Premium Essay

Leg 500 Week 1 Discussion

In: Other Topics

Submitted By hwsoloutions
Words 441
Pages 2
LEG 500 WEEK 1 DISCUSSION

A+ Graded Tutorial Available At: http://hwsoloutions.com/?product=leg-500-week-1-discussion Visit Our website: http://hwsoloutions.com/
Product Description
PRODUCT DESCRIPTION
LEG 500 Week 1 Discussion,
From the e-Activity, determine the ethical theory or theories (from Chapter 1 of the textbook) that best support(s) the B-corp concept. Support your response.
A B Corporation’s requires a firm to conform to socially and beneficial practices. These practices can include protecting the environment, community, or preserving employee benefits. The idea of B Corporations cam from interest in corporate social responsibility. The theory that best support B-corps is virtue ethics which looks at what human beings are capable of being, how to develop habits of good character that will lead them to their potential. Ethic of care concept can also be used with B-corps where ethics becomes nurturing and reinforcing the ties with one another such as caring.
Evaluate the likelihood of traditional corporations using social responsibility as an effective competitive strategy. Specify at least one (1) way that a company with which you are familiar can use (or has used) social responsibility as a competitive strategy in the marketing of its products / services, supply chain, charitable activities, strategic investments, or operations.
Social responsibility is the thought that companies should embrace social topics that affect the community and not solely focus on their profits. Social responsibility means to
From the e-Activity, determine the ethical theory or theories (from Chapter 1 of the textbook) that best support(s) the B-corp concept. Support your response.
A B Corporation’s requires a firm to conform to socially and beneficial practices. These practices can include protecting the environment, community, or preserving employee benefits.…...

Similar Documents

Free Essay

Leg -500-Assignment 1

...Employment-At-Will Doctrine Ayesha Kapoor LEG-500 – Law, Ethics and Corporate Governance Dr. Angelina Audrey 28th July 2012 Employment-At-Will Doctrine: At-Will employment is a doctrine of American Law, that defines an employment relationship in which either party can immediately terminate the relationship at any time with or without any advance warning and with no subsequent liability, provided there was no express contract for a definite term governing the employment relationship and that the employer does not belong to a collective bargaining group. In USA, any hiring is presumed to be “At-Will” that is the employer is free to discharge individuals for good cause or bad cause or no cause at all and the employee too is equally fit to quit, strike or otherwise cease work. In this assignment in capacity of the Chief operating Officer of the company, I would like to address some of the personnel problems that require immediate attention before the Initial Public Offering (IPO) of the company. Scenario 1.In this scenario John’s action of posting a negative statement on Facebook is truly unprofessional and unethical. According to the National Labour Relations Board, criticism by the employee over social networking sites is a protected activity that employers should not violate by punishing workers for such statements. Hence it prohibits employers to retaliate against employees for communicating with each other online or in person. John cannot be legally fired. This......

Words: 2380 - Pages: 10

Premium Essay

Leg 500 Assignment 1

...Running head: EMPLOYMENT-AT-WILL DOCTRINE 1 Employment-At-Will Doctrine Name LEG 500 Date Professor EMPLOYMENT-AT-WILL DOCTRINE Employment-At-Will Doctrine Employment-At-Will Doctrine is “the common law rule that holds that whenever an employment relationship is of an indefinite duration, either party may terminate the relationship a anytime” (Halbert, 2010). The new hired Chief Operating Officer (COO) needs to understand this law in order to prepare for an IPO (Initial Public Offering). Sadly the midsize company where the COO was hired has some issues that must be addressed before addressing the public. Here are the eight scenarios that the company and new COO currently face. 2 First scenario, John posted a rant on Facebook page in which he criticized the company’s most important customer. Nowadays when working for a company, employees should know that there is no privacy when it comes to what you as individuals do or express on a social media, there is always somebody that will get the message and pass the information to a superior. In this case, John not only put the credibility of the company in jeopardy, but also his job and the trust of the client. Now the company not only has to do some damage control repair but also needs to review the policy regarding social media and let know the employees the consequences of posting negative comments about the company’s client on personal blogs or social media. The company should implement something similar to what......

Words: 1403 - Pages: 6

Premium Essay

Week 1 Discussion 1

...Networking Security Fundamentals Week 1 Question 1 "Providing Security Over Data" Please respond to the following: The CIA Triad offers three security tenets that allow data owners the framework to secure data. Considering your place of employment or your home computing environment, discuss in detail the means in which each of the three tenets are addressed to mitigate risk and enhance security in your chosen environment. In my workplace, all three security tenets are strongly enforced. Our information systems are available 99.9% of the time. We have specialists on call to support all facets of the organization, so even an unplanned outage can be mitigated by flipping to a mirror, then correcting the issue in the production environment. The integrity of the information is protected by the user account controls implemented by the data administrators, who create views and profiles for each user. Additionally, network admins restrict access to the data servers themselves. The confidentiality is also protected by the user account controls. With these in place, only authorized users are able to access or modify data. The use of mobile devices to create or access data has gained worldwide appeal and has obtained critical mass. From the e-Activity, summarize the attack and describe how you would mitigate the threat.  Mobile devices are now more alluring to attackers due to the concentration of users on a small base of operating systems. For example, prior to the launch of......

Words: 1411 - Pages: 6

Free Essay

Leg 500 Week 5

...Employment At Will Doctrine Stephen C Wilburth Jr LEG 500 May 1st, 2014 Lateefah Muhammad Abstract This is the doctrine in American law which defines how the employment relationship can be terminated by either party by giving advance notice or even without one. Privacy management tools help organizations conduct privacy impact assessments, check processing activities against requirements from privacy regulations, and track incidents that lead to unauthorized disclosures (investigation, remediation and reporting). They analyze and document data flows of personal information (nature of data, purpose of processing, data controller), support authoring and distribution of privacy policies (for which they provide templates), and track user awareness (users acknowledging having read the policies). Employment-At-Will Doctrine The employment-at-will doctrine is a legal ruling supported by companies that allows an employer the ability to dismiss an employee for any reason, other than an illegal one or no reason, without legal liability. The doctrine allows an employee to leave a position or job, at any time, without reason void of any legal consequences (Halbert & Ingulli, 2012). With employment-at-will, an employer has the right to change its policies or terms of employment without notice. Wages or benefits can be altered or reduced at any time. The doctrine can be modified by contracts drawn by the employer. The contract may specify the terms of employment or may...

Words: 2764 - Pages: 12

Premium Essay

Leg 500: Assmnt 1

...be no issues or hesitations with her termination. The fourth scenario involves Bill, who has been found to be using his company issued Blackberry to also run a side business. Bill would not be terminated, but let off with a warning and possible probation, and would also lose his cell phone privileges for a specific period of time. The fifth scenario involves a group of secretaries that decided to collectively dress in black and white striped outfits on the same day in order to silently protest a memo that announces the companies new key logger software installed on company computers. There is no way to definitely prove their intentions by wearing the colors other than simple hearsay, so this matter would be dropped without further discussion. The sixth scenario involves Joe, who was reprimanded for sending an email with content that insulted a top client from his personal email account on a company computer. After being confronted, he threatens to sue the company for invasion of privacy; however in the previous scenario the secretaries wore black and white stripes in a silent protest against the key logger software, which detects the movements on employee computers. Joe would have already been made aware that anything private in nature that he accessed on a company computer would be open to viewing by management and corporate. Joe would not have a case and would be let go with a decent severance package. The seventh scenario discusses a supervisor that has requested......

Words: 1228 - Pages: 5

Free Essay

Leg 500, Assigment 1

...Electronic Surveillance of Employees Electronic Surveillance of Employees Your Name Date Your School/Instructor/Class Electronic Surveillance of Employees 1. Explain where an employee can reasonably expect to have privacy in the workplace Today, employees grow increasingly concerned about their workplace privacy, because employers have been closely monitoring them through electronic surveillance more now than a decade ago. In some states, there are efforts made to try and cease the monitoring, however they are having little luck, and the debate will seemingly exist for years to come. In my opinion, employees should only expect to have privacy in restrooms, and break rooms in business organizations. In the case of the car sales business, the desks were appropriate for the type of business conducted, and the area is open so there is an open communication between customer and salesperson. 2. In the office workplace there are typically two types of workspaces, an open area, in which there are several desks and where conversations can be overhead, or an enclosed office, in which—when the door is closed—conversations cannot be heard and where one would expect virtually total privacy. Explain whether it makes a difference if an employee is in an open area or in an enclosed office. In a setting that is closed should only be done, if the supervisor needs personal information...

Words: 724 - Pages: 3

Free Essay

Leg 500 Week 2 Discussion

...LEG 500 WEEK 2 DISCUSSION A+ Graded Tutorial Available At: http://hwsoloutions.com/?product=leg-500-week-2-discussion Visit Our website: http://hwsoloutions.com/ Product Description PRODUCT DESCRIPTION LEG 500 Week 2 Discussion, Analyze the duty of loyalty in whistleblower case to determine to whom loyalty is owed and shows the greater duty of loyalty. Support your analysis with specific examples. Then suggest at least one change to an existing law. The duty of loyalty in the case of Milton v. IIT Research Institute did not lie upon Dr. Donn Milton. Dr. Milton had no legal duty to his claims of reporting tax fraud to IITRI’s Board of Directors. Dr. Milton was not responsible for correcting IITRI’s tax filings nor did he face potential liability for failing to disclose this information (Halbert & Ingulli, p.48.) Dr. Milton’s job was to supervise administration on a contract between IITR and the federal government called the Tax Systems Modernization Institute (TSMI) (Federal 4th Circuit, 1998.) Analyze the duty of loyalty in whistleblower case to determine to whom loyalty is owed and shows the greater duty of loyalty. Support your analysis with specific examples. Then suggest at least one change to an existing law. The duty of loyalty in the case of Milton v. IIT Research Institute did not lie upon Dr. Donn Milton. Dr. Milton had no legal duty to his claims of reporting tax fraud to IITRI’s Board of Directors. Dr. Milton was not responsible for correcting......

Words: 295 - Pages: 2

Free Essay

Leg 500 Week 3 Assignment

...LEG 500 WEEK 3 ASSIGNMENT A+ Graded Tutorial Available At: http://hwsoloutions.com/?product=leg-500-week-3-assignment Visit Our website: http://hwsoloutions.com/ Product Description PRODUCT DESCRIPTION LEG 500 Week 3 Assignment, Although there are many references to famous whistleblowers, such as those at WorldCom and Enron, whistleblowing cases can happen in any company and whistleblowers’ actions can have dire consequences for the company, employees, and stakeholders. There are inherent qualities that typify whistleblowers, such as being altruistically motivated or selfless, highly respected, above reproach, and among the best employees. Whistleblowers are also typically utilitarian regarding which options will invoke the greatest amount of happiness (so-to-speak) but do the less harm in other words, a whistleblower has the option to either say nothing in the first place or report a wrong doing to his or her supervisor, and finally blow the whistle externally. So for whistleblowers it’s a moral obligation for them to reveal wrong-doings in an organization. Whistleblowers are uninterested in altering their behavior where misconduct abounds, rather they allow their own attitudes and beliefs to guide them. Whistleblowers are often well educated and hold professional positions with an established reputation for high integrity. Although there are many references to famous whistleblowers, such as those at WorldCom and Enron, whistleblowing cases can happen in any......

Words: 367 - Pages: 2

Free Essay

Leg 500 Week 3 Discussion

...LEG 500 WEEK 3 DISCUSSION A+ Graded Tutorial Available At: http://hwsoloutions.com/?product=leg-500-week-3-discussion Visit Our website: http://hwsoloutions.com/ Product Description PRODUCT DESCRIPTION LEG 500 Week 3 Discussion, The legal doctrine of employment-at-will gives employers the right to terminate employment for just about any reason with very few restrictions(Halbert & Ingulli, 2012). Additionally, protections under the First Amendment do not apply in private corporations. Lewis Maltby (2010) cites the case of Lynne Gobbell who was fired in 2004 because she refused to remove a political bumper sticker from her car in direct disobedience of her boss. As such, private employers have fairly unlimited ability to monitor productivity and communications of employees at work to include use of communications equipment provided by the company and video monitoring. However, I recommend that the employer’s ability to monitor an employee’s personal email be limited, even when an employee logs into their personal email account from a work computer. Many employers allow employees leeway to do some personal business on company time or using company provided computers during work breaks. When logging into personal e-mail through an account such as Gmail or Yahoo, an employee has a reasonable The legal doctrine of employment-at-will gives employers the right to terminate employment for just about any reason with very few restrictions(Halbert & Ingulli, 2012)...

Words: 375 - Pages: 2

Premium Essay

Leg 500-Assignment 1

...Electronic Surveillance of Employees Legal 500 10/20/2011 1. Explain where an employee can reasonably expect to have privacy in the workplace. The increased use of technology in the workplace has generated new fears for both employers and employees in the privacy region. These days most employees have access to email, and internet access in the workplace, as opposed to a decade ago, has also exploded. According to an IDC Corporation study, two-thirds of employees in medium and large companies in the United States had Internet access in 1997. Today, those numbers are exponentially higher (Gindin, 1997). While this technology can be praised for the ways in which it has helped industry and general public, it also raises concerns about employee’s privacy in the workplace that before did not exist. Employers did not have technological access to both work-related and personal information about their employees, but now employers have full technological access to the employee’s information while he is at work. Question is why employers would need the personal information of their workers, what they do with the information and why employees should be worried, how employers can protect themselves from privacy suits, what the legal position of such privacy concern is and lastly, what employees should be doing to safeguard their privacy while at work. The employees can reasonably expect privacy in the workplace in places like restrooms, parking lots, lounges and in the kitchen......

Words: 2681 - Pages: 11

Free Essay

Leg 500 Week 8

...The Food and Drug Administration (FDA) tries to be proactive in protecting the public from harm caused by drugs, medical devices, food, etc. They do a lot of testing and try to prevent things from slipping through the cracks. Still, there are always recalls happening, which makes the FDA react. For example, just last week Wegman's had to recall their butternut squash ravioli because it contained cashews and almonds that were undeclared. For people with allergies to those nuts, there can be significant harm, especially when nothing on the box suggested that the product had those nuts in them. The Consumer Product Safety Commission (CPSC), similarly is both proactive and reactive because, like the FDA, although it tries to ensure safety before any harm occurs, there is always something that happens that results in a product recall. For example, just a few days ago, glass jar candles were recalled by the CPSC because the glass lid can break when the jar is opened, which can cause cuts. So far, there have been 16 reports of cuts, one of which involved stitches. The CPSC seems to be a little slow in reacting to this issue. One report of this happening should be sufficient. It should not take this many cases in order to create a recall. Fifteen reported cases, and countless others that went unreported, could have been prevented if they acted quicker.   The National Highway Traffic Safety Administration’s (NHTSA) is a little slower in their response time because......

Words: 585 - Pages: 3

Premium Essay

Leg 500 Assignment 1

...Leg 500 – Assignment 1 Electronic Surveillance of Employees is a video about a car dealership manager that uses electronic surveillance in order to eaves drop on his employees. From the manager’s point of view, he is ensuring the truthfulness of the employees in the best interest of the dealership. However, as one employee points out, the manager is not only invading the privacy of the employees, but also that of the customers. The saleswoman feels that her personal privacy, as well as that of the customers is invaded and that the surveillance is unfair. Explain where an employee can reasonably expect to have privacy in the workplace. There are very few situations in which an employee can reasonably expect to have privacy in the workplace. Employers have the right to monitor employees in the work place. They can monitor everything from their phone calls, to their computer usage, to even conversations between employees. The few places employees can expect privacy is in the restroom or locker rooms, which are prohibited from video surveillance, however, audio surveillance may still be used (1993). In most states, employers are not even required to notify employees when they are being monitored. One exception is California, which requires employers to notify employees when they are being monitored on the telephone via either a beep or a pre-recorded message (1993). California also requires employers, when they recognize a telephone conversation as being personal...

Words: 1367 - Pages: 6

Free Essay

Leg 500 Week 6 Discussion 1

...Review “Second Treatise of Government” in Chapter 6. Please respond to the following: John Locke’s Two Treatises of Government were written to defend armed resistance to the English king by English subjects in the years preceding the Whig revolution, the Glorious Revolution of 1689 (as it’s called). Involved in plots, Locke fled from England to Holland in 1683 and stayed there until 1689. The First Treatise is an attack on the theory of absolute monarchy defended by Sir Robert Filmer. The Filmer theory traces the rights of the monarch to the establishment of monarchical power in Adam (the first man of the Bible) by God. This absolute authority to rule then gets passed along down to the present king of England. So the king is answerable only to God and the subjects are obligated to obey the king’s commands come what may, says Filmer. * Explain what, according to Locke, gives a person their right to property. As stated in the textbook, " everyman has a property in his own Person. This nobody has any right to but himself. The labor of his body, and the work of his hands, we may say, are properly his. Whatsoever then he removes out of the state that nature hath provided, and left it in, he hath mixed his labor with, and joined to it something that is his own, and thereby makes it his property. It being by him removed from the common state nature placed it in, it hath by this labor something annexed to it, that excludes the common right of other men" (p.209,......

Words: 1223 - Pages: 5

Premium Essay

Leg 500 Assignment 1

...Assignment # 1- Electronic Surveillance of Employees Ww gg Law, Ethics, and Corporate Governance Professor Lynette Collins April 19, 2011 Electronic Surveillance of Employees 1. Explain where an employee can reasonably expect to have privacy in the workplace. Privacy has become extremely important part of American culture. Lately, work place privacy has brought unwanted and costly litigations. To protect the company from those kinds of litigations, organizations are monitoring employee communications carefully. Although according to courts the private organizations have rights to monitor employee communications. In order to this `` Employee surveillance and email monitoring in the workplace present a number of sometimes conflicting issues regarding an employer’s need to protect its property and itself against liability and an employee’s right to privacy``(Adams, Scheuing & Feeley, 2000). Martin and Freeman (2003) also examined key arguments for and against employee monitoring, productivity, security, liability, privacy, and creativity. Privacy may be invaded in four ways. The first is unreasonable intrusion upon a person’s seclusion. Appropriation occurs when the use of a person’s name or likeness is used for economic benefit. Third is public disclosure of private facts. Finally, false light Most cases concerning invasion of privacy by employers involve intrusion upon seclusion’s is publicly characterizing or placing a person in a false light (Chieh......

Words: 885 - Pages: 4

Premium Essay

Leg 500 Assigmement 1

...broadest compare to public policy and implied contract exceptions. The implementation of statutory exceptions has been given protection to employees. Employers cannot fire employees due to their race, color, religion, sex, national origin, age, or disability (Halbert, T. & Ingulli, e. (2006)).Jennifer was hired for abilities and skills to perform the job and its duties. As her manager we have put here through several months of training and she has failed to learn the necessary computer skills to perform her job up to the company’s standards. Now as her manager I will be providing Jennifer with coaching on this situation to see how we can help her improve the skills. We will over her to shadow a senior employee for a week then let her work under a senior employee for week to see what her competence with the system. Also to see Jenifer’s ability to with a visual or on the job training of what she’ll actually be doing. Now we are moving forward with Jennifer a little in depth training. It’s very costly for my company to go the hiring process so soon. 2. Describe what steps you would take to address the following scenario involving management, behavior, and performance: According to, Charles Muhl JD formerly an economist with the Bureau of Labor Statistics, Washington, DC, “The typical situation involves handbook which state that employees will be disciplined or terminated only for “just cause” or under other specified circumstances, or provisions which......

Words: 769 - Pages: 4