1000 Search Results for Employee Acceptable Use Policy
What are the risks of copying the database to the laptop and taking it home or on a trip?The most obvious risk associated with copying the database to her laptop are related to security. Here, here laptop may not have the same security provision as t Continue Reading...
Hostile Work Environment
The term "hostile work environment" has a wide range of meanings and definitions. Obviously, how precisely it is defined would vary based on the role or position of the person involved, their opinion about things employer ri Continue Reading...
Workplace Safety
Safety within the workplace is a central issue that Occupational Safety and Health Authority hold with the highest consideration than any other matter within the workplace that can potentially affect the employees. OSHA has in place Continue Reading...
Quality Improvement Program
Needs Assessment and Quality Improvement Plan
Paula Stechschulte, PhD, RN
Quarter
This paper discusses the process of drafting a quality improvement plan at a community level medical facility, a plan that is aimed at Continue Reading...
Mobile Device Management Change Initiative Plan
With the growing volume of content, number of applications and information accessed via various devices, Mobile Device Management (MDM) initiative is vital in the management of the mobile enterprise. M Continue Reading...
Organizational Policy on the Acceptable Use of Email and Text Messaging
Good Morning Staff,
In the past few years, this company has experienced tremendous growth and productivity because of your significant contributions towards the realization of Continue Reading...
"
There are several benefits that a global consumer electronic firm could derive from inter-project learning.
First, inter-project learning allows firm to enhance project completeness. Prencipe, & Tell (2001) argue that inter-project learning a Continue Reading...
Network Security
History and Evolution of Network Security:
The term 'Network Security' refers to the concept of the creation of a 'secure platform' based upon which the user of the computer or of a program within the computer are allowed to perfor Continue Reading...
Privacy in the Workplace
"Employee Monitoring: Is there Privacy in the Workplace?" 2003. Consumers Action Network
Professionally ethical standards dictate that employees should be committed to working and performing at a professional level while in Continue Reading...
man who was apparently fired from his job for a Facebook 'like'. The person in question works for a sheriff's department, and liked the page of his boss' challenger in the election. When his boss won re-election, the staffer was fired for supporting Continue Reading...
Personnel record
Personnel records are data pertaining to employees which consist of factual and comprehensive information of employee. All employee information is kept in systematic order which assists human resources manager to make an effective Continue Reading...
Privacy of an Individual in the Workplace
Argument Length: 2,000 words Task Construct argument notion individual's privacy important consideration workplace, Use ethical theory support position. Rationale This task designed: demonstrate capacity und Continue Reading...
This particular aspect is what most medical trainers miss when dealing with interns or newly appointed nurses. They found that oxygen use, if below the necessary requirement can be damaging, so can its overuse. In another study, it has been found th Continue Reading...
Johnson Controls, Inc. (886 F.2d 871 (7th Cir. 1989).
The Supreme Court heard this case because they were concerned with an employer's gender-based fetal-protection policy. The question was whether an employer could exclude a fertile female employe Continue Reading...
McCullough stated she was being disciplined because of her complaints regarding what she saw as the hostile work environment at Hyundai.
The court found that although McCullough may have acted in a vocal and confrontational manner as an employee, b Continue Reading...
Social Media - a New Kind of Security Problem in Business
The Newest Threat to any Business: Social Media
Social media is one of the most significant changes that has come about in communication today. However, it can also have serious implications Continue Reading...
Key positions normally undergo additional scrutiny in assessment even when time is of the essence.
Comparison between the American and German HR policies
Equal Opportunity and Employment Practices
This policy is put in place in order to ensure th Continue Reading...
In order to rectify this situation, Price suggests better policies of Internet abuse.
Price's article has stunning implications for the human relations concept of training and development. In order to train employees and develop Internet abuse poli Continue Reading...
The purpose of this precaution is to maximize the ability of the company to pursue violations of its copyright in an appropriate court of law or other forum and to ensure that the company is entitled to the maximum compensation allowed by law for co Continue Reading...
Communications Workshop One
Changing Jobs Following a Brief Period of Employment
Opting to take another job only a week after beginning a new job is not illegal, as people a free to come and go as they please. However, there are many consequences t Continue Reading...
(Snyder & DeBono quoted in Kjeldal 2003, Introduction section, ¶ 6).
The results from the study Kjeldal (2003) conducted with 70 participants in two stages suggest that the word association responses high self-monitors (HSMs) produce refle Continue Reading...
Sexual Harrassment
Effects Of Sexual Harrassment In The Workplace
The problems of sexual harassment cases are prevalent in almost all of the companies. In today's workplace, incidents of sexual harassment have become common. It is not unusual that Continue Reading...
DESIGNING & IMPLEMENTING a DIVERSITY TRAINING PROGRAM
DESIGNING AND IMPLEMENTING A DIVERSITY TRAINING PROGRAM
Good evening
Designing and Implementing a Diversity Training Program
Identify and discuss three objectives of the diversity training Continue Reading...
Reporting on Information Needs
This report aims at establishing the process for managing records within the organization and marketing products. This report was requested by Michael Duffy Administration and Business Support Manager, based on the num Continue Reading...
Social Engineering as it Applies to Information Systems Security
The research takes into account several aspects that better create an overview of the term and the impact it has on security systems. In this sense, the first part of the analysis revi Continue Reading...
Accounting System Implemented at Chic Paints Limited
Report submitted in order to fulfil the requirements of AAT Accounting Qualification
Internal Controls and Fraud
Accounting System Review
Weaknesses in the Existing System and Recommendations
Continue Reading...
risks are associated with implementing a BYOD policy, and how can these risks be addressed? Consider how BYOD risks differ from those in a corporate-owned mobile strategy.
The first risk associate with a BYOD policy is the added costs associated wi Continue Reading...
Labor Relations & Globalization
Argue for or against the use of the "school voucher program." Which do you believe is right? Explain your answer.
Both the National Education Association (NEA) and the American Federation of Teachers (AFT) identi Continue Reading...
According to Reidenberg (2000: 1318), policy in the United States protects personal information according to a market-dominated paradigm, where limited statutory and common law rights are granted for information privacy. In Europe, on the other hand Continue Reading...
The COP will be responsible to attend the Police Commission meetings to keep commission members knowledgeable about any issue related to the Department's operations, and to respond to citizens' complaints or concerns. The COP acts on all matters re Continue Reading...
Notwithstanding these positive trends, the glass ceiling is not broken (although it has been cracked a bit) and even telecommuting is used in different ways with male and female employees. For example, Arnow-Richman points out that, "While telecomm Continue Reading...
At the same time, one does not know whether they offer the workers any benefit or perk as is provided by Korean employers.
This matter has to be sorted out by the Korean partner as the workers are more likely to trust him than Australians. He may a Continue Reading...
ethics of business regarding computer technology. The writer focuses on the issue of email privacy and whether employers have the right to read and act on private email sent by employees from their workstations. The writer explores both sides of the Continue Reading...
Q2.Differentiate between administrative, technical and physical security controls (safeguards) and give an example of each.
Administrative controls relate to the procedural elements of risk mitigation, including avoiding lapses in policies, proced Continue Reading...
It gives a fair opportunity to all applicants in the recruitment process
Gives the company a chance to source workers from different parts of the world. This is accelerated by the use of technologies such as the internet.
Application forms
All a Continue Reading...
Distance learning, sometimes called "distance education" is, according to Kerka (1996), a method of education in which the learner is physically separated from the professor and the institution sponsoring the instruction. Distance education may be us Continue Reading...
Persuading as a Part of Managing Change
Influencing and persuading
Influencing people means making them want to do what you want them to do, not simply telling them to do something.
The most obvious means of persuading people is through the use o Continue Reading...
Integrating the value of the code of ethics to the entire company can indeed help to prevent some unethical behaviors and that safeguards the company's corporate reputation (Vitell, 2006). Having the code of ethics in place, no matter how much emplo Continue Reading...
The workforce is addressed on a personal level to ensure that each individual not only understands what the expectations are of him or her, but also to ensure that they will give only their best effort towards the organizational goal. In order to mo Continue Reading...
American today, works more that an American worker of even a generation ago. A 1999 Government report stated that workers worked 8% more hours than the previous generation. This translates to an average workweek of 47 hours. Twenty percent of worker Continue Reading...