Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Situation
A caller asked "What is the policy on a manager unlocking one of their employees desks after hours in search of something? Is this an invasion of privacy? What rights do/does the employee have?" The Telcos Response The caller was informed that a manager would need to have a legitimate business reason for accessing an employees desk. This needs to be a bona fide reason, not just that he/she is angry at a person. For example, if a manager had reason to believe an employee had a gun, stolen merchandise, or drugs hidden in their desk, or had left on vacation and had critical work material in the desk, these would be considered legitimate reasons for opening and employee's desk. Your Task: 1. Determine who in your organization is the ethics point of contact. This could be at the local level within your particular office or at the corporate level. Contact that individual and ask what the company policy is in regards to employee privacy issues. Do not just copy the words from the employee Code of Conduct handbook. 2. Write a page or two explaining what your particular company's policy is towards employee privacy and the decide if you agree with this policy (and state why) or disagree with it (state why and how you might recommend changes to the current policy).Situation
A caller asked "What is the policy on a manager unlocking one of their employees desks after hours in search of something? Is this an invasion of privacy? What rights do/does the employee have?" The Telcos Response The caller was informed that a manager would need to have a legitimate business reason for accessing an employees desk. This needs to be a bona fide reason, not just that he/she is angry at a person. For example, if a manager had reason to believe an employee had a gun, stolen merchandise, or drugs hidden in their desk, or had left on vacation and had critical work material in the desk, these would be considered legitimate reasons for opening and employee's desk. Your Task: 1. Determine who in your organization is the ethics point of contact. This could be at the local level within your particular office or at the corporate level. Contact that individual and ask what the company policy is in regards to employee privacy issues. Do not just copy the words from the employee Code of Conduct handbook. 2. Write a page or two explaining what your particular company's policy is towards employee privacy and the decide if you agree with this policy (and state why) or disagree with it (state why and how you might recommend changes to the current policy).
Relation to other Terminologies in Library Science: Classification is a vital discipline in the field of library and information science and pervadesall the other sub-fields o
A large unit manufacturing electrical goods which has been known for its liberal personnel policies and fringe benefits is facing the problem of low productivity and high absenteei
Question 1 What is quorum? How is it related to clustering? Question 2 Explain round robin DNS. Discuss its efficiency Question 3 What is VMware server? How does i
Question: (a) What are the quality dimensions a consumer looks for in a product? (b) Deming's 14 points plan is a complete philosophy of management. Give an outline of ten
QUESTION 2 a) Due to severe budgetary constraints that is facing the central government, public sector projects are being resorted to on a public-private basis. Explain what is
A Public Body has conducted a bidding exercise through the Restricted Bidding Method for the procurement of five PCs, five laser printers, two UPS and one scanner. Bidders were
Question 1 How is the public relations industry organized? Question 2 How are newspapers registered? Explain in detail Question 3 Write a long note on the Structure of E
Question: Jaimie and Mary are work colleagues in the support team of a large department at the University. Mary has been on maternity leave and the department was reorganised
INFLIBNET (Information and Library Network) The University Grants Commission (UGC) in its attempt to establish networking has taken the initiative and decided to develop a ne
Question 1 Explain the various inputs , tools and techniques of qualitative risk analysis process Question 2 The risk mitigation methodology describes the approach to contro
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd