Premium Essay

Nortel Networks

In:

Submitted By gfrancis72
Words 14163
Pages 57
Business Ethics in a Global Context

Executive Summary
TransCanada and the Pipeline Industry Ethical decisions are important in any organization, regardless of location, industry or size. The importance is paramount in the oil industry due to the danger to the environment, local towns and cities, and employees. The following project looks at the TransCanada Company in detail to determine the practices and policies they have in place to ensure ethical decisions are made. The paper will explain the company’s goals, current systems in place and plans for the future. It will also show past examples of why careless mistakes and risky behaviour could cripple a company’s performance, even if the mistake is minor. The TransCanada Company is a Canadian giant and a world leader in energy. They specialize in many regions of the energy industry, including gas, electricity and oil. Currently, they have over 10 natural gas pipeline projects, 13 oil pipeline projects and 8 electric projects on the go, not to mention their existing infrastructure and day to day operations. They have over $46 billion in assets and are constantly expanding, devoting billions in investments across North America every year. A Company of this size with so much power needs to behave in the most ethical way possible and consider all stakeholders with the utmost respect. A lack of attention to detail and its effects on society could lead to disastrous effects to not only North America but to TransCanada itself. This company is on the world stage in the oil industry. Overall, even when consider its past faults, TransCanada constantly shows tremendous efforts to improving itself and the world around them. As stated within this paper, they tend to handle crises in a timely and proactive manner, with no visible attempt to withhold information from the public. TransCanada is a good role model

Similar Documents

Free Essay

Nortel Networks Internalcontrols

...1097961 Nortel Networks was once a Canadian telecommunications corporation worth $300 billion dollar that nearly employed 90,000 people during its height on operations in the 90’s (The Canadian Press 2014). In 2009 Nortel networks had to file for bankruptcy. Nortel’s bankruptcy is considered one of Canada’s largest bankruptcy cases in Canadian history (The Canadian Press 2014). In 2007 the Securities Exchange Commission files a lawsuit against Nortel for accounting fraud. Nortel was accused of not following the Generally Accepted Accounting Principles. The two main principles that Nortel executives were accused of were going against the revenue recognition principle and the provisions principles. Nortel broke the revenue recognition principle for the sole purpose of meeting budgeted sales and revenues (Cullen 2007). What Nortel would do was to not recognize expenses right away and to recognize unearned revenue (Cullen 2007). The reason for breaking these rules was to magnify their revenue and profits. Nortel broke the provisions principle by recognizing their expenses later on causing profits to increase (Cullen 2007). While breaking these rules managers and executive members of Nortel would still collect their yearly bonuses and benefits based on the profits the company would make that year. Nortel on paper was showing that it had made more revenue than it should. The managers in the financial departments all had their ethical issues. Maybe Nortel needed more...

Words: 388 - Pages: 2

Premium Essay

Nortel Networks Case

...March 29, 2013 ACC230 Nortel Networks Case The Nortel case does show that Nortel has agreements in associated to the guarantee under FIN 45. The payments based on a liability, charges relating to assets, or equities security that was provided by third parties has to be made to that third party. Nortel was able to retain liabilities for the events that occurred before the sale. Nortel guaranteed escrow for specified periods and had no limits of the potential amounts of the liabilities. It seems to be common for a business sale agreement to exclude maximum amounts of these liabilities since it is difficult to estimate the maximum potential of them for the indemnification guarantees. The company has agreements with its customers, lease agreements, third party debt, banks, agents and suppliers of intellectual property. Nortel has not made any indemnification payments in relation to any of the agreements mentioned. With regards to the commitments Nortel has made those commitments through bids, performance bonds, and other bonds that are in relation to their contracts. Nortel did not make any significant payments for any of these. The company did make capital agreements requiring them to fund new capital. The commitment they have of $16 million expires on a variety of dates through 2012. Nortel has purchase commitments with some suppliers that hold Nortel to detailed purchases and minimums. I think that the disclosures are stated well, but based...

Words: 253 - Pages: 2

Premium Essay

Jinan Broadcasting Corporation

...multiple suppliers. Sourcing the equipment from multiple suppliers would Type approval which would add uncertainty to the project and the approval itself would take 3 months. If multiple suppliers are involved clear demarcation points are required to avoid potential conflict of interest. There were internal objections from other division MDs. MD of Radio and Television Programming was of the opinion data & voice was the business of China Post & Telecom. Another MD, of the Radio & Television Broadcasting was of the opinion Alcatel equipment was more robust than Nortel’s. Budget was a key constraint as RMB 110 million was sanctioned but the initial estimates suggested it might cross the same. JBC needed in-house expertise to remotely monitor the network which was lacking. Zhou was not sure if reselling of long distance capacity was permitted by the Chinese government. - - Trace the history of decisions made in the data and voice project. 1) What were the decisions made? What were their implications? Decisions made and their implications are as follows - To launch the DVP by January 2002 – This decision was made without keeping in mind the time required to implement a project of this magnitude. - Budget allotted to the project RMB 110 million – Preliminary estimates indicate higher budgetary requirement. The scale of initial deployment maybe trimmed if the budget is rigid and cannot be increased. - Decision to go ahead with the DVP without clearing potential conflict of interest...

Words: 1010 - Pages: 5

Premium Essay

Ethics

...Our case study discusses the rise and fall of one of the largest telecommunications corporations in the world, Nortel Networks Corporation. Nortel was one of the many early 21st century telecommunications companies that failed due to upper echelon management, a dysfunctional board of directors, inflated costs and earnings, and a smoke and mirrors illusion of stability. There were many avenues that could have been taken that would have prevented the demise and fall of the organization, but those roads were not traveled. Many argue that government intervention could have prevented the backlash and whitewater effect of Nortel’s bankruptcy, but due to corporate ties within the government and the Securities and Exchange Commission the many CEO’s continued to elude the government auditors and the stakeholders. From an ethical perspective, there were several factors that contributed to the rise and fall of Nortel. The initial CEO and founder of Nortel, John Roth, demonstrated altruistic behavior because he did want the company to profit, the investors to profit, as well as their primary stackholders. Nortel’s fall from grace came swiftly and on many fronts. Its market capitalization climbed to an all-time high of $398 billion in September 2000. Two years later, in August 2002, the amount had plunged to just $5 billion (Collins, 2011, pg. 536). In 2000, Nortel was Canada’s largest producing company and employed 93,000 people worldwide. Their research and development team was renowned...

Words: 2056 - Pages: 9

Free Essay

Nortel Accounting Scandal

...Nortel Accounting Scandal History Nortel Networks Corporation, formerly known as Northern Telecom Limited and sometimes known simply as Nortel, was a multinational telecommunications and data networking equipment manufacturer headquartered in Mississauga, Ontario, Canada. It was founded in Montreal, Quebec in 1895. At its height, Nortel accounted for more than a third of the total valuation of all the companies listed on the Toronto Stock Exchange (TSX), employing 94,500 worldwide, with 25,900 in Canada alone. Products Nortel made telecommunications, computer network equipment and software. It served both general businesses and communications carriers (landline telephone, mobile phone, and cable TV carriers). Technologies included telephonic (voice) equipment, fiber optics, local wireless, and multimedia. Board Members * Jalynn H. Bennett (Corporate Director) * James Blanchard (ex-American Politician and Lawyer) * Frank Carlucci (Chairman Emeritus) * John Cleghorn (Director) * Frank Dunn (ex-CEO) * Yves Fortier (Director) * Kristina Johnson (Director) * John MacNaughton (Director) * John Manley (Director) * Richard McCormick (Director) * Claude Mongeau (Director) * William Owens (Admiral) * John Roth (ex-CEO) Profile of the Event In 2007 both the U.S. Securities and Exchange Commission (SEC) and the Ontario Securities Commission laid charges against former senior financial officials from Nortel including then-CEO Frank...

Words: 1707 - Pages: 7

Free Essay

Outsourcing in Global Telecom

...business model “Pay as you grow”.In this model,the network and other utilities are managed by reputed companies which ensures a high quality to the customers. This has enabled Bharti to convert its fixed costs involved with capital expenditure to the variable cost on the rate of usage. This Indian Telecom giant with a limited expertise on technology has managed services with Nokia Siemens Networks and IBM which has improved its technological prowess and decreased its excess workforce. The core competencies of Airtel have been market planning ,branding and identifying customer needs. The net result of this endeavor is that the company can offer mobile telecom service at one of the lowest rates in the world enjoying an compounded annual growth rate of 120% in sales revenues and around 300% in net profits between the year 2003-10. The rise of managed services In the recent past,the line between core and non-core competencies has blurred. The main reasons behind this paradigm shift are competency needs ,financial pressures, operational efficiencies and the change in the telecom business environment. Thus came the era of managed services where a firm took over the traditional network operations from the operator so that the operator can concentrate on its core competencies .Managed services cover various functions like planning, designing ,operating and optimizing a network. The field of managed services include CRM, billing, network consolidation and IT systems .Companies like...

Words: 1465 - Pages: 6

Free Essay

Syllabus

...it is both my hope and expectation that you will complete this course with an understanding of network design and management.For me networking started with me completing my Bachelor of Science in Electronic Engineering Technology in 1988. I then went on to complete a Master of Science in Computer Science, from Illinois Institute of Technology in 1992.  In 2011, I completed my doctoral studies at Georgia State University. From about 1988 – Present, I have worked for various Telecommunication companies, such as, AT&T Bell Labs, Tellabs, Nortel, and Cisco Systems.  My most enjoyable position was designing fiber optic networks for many of the top tier ISP/Service Providers today.I love to play tennis; I wish that I could play tennis for a living. I play in KSWISS Men’s Single League, T2 Tennis, Peach Tennis and tournaments. I also love running at least three times a week. The other activities I enjoy, working on my computer, playing with my dog and enjoying the beautiful outdoors.If you every need to contact me, please give me a call or email me. We can setup a time that is convenient.  Please remember, I am here to help you not only complete the course, but also to be sure that you can master the concepts and skills that the course offers.  My contact information is listed in the syllabus. Thanks, Dr. Wright |   | Print This Page |   | | Course Text |   | Top-Down Network Design 3rd Edition by Priscilla Oppenheimer © 2011 Cisco Press | First Time Using VitalSource...

Words: 3071 - Pages: 13

Free Essay

Voip Essay

...Technology:..........................23 IP Videoconferencing IPCommunications Voice-over-IP is changing the way we think of,and manage,communications. Compliments of Computerworld Executive Bulletin IP Communications 2 Converged IP networks allow for a wide variety of new applications to ride on the network and interact, including IP telephony,audioconfer- encing,videoconferencing,unified messaging and presence technolo- gies (like chat). Getting Started Corporate America is just starting down the road to voice-over-IP (VoIP)communications,though every analyst says it¡¯s just a matter of time before it becomes main- stream.¡°By 2009,the installed base of IP [communications]equipment will dominate the enterprise land- scape,but that¡¯s still a few years away,¡±says Robert Rosenberg,presi- dent of Insight Research Corp.in Boonton,N.J. There are several reasons why VoIP hasn¡¯t been an overnight suc- cess.Companies started testing the waters of VoIP in 2001,but there were serious concerns about voice sound quality that slowed the mo- mentum (those concerns have been largely resolved).Moreover,one of the key reasons for implementing VoIP was to reduce the long-distance charges associated with the tradi- tional phone networks,yet those charges have dropped so low that those cost savings are less dramatic. The cost...

Words: 10014 - Pages: 41

Premium Essay

Computer

...in researching   1) Developing a search strategy showed me how to organize my material and stay on topic. It also introduce me to key concepts which I have been using in my classes when studying and taking notes. Ironically I found using this method at work as well. Recently I found a solution to an ongoing network problem and my manager approached me asking me to fully research the resolution draft an email and send it out to the entire team.By using the search strategy I was able to gather the correct information that was needed to draft the email and send it to my team. 2)The Boolean operator AND OR NOT stuck in my head the most. I learned that this method is the main component to an effective statement and to broaden or narrow your search. When I use to search google without using the Boolean operator I always wondered why the search engine always gave me along list of searchs that didnt really relate to what I was looking up. By using this method I was able to get the exact results that I wanted and as I mention above this method was also used when I did my initial search statement for the email I sent to my colleagues on how to properly resolve the network issue. 3)Lastly the most important component of a research project is to cite the resources appropiately. In this course i was introduce to several styles of citing. There are different citing styles for different  documentation styles. I had to go back and really study this method thoroughly as suggested by...

Words: 337 - Pages: 2

Free Essay

There After

...How would one counter an active attack? b) Give examples of two possible scenarios when one cannot be absolutely certain that an adversary is launching a modification-of-message attack or denial-of-service attack, even when the proper security protections are in place. Explain your answer. c) How could traffic analysis jeopardize security? Give an example to illustrate your answer. Question 2 (a) Is it likely to achieve perfect security for a network (i.e. to have a network that will never fail in terms of security) in the real business world? Give three possible reasons to substantiate your answer. (b) The computing speed is much faster these days compared to that some years back. On the other hand, old algorithms and systems are still in use. Give three reasons to explain this situation. Question 3 a) (i) Explain Security Services and Security Mechanisms. (ii) Suppose the main threat of a network is replay attack. Does the use of confidentiality services protect the network against such attack? Explain your answer. (iii) Is it always the case that only one mechanism can be used to achieve the provision of a particular service? Give an example to illustrate and explain the answer. (b) Explain how the following services ensure security of the systems or of data transfers and give possible example or scenario for each: i) Message authentication ii) Non- repudiation iii) Confidentiality ...

Words: 284 - Pages: 2

Premium Essay

Harriet's Chocolate Factory

...Case Study 1: Harriet’s Fruit and Chocolate Company Daniel Michovich Dr. Otto CIS532: Network Architecture and Analysis January 26, 2013 Mission Statement: Striving to be number one fruit and chocolate industry area wide. Introduction “Harriet’s Fruit and Chocolate Company was established in 1935 in the Pacific Northwest of the United States to ship gift baskets of locally grown peaches and pears to customers in the United States (Oppenheimer, 2011)” In regards to the physical infrastructure of Harriet’s Fruit and Chocolate Company, my investigation will reveal many important aspects to aid in the planning of the network design. First, I will determine the number of buildings to be used, as well as the distance between them and what equipment they will contain such as wiring closets or computer rooms and the current network devices. Determining the distance will help in the cabling design and wiring as well as the selection of technologies and devices to meet the design goals. My investigation will further reveal any architectural or environmental constraints, such as tall trees within the path that power lines may travel, that will assist in decisions such as whether wireless technologies are feasible as well as if there are any impediments to communications or installation, to include all hazards. Infrastructure architecture consists of the hardware, software, and telecommunications equipment that, when...

Words: 1326 - Pages: 6

Free Essay

Ecss Practice Exams

...| | |The most damaging of the denial of service attacks can be a _______________ attacks, where an attacker uses zombie software distributed | |over several machines | | | | | |[pic] | |Bot | | | | | |[pic] | |Distributed denial of service ...

Words: 2882 - Pages: 12

Premium Essay

Ipremier Case Study

...customer an opportunity to decide if they want the products or not. iPremier Company iPremier is one of the top retail business that sell the luxury items, profiting $2.1 million on sales $32millions in 2006. Since then sale has grown over 20% annually. There was a decrease, but everything works itself out. Upper management describes working at iPremier as intense. .Qdata is the company that host iPremier computer equipment and provided connectivity to the internet (Austin and Murray, 2007). Although Qdata offers monitoring of website for customer and network operation, they had not invested in advanced technology and was not able to keep staff. During 75-minute attack how well did they iPremier perform. What would you have done differently if you was Bob Turley Bob Turley is new Chief Information Officer and is currently in New York on business. AT 4.31 am he received a call, from the network been hack and wired email received with just the word “Ha”. The site was a DoS attack coming from about 30 locations, the purpose of the attack was an attempt to make the computer unavailable. iPremier was not ready for such an attached and didn’t have anything in order which would help them with such an attacked. The situation was poorly handled, and Bob did not contact anyone higher up to let them know what was going on. He didn’t know who to contact, whether to call police or FBI or who to contact at...

Words: 967 - Pages: 4

Free Essay

Trending & Aggregation

... | |*Document Date: |[2013-05-20] | | T&A Handbook [pic] Update Notes |Date |Version |Description |Author | |2013-05-20 |V1 |T&A Handbook |Elham Kalantari | Contents 1 Introduction 3 2 T&A Interfaces 3 2-1 Source Availability 3 2-2 Dashboards 4 2-2-1 General Information 4 2-2-2 Over Time Mode 5 2-2-3 Over Network Elements Mode 9 2-2-4 Dashboards Contextual Menu 9 3 Examples 10 Introduction This document will guide you through the Trending&Aggregation (T&A) user interfaces. Some examples are available at the end. T& A Interfaces 2-1 Source Availability [pic] : This icon allows the visualization of source file availability. By clicking on it, below window appears. [pic] :...

Words: 1080 - Pages: 5

Premium Essay

Computer

...afford to spend and if anyone is technical in the company or are they going to need some outside help to keep up maintenance after the system is in place. (this can add to the cost of the system) My next step would be to start asking some questions about the law firm. I would like to know what the law firm is in charge of doing. Criminal, civil, family or so on; I think this would give me a better understanding of some of the information I may be working with along the way. As a law firm I am sure they spend a lot of time in the courtrooms and in their home offices so other questions I would ask is if they have cell phones and laptops that will need to access information on the network; this will help in a couple of areas, firstly in deciding if we should consider cloud computing or a private network and secondly, how to set up files access and permissions by departments and depending on size of company, maybe servers. Being a law firm a big consideration would have to be security of the information they access and ways of accessing this information. I would like to talk with the employees also, just to get an idea...

Words: 500 - Pages: 2