Evaluate the relating to the itworks code of ethics

Assignment Help Computer Engineering
Reference no: EM133422226

Question: An ITWorks employee named Carl discovered his ITWorks HDD was accidentally in his partner's possession. Carl had taken the HDD home and his partner accidentally took it about a week ago. The HDDs contents included the following:

Training materials used at ITWorks
Notes about training that had been carried out by all ITWorks employees
ITWorks positions listing & classification
ITWorks staff personal information including salaries, addresses, work & personal phone numbers, etc
Carl said that the HDD will soon be back in his possession but he did inform ITWorks that his partner works for an ITWorks competitor named 'Cyberdyne Industries'.

It has also come to light that Carl and his partner recently attended a work conference hosted by Cyberdyne Industries and during the function Carl became inebriated. It is unclear if this is when the ITWorks HDD was lost but it is clear that it was known to Cyberdyne Industries staff that Carl worked for ITWorks and that his conduct was unacceptable. Carl was asked to leave and escorted from the function. It has also been claimed that as Carl was being escorted out of the venue he made defamatory claims that Cyberdyne Industries workers were "...decrepit, degenerates who were corrupt dogs. They have no decency or regard for the quality of their work or standing the ICT sector and are a disgrace".

Evaluate the following relating to the 'ITWorks Code of Ethics and Professional Conduct' policies and procedures.
As part of your evaluation (approx. 80 words for a, b & c in total):
List at least two things that Carl did wrong
Is the policy clear enough for Carl to understand and follow so that his behaviour was different?
three things that could be improved in the 'COE' (one each for ethics, IP and privacy)

Reference no: EM133422226

Questions Cloud

Do you think that such a double standard still exists today : Issues and Practice of Philosophy, Simone de Beauvoir suggests that the love of a woman and that of a man are different and engender a double standard.
Illustrate the circular reference error in cell e36 : Precedents to illustrate the circular reference error in cell E36. Correct the formula in cell E36 by entering the correct cell range
What are the advantages and disadvantages of using focus : What are the advantages and disadvantages of using focus groups (online or in-person) when attempting to understand the relationship between employee
Explain how you will use the knowledge you gained from : Search the educational leadership literature and upload three full-text, peer-reviewed qualitative and/or quantitative research articles published in the last
Evaluate the relating to the itworks code of ethics : Evaluate the relating to the ITWorks Code of Ethics and Professional Conduct' policies and procedures. As part of your evaluation (approx. 80 words
What business value will incorporating data layer : what business value will incorporating data layer design techniques provide - For the duration of this course, you will be the Chief Data Officer (CDO)
How important is it to you to see an artist : How important is it to you to see an artist, and how might their appearance influence your feelings about their performance?
What evidence does paine provide to support this argument : What evidence does Paine provide to support this argument? Why does Paine argue about the immediacy of action? What evidence does he use to support
What are critical techniques you can use from the humanities : What are critical techniques you can use from the humanities to analyze the content shared in images on social media to analyze the honesty and message

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd