumer Analysis. Select a sport team, individual, facility, or organization and provide a thorough analysis of the
existing marketing strategies and consumers, and determine an opportunity for greater consumer reach. Outline a brief 1-, 3-, and 5-year plan for the marketing
opportunity.
Specifically, the following critical elements must be addressed:
I. Marketing Foc.
More Related Content
Similar to Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Managing Social Media Risks for Municipalities (and More)Dan Michaluk
This is a 45 minute presentation I gave at a government liability conference when asked to deal with social media risk management and data breach management.
Dmytro talked on an OSAC quarterly meeting and explained legal background for monitoring of employees correspondence, phone calls, spy after employees. He compared Ukrainian legislation and rare Ukrainian enforcement experience with US laws and court practice.
Social media & data protection policy v1.0 141112 Dave Shannon
Presentation presented to employees in a previous role. Unfortunately corporate identity has had to be removed, however content is still relevant to policies and legislation
Briefly describe the research design
Who the target population
Was the sampling method and the sample size appropriate? Why?
Any selection bias in sampling and representativeness?
Does the article you selected have a model specification? If yes, is the specified model congruent with the conceptual framework? If no, what went wrong?
What method of data analysis did the author(s) use? Is it appropriate
As an employer, you have more authority to monitor employee communications than you might think. It depends in large measure on the level of privacy you have led employees to expect, whether explicitly or implicitly. Managing those expectations is the key to maintaining your rights. For more information, please visit http://www.hrp.net/2017/06/can-you-monitor-your-employees-communications/
Social Media in the Workplace
Linky Trott
Abstract
There is no doubt that most businesses use social media and collaboration tools
such as social business software of some kind or another and embrace the
benefits that these can bring. In a 2009 a global Manpower survey, businesses
identified the main benefits of using social media as; brand building, fostering
collaboration and communication, as way of recruiting new talent, improving
employee engagement and driving innovation.
But there are also risks. This article examines the main legal risks that can arise
in the workplace as between a business and its workforce and considers how
the Courts and Tribunals are responding to social media issues arising in the
workplace.
Introduction
If a business has a concern about the use of social media, a blanket ban is
clearly an option. Whilst that may feel like the most simple approach, it is
unlikely to be practical. Even as far back as 2009, the Manpower survey
observed that “the younger generation consider social media tools as a
Biography
Linky Trott is a Partner at law firm, Edwin Coe. She provides day to day advice on a
comprehensive range of employment issues for established corporate clients including
the negotiation and provision of strategic advice on severance arrangements, bullying
and harassment claims, the management of ill health and capability dismissals, dealing
with allegations of discrimination, collective redundancies and Board disputes.
Linky also undertakes High Court injunctive work to enforce or resist post termination
restraints and the protection of confidential information. Working with Senior
Executives and Board Directors, Linky regularly advises and helps to negotiate terms
of Executive service agreements to include bonus schemes, guaranteed payments and
share options in regulated and non regulated industries. She has provided strategic
advice on a number of successful team moves within the communications and financial
sector acting for both the poaching competitor and the individuals being approached.
Linky also advises on data protection, commercial agents and the Conduct of
Employment Businesses and Employment Agency issues.
Linky sits on the Employment Committee of the Law Society and is Chair on the In and
Around Covent Garden Business Forum. She is also a member of the Employment
Lawyers Association, and has appeared on ITV and Channel 4 commenting on
Employment Law issues arising in the news and is a regular speaker at conferences on
employment issues.
Linky Trott
Partner
Edwin Coe
Keywords Risk, Rewards, Safeguards, Recruitment, Human Rights Act 1998
Paper type Opinion
23 Credit Control
Legal Aspects
prerequisite for doing business” and with generation Y having been in the
workplace for around ten years, it is unlikely that staff will tolerate a blanket ban.
Time wasters
Employers can of course monitor an employe.
Similar to Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx (20)
SPT 208 Final Project Guidelines and Rubric Overview .docxsusanschei
SPT 208 Final Project Guidelines and Rubric
Overview
Marketing and advertising are often used interchangeably, yet throughout this course you have learned that marketing is a much larger concept that requires a
strong understanding of consumer behavior, products and services, and often the greater economic environment. Marketing is applicable to every industry and
discipline in one way or another, but within the sport industry we have the chance to see the application of marketing concepts as if under a spotlight due to the
industry’s global reach and importance to society.
Your final project is the creation of an Opportunity and Consumer Analysis. You will select a sport team, individual, facility, or organization as the focus of your
consumer and opportunity analysis. When selecting your area of focus, think about your interests and career aspirations. As you progress through the course,
you will have the opportunity to practice the skills required for this project in several milestone activities. Your final deliverable will include a strengths,
weaknesses, opportunities, and threats (SWOT) analysis of your selected focus; a consumer analysis; an analysis of successful marketing and media strategies;
and a brief 1-, 3-, and 5-year plan that allows you to explain your intended use of a proven marketing strategy and various media opportunities. Please note that
your Opportunity and Consumer Analysis will be an eligible artifact to include in your program portfolio, as it will highlight your ability to recognize consumer
characteristics and opportunities for brand improvement.
The project is divided into two milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Modules Three and Five. The final Opportunity and Consumer Analysis will be submitted in Module Seven.
This assessment addresses the following course outcomes:
• Analyze consumer behaviors for the influence of political, cultural, and social events on consumer motivation at the local, national, or international
levels within the sport industry
• Illustrate the application of key marketing strategies in successful sport-specific marketing campaigns
• Identify proven marketing strategies that can be successfully applied to specific sport marketing scenarios to attract consumers
• Compare media opportunities for successfully communicating and marketing towards specific consumers within the sport industry
Prompt
Develop a comprehensive Opportunity and Consumer Analysis. Select a sport team, individual, facility, or organization and provide a thorough analysis of the
existing marketing strategies and consumers, and determine an opportunity for greater consumer reach. Outline a brief 1-, 3-, and 5-year plan for the marketing
opportunity.
Specifically, the following critical elements must be addressed:
I. Marketing Foc.
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docx
Running head: CODE OF ETHICS 1
CODE OF ETHICS 4
Three Mountains Regional Hospital Code of Ethics
Sharlene Salinas
Professor Bradshaw
HSA4210
July 31, 2019
Three Mountains Regional Hospital Code of Ethics
Progressive developments in science and technology in the 20th century contributed to advances in healthcare and medicine that have helped many lives. Healthcare professionals are confronted with ethical dilemmas and moral questions as the context in which healthcare is provided keeps on changing. Healthcare specialists are required to be dedicated to excellence within their professional practice of promoting community, organizational, family, and individual health. Healthcare code of ethics provides a platform for shared professional values (Wocial & Tarzian, 2015). It is the responsibility of healthcare specialists to reach the best possible standards of conduct and to encourage these ethical practices to those with whom they work together. Healthcare professionals are facing challenges as the context in which healthcare is provided keeps on changing.
The Three Mountains Regional Hospital code of ethics will clarify the roles and responsibilities within the healthcare profession. The code of ethics will also guide the healthcare professionals on addressing common ethical questions. With 15,000 admissions annually, the Three Mountains Regional Hospital requires a code of ethics that will guide the healthcare professionals in the hospital in dealing with such a capacity. Healthcare professionals from the hospital will be defined by their purpose but not their job description (Turner & Epstein, 2015). The proposed code of ethics will inform individual decision-making when faced with ethical situations within a given relationship or role at the Three Mountains Regional Hospital.
Ethics are an essential part of healthcare, and they should provide value in practical situations. The proposed code of ethics will provide a structure and shape to the Three Mountains Regional Hospital’s environment and summarize the healthcare organization’s ethical position. The code of ethics will describe the ethical attitude shared by healthcare workers at Three Mountains Regional Hospital, and it will be valuable and influential on the success of the healthcare organization. The mission of the code of ethics is to guide the hospital is leading the way to a healthier community through the provision of quality care.
Code of Ethics
· Uphold the policies of the Three Mountains Regional Hospital (Merry & Walton, 2017).
· Protect the intellectual, physical, and electronic property of the hospital (Hoppe & Lenk, 2016).
· Promote a healthy, secure, and safe working environment (Merry & Walton, 2017).
· Act responsibly and honestly by avoiding perceived or actual conflicts of interest (Merry & Walton, 2017).
· Protect and respect the privacy and confidentiality of all individuals and informat.
Spring 2020Professor Tim SmithE mail [email protected]Teach.docxsusanschei
Spring 2020
Professor: Tim Smith E mail: [email protected]
Teaching Assistant: Ray Kim E mail [email protected]
Office hours: PLF South 113 TBA
EVOLUTION OF ROCK
MCY 127
Course Description:
This general education course is a study of the birth and evolution of the music form of Rock and Roll. It is a study of both the historical and musical elements of rock with a focus on the performers and the songs in the genre. Some of the objectives for this course include:
Increasing awareness of the wide range of musical styles that “add up” to form rock
Provide insight on the cultural evolution of rock and how it applies to society
Study how technological advances have influenced both the performers and composers in rock
Prerequsites:
None
Required text:
None
Required listening: Spotify playlist MCY127TS
Course Requirements and Grading:
Test 1 20%
Midterm exam 25%
Test 3 20%
Final exam 25%
Essay on live musical performance 10%
Essay assignment will consist of attending a live musical performance at the Frost School of Music (or approved off campus performance). At the conclusion of the performance, you will obtain signatures of two or more participants. You will compose an essay that will summarize the performance (ensemble, repertoire, etc.). You will compare and/or contrast the performance with details we have studied in class. The essay should be two to three pages long, computer printed, double spaced, and stapled. It will be due on Thursday, November 19.
Conduct and rules:
Rock and roll is a joyous art form. I intend for the class to be a fun and learning environment. I hope to engage you as adults, not as adolescents. However, inappropriate language or behavior to one another will not be tolerated, and will result in the student facing disciplinary action and potential removal from the class. You are adults. I am not your baby-sitter. If you fail to attend class regularly, you will find it much more difficult to excel in the course. SHOW UP AND PAY ATTENTION! It will make your life easier in the long run. Plagiarism on your essay will not be acceptable, and will result in the loss of 10% of your final grade. Cheating is rampant. While I will make every effort to curb the options students might have to copy one another on tests, I can’t stop it completely. I will have assistance from the Honor Council on test days, and cheating will result in a zero on that test. None of you can afford this. I truly believe that if you will engage the material, come to the lectures, and actively listen to the required listening material, you will not find a need to cheat.
If you are feeling overwhelmed by any of the material, please make an appointment to meet with me during office hours.
Lectures and listening:
Each class will consist of a lecture and a period of listening to music appropriate to that lecture. The music played in class will be made available to you through Blackboard in addition. You will be responsible for the material presented.
Spring 2020 – Business Continuity & Disaster R.docxsusanschei
Spring 2020 – Business Continuity & Disaster Recovery Planning (ISOL-632-50)
Incident Management
S no
Disaster Type
Plans & Precautions
Initial Action
Stabilization Strategy
1
Thunderstorm
2
Floods
3
Tornadoes
4
Severe weather such as blizzard
5
Hurricanes
6
Explosion such as bomb threats
.
Spring 2020Carlow University Department of Psychology & Co.docxsusanschei
Spring 2020
Carlow University
Department of Psychology & Counseling
Professional Counseling Program
LGBT Lives Cultures & Theories
PRC-742-G1, PY-235-DA, WS-237-DA
3 Credits; No Prerequisites
Course Syllabus- Spring 2020
Wednesday’s 6:00pm-8:30pm
Instructor: Michelle Colarusso, Ph.D., LPC, NCC Office: TBD
Cell phone: 724-396-9769 E-mail: [email protected]
Office hours: By appointment only Location: Antonian Hall 403
Carlow's Mission Statement
The mission of Carlow University, a Catholic liberal arts university, is to involve persons, primarily women, in a process of self-directed, lifelong learning which will free them to think clearly and creatively, to discover and to challenge or affirm cultural and aesthetic values, to respond reverently and sensitively to God and others, and to render competent and compassionate service in personal and professional life.
Course Description
This course will address issues related to counseling gay, lesbian, bisexual and transgender clients. These include issues of sexual identity development, coming out, homophobia and heterosexism, family and relationship issues, multicultural issues, youth, aging, spirituality, HIV/AIDS, and substance abuse as well as ethical and professional issues in working with gay, lesbian, bisexual and transgender clients through affirmative counseling/therapy.
Learning Outcomes and Assessment
What students will learn
How students will learn it
How students will demonstrate learning
Impact dominant culture has on LGBT individuals
Readings, Experiential Activities, Class Discussions
Class Participation, Reflection Journals, Exam
Multifaceted issues facing specific LGBT populations
Readings, Experiential Activities, Class Discussions
Class Participation, Reflection Journals, Exam
Familiarize themselves with theories of identity development
Readings, Experiential Activities, Class Discussions
Class Participation, Reflection Journals, Exam
Affirmative counseling/therapy and their knowledge and skill in providing it.
Readings, Experiential Activities, Class Discussions
Class Participation, Reflection Journals, Exam
Variety of counseling issues that have particular relevance to LGBT clients.
Readings, Experiential Activities, Class Discussions
Class Participation, Reflection Journals, Exam
Access to local and national resources available to assist in work with LGBT clients.
Readings, Experiential Activities, Class Discussions
Class Participation, Reflection Journals, Exam
Course Requirements and Resources
Methods of Involvement & Examination
Methods of Instruction
Classes will consist of didactic and experiential elements, including lectures, large and small group discussions, modeling, structured role-plays and simulations, live or video demonstrations, and student presentations in class and on CelticOnline/Schoolology. Primary methods include lecture/discussion, readings, and a variety of experiential exercises. Students will immurse themselves into the LGBTQ Cul.
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docxsusanschei
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMES
Spotlight ARTWORK Tara DonovanUntitled, 2008, polyester film
HBR.ORG
What Is
the Theory
f ̂ Fiof
y
Firm?
Focus less on competitive advantage and more on growth
that creates value, by Todd Zenger
f asked to define strategy, most execu-
tives would probably come up with
something like this: Strategy involves
discovering and targeting attractive
markets and then crafting positions that
deliver sustained competitive advan-
tage in them. Companies achieve these
positions by configuring and arranging
resources and activities to provide either
unique value to customers or common
value at a uniquely low cost. This view of strategy as
position remains central in business school curricula
around the globe: Valuable positions, protected from
imitation and appropriation, provide sustained profit
streams.
Unfortunately, investors don't reward senior
managers for simply occupying and defending po-
sitions. Equity markets are full of companies with
powerful positions and sluggish stock prices. The
retail giant Walmart is a case in point. Few people
would dispute that it remains a remarkable firm. Its
early focus on building a regionally dense network
of stores in small towns delivered a strong positional
advantage. Complementary choices regarding ad-
vertising, pricing, and information technology all
continue to support its low-cost and flexibly mer-
chandised stores.
Despite this strong position and a successful stra-
tegic rollout, Walmart's equity price has seen little
growth for most of the past 12 or 13 years. That's be-
cause the ongoing rollout was anticipated long ago,
and investors seek evidence of newly discovered
value—value of compounding magnitude. Merely
sustaining prior financial returns, even if they are
outstanding, does not significantly increase share
price; tomorrow's positive surprises must be worth
more than yesterday's.
Not surprisingly, I consistently advise MBA stu-
dents that if they're confronted with a choice be-
tween leading a poorly run company and leading a
well-run one, they should choose the former. Imag-
ine assuming the reins of GE from Jack Welch in Sep-
tember 2001 with shareholders' having enjoyed a 40-
fold increase in value over the prior two decades. The
expectations baked into the share price of a company
like that are daunting, to say the least.
To make matters worse, attempts to grow often
undermine a company's current market position.
As Michael Porter, the leading proponent of strat-
egy as positioning, has argued, "Efforts to grow blur
June 2013 Harvard Business Review 73
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMES
uniqueness, create compromises, reduce fit, and
ultimately undermine competitive advantage. In
fact, the growth imperative is hazardous to strategy."
Quite simply, the logic of this perspective not only
provides little guidance about how to sustain value
creation but also discourages growth that might in
einy way move a compeiny away from i.
Sport Ticket sales staff trainingChapter 4Sales .docxsusanschei
Sport Ticket sales staff training
Chapter 4
Sales Staff
Developed not born
Skill set of a seller
Different to skill set of a manager
Sales process
Develop lifelong relationship with purchaser
Best source of increasing business
Upselling
Referrals
Sales Department
Recruit
Train
Develop
Motivate
Retain
Recommendations
Balance in house and outsourced
Communication between sales manager and sales staff
Success celebrations
Gather feedback from sales staff
Recruiting/Hiring
Personality, creativity (intangibles)
Fit with organization
Dress for success (opportunity taken seriously)
Positive attitude
Welcoming personality
Poised/confident (not over confident)
Initiative (carry conversation)
Energy, enthusiasm, commitment
Sales positions
10-20 inside sales staff
Supervisor to staff ratio 1:8
Annual training
New employee training (1 week to 1 month)
Ideal structure
8-16 Part-time
2 ½ months than ready to replace nonperforming FT
6-8 full time season ticket dedicated
3-6 full time group sales dedicated
Self-training
One book per month, mentor, seminars, practice
Sales Culture
Desired outcomes
Effectiveness
Productivity
Stability
Long term growth
Created by the sales manager (leadership)
Orlando Magic three A’s
Action
Visible displays
Find needs, wants, desires of employees
Reward accomplishments
Attitude
Believe in sales staff
Atmosphere
Visible signs of success
gong
Retaining/Motivating
Database management
Lead distribution
Reporting
Evaluation
Satisfy need of employees first
Better able to meet customer needs
Achieve organizational goals
Four types of sales employees
Competitor
Rivalries, win contests
It’s All About me
Recognized as best
Achiever Team Builder
Recognition of achievements, group success
Empathetic Seller
Cultivate relationships, not volume producers
Sales Career
Exploration
Establishment
Maintenance
Disengagement
Employee rate feeling appreciated and informed as top want
Sport Consumer Incentivization
Chapter 3
Incentives
Depend on consumption motives
Items of perceived value that add to offer
Overcome indifference or resistance
Later stage of buying/communication process
Price based incentives
Discounting core product damaging
Contingency based
Consumer action (provide info, prior purchase, etc) prior to price reduction
Attract infrequent customers
8% increase in attendance (top 10, 2004)
“cherry pickers” – only attend with promotion
MLB
14% increase, 2% watering down effect, more is better, weekdays (vs. high attendance – max total entertainment value)
Incentives continued
Rule changes, star players (consumption incentive)
Place based incentives
26 fundamental motives for sport consumption
Primary motives
Achievement
Ordinary runners (sense of accomplishment)
Perfect attendance
Vicarious achievement (enhance self esteem through success of athlete)
Sponsors – increased sales volume, exposure
Craft
Developing or observing physical skill
Winning record – highest predictor of attendance/s.
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docxsusanschei
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, glass plates, phenolic sheets, polyurethane resin; modules 100 x 100 x 8 cm
Installation view at Lehmann Maupin Gallery, New York
Why We Love
to Hate HR
...and What HR
Can Do About It
by Peter Cappelli
SPOTLIGHT ON RETHINKING HUMAN RESOURCES
Peter Cappelli is a
professor of management
at the Wharton School and
the author of several books,
including Will College
Pay Off? A Guide to the
Most Important Financial
Decision You’ll Ever Make
(PublicAffairs, 2015).
HBR.ORG
July–August 2015 Harvard Business Review 55
These feelings aren’t new. They’ve erupted now
and in the past because we don’t like being told how
to behave—and no other group in organizational life,
not even finance, bosses us around as systematically
as HR does. We get defensive when we’re instructed
to change how we interact with people, especially
those who report to us, because that goes right to the
core of who we are. What’s more, HR makes us per-
form tasks we dislike, such as documenting problems
with employees. And it prevents us from doing what
we want, such as hiring someone we “just know” is
a good fit. Its directives affect every person in the
organization, right up to the top, every single day.
The complaints also have a cyclical quality—
they’re driven largely by the business context. Usu-
ally when companies are struggling with labor issues,
HR is seen as a valued leadership partner. When
things are going more smoothly all around, manag-
ers tend to think, “What’s HR doing for us, anyway?”
This doesn’t mean that HR is above reproach.
Quite the contrary: It has plenty of room to improve,
and this is a moment of enormous opportunity. Little
has been done in the past few decades to examine the
value of widely used practices that are central to how
companies operate. By separating the effective from
the worthless, HR leaders can secure huge payoffs for
their organizations. But it’s important to understand
HR’s tumultuous history with business leaders and
the economy before turning our attention to what the
function should be doing now and in the future.
The “Personnel” Pendulum
How top executives feel about HR pretty reliably re-
flects what’s going on in the U.S. economy. When the
economy is down and the labor market is slack, they
see HR as a nuisance. But sentiments change when
labor tightens up and HR practices become essential
to companies’ immediate success.
Think back to the Great Depression. People would
put up with nearly anything to stay employed. Line
managers complained that personnel departments
were getting in the way of better performance, which
they thought could be achieved with the “drive” sys-
tem: threatening workers and sometimes even hit-
ting them if they failed to measure up.
Similarly, business leaders didn’t put a lot of
stock in HR during the 2001 and 2008 recessions, be-
cause employees—keenly aware of how replaceable
th.
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docxsusanschei
Sponsorship Works 2018 8
PROJECT DETAILS
Sponsorship title:
Audi Cup
Duration of sponsorship:
2009-present
Case study entered by:
Audi AG
Sponsor’s industry sector:
Automotive
Rights-holder:
Audi AG (Ownership Platform)
Agency:
brands and emotions GmbH
– Lead Agency, Audi Cup
Other organisations involved in the
planning, activation or evaluation:
FC Bayern Munich;
Several service providers (including event
agency, TV commercialisation,
TV production, etc.).
Campaign summary
Launched in 2009, the year of Audi’s 100th anniversary,
the Audi Cup is a pre-seasonal worldwide football
tournament. Leading teams including FC Barcelona,
Real Madrid and Manchester United meet in Munich
for the biennial Audi Cup during the summer break in
football.
The event is an owned and mainly refinanced
platform by Audi with a strong international media
presence, achieving around 2.5 billion consumer
contacts across television and online media at each
tournament in around 200 countries. With cutting-edge
technologies as an integral part of its staging and
coverage, the event provides a global opportunity to
highlight Audi’s “Vorsprung durch Technik” values.
Planning
Business needs
The Audi Cup provides an ideal platform to present
a strong, resonating connection between top-level
international football and the brand’s “Vorsprung
durch Technik” positioning. Audi has been involved in
international football for over 14 years and the launch
of the Audi Cup in 2009 established a new benchmark
in proprietary sports marketing, creating a whole new
way for Audi to implement its own rights in a highly
controlled and targeted manner.
Taking a “high-tech” approach to the world of
football broadcasting and marketing, the Audi Cup
meets the clear business need for Audi to demonstrate
Audi and the Audi Cup
A u d i a n d t h e A u d i C u p
Sponsorship Works 2018 9
A u d i a n d t h e A u d i C u p
and underpin its core brand proposition as a highly
innovative, technologically advanced automotive
company.
The development and implementation of tools
including the first ever implementation of digital overlay
of led boards in live broadcasting and the first ever live
holographic press conference in sport, a dedicated
chatbot and Alexa Skill and the Audi Player Index, not
only underline Audi’s status as a “high-tech” brand but
genuinely enhance enjoyment of the tournament for
fans, building a truly relevant connection.
Sponsorship selection
Audi’s long association with football, with its focus on
high-profile, global clubs, saw the brand develop from
a classic sponsor to an owner and organiser of various
leading platforms in its own right – the Audi Cup, Audi
Summer Tour and Audi Football Summit. With these
properties and its year-round association with the
game, Audi set itself the goal of elevating its successful
sponsorships into full ownership; Audi shifted from a
host or a marque associated with the.
SPM 4723 Annotated Bibliography You second major proje.docxsusanschei
SPM 4723
Annotated Bibliography
You second major project for the course will be an annotated bibliography. Instead of writing a
paper, an annotated bibliography requires you to research a particular legal topic or question, of
your choosing, in sports and find academic and law review articles that address that topic. You
will develop a question about a legal topic in sports and find seven law review articles to
summarize. Each article summary should be 300-350 words in length and should both explain
the contents of the article and its relevance to your question or topic. The summaries should be
written in your own words. You are required to select law review articles using LexisNexis. The
format for the annotated bibliography is explained below.
Please put your topic as the title for your paper. Next, each annotation should begin with the
APA citation for the article in bold print (do not include web links), followed by a summary of
the article (300-350 words) explaining how it addresses your question. The complete annotated
bibliography should be double-spaced, 12pt Times New Roman font with one-inch margins. You
will be submitting it through Turnitin via Canvas, do not include your name, course number,
date or UFID on your annotated bibliography (similar to the case briefs). You should start each
annotation on a separate page, and please remember to begin each annotation with the APA
citation for the article as instructed above. This assignment is due on Wednesday, April 22nd.
1.Which of the following is not a key component of the conceptual framework of accounting?
Select one:
a. internal users
b. the objective of financial reporting
c. cost constraint on useful financial reporting
d. elements of the financial statements
2.The balance sheet and income statement for Joe's Fish Hut are presented below:
Joe's Fish Hut
Balance Sheet
As at December 31
2016
2015
ASSETS
Current Assets
Cash
$180,623
$60,300
Accounts receivable
$18,900
$14,200
Inventory
$23,600
$25,300
Total Current Assets
$223,123
$99,800
Property, plant & equipment
$129,000
$184,000
Less: Accumulated depreciation
$-26,900
$-21,600
TOTAL ASSETS
$325,223
$262,200
LIABILITIES AND EQUITY
Liabilities
Current Liabilities
Accounts payable
$28,000
$41,800
Current portion of bank loan
$9,500
$9,500
Total Current Liabilities
$37,500
$51,300
Non-current portion of bank loan
$71,000
$42,000
TOTAL LIABILITIES
$108,500
$93,300
Shareholders' Equity
Common shares
$80,000
$54,400
Retained earnings
$136,723
$114,500
TOTAL SHAREHOLDERS' EQUITY
$216,723
$168,900
TOTAL LIABILITIES AND EQUITY
$325,223
$262,200
Joe's Fish Hut
Income Statement
For the Year Ended December 31, 2016
Sales
$137,000
COGS
$83,200
Gross Profit
$53,800
Operating Expenses
Insurance Expense
$1,600
Rent Expense
$5,380
Salaries Expense
$5,150
Telephone Expense
$840
Interest Expense
$1,340
Depreciation Expense
$5,300
Total Operating Expenses
$19,610
Operating Profit Before .
Speech Environment and Recording Requirements• You must have a.docxsusanschei
Speech Environment and Recording Requirements
• You must have an audience of at least 5 adults 18 years or older for all speeches. The audience must be live and in person, that is, physically present. Virtual attendance is not permitted. Your video recording must show the 5 individuals sitting as ENGAGED audience members. The audience should be visible before, during, and after the speech and you should be facing your audience. The camera should be placed behind your audience.
• You are required to record and post all 3 speeches in order to earn a passing grade in this course.
• The video must be of a high enough quality that the instructor is able to see your full facial expressions and gestures. Your instructor will need to be able to hear your voice very clearly. You risk a failing grade if your instructor is not able to discern facial expressions or subtle changes of vocal intonation on the recording.
• Be sure to record your presentation from head to toe. Your instructor needs to be able to see your posture and other elements.
• Be certain to record your video in landscape (wide), not portrait (tall).
• You may not stop the recording and re-record a section of your speech. What you
submit must be a complete presentation from start to finish with NO EDITING. You could record your speech a few times and then pick the best presentation to send. Just make sure you only submit one copy of your best speech.
• You will upload your speech following the YouTube directions and proper privacy guidelines. Speech capture directions and instructions are in Module 1 of the Blackboard online classroom.
• Be certain to provide a video link to your speech that is available for your instructor and college administrators to view without requiring passwords or special permissions. Submitting a link that does not immediately provide this access results in a failing grade for your speech and could result in a failing grade for the course. You cannot use Google Hangouts or other mediated communication in place of a live audience. Your live audience must be physically present at the location you deliver your speech.
• Any attempt to circumvent live speech audience requirements perceived by your instructor as deceptive, dishonest or otherwise disingenuous results in a zero for your speech with no opportunity to make it up and may result in a failing grade in the course and referral to the appropriate FSCJ administrative official for academic dishonesty.
• The video link (URL) you provide for your speech must remain posted, active and viewable until 14 calendar days following the official scheduled end of the semester, according to the official FSCJ academic calendar. Removing your speech from the URL or link you provide automatically reverts any score you have to a zero and will result in a failing grade for the course.
• Attempts to work around presenting in front of a live audience are considered academic dishonesty.
• Posting your speech on a screen or readin.
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docxsusanschei
Sped4 Interview 2.10.17 Audio.m4a
Jodee: [00:00:08] And we are looking at the collaborative process between secondary special ed teachers and transitioning and transition specialists when transitioning students with autism spectrum disorder or other disabilities from secondary to higher. OK so the first question is is describe the condition process as you understand it from the guidelines of the secondary transition plan.
Sped4: [00:00:52] OK. So first thing is a series of assessments that are appropriate for assessing it can include you know obviously interviewing the teacher not not the teacher the student and then sometimes parents are involved in that process. Then there's other batteries of tests. Things like the couter doing AZCIS things other interests inventories and things of that nature to get that. Looking at transcripts students grades grade reports in those things and taking those all that data and that assessment information and looking at that.That's my understanding and interpretation and kind of what I do.
Jodee: [00:01:46] So you know it's the responsibility of the secondary teacher special ed teacher as the case manager to interview the students. And you know one of the big pieces that we look at is the age appropriate goals. You know if you've got a student who is who is autistic academically They're very bright. They can do the work but they have absolutely zero social skills. And they want you maybe studied to be. They want to go into broadcast journalism or something along those lines. So it's like having you determined you know is it like a collaborative effort. You determine and work with the other person you know because sometimes you have to be that person and say yes might not be the best fit for you. How does that kind of playing into things.
Sped4: [00:02:51] I don't know like I don't mind doing that or being the one.
Sped4: [00:02:58] I haven't run into that exact situation but I have other situations where students wanted to go straight to university from high school and just had these visions of grandeur. But their GPA would not allow for that or they had other deficiencies and things of that nature. And so it's just it's sometimes it's like literally printing out the requirement and showing them just saying you know these aren't going to work. It's not a possibility. However it doesn't mean that you can't go on to higher education. And just providing them alternative routes like one if there is enough time if there for example is there a sophomore or a junior. You know we look at like Well is there enough time to get rid of these deficiencies. Can you take some of these courses. Can you do that to get your GPA up to get rid of the deficiencies et cetera. Is that feasible. Is that feasible with money or mom is mom and dad going to pay for that you know. And is there enough time or looking. OK well if that's not an option then community college is not necessarily a bad thing to do it right. When did yo.
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docxsusanschei
Sped Focus Group.m4a
Jodee: [00:00:01] This is a focus group with the secondary special education teachers. So anybody feel free to chime in and we just talked about the secondary transition plan and theoretical principles of Situation and support. So the first question is How does political correctness influence transition process. So think about some of the terminology that's changed. For example we don't refer to kids with cognitive impairment as being mentally retarded. So how does that PC influence the transition process. And anybody can feel free to speak up if they would like.
TS5: [00:00:49] Well I guess I'll start because I'm probably the least politically correct person around. I think you make an example of the fact of you know you know with. What you can and cannot say Well not everybody is up to date on the current lingo and everybody apparently might may be in denial about where their child is at cognitively when using certain terms they may expect more from their or their child than they're actually capable because we're not using terms of people understand or that people use. Obviously I'm not talking about in a hurtful way but you know I mean I have a student now that he's I guess they went out of their way to label him. You know he has a label of autism. But I keep telling these people on my autism is not his problem his cognitive is his problem as long as that IEP keeps talking about autism then that seems to be the direction of where they want to go with the services. And and I keep saying that autism is not the problem. So that's just my 2 cents on.
Jodee: [00:02:12] How has that worked so far just to kind of pair off your response on that TS5 how has it like you're able to see that it's not the Autism that's a problem. How do you stear that to the correct path and have deal with this and what the kid is capable of doing regarding transition.
Sped5: [00:02:34] Well I was fortunate in this area where I think it was an issue of the mom was in denial that it wasn't all the other teachers were like no. This is what this is what he needs. You know because of the IEP I'm trying to get him. You know support all the time and it's just a matter of when they look at the IEP and says why is it that it will be this and this and I'm like I didn't write the IEPP I didn't put down autism. I'll just tell you what I see now what I have and that's what it is. And so it wasn't until at an an IEP meeting that the other teachers who see them every day too are like no this is where he's at. He needs the support he needs this because of x y z. So you know that's just for example.
Jodee: [00:03:25] Okay TS7 I'm going to kind of put you on the spot on for a minute when we talked a couple of days ago about that one student what were some of the things that you might have encountered in working with the parents on regarding transitioning him. And you know just to give a bit with a bit of background history it was a young man diagnosed with.
Specialized Terms 20.0 Definitions and examples of specialized.docxsusanschei
Specialized Terms
20.0
Definitions and examples of specialized terms for adaptive behavior assessments including content and statistical terms are proficient.
Limitations of Standardized Assessments
20.0
Substantial explanation of at least two limitations of standardized assessments is provided.
Consultative Role of Special Education Teacher
20.0
The description of consultative role of the special education teacher in helping parents/ guardians understand the process of assessments and terminology is expertly addressed.
Aesthetic Quality
5.0
Design is pleasing. Skillful handling of color, text and visuals creates a distinctive and effective presentation. Overall, effective and functional audio, text, or visuals are evident.
Mechanics of Writing (includes spelling, punctuation, grammar, and language use)
5.0
Submission is virtually free of mechanical errors.
Organization
5.0
The content is well-organized and logical. There is a sequential progression of ideas that relate to each other. The content is presented as a cohesive unit and provides the audience with a clear sense of the main idea.
Documentation of Sources (citations, footnotes, references, bibliography, etc., as appropriate to assignment and style)
5.0
Sources are documented completely and correctly, as appropriate to assignment and style, and format is free of error.
Total Percentage
100
.
Special notes Media and the media are plural and take plural verb.docxsusanschei
Special notes: Media and the media are plural and take plural verbs. The use of personal pronouns "we" and "you" are unacceptable in academic writing except when otherwise indicated. The use of the first person "I" is not called for in this assignment.
Write a 700- to 1,050-word paper in which you answer the following questions:
· What were the major developments in the evolution of mass media during the last 120 years or so? Discuss at least five forms of major mass media in order of development. Choose from movies, recorded music, radio, television, video games, internet streaming, and social media. Newspapers may be included but only those developments in the last 120 years or so. We are not requesting the history of mass media, mass media developments before 1900, and identification of communications devices that are person to person and not mass media such as the telegraph and telephone.
· What innovations did each provide to consumers (what was new about them)? How did each medium change the lives and behavior of people after its introduction?
· What is meant by the term media convergence, and how has it affected everyday life?
· Conclude with a reflection on why media literacy is important for responsible media consumption today.
Format your essay according to appropriate course-level APA guidelines. Spelling and grammar check your work.
Note: your first paper will be annotated with regard to formatting, spelling, grammar, and usage, for which you will not be penalized, but you are responsible for applying these notes to subsequent assignments.
.
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docxsusanschei
SPECIAL ISSUE ON POLITICAL VIOLENCE
Research on Social Movements and Political Violence
Donatella della Porta
Published online: 15 July 2008
# Springer Science + Business Media, LLC 2008
Abstract Attention to extreme forms of political violence in the social sciences has been
episodic, and studies of different forms of political violence have followed different
approaches, with “breakdown” theories mostly used for the analysis of right-wing radicalism,
social movement theories sometimes adapted to research on left-wing radical groups, and
area study specialists focusing on ethnic and religious forms. Some of the studies on extreme
forms of political violence that have emerged within the social movement tradition have
nevertheless been able to trace processes of conflict escalation through the detailed exam-
ination of historical cases. This article assesses some of the knowledge acquired in previous
research approaching issues of political violence from the social movement perspective, as
well as the challenges coming from new waves of debate on terrorist and counterterrorist
action and discourses. In doing this, the article reviews contributions coming from research
looking at violence as escalation of action repertoires within protest cycles; political
opportunity and the state in escalation processes; resource mobilization and violent
organizations; narratives of violence; and militant constructions of external reality.
Keywords Political violence . Social movements
Attention to extreme forms of political violence in the social sciences has been episodic, with
some peaks in periods of high visibility of terrorist attacks, but little accumulation of results.
There are several reasons for this. First, some of the research has been considered to be more
oriented towards developing antiterrorist policies than to a social science understanding of the
phenomenon. In fact, “many who have written about terrorism have been directly or indirectly
involved in the business of counterterrorism, and their vision has been narrowed and distorted
by the search for effective responses to terrorism…. [S]ocial movement scholars, with very few
exceptions, have said little about terrorism” (Goodwin 2004, p. 259). Second, studies of
different forms of political violence have followed different approaches, with “breakdown”
theories mostly used for the analysis of right-wing radicalism, social movement theories
sometimes adapted to research on left-wing radical groups, and area study specialists focusing
on ethnic and religious forms. Third, and most fundamentally, there has been a tendency to reify
Qual Sociol (2008) 31:221–230
DOI 10.1007/s11133-008-9109-x
D. della Porta (*)
Department of Political and Social Sciences, European University Institute,
Badia Fiesolana, Via dei Roccettini 9, 50016 San Domenico di Fiesole Firenze, Italy
e-mail: [email protected]
definitions of terrorism on the basis of political actors’ decisions to use violence (Tilly 200.
SPECIAL ISSUE CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docxsusanschei
SPECIAL ISSUE: CRITICAL REALISM IN IS RESEARCH
CRITICAL REALISM IN INFORMATION SYSTEMS RESEARCH
John Mingers
Kent Business School, University of Kent,
Canterbury, Kent, CT2 7NZ UNITED KINGDOM {[email protected]}
Alistair Mutch
Nottingham Business School, Nottingham Trent University, Burton Street,
Nottingham NG1 4BU UNITED KINGDOM {[email protected]}
Leslie Willcocks
London School of Economics and Political Science, Houghton Street,
London WC2A 2AE UNITED KINGDOM {[email protected]}
Introduction
There has been growing interest in a range of disciplines
(Ackroyd and Fleetwood 2000; Danermark et al. 2002;
Fleetwood 1999; Fleetwood and Ackroyd 2004), not least
information systems (Dobson 2001; Longshore Smith 2006;
Mingers 2004b; Mutch 2010b; Volkoff et al. 2007; Wynn and
Williams 2012) in ideas derived from the philosophical tradi-
tion of critical realism. Critical realism offers exciting pros-
pects in shifting attention toward the real problems that we
face and their underlying causes, and away from a focus on
data and methods of analysis. As such, it offers a robust
framework for the use of a variety of methods in order to gain
a better understanding of the meaning and significance of
information systems in the contemporary world.
Although the term critical realism has been used in a number
of different traditions, we are primarily concerned with that
developed from the foundational work of Roy Bhaskar in the
philosophy of science, later extended in the social arena by
authors such as Archer and Sayer (Archer et al. 1998; Bhaskar
1978, 1979; Mingers 2004b; Sayer 2000). In this tradition,
the benefits of CR are seen as:
• CR defends a strongly realist ontology that there is an
existing, causally efficacious, world independent of our
knowledge. It defends this against both classical positi-
vism that would reduce the world to that which can be
empirically observed and measured, and the various
forms of constructivism that would reduce the world to
our human knowledge of it. Hence it is realist.
• CR recognizes that our access to this world is in fact
limited and always mediated by our perceptual and theo-
retical lenses. It accepts epistemic relativity (that knowl-
edge is always local and historical), but not judgmental
relativity (that all viewpoints must be equally valid).
Hence it is critical in a Kantian sense.
• CR accepts the existence of different types of objects of
knowledge—physical, social, and conceptual—which
have different ontological and epistemological charac-
teristics. They therefore require a range of different
research methods and methodologies to access them.
Since a particular object of research may well have
different characteristics, it is likely that a mixed-method
research strategy (i.e., a variety of methods in the same
research study) will be necessary and CR supports this.
In this introduction, we will first introduce the basic concepts
of critical realism as a philosophy of science.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Chapter 3 - Islamic Banking Products and Services.pptx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
1. Running Head: Employee Use Of Internet At Work: Policy
Proposals
1
Employee Use Of Internet At Work: Policy Proposals
10
INTRODUCTION
This paper talks more about the policy proposals about the use
of internet at work. It surveys the possible torts that employees
who use the internet could commit. It looks at the possible
crimes that could be perpetrated by employees who use the
internet at work. These crimes will be indicated as to whether
they are white collar or blue collar. The liability of the
corporation versus the responsibility of the individual employee
through the commission of torts or crimes using the internet at
work will be analyzed. Further analysis of whether violations of
the duty of care or duty of loyalty could exist through the use of
social media sites at work will be given. It explores the
employee privacy rights that exist regarding the use of internet
2. at work. The employment laws that protect the employee or
employer on the utilization of the web at work will be
discussed.
The possible torts that can be committed by employees
through the utilization of the web include obstruction of justice.
This happens where the government is investigating as an aspect
of the company’s operations and staff decides out of motives of
loyalty or self-preservation to cover things up. They can cover
things up through hiding or destroying documents. This can
amount to obstruction of justice and can multiply the
consequences to the company of the original misconduct. Many
materials are held electronically, and any obstacle will likely
use the company’s technology.
Another tort that can be committed by employees is
copyright violations. This happens when employees create and
distribute multiple copies of protected material more than fair
use using employer’s technology. This can lead to suits by the
owner of the copyrighted material. Sabotage is another tort that
can be committed by employees. This is mostly done by a
disgruntled employee or former employees with technical
expertise to create disruption which could last for some time
and cause economic losses. Sabotage can happen through
stealing information or maliciously publicizing it or deleting or
overwriting company files. Another way of sabotage by
deletion could be saving deliberately of documents that intend
to be destroyed under a document retention program whether
maliciously or otherwise.
Fraud is another common tort that may be committed by
employees. Through the use of technology, employees can
penetrate company operations and commit offenses like
embezzlement, defrauding the company and corruption of
business records. Misconduct due to fraud can be prematurely
recognizing revenue, overvaluing goodwill, managing earnings
and other accounting malpractices, self-dealing by the
management and giving and accepting kickbacks for orders.
A significant tort that may be committed by employees is
3. the misappropriation of trade secrets. This is possible because
they are kept in electronic format. The employer’s greatest risk
to computer security comes from current and former employees
who deliberately or inadvertently disclose confidential or
sensitive information to additional parties. Company secrets can
include a formula, pattern, compilation, program, device,
method or process that gives independent economic value from
not being known by other persons who can obtain economic
benefits from its disclosure or use.
Harassment and threats are other torts that may be
experienced by employees. Sexual harassment is done through
the use of technology in the workplace. An employee can send
emails to other coworkers which contain information rife with
sex innuendos which are wrong. Another offense is viewing
child pornography in the workplace because many believe that
the authorities are not likely to track their illegal activities.
(Dexter, 2007).
Blue collar crimes are those crimes that are more physical
and violent in nature when being committed. White collar
crimes, on the other hand, refer to crimes that are perpetrated by
employees due to abuse of the internet, and they are not
physically violent. From all the above crimes mentioned, they
can be classified in the white collar crimes since they are not
physical and they involve an employee using the internet to
create harm. These crimes do not hurt anyone physically, but
they hurt the company’s finances and reputation to some extent.
Under the ‘respondent’ superior law, employers are legally
responsible for the actions of their employees. This rule only
applies when the employee is acting under the responsibilities
granted by the employment. For example, if an employee during
his course of duty knocks down a pedestrian accidentally, the
company will be liable for the damage and will take care of all
the medical bills. The primary purpose of constituting this law
is to ensure employers are held responsible for the costs of
doing business. If the crime committed is among the risks of the
business the company will have to accept all legal
4. responsibility. This law is also used in offenses committed via
the internet while on company time. If inappropriate emails or
content are shared in the workplace, the employer should be
entirely responsible for consequences of the crime. If the
employee committed the internet crime outside working hours
and using personal equipment, then the responsibility is upon
the employee for such actions and not of the company they
work.
There has been a debate on whether employees are
supposed to use social networks at the workplace. Some
individual employees should use social media in dispensing
their duties like the marketing teams, but a question pops up on
whether all employees should have access to these sites while at
the workplace. Many companies believe that not all employees
should have access to these locations while other argue that
social media use at work gives employees an opportunity to
share their work with others. Although an employer does not
have the right to monitor employee’s private communication,
they have a duty to take effective measures to stop the co-
employee harassment. This is when the employer knows or has a
reason to know when such harassment is being held in the
workplace or settings related to the workplace. If an employer
encourages an employee to engage in copyright infringement,
the owner of the copyrighted material can claim contributory
infringement against the company. An employer can be held
accountable if they have knowledge of infringing conduct and
help the employee do it, had knowledge of the direct employee
infringement or participates substantially in the offense. On the
part of the employee, it is criminal to access a computer without
authorization and as a result, cause internet crimes. It is also a
violation to knowingly and with intent to defraud a company
through accessing its protected computer without authorization.
(Totten, 2004).
The duty of care is a requirement that a person acts
towards others and the public with watchfulness, attention,
caution, and prudence that a reasonable person in the
5. circumstances would use. Whether the individual does not
perform to this standard, the actions are considered negligent,
and any damages resulting can be claimed in a lawsuit for
negligence (Legal Dictionary - Law.com, 2017).
The duty of loyalty has a principle that directors and other
officers of an organization in making decisions in their
capacities as corporate fiduciaries must act without personal
economic interest or conflict. This duty is breached by making a
self-interested transaction or taking a corporate opportunity
(Duty of Loyalty, 2017).
Violations of duty of care and duty of loyalty can exist in
the use of social media in the workplace. One can use social
media in the workplace to tarnish the image of other people or
engage in activities that are not morally acceptable. An
employee can comment on individual issues about different
things which can cause uproar along the interwebs which may
be considered negligence leading to service of lawsuits.
Under the common law, a person privacy may be invaded
an unreasonable intrusion upon his or her seclusion, an
appropriation of his or her name or likeness, public disclosure
of private facts and public portrayal of the person in a false
light. Among these privacy concerns, the most common tort
likely to be committed by an employer while conducting
research is an intrusion upon seclusion. Intrusion upon
seclusion is intentionally intruding upon the solitude or
seclusion of another, which is an invasion of privacy if the
intrusion would be highly offensive to a reasonable person.
Activities carried out by an employee using an employer’s
computer system are unprotected by personal privacy laws.
Emails sent using company computer systems are considered as
company property.
Employers have the right to monitor and view employee
email as long as they have a strong business for doing so.
Employers have the right to track websites visited by their
employees, block employees from visiting certain sites or limit
the amount of time an employee may spend on a particular
6. internet site. Employers often use electronic surveillance
practices to keep tabs on employees and business operations.
However, this monitoring has some legal limits. An employer
may not monitor personal phone calls even those that made
using telephones on work premises. An employer can monitor a
personal call only if an employee knows the particular call is
being monitored and consents to it. An employer is also legally
liable if they read, disclose, delete or prevent access to an
employee’s messages (“Privacy in the Workplace: Overview –
FindLaw,” 2017).
According to the federal electronic communications
privacy act, an employer provided system is the property of the
company. This means that companies who submit their
employees with a computer and free internet access are free to
monitor things that one does with the computer and the internet
access provided. This comes right when an employer gives an
employee a written policy regarding the monitoring of the use
of equipment. Although some federal laws and state laws make
it illegal for employers to intercept private email, employers
may monitor emails from the work email address provided or
watch any email stored on the work computer. Employees are
protected by law in cases where they use their devices and
personal emails. Personal data and devices can only be
monitored by the employer after notifying the employees. A
federal law, the electronics communications privacy act of 1986
prohibits unauthorized interception of or access to electronic
communication, including telephone, email, and computer
usage. It only applies to the usage of personal devices (USA
Employee Monitoring Laws: What Are Employers Allowed and
not Allowed Doing in the Workplace? 2017).
The policy the CEO should adopt targeted to the directors
is that they should come up with suggestions of how to
assemble an internal team of information technology or
information security experts, attorneys, media relations
employees and human resources professionals to help deal with
criminal conducts of the company’s technology. The
7. information technology or information security personnel will
be able to respond to a breach or compromise of the company’s
systems and help in investigating any misconduct. They will
also contribute to rectifying the problem as soon as possible.
The attorneys and human resource professionals will be
consulted in any investigation or during a search of an
employee’s workspace including his electronic gadgets of work
or before terminating an employee. They may also act as
invaluable conduits with local authorities. Media relation
employees will collaborate with the press in dissolving harmful
exposure in case of any incidents concerning internet crimes.
The policy targeting the workers should be that the
business related work should be performed by a company owned
computer at all times to allow access to the contents contained
therein. Any job that is not carried out in the office should also
be done on a company owned equipment like a using a laptop
(Totten, 2004).
The business judgment rule is a legal principle that makes
officers, directors, managers, and other agents of a corporation
immune from liability to the corporation for loss incurred in
corporate transactions that are within their authority and power
to make when sufficient evidence demonstrates that the
transactions were made in good faith (Business Judgment Rule,
2017). If this rule is invoked, it will play a huge role in
enforcing the policy directed by the directors to come up with
suggestions on how to add employees who are responsible for
information technology, media relations, and human resource
issues. This is because each of the employees will play their
role in determining whether the misconduct of the director or
employee was done out of good faith or on personal interests.
These professionals will explore each opportunity at their
disposal due to their high level of professionalism and get to the
bottom of the matter hence unveiling the right intention.
Some remedies in regards to crimes committed via the
internet are that the employers should develop and distribute a
company policy to all employees regarding employer’s
8. electronic property services. This will ensure that none of the
employees can claim malice against them in case they are
caught up in internet misconducts. It is the duty of the employer
to educate and train all staff about the seriousness of
committing crimes through the use of the organization’s
technology. The employer should also state the level of
authority each employee has in accessing specific locations,
documents and files on the company’s computer system or
network. All direct managers should regularly monitor and
search the employee’s computers to determine whether they are
downloading copyrighted materials or engaging in the non-
business related conduct. The company policies regarding
downloading and uploading copyrighted materials, using the
internet and email and using any of the employer’s technology
should be strictly enforced. This will reduce claims of
harassment and vicarious liability. After the termination of any
employee, they should be denied access to the company’s
network or computer system. If the employee is assigned a
password, the employer must ensure the password is no longer
valid. In the case of a termination, the employer should only
state whether they will hire or rehire the employee without
disclosing any other information (Totten, 2004).
The ethical issues that may arise in the workplace due to the
implementation of the policies are that the company will face a
challenge protecting their interests through monitoring while
ensuring they do not go so far that the employees lose their
privacy in the workplace. Employers will establish respect for
employee’s privacy by creating a written policy that defines
acceptable uses for company computers. Internet monitoring
could be a breach of privacy when the employees are not given
a written notice on the appropriate use of company computers
and the employer’s right to monitor activities done via the
internet. The employers can be sound and ethical by controlling
the use of internet at the workplace for business related reasons
only (Burks, 2017).
9. References
Burks, F. (2017). Ethical Issues & Employer Monitoring
Internet Usage. Smallbusiness.chron.com. Retrieved 30
June 2017, from http://smallbusiness.chron.com/ethical-issues-
employer-monitoring-internet-usage- 12617.html
Business Judgment Rule. (2017). TheFreeDictionary.com.
Retrieved 30 June 2017, from http://legal-
dictionary.thefreedictionary.com/Business+Judgment+Rule
Dexter, D. (2007). Employee Misuse Of Employer’s
Technology. San Francisco.
Duty of Loyalty. (2017). LII / Legal Information Institute.
Retrieved 30 June 2017, from
https://www.law.cornell.edu/wex/duty_of_loyalty
Legal Dictionary - Law.com (2017). Law.com Legal Dictionary.
Retrieved 30 June 2017, from
http://dictionary.law.com/Default.aspx?selected=599
Privacy in the Workplace: Overview - FindLaw (2017).
Findlaw. Retrieved 30 June 2017, from
http://employment.findlaw.com/workplace-
privacy/privacy-in-the-workplace- overview.html
Totten, J. (2004). The Misuse Of Employer Technology by
Employees to Commit Criminal Acts. Capitol Mall, Suite 3000.
USA Employee Monitoring Laws: What Are Employers Allowed
and not Allowed Doing in the Workplace?. (2017).
Worktime.com. Retrieved 30 June 2017, from
https://www.worktime.com/usa-employee-monitoring-
laws-what-can-and-cant- employers-do- in-the-workplace/
Section 4- Internet, E-mail, Computer, and Cell Phone Usage
0. POLICY
The use of XYZ Inc., Inc/ XYZ Inc. automation systems,
including computers, fax machines, and all forms of
Internet/intranet access, is for company business and for
authorized purposes only. Brief and occasional personal use of
10. the electronic mail system or the Internet is acceptable as long
as it is not excessive or inappropriate, occurs during personal
time (lunch or other breaks), and does not result in expense or
harm to the Company or otherwise violate this policy.
Use is defined as "excessive" if it interferes with normal job
functions, responsiveness, or the ability to perform daily job
activities. Electronic communication should not be used to
solicit or sell products or services that are unrelated to the
Company's business; distract, intimidate, or harass coworkers or
third parties; or disrupt the workplace.
Use of Company computers, networks, and Internet access is a
privilege granted by management and may be revoked at any
time for inappropriate conduct carried out on such systems,
including, but not limited to:
1. Sending chain letters or participating in any way in the
creation or transmission of unsolicited commercial e-mail
("spam") that is unrelated to legitimate Company purposes;
1. Engaging in private or personal business activities, including
excessive use of instant messaging and chat rooms (see below);
1. Accessing networks, servers, drives, folders, or files to which
the employee has not been granted access or authorization from
someone with the right to make such a grant;
1. Making unauthorized copies of Company files or other
Company data;
1. Destroying, deleting, erasing, or concealing Company files or
other Company data, or otherwise making such files or data
unavailable or inaccessible to the Company or to other
authorized users of Company systems;
1. Misrepresenting oneself or the Company;
1. Violating the laws and regulations of the United States or any
other nation or any state, city, province, or other local
jurisdiction in any way;
1. Engaging in unlawful or malicious activities;
1. Deliberately propagating any virus, worm, Trojan horse, trap-
door program code, or other code or file designed to disrupt,
disable, impair, or otherwise harm either the Company's
11. networks or systems or those of any other individual or entity;
1. Using abusive, profane, threatening, racist, sexist, or
otherwise objectionable language in either public or private
messages;
1. Sending, receiving, or accessing pornographic materials;
1. Becoming involved in partisan politics;
1. Causing congestion, disruption, disablement, alteration, or
impairment of Company networks or systems;
1. Maintaining, organizing, or participating in non-work-related
Web logs ("blogs"), Web journals, "chat rooms", or
private/personal/instant messaging;
1. Failing to log off any secure, controlled-access computer or
other form of electronic data system to which you are assigned,
if you leave such computer or system unattended;
1. Using recreational games; and/or
1. Defeating or attempting to defeat security restrictions on
company systems and applications.
Using Company automation systems to access, create, view,
transmit, or receive racist, sexist, threatening, or otherwise
objectionable or illegal material, defined as any visual, textual,
or auditory entity, file, or data, is strictly prohibited. Such
material violates the Company anti-harassment policies and
subjects the responsible employee to disciplinary action. The
Company's electronic mail system, Internet access, and
computer systems must not be used to harm others or to violate
the laws and regulations of the United States or any other nation
or any state, city, province, or other local jurisdiction in any
way. Use of company resources for illegal activity can lead to
disciplinary action, up to and including dismissal and criminal
prosecution. The Company will comply with reasonable requests
from law enforcement and regulatory agencies for logs, diaries,
archives, or files on individual Internet activities, e-mail use,
and/or computer use.
Unless specifically granted in this policy, any non-business use
of the Company's automation systems is expressly forbidden.
If you violate these policies, you could be subject to
12. disciplinary action, up to and including dismissal.
Ownership and Access of Electronic Mail, Internet Access, and
Computer Files; No Expectation of Privacy
The Company owns the rights to all data and files in any
computer, network, or other information system used in the
Company and to all data and files sent or received using any
company system or using the Company's access to any computer
network, to the extent that such rights are not superseded by
applicable laws relating to intellectual property. The Company
also reserves the right to monitor electronic mail messages
(including personal/private/instant messaging systems) and their
content, as well as any and all use by employees of the Internet
and of computer equipment used to create, view, or access e-
mail and Internet content. Employees must be aware that the
electronic mail messages sent and received using Company
equipment or Company-provided Internet access, including
web-based messaging systems used with such systems or access,
are not private and are subject to viewing, downloading,
inspection, release, and archiving by Company officials at all
times. The Company has the right to inspect any and all files
stored in private areas of the network or on individual
computers or storage media in order to assure compliance with
Company policies and state and federal laws. No employee may
access another employee's computer, computer files, or
electronic mail messages without prior authorization from either
the employee or an appropriate Company official.
The Company uses software in its electronic information
systems that allows monitoring by authorized personnel and that
creates and stores copies of any messages, files, or other
information that is entered into, received by, sent, or viewed on
such systems. There is no expectation of privacy in any
information or activity conducted, sent, performed, or viewed
on or with Company equipment or Internet access. Accordingly,
employees should assume that whatever they do, type, enter,
send, receive, and view on Company electronic information
systems is electronically stored and subject to inspection,
13. monitoring, evaluation, and Company use at any time. Further,
employees who use Company systems and Internet access to
send or receive files or other data that would otherwise be
subject to any kind of confidentiality or disclosure privilege
thereby waive whatever right they may have to assert such
confidentiality or privilege from disclosure. Employees who
wish to maintain their right to confidentiality or a disclosure
privilege must send or receive such information using some
means other than Company systems or the company-provided
Internet access.
The Company has licensed the use of certain commercial
software application programs for business purposes. Third
parties retain the ownership and distribution rights to such
software. No employee may create, use, or distribute copies of
such software that are not in compliance with the license
agreements for the software. Violation of this policy can lead to
disciplinary action, up to and including dismissal.
0.
CONFIDENTIALITY OF ELECTRONIC MAIL
As noted above, electronic mail is subject at all times to
monitoring, and the release of specific information is subject to
applicable state and federal laws and Company rules, policies,
and procedures on confidentiality. Existing rules, policies, and
procedures governing the sharing of confidential information
also apply to the sharing of information via commercial
software. Since there is the possibility that any message could
be shared with or without your permission or knowledge, the
best rule to follow in the use of electronic mail for non-work-
related information is to decide if you would post the
information on the office bulletin board with your signature.
It is a violation of Company policy for any employee, including
system administrators and supervisors, to access electronic mail
and computer systems files to satisfy curiosity about the affairs
of others, unless such access is directly related to that
14. employee's job duties. Employees found to have engaged in
such activities will be subject to disciplinary action.
0. ELECTRONIC MAIL TAMPERING
Electronic mail messages received should not be altered without
the sender's permission; nor should electronic mail be altered
and forwarded to another user and/or unauthorized attachments
be placed on another's electronic mail message.
Policy Statement for Internet/Intranet Browser(s)
The Internet is to be used to further the Company's mission, to
provide effective service of the highest quality to the
Company's customers and staff, and to support other direct job-
related purposes. Supervisors should work with employees to
determine the appropriateness of using the Internet for
professional activities and career development. The various
modes of Internet/Intranet access are Company resources and
are provided as business tools to employees who may use them
for research, professional development, and work-related
communications. Limited personal use of Internet resources is a
special exception to the general prohibition against the personal
use of computer equipment and software.
Employees are individually liable for any and all damages
incurred as a result of violating company security policy,
copyright, and licensing agreements.
All Company policies and procedures apply to employees'
conduct on the Internet, especially, but not exclusively, relating
to: intellectual property, confidentiality, company information
dissemination, standards of conduct, misuse of company
resources, anti-harassment, and information and data security.
Personal Electronic Equipment
The Company prohibits the use or possession in the workplace
of any type of camera phone, cell phone camera, digital camera,
15. video camera, or other form of image- or voice-recording device
without the express permission of the Company and of each
person whose image and/or voice is/are recorded. Employees
with such devices should leave them at home unless expressly
permitted by the Company to do otherwise. This provision does
not apply to designated Company personnel who must use such
devices in connection with their positions of employment.
0. SOCIAL MEDIA POLICY
At XYZ Inc.we understand that social media can be a fun and
rewarding way to share your life and opinions with family,
friends and co-workers around the world. However, use of
social media also presents certain risks and carries with it
certain responsibilities. To assist you in making responsible
decisions about your use of social media, we have established
these guidelines for appropriate use of social media.
This policy applies to all associates who work for XYZ Inc.or
one of its subsidiary companies in the United States (XYZ
Inc./XYZ Inc.).
Supervisors and supervisors should use the supplemental Social
Media Management Guidelines for additional guidance in
administering the policy.
Any employee who violates the Company’s social media
provisions may be subject to disciplinary action, up to and
including termination. Additionally, violations may result in
criminal prosecution, reimbursement of expenses incurred as a
result of the violation and additional legal action.
0. GUIDELINES
In the rapidly-expanding world of electronic communication,
social media can mean many things. The term "social media"
includes all means of communicating or posting information or
content of any sort on the Internet, including to your own or
someone else's web log or blog, journal, or diary, personal web
site, social networking or affinity web site, web bulletin board,
16. or a chat room, whether or not associated or affiliated with XYZ
Inc.as well as any other form of electronic communication.
The same principles and guidelines found in XYZ Inc.policies
and three basic beliefs apply to your activities online.
Ultimately, you are solely responsible for what you post online.
Before creating online content, consider some of the risks and
rewards that are involved. Keep in mind that any of your
conduct that adversely affects your job performance, the
performance of fellow associates or otherwise adversely affects
members, customers, suppliers, people who work on behalf of
XYZ Inc.or XYZ Inc.legitimate business interests may result in
disciplinary action up to and including termination.
XYZ Inc.reserves the right to monitor all public blogs and
social networking forums for the purpose of protecting its
interests and monitoring compliance with Company policies. If
you have a problem with a policy of the Company or something
that is happening with the Company, please speak to someone
about it to see if the issue can be resolved internally instead of
posting it on the internet. What you post about your personal
activities on the internet may be used to make personnel
decisions. If activity is found to be compromising or
insubordinate, the Company may require cessation and removal
of any detrimental commentary or postings.
0. KNOW AND FOLLOW THE RULES
Carefully read these guidelines, the XYZ Inc.Statement of
Ethics Policy, the XYZ Inc.Information Policy, and the
Discrimination & Harassment Prevention Policy, and ensure
your postings are consistent with these policies. Inappropriate
postings that may include discriminatory remarks, harassment,
and threats of violence or similar inappropriate or unlawful
conduct will not be tolerated and may subject you to
disciplinary action up to and including termination.
Be respectful
Always be fair and courteous to fellow associates, customers,
17. members, suppliers, or people who work on behalf of XYZ
Inc.Also, keep in mind that you are more likely to resolved
work-related complaints by speaking directly with your co-
workers or by utilizing our Open Door Policy than by posting
complaints to a social media outlet. Nevertheless, if you decide
to post complaints or criticism, avoid using statements,
photographs, video, or audio that reasonably could be viewed as
malicious, obscene, threatening, or intimidating, that disparage
customers, members, associates, or suppliers, or that might
constitute harassment or bullying. Examples of such conduct
might include offensive posts meant to intentionally harm
someone's reputation or posts that could contribute to a hostile
work environment on the basis of race, sex, disability, religion,
or any other status protected by law or company policy.
Avoid the use of profanity, or expressing yourself in a lewd or
otherwise inappropriate manner. Individuals who know you and
know that you work for the Company shape their opinion of the
Company based on what they see of you both in and out of the
workplace. Once you publish information on the internet it may
be difficult if not impossible to retrieve it.
BE HONEST AND ACCURATE
Make sure you are always honest and accurate when posting
information or news, and if you make a mistake, correct it
quickly. Be open about any previous posts you have altered.
Remember that the Internet archives almost everything;
therefore, even deleted postings can be searched. Never post
any information or rumors that you know to be false about XYZ
Inc.fellow associates, members, customers, suppliers, and
people working on behalf of XYZ Inc.or competitors.
Post only appropriate and respectful content
1. Maintain the confidentiality of XYZ Inc.trade secrets and
private or confidential information. Trade secrets may include
information regarding the development of systems, processes,
products, know-how, and technology. Do not post internal
reports, policies, procedures, or other internal business-related
18. confidential communications.
1. Respect financial disclosure laws. It is illegal to
communicate or give a "tip" on inside information to others so
that they may buy or sell stocks or securities. Such online
conduct may also violate the Insider Trading Policy.
1. Do not create a link from your blog, website, or other social
networking site to a XYZ Inc.website without identifying
yourself as a XYZ Inc.associate.
1. Express only your personal opinions. Never represent
yourself as a spokesperson for XYZ Inc.If XYZ Inc.is a subject
of the content you are creating, be clear and open about the fact
that you are an associate and make it clear that your views do
not represent those of XYZ Inc.fellow associates, members,
customers, suppliers, or people working on behalf of XYZ Inc.
If you do publish a blog or post online related to the work you
do or subjects associated with XYZ Inc. make it clear that you
are not speaking on behalf of XYZ Inc.It is best to include a
disclaimer such as "The postings on this site are my own and do
not necessarily reflect the views of XYZ Inc."
USING SOCIAL MEDIA AT WORK
Refrain from using social media while on work time or on
equipment we provide, unless it is work-related as authorized
by your Supervisor or consistent with the Company Equipment
Policy. Do not use XYZ Inc.e-mail addresses to register on
social networks, blogs, or other online tools utilized for
personal use.
RETALIATION IS PROHIBITED
XYZ Inc.prohibits taking negative action against any associate
for reporting a possible deviation from this policy or for
cooperating in an investigation. Any associate who retaliates
against another associate for reporting a possible deviation from
this policy or for cooperating in an investigation will be subject
to disciplinary action, up to and including termination.
19. MEDIA CONTACTS
Associates should not speak to the media on XYZ Inc.behalf
without contacting the doctor. All media inquiries should be
directed to them. If you have questions or need further
guidance, please contact your Compliance Officer.
Employee Use of Internet At Work: Policy Proposals
Your consulting services have been requested by the CEO of a
Fortune 500 company. The CEO is concerned about the use of
the internet at work and employs your consulting services to
discuss her concerns. Primarily, she is concerned that
employees might be abusing the internet and is wondering what
repercussions the company might face in a variety of legal
areas, specifically with respect to the legal environment of
business, ethics, and human resources issues. She is also
concerned with preventing abuse of the internet at all levels,
from low-level employees to the Board of Directors.
She requests a memo from you regarding:
1. Possible torts that could be committed by employees who use
the internet at work
2. Possible crimes that could be committed by employees who
use the internet at work (and indicate whether the crimes are
white collar or blue collar)
3. Liability of the corporation versus liability of the individual
employee through commission of torts or crimes using the
internet at work
4. Whether violations of the duty of care or duty of loyalty
could exist through use of social media sites at work
5. Employee privacy rights or concerns that exist regarding use
of the internet at work
6. Employment laws that protect the employee or the employer
with respect to use of the internet at work.
Identify two policies that this CEO could put in place to curb
the potential for abuse of the internet at work, with one policy
20. that addresses low-level employees and one policy that is
targeted for the board of directors. Keep in mind the business
judgment rule with respect to the latter policy and discuss
whether it might ever be invoked to enforce or ignore such a
policy. Articulate your ideas on how to remedy the issue of
corporate malfeasance that occurs through abuse of the internet
at work. Proffer some clear recommendations to the CEO about
how to improve overall corporate governance by reducing the
potential for abuse of the internet at work.
You must also clearly address ethical issues that arise regarding
your policies; note that ethical issues might exist on behalf of
the employee if your policies are not utilized, but ethical issues
might exist on behalf of the employer if the polices are
implemented.
The CEO intends to pass along this memo to other employees in
the company who might not have a strong understanding of
these concepts. Thus, you are also requested to clearly explain
and define the legal concepts you raise. She also is concerned
about offending employees with policy suggestions and requests
you keep this in mind with your suggested policies.
This issue exists in many companies and corporations, so you
are encouraged to research outside sources for data supporting
policies to reduce abuse of the internet at work. Demonstrate
critical thinking by analyzing, evaluating, and interpreting
appropriate policies to provide an original perspective to
enhance corporate legal and ethical environs as they relate to
use of the internet at work.
You are expected to convey complex ideas in a clear, concise
and organized fashion, using the required and recommended
readings from the course for analytical support.