No body said I shouldn’t. Where did Kelly go wrong? Kelly was only hired to the company as field specialist in restoring and backing-up company‘s database.

Slides:



Advertisements
Similar presentations
4.07 Emily Wingo.
Advertisements

Word List A.
Business Ethics and Social Responsibility
Integrated Assessment Record (IAR) Privacy and Security for IAR Viewers
Problem Friggle Corp. is a leasing and property management company located in Alberta. It provides financing to organizations wishing to purchase.
ASAC Annual Conference – St. Louis, MO October 21, 2014 Presented by: Paige Gilligan, CAC.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Module 5: financial services review
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Safety On The Internet Illinois Attorney General’s Office Naperville Police Department.
Chapter 4 Ethics and Social Responsibility
IST346: Information Ethics. Ethics  Ethics are the principles of conduct that govern a group of people.  Ethics are not morals.  Morals are the proclamation.
Values, Integrity, Morals, Philosophy, and Corporate Culture Dr. Stan Abraham MHR 423 Fall 2003.
Group E: Brittany Caleb John & Rishi MGS 3040 section 4.
Dialing For Dollars Group D Jim Purvis, Pam Roslonek, Keith Poirier.
MGS 3040 CHAPTER 5 DISCUSSION QUESTIONS GROUP B Kimberly Matt Shawn Ashley.
Big Data and Employment Discrimination Aaron Konopasky, J.D., Ph.D.
Ethical Use of Computers. Ethics and Responsibilities in the Computing Process Every profession operates with a set of ethics that help to define the.
Ethics in Software Engineering
Safety On The Internet  Usage time  Locations that may be accessed  Parental controls  What information may be shared with others Online rules should.
UNIT 2: CONTEXT. Chapter 3: Ethics & Social Responsibility.
Information Age In Which We Live Session 2. Introduction Knowledge is Power What you don’t know will hurt you Business are using information to reel in.
PC Support & Repair Chapter 10 Communication Skills.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Table of Contents What Are Buyer Personas?...……………………………………………………………. Slide 3 What Are Negative Personas? ……………………………………… ….. Slide.
N OBODY SAID I SHOULDN ’ T PAGE 150 & 151- ETHICS C HAPTER FIVE MGS3040-Section 3 Group B Shavone Parris Idalia Fabregas Annette Immella Sergio Martins.
Section 9.2 Ethical Behavior.
Chapter 4 Ethics and Social Responsibility
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
MORALITY What are morals? What are your morals?
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Digital Citizenship Created By: Kelli Stinson June 2011.
Dimensions of E – Commerce Security
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Business Ethics. What is Ethics? Ethics: A set of moral principles, especially ones relating to or affirming a specified group, field, or form of conduct;
By Joe Breen.  The self regulation of ethics relies on ways to deter unethical behavior of the members.  The AMC’s first code was enacted in 1972 and.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Data Base Systems Some Thoughts. Ethics Guide–Nobody Said I Shouldn’t Kelly make a backup copy of his company’s database on CD and took it home and installed.
WHITE COLLAR CRIME Lecture 13: Policing & Regulating White Collar Crime.
How to succeed as a distributor in Direct Marketing.
Ethics for Engineering Practice 4 Codes of Ethics 4 Ethical Systems and Decision Strategies 4 Building Blocks of Trust 4 Situation Dynamics and Ethical.
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 13 Evaluating Corporate Ethics Understanding Business Ethics Stanwick.
Cyber Safety Jamie Salazar.
Chapter 9 Workplace EthicsSucceeding in the World of Work Ethical Behavior 9.2 SECTION OPENER / CLOSER INSERT BOOK COVER ART Section 9.2 Ethical Behavior.
Chapter 9 Workplace EthicsSucceeding in the World of Work Ethical Behavior 9.2 SECTION OPENER / CLOSER INSERT BOOK COVER ART Ethical Behavior.
10-1. P A R T P A R T Assessing Performance and Developing Employees Managing Employees’ Performance Developing Employees for Future Success Separating.
EXHIBIT B Interactive Game on Internal Security and Employee Monitoring BEGIN.
BUYER PERSONAS HOW TO CREATE FOR YOUR BUSINESS
Table of Contents What Are Buyer Personas? ...……………………………………………………………. Slide 3 What Are Negative Personas? ……………………………………… ….. Slide.
Solutions of Case Study 4 & 6
Table of Contents What Are Buyer Personas? ...……………………………………………………………. Slide 3 What Are Negative Personas? ……………………………………… ….. Slide.
Data Validation & Security.
Field Inventory Services-Sanofi Inventory and Audit Training
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
BCT 2.00 Analyze Technology Issues
ETHICS: Nobody Said I Shouldn’t
Table of Contents What Are Buyer Personas? ...……………………………………………………………. Slide 3 What Are Negative Personas? ……………………………………… ….. Slide.
Deciding and acting ethically
BellWork A neighbor offered you $15 for picking up her mail. Afterward, she gives you $20 and refuses change. She actually gave you two twenties that were.
How To Investigate Complaints of Harassment
Table of Contents What Are Buyer Personas? ...……………………………………………………………. Slide 3 What Are Negative Personas? ……………………………………… ….. Slide.
Table of Contents What Are Buyer Personas? ...……………………………………………………………. Slide 3 What Are Negative Personas? ……………………………………… ….. Slide.
Table of Contents What Are Buyer Personas? ...……………………………………………………………. Slide 3 What Are Negative Personas? ……………………………………… ….. Slide.
Internal Controls Risk and Fraud? Risk is anything that could negatively impact on the businesses ability to meet it’s operational objectives.
Table of Contents What Are Buyer Personas? ...……………………………………………………………. Slide 3 What Are Negative Personas? ……………………………………… ….. Slide.
A Look at the Complexity of Human Resource Management
Table of Contents What Are Buyer Personas? ...……………………………………………………………. Slide 3 What Are Negative Personas? ……………………………………… ….. Slide.
Table of Contents What Are Buyer Personas? ...……………………………………………………………. Slide 3 What Are Negative Personas? ……………………………………… ….. Slide.
Table of Contents What Are Buyer Personas? ...……………………………………………………………. Slide 3 What Are Negative Personas? ……………………………………… ….. Slide.
Presentation transcript:

No body said I shouldn’t

Where did Kelly go wrong? Kelly was only hired to the company as field specialist in restoring and backing-up company‘s database in a secure file. She had never got any permission to make a copy of the company’s database, not only that, but also she had left corporate premises with a copy of the company’s data sales, financial information, marketing strategies, all information in what could concerns a competitors. She also had invaded other sales associate’s privacy and sales codes. She viewed information that she had no business to view.

. Do you think it was illegal, unethical, or neither for Kelly to take the database home and query the data? Yes, because it wasn’t her business to view sales information and business deals because this information should be private and secured. I think it was illegal because this kind of information could threaten the strength of this corporate in their area of market. I also believe it was unethical because she viewed confidential information about sales associates and sales deals, in addition, to business integrity by making a duplicate copy of the company’s database and taking it home.

Does the company share culpability with Kelly? I don’t think so because the company fired her immediately after being informed with this incident, although Kelly thought that she was doing the right thing by finding out that one of the sales associate is giving major discounts to a certain corporate with the motive of either manipulation of commission, or conflict of interest. Her boss considered her acts as a violation to the company code of conduct and she was fired instantly.

What do you think Kelly should have done upon discovering the odd pattern in Jason’s orders Kelly should have contacted her boss immediately explaining him the information she discovered in regard to a possibility of fraudulent accounts or she thinks you might want to take a closer look at certain deals. She shouldn’t waited until she returned back to work on Monday because her manger fired her under the perception that she stole the company’s database.

What should the company have done before firing Kelly? The company should have generated an investigation with Kelly first, because they would’ve find out about Jason's odd-pattern of discounts to certain deals. Probably they could’ve cut her a brake and she gets off on write-up just because her real intention was knowledging her self on company’s products and just that her good luck, she was able to access and read in details about sales deals and finding Jason’s odd- pattern of discounts issue.

Is it possible that someone other than Jason is involved in the arrangement with Valley Appliances? What should Kelly have done in light of that possibility? Yes, because someone like Jason’s ethical behaviors and business integrity are missing. He could’ve dealed with someone from valley appliances to give them a big discount and they were going to give him extra commission on side. And in this case, Kelly should’ve reported her assumption to her boss or even higher personal in the corporate..

What should Kelly do now Kelly should her boss with all the information she gathered from the copy of the database CD she had. And maybe her boss will realize that her intensions were good.

Metadata make databases easy to use for both authorized and unauthorized purposes. Explain what organizations should do in light of this fact. Business Organizations and corporate firms should have all these important information in a secured file and for no one that could access these codes- files without certain logins, password, lock patterns.. To avoid important information theft.