N OBODY SAID I SHOULDN ’ T PAGE 150 & 151- ETHICS C HAPTER FIVE MGS3040-Section 3 Group B Shavone Parris Idalia Fabregas Annette Immella Sergio Martins.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Protect Our Students Protect Ourselves
Conflict of Interest, Conflict of Commitment, and Outside Activities UTSA HOP 1.33 Non-covered UTSA staff 1.
Employee Performance Any employee’s performance can change in a variety of ways during her/his tenure in a position. Ideally, everyone would follow the.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Foundations of Real Estate Management BOMA International ® Module 1: Real Estate Administration Contracting for Goods and Services ®
RVCC FACULTY FERPA WORKSHOP OCTOBER 2011 DAN PALUBNIAK REGISTRAR
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
IST346: Information Ethics. Ethics  Ethics are the principles of conduct that govern a group of people.  Ethics are not morals.  Morals are the proclamation.
FERPA The Family Educational Rights and Privacy Act.
Group E: Brittany Caleb John & Rishi MGS 3040 section 4.
No body said I shouldn’t. Where did Kelly go wrong? Kelly was only hired to the company as field specialist in restoring and backing-up company‘s database.
MGS 3040 CHAPTER 5 DISCUSSION QUESTIONS GROUP B Kimberly Matt Shawn Ashley.
Have You Read Your Medical Record? Peggy Beck, RHIA, CMT, FAAMT.
INTERNET and CODE OF CONDUCT
Department of Human Resources. Progressive Process A progressive discipline system gives employees ample warning of misconduct or work-related problems;
Confidentiality… important facts to know and critical things to do!
Disciplinary Policy INCA Community Services. Purpose O Every employee has the duty and the responsibility to be aware of and abide by existing rules and.
Yes No Yes No Yes No Yes No Yes No Yes No Yes No.
Termination Process Team 1: Anuj Kumar Agrawal Mohaammed Al-baqmi
New Hire training.
PC Support & Repair Chapter 10 Communication Skills.
Ethics and professional Conducts for Civil engineers
2015 ANNUAL TRAINING By: Denise Goff
Use Policies Deputy Attorney General Robert Morgester
An Educational Computer Based Training Program CBTCBT.
Section 9.2 Ethical Behavior.
Copyright  2010 Pearson Education Canada / J A McLachlan Chapter Nine Making Ethical Decisions.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Parts taken from Human Behavior 2ed Chapter 22 Effort and Ethics.
By Joe Breen.  The self regulation of ethics relies on ways to deter unethical behavior of the members.  The AMC’s first code was enacted in 1972 and.
 How it affects a company’s operation  The need to understand the complexity of business ethics and  the stages that must be established for the proper.
Data Base Systems Some Thoughts. Ethics Guide–Nobody Said I Shouldn’t Kelly make a backup copy of his company’s database on CD and took it home and installed.
EDAD 520 Legal and Ethical Foundations of Educational Leadership.
Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Chapter 7 Fraud, Ethics, and Controls.
1 10 ways to prevent legal malpractice Protect yourself and your firm.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
PROGRESSIVE DISCIPLINE Guidelines for Use. Progressive Discipline is… Discipline applied in several stages of severity, culminating in dismissal if necessary.
INTERNAL CONTROLS What are they? Why should I care?
Performance Management of Staff Disciplinary Process Richard Walsh Manager – Human Resources.
Lecture 27 Intellectual Property. Intellectual Property simply defined is any form of knowledge or expression created with one's intellect. It includes.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
Ch. 8 Review How can you prepare for the 1 st day on the job? How can you prepare for the 1 st day on the job? How do companies/organizations help new.
Your Rights! An overview of Special Education Laws Presented by: The Individual Needs Department.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
E MPLOYEE R IGHTS & D ISCIPLINE MGT 3513 Introduction to Human Resource Management Please remember to turn off and put away cell phones.
1. On a blank sheet of paper… Write down one reason why you may be disciplined (written up) at work.
Canada’s Breach Reporting Law What you need to know Timothy M. Banks, CIPP/C Dentons Canada LLP July 21, 2015.
For providing best security services security guard should maintain some rules, at the same times customers also should obey those rules set by security personalities. Then only a good professional relationship between customer and security can be built.
Registration Audit Escort & Managers Information
Supervisors, Trainees, and USPAP
ETHICS: Nobody Said I Shouldn’t
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
PROGRESSIVE DISCIPLINE Guidelines for Use
Employee Rights & Discipline
The Health Insurance Portability and Accountability Act
Progressive Discipline
Handout 9: Organisational policies and procedures
Developing an Impartial and Appropriate Factual Record
Presentation transcript:

N OBODY SAID I SHOULDN ’ T PAGE 150 & 151- ETHICS C HAPTER FIVE MGS3040-Section 3 Group B Shavone Parris Idalia Fabregas Annette Immella Sergio Martins Huascar Teran

Shavone Parris

W HERE DID KELLY GO WRONG ? Kelly’s first error was copying then taking home the database. The second was obtaining personal information on the accounts and doing his own investigation on each account. The last error was actually discussing the accounts in public with Jason and probing him about the discounts he gave the vendor.

Idalia Fabregas

D O YOU THINK IT WAS ILLEGAL, UNETHICAL OR NEITHER FOR K ELLY TO TAKE THE DATABASE HOME AND QUERY THE DATA ? It was both illegal and unethical for Kelly to take the database home because it is the property of the company and as such it should not be removed from the workplace without proper approval - of which Kelly did not obtain. Furthermore, he was using the database for his own amusement purpose and it had nothing to do with his normal job responsibility Lastly, his superiors were unaware of his actions.

D OES THE COMPANY SHARE CULPABILITY WITH K ELLY ? The company would share culpability with Kelly if they did not express in writing the rules and regulations regarding company property. However if the company had a written policy which was made public to all employees then Kelly would have the sole responsibility. Also, it does not appear that the company had any security measures in place to prohibit their employees from copying files; it is the companies responsibility to take protective measures as well.

Annette Immella

W HAT DO YOU THINK K ELLY SHOULD HAVE DONE UPON DISCOVERING THE ODD PATTERN IN J ASON ' S ORDERS ? Kelly should have immediately reported the odd pattern to his supervisor. Who in turn could have looked further into the matter. Kelly should have also admitted to his superiors that he copied the database for his own personal use in learning more about databases. This would at the very least given him a chance to explain his position as to why he took the information without permission.

W HAT SHOULD THE COMPANY HAVE DONE BEFORE FIRING K ELLY ? The company should have changed the administrative passwords to all of Kelly’s accounts. The company should have met face to face with Kelly to obtain a reason as to why he had looked at the database. The company should have escorted Kelly to his home in order to actually view the copied CD of the database and destroy its content immediately.

Sergio Martins

I S IT POSSIBLE THAT SOMEONE OTHER THAN J ASON IS INVOLVED IN THE ARRANGEMENTS WITH VALLEY APPLICATIONS ? Given the situation between Jason and Valley Appliances we can certainly conclude that someone else could be involved. Given the fact that Jason gave Valley Appliances such hefty discounts and no other Sales Representative did, someone may be covering up for him, especially since Kelly was immediately terminated after joking with Jason about his sales pattern. Or chances are that he could be receiving some sort of an incentive from Valley Appliances.

W HAT SHOULD K ELLY HAVE DONE IN LIGHT OF THAT POSSIBILITY ? Kelly should have looked through data of the Sales personnel at work rather than at home and immediately have reported the suspicious sales activity of Jason to a Manager. However, it was wrong that Kelly was looking through this data especially given the fact that he took the records home.

W HAT SHOULD K ELLY DO NOW ? Kelly should have never mentioned anything to Jason not knowing what the outcome would be. Most importantly he should haven taken such a matter directly to a manager. It is evident that Jason’s odd sales behavior with Valley Appliances was unethical and as well not fair to other clients. Given the outcome of Kelly’s decision to tell Jason about what he had done, he should learn to not make that mistake again and that work data is vital to the company and its employees – therefore, it should stay at work and not be brought home.

Huascar Teran

M ETADATA MAKE DATABASES EASY TO USE – FOR BOTH AUTHORIZED AND UNAUTHORIZED PURPOSES – E XPLAIN WHAT ORGANIZATIONS SHOULD DO IN LIGHT OF THIS FACT. Metadata- is basically data about data. In this case its data that describes the content of the database. Kelly was able to access the database because of the knowledge she had with SQL. An IT person would normally have easier access to decode the content of the database. First, if a business is afraid of the information it contains, they should contract the database management to a third party.

M ETADATA MAKE DATABASES EASY TO USE – FOR BOTH AUTHORIZED AND UNAUTHORIZED PURPOSES – E XPLAIN WHAT ORGANIZATIONS SHOULD DO IN LIGHT OF THIS FACT. Second, they could have everyone with access to the "information" to sign a contract prohibiting anyone to disclose any information about it. Third, would be to password protect it by the manager. Only the individuals working with the document would have the password. Finally, they could monitor illegal downloading of confidential files and have a flagged directed to the Managers of the individual trying to copy the file.