Free Essay

Organizational Policy

In:

Submitted By geemoney
Words 810
Pages 4
Data Piracy on the Internet Ethical dilemma: Data Piracy on the Internet | Stakeholders | Understanding/Tolerance | Autonomy | Publicity | 1: Record Labels/Software Companies | The duty to understand and to accept other viewpoint if reason dictates doing so is warranted. | They have the right to make their own decisions about how to control the spread of their data on the Internet. | They have the duty to make it public of the laws containing copyright infringement. | 2:Sites that pirate the data | They have the duty to understand why the record labels and software companies don’t want their information provided free on the Internet. | They have the duty to make their own decisions to host the data. | They have the responsibility based on the law to inform the users that they are breaking the law and could be penalized for it. | 3: People that download the data illegally | They have the duty to understand why it is illegal to download media and software free of charge. | They have the duty to maximize the right to make their own decisions to download. | They have the duty to take actions based on ethical standards that must be known and recognized by all who are involved that they could be punished for their actions |

“When we start to talk losses in hundreds of billions of dollars, it’s easy for our eyes to glaze over. It’s a big number. Hundreds of billions is reserved for things like out-of-control healthcare costs. But healthcare gets plenty of attention from government, private corporations and consumers. You know what else will cost the United States hundreds of billion if dollars by 2018? Data loss (Savitz)”. I chose data piracy because this is a topic that has been overlooked for years. It seems nobody has a solution for this problem so it continues to grow at an alarming rate. Online data piracy continues to be a dilemma because 70% of online users find nothing wrong with it. If people believe they are doing nothing wrong, a solution to the problem is harder to obtain. The principals: understanding/tolerance, publicity, and autonomy, are three principals that are key to identifying the source to the problem, how the problem is spreading and possibly how to find a solution. The companies responsible for creating and releasing the data should ultimately have the right to decide how their product is released and sold but instead it is being taken away from them by websites that provide their products free of charge. When you have a statistic that says 95% of music downloaded online is illegal (GoGulf), there is an obvious problem. People who choose to download the data do ultimately have the right to decide if they want to pirate the software or media, but it is also their responsibility to understand that stealing these products is illegal and the companies that produced it do in fact have the right to obtain a profit. We can see that this not the case because 98.8% of data transferred using P2P networks is copyrighted (GoGulf). Information on this topic, statistics and various points of views can be almost anywhere. I gathered my information from blogs, company websites, news articles, and even a library database. I made sure to use a variety of sources so that I could get as many different viewpoints as I could on the matter helping me to form the statements in my matrix. One of the resources I used was the RIAA (Recording Industry Association of America) website, which creates, manufacture and distributes 85% of all legitimate recorded music produced and sold in the United States. This website was very helpful in getting the point of view that the companies have on the subject of data piracy. “While downloading one song may not feel that serious of a crime, the accumulation impact of millions of songs downloaded illegally – and without any compensation to all the people who helped to create that song and bring it to fans – is devastating (RIAA)”. This is just one example of the consequences of people stealing media is having on other people. The majority of the research that I found suggests that the people that are stealing data and hosting the websites that pirate the data, are failing in their ethical responsibility to ask themselves, is this against the law? Are my actions affecting others? Because of the many different viewpoints and ways to distribute data over the Internet, this is a problem that will be hard to contain and almost impossible to eliminate.

Referemces

Savitz, Eric (2012, January 2nd). The $100 Billion Problem No One Is Talking About. Forbes.com . Retrieved November 8th, 2013, from University Of Maryland University College Database

GoGulf, (2011, November 1st). Online Piracy In Numbers – Facts and Statistics. Go-Gulf.com . Retrieved November 7th, 2013, from http://www.go-gulf.com

Similar Documents

Free Essay

Organizational Policy Statement

...For the three-policy statements below please reference the two REFS below A. ISO/IEC: 27002 B. ISO/IEC: 27001 Organizational policy statement 1. System breach prevention When an employee leaves the company, the company will update their CRL and ACL (certificate revocation list and access control list). This way a previous employee will not have access to company systems. Previous employees having account access to the company’s virtual private networks (VPN) from home or remote locations will be terminated immediately upon employee termination. See ref A, Annex A.8.3.3, pg. 16 a. Any employee going on company approved travel that will require him/her to access company networks remotely, will request access tens days prior to travel. b. Any employee requesting access to the company’s VPN will request access via the proper channels. See ref A, Annex, A.8.1.1, pg 15, A.11.2, pg 22 c. All access requests will be logged and finalized by human resources after employee have reviewed a confidentiality and non-disclosure agreement of company sensitive information IAW ref A, section 8, Annex A.11.4.1, pg 23 A.11.2 pg 22 d. Employee account will expire ten days before employee leaves the company or termination to ensure that all accounts have been closed and access revoked. The network management team will run account active program to see all account active for the employee that is to be released on the 10th day to ensure that the employee is not...

Words: 600 - Pages: 3

Free Essay

Business Environment on Armani

...2…………………………………………………………………………………………………………………………………….. 6 2.1 Explain how economic systems attempt to allocate resources effectively……………………. 6 2.2 Assess the impact of fiscal and monetary policy on business organizations and their activities………………………………………………………………………………………………………………………………….. 8 2.3 Evaluate the impact of competition policy and other regulatory mechanisms on the activities of a selected organization…………………………………………………………………………………… 9 Task 3………………………………………………………………………………………………………………………………… 10 3.1 Explain how market structures determine the pricing and output decisions in various organizations………………………………………………………………………………………………………………… 10 3.2 Illustrate the way in which market forces shape organizational responses using a range of examples……………………………………………………………………………………………………………………… 11 3.3 Judge how business and cultural environments shape the behavior of Armani…………. 12 Task 4……………………………………………………………………………………………………………………………… 13 4.1 Discuss the importance of international trade, and globalization to Armani or other organizations………………………………………………………………………………………………………………… 13 4.2 Impact of global factors on Armani or other organizations……………………………………. 14 4.3 Evaluate the impact of policies of the...

Words: 4521 - Pages: 19

Free Essay

Social Responsibility

...of our manufacturing facilities are ISO-14001 and have been validated according to strict environmental regulations. GT Valvetrain continually practices manufacturing of its components with sustainable environmental practices. One thing that GT Valvetrain can do to help add to the company’s environmental responsibility policy would be adopt a hazardous material board. This board would consist of employees that analyze all new chemicals and substances to be used in future manufacturing processes. The board will review the chemicals and substances to evaluate how harmful they are to the environment and suggest alternatives that are more environmentally friendly and support the company’s environmental policy this is already in place. In addition, GT Valvetrain could invest in solar panels to offset some of the company’s carbon footprint. Large electricity consumption is inherent with manufacturing automotive components therefore GT Valvetrain could install solar panels on the rooftop of the plant to manufacturer some of its large amount of needed electricity. In making this investment into clean renewable energy, the company would support its environmental policy for years to come while reducing overhead cost by reducing its monthly energy bill and helping to ensure the organizations viability in the future. Ethical Leadership GT Valvetrain is continuing the social responsibility of its company and sees this as a prerequisite for lasting corporate success. GT Valvetrain’s...

Words: 1112 - Pages: 5

Premium Essay

Alcoa's Core Values in Practice

...Discussion Case: Organizational Ethics and the Law Classification of Ethical Work Climate Discussion case “Alcoa’s Core Values in Practice” exemplifies Aluminum Company of America’s implementation of a strong values-based ethical climate by insisting decisions of employees and what they do be aligned with company values. Analysis of Alcoa’s core values relative to Victor and Cullen’s typology, suggest Alcoa follows a principled-local method to ethical climate where personal morality; company rules and procedures; and laws and professional codes are favored. In respect to Professor Paine’s studies of ethical climate, Alcoa would be categorized as implementing integrity-based programs, where concerns for the law and employee responsibility are combined. Role of Management Top management commitment to developing an ethical work climate and organizational performance at Alcoa was communicated by CEO Paul O’Neill in the 1990s. His focus on the company’s core value of health and safety, led to implementation of global ethics and compliance programs. The program included an ethics and compliance officer whose purpose is to report compliance issues to the CEO and board of directors. Other ethical safeguards created to support a strong ethical climate at Alcoa consists of a global code of conduct; ethics and compliance training for all employees; and a global helpline reporting system. Management of Personnel Alcoa’s top management believed that no employees should be...

Words: 441 - Pages: 2

Free Essay

Final Essay Assignment

...2013 What biases, if any, might be common to U.S. intelligence agencies? Give two examples from history or modern day? There are a number of different types of bias mentioned in our text books. In their book, “Analyzing Intelligence” Bruce and Bennett discuss the denial and deception (D&D) bias traps than an analyst can fall into. They mention that there are three major categories: 1) Cultural and personal bias; 2) Organizational bias; & 3) Cognitive heuristics bias. Such biases can taint the analysts opinions based on their type of biases. (George & Bruce. 2008, 127-130) Cultural and personal bias may allow the perception of the intelligence to be tainted by personal beliefs and pre-conceptions that the analyst has developed over his lifetime. This type of bias also may be influenced by personal experiences, morals, customs, habits, and social environments. Organizational bias is “generally associated with the limitations and weaknesses of large bureaucratic organizations”. This type of bias is the result of actual or perceived goals, policies, and traditions of an organization. Bruce also says that the differences are even more extreme when “classified information” is involved. Cognitive heuristics bias is the inability to properly perceive or understand the world around them. This type of bias makes the analysts vulnerable to optical illusions, magician’s tricks, political and military deception just to name a few. This bias may cause the analyst to believe...

Words: 2232 - Pages: 9

Premium Essay

Locating Topics of Interest

...NORTHCENTRAL UNIVERSITY ASSIGNMENT COVER SHEET Learner: Terry L Green THIS FORM MUST BE COMPLETELY FILLED IN Please Follow These Procedures: If requested by your mentor, use an assignment cover sheet as the first page of the word processor file. The assignment header should include the Learner’s last name, first initial, course code, dash, and assignment number (DoeJXXX0000-1) justified to the left and the page number justified to the right. Keep a Photocopy or Electronic Copy of Your Assignments: You may need to re-submit assignments if your mentor has indicated that you may or must do so. Academic Integrity: All work submitted in each course must be the Learner’s own. This includes all assignments, exams, term papers, and other projects required by the faculty mentor. The known submission of another person’s work represented as that of the Learner’s without properly citing the source of the work will be considered plagiarism and will result in an unsatisfactory grade for the work submitted or for the entire course, and may result in academic dismissal. | | BTM8102-8 | Kris Iyer, PhD | | | Business Research Methodology | GreenTBTM8102-2 | | | <Add Learner comments here> ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Faculty Use Only ------------------------------------------------- <Faculty comments here> ...

Words: 2699 - Pages: 11

Premium Essay

Tactical Leadership Versus Organizational Leadership

...Tactical Leadership versus Organizational Leadership Tactical Leadership and Organization Leadership utilize the same principles of leadership in order to meet the goals of mission accomplishment. Tactical Leadership is developed by using previous experiences to analyses and implement specific actions that need to be taken to achieve the organizations mission. Tactical Leaderships center of influence is as small as individual and as large as a battalion. Company and Battalions are organizational and thus Organizational Leadership must also be used at that level, but without Tactical Leadership that was developed earlier, failure is inevitable. Tactical Leadership can be viewed as a corner stone of Organizational Leadership. Tactical Leaderships is often influenced and shaped but Organizational Leadership due to the implementation of policies and procedures. Tactical Leadership must apply the not only the leadership principles but also human needs to those being lead. Organizational Leadership effects the organization in establishment of policies, standard operation procedures(SOPs), and organization norms. Organizational Leadership like Tactical Leadership is ever evolving, but without the defined parameters establish thru policies, SOPs, and norms. Organizational Leadership must plan in longer terms and establish systems in order to maintain the continued productivity of the Organization. Organizational Leadership center of influence spans form Company Level to Strategic...

Words: 258 - Pages: 2

Free Essay

Analyse the Organisational Objectives Provided in the Scenario to Identify the Change Requirements for Fast Track Couriers

...Assignment Organizational Change Case Study: Fast Track Couriers Pvt. Ltd. 1. Analyse the Organizational Objectives to Identify the Change Requirements for Fast Track Couriers 1.1 Identify the requirements for change Fast Track Couriers are in the need to bring some changes in their organizational structure as well as operations. These requirements for change are: It needs to build its market share so as to be the preferred choice as movers/courier company. It needs to change their delivery system so as to offer shorter delivery times to its customers. Slow distribution system causes late delivery to the customers which can be negative for the company, hence decrease their delivery system The lack of participation in training programs are required to be changed by building trust among employees as well as drivers and motivating them to work productively Productivity reporting shall be completed using PDA data Drivers are resistance to change which can negatively affect the company and thus should be explained about the change in detail by keeping in mind their requirements. 1.2 Link between changes identified and organizational strategic plan goals. Change is inevitable. Every organization needs a change but it should be in accordance with the strategic goals of the company. The changes identified for Fast Track Couriers are linked to its strategic and operational goals. The strategic goals and its associated changes are: The company proposes to expand their business in the...

Words: 1279 - Pages: 6

Premium Essay

Paper1

... as to many other elite theorists, that capitalism is now interlacing with politics, in such a way that corporations are now able to determine and effectively influence the direction that government policies should take. This corporate power uses a certain number of mechanisms, strategies and processes whether legal or illegal, official or unofficial, to reach that end (Domhoff, 1990). In this essay, I aim at establishing and describing these processes as well as evaluating their impact on society. Concurrently, I shall evaluate and analyse this argument. Before establishing these strategies, I believe it is important that one be aware of what makes the corporate power elite and how it has managed to create a network or upper class and even corporate community network to determine domestic/national policy. Modern capitalist societies are not simply made of the upper class and corporate communities who as Domhoff argues, include all large income-producing property owners who also happen to control all the source of capital, thus constituting both a social and economic class (Domhoff, 2010: 7) at the top of the social hierarchy. There are also a variety of non-profit associations that are significant because they structure and determine the different discussions over public policy as well as the public opinion which, indeed, matters most to governments (Wetherley, 2008). Although they have been qualified of non-partisan or bipartisan due to the fact that they are neither associated...

Words: 2957 - Pages: 12

Free Essay

Business

...of internet, social Media and e-mail out with the workplace does not impact adversely on the council and its business, compromise their contractual relationship with the council or breach council policy. This policy sets out the expected standards of internet, social media and email use and provides for those standards to be monitored and enforced. The content should be read in conjunction with the relevant employment policies referred to in this document together with other policies and guidance issued by the council’s IT Service, in particular the Data Protection and Information Security Policies. The key aims of the policy are to: * Regulate and control access to the council’s internet, social media and e-mail system networks; * Promote efficient and effective use of internet, social media and e-mail facilities while allowing reasonable and limited personal use in an employee’s own time; * Set standards for the proper secure and lawful use of internet, social media and e-mail in order to minimise and manage the potential risks to the council from inappropriate and illegal use; * Provide employees with guidance on their responsibilities when accessing the internet via the council networks and when using social media and council email applications. This policy applies to the use of internet, social media and e-mail in the following circumstances: * Business Use: Use for legitimate council business consistent with the duties and responsibilities of an...

Words: 481 - Pages: 2

Premium Essay

Is4550 Week 1 Lab

...------------------------------------------------- Week 1 Laboratory Part 1: Craft an Organization-Wide Security Management Policy for Acceptable Use Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Define the scope of an acceptable use policy as it relates to the User Domain * Identify the key elements of acceptable use within an organization as part of an overall security management framework * Align an acceptable use policy with the organization’s goals for compliance * Mitigate the common risks and threats caused by users within the User Domain with the implementation of an acceptable use policy (AUP) * Draft an acceptable use policy (AUP) in accordance with the policy framework definition incorporating a policy statement, standards, procedures, and guidelines Part 1 – Craft an Organization-Wide Security Management Policy for Acceptable Use Worksheet Overview In this hands-on lab, you are to create an organization-wide acceptable use policy (AUP) that follows a recent compliance law for a mock organization. Here is your scenario: * Regional ABC Credit union/bank with multiple branches and locations thrrxampexoughout the region * Online banking and use of the Internet is a strength of your bank given limited human resources * The customer service department is the most critical business function/operation for the organization * The organization wants to...

Words: 639 - Pages: 3

Free Essay

Workpllace Violence

...Workplace Violence Case Study 01 Supervised by Dr. Hesham Sadek Prepared by Amr Mohamed Anwar (52 F) Workplace Violence Case Study 01 1 1- Problem Definition 1 2- Justification of the Problem 2 3- List of Alternatives 2 4- Evaluate Alternatives 2 a- Develop a violence Prevention Program. 2 b- Provide a policy on workplace violence and weapons 3 c- Implement Physical Security 3 d- Background Screening 4 5- Recommendations 4 1- Problem Definition Violence at workplace is the Violence against coworkers, supervisors, or managers by a present or former employee. It happens in the form of physical abuse and threat, that causes the murder of three supervisors with clear intentions from the murdered. 2- Justification of the Problem Violence at work may come from:  a- Unfair treatment. b- Unfair termination. c- Lack of justice. d- Persecution of supervisors or Managers. e- Workplace not safe and healthy enough. 3- List of Alternatives a- Develop a violence Prevention Program. b- Provide a policy on workplace violence and weapons. c- Implement Physical Security. d- Background Screening. 4- Evaluate Alternatives a- Develop a violence Prevention Program. Violence Prevention Program should provide the following: Develop and promote an incident reporting structure so employees have a mechanism for reporting incidents and threats of violence. The system should include a way for employees to give confidential information concerning threats...

Words: 683 - Pages: 3

Premium Essay

Human Resource

...Developing HR Policies Institutional Affiliation Name INTRODUCTION: It has emerged that organizations are often prompted to make revisions to established HR policies on a regular basis (McGlothin, at.al 2002). There are multiple things prompt the quest for such policy changes such as federal regulations and when an organization like the one under this case study changes its operations or embark on business environments. As documented in this assignment, one of the fundamental roles of HR manager is to be the dispenser of policies, procedures, and rules at times and a trusted counselor and guide at other occasions. On the contrary; implementing policy changes in an organization can be met with more than a few challenges. Based on this; this essay will clearly document necessary changes that are required fully and effectively to review policies, the procedures, as well as HR rules within the jewelry company (McCook, 2000). Firstly; HR managers are advised to proceed cautiously when confronted with challenges of implementing policy changes because such changes can have a fundamental impact on an organization (McCook, 2000). Implementing a policy requires more than a few procedures within the jewelry company (McCook, 2000). In the quest to effectively implement changes in this business, the first step that I will take in my policy, procedure, and HR rules review with the jewelry company will be transparency. HR experts...

Words: 1309 - Pages: 6

Premium Essay

Change Analysis Images

...greater earnings, executives must harness their vision and put aligning systems and organizational structures in place that guarantee profit and company growth. Change, however, can be problematic and difficult within an organization, especially those catering to stockholders and investors. The Strategic Change Initiative Strategic change involves not only deciding what to change, but how and when to change specific elements of one’s strategic orientation. This change may be driven by dramatic changes within the environment, declining organizational performance, or perhaps even both. Within the realm of an early childhood education, strategic planning can be considered as steering the parent and community volunteering activities such that they are in alignment with organizational mission and vision. The purpose of the PACE Early Childhood Education Policy Committee will be to work in conjunction with the PACE ECE Director, Board of Directors, and staff to serve as a policy making body. In addition, the PACE ECE Policy Committee will also serve as a catalyst for relaying relevant information to all PACE ECE school sites and assist in the implementation of all PACE ECE’s organizational goals and objectives. To implement the strategic change process within the organization to improve parent involvement, the Policy Committee has agreed to and voted on adding two new positions, one within the Policy Committee and one at each of our school sites. Change Images The...

Words: 955 - Pages: 4

Premium Essay

Is Professionals

...Introduction Information technology implementation is the basic requirement of emprises now days. Information security (IS) is important to secure this system and ensures the balance in information risk and information control. “Principles of Information Security, 4th Edition” is the book which provides balance information about information security in modern enterprises, risk management, security technology and Information security professionals with their roles in managing risk in information security (Whitman & Mattord, 2011). The study of this book makes us capable to evaluate the top five IS professionals and their respective roles in information security. Top Five IS Professionals and Their Roles and Responsibilities In top five IS professionals Chief Information Officer (CIO). CIO is the leading IS professional as he led other on the way to adopt the strategies to mitigate Information risks in order to manage the information system of the company. The main responsibility of CIO is to guide the chief executive officers and president of the company in information management matters and advise them in order to take effective decisions to implement information security system (Siponen, 2000). The leading position and decision making power of CIO make it capable to take important information management decisions. This is the major reason to rank him as the fist important IS professional. Chief Information Security Officer (CISO) is the second most important IS professional...

Words: 587 - Pages: 3