Free Essay

Google

In:

Submitted By ghost21
Words 11257
Pages 46
Legal Ethical Operational Legal Ethical Operational
Legal Ethical Operational
Legal Ethical Operational
Legal Ethical Operational
Legal Ethical Operational
Legal Ethical Operational
Legal Ethical Operational
Legal Ethical Operational
Legal Ethical Operational
Legal Ethical Operational
Legal Ethical Operational Legal Ethical Operational
Legal Ethical Operational

Legal Ethical Operational Legal Ethical Operational
Legal Ethical Operational
Legal Ethical Operational
Legal Ethical Operational
Legal Ethical Operational
Legal Ethical Operational
Legal Ethical Operational
Legal Ethical Operational
Legal Ethical Operational
Legal Ethical Operational
Legal Ethical Operational Legal Ethical Operational
Legal Ethical Operational

Legal, Ethical and Operational Issues
P3
Ben Bush |

Contents: * -------------------------------------------------
INTRODUCTION 2
-------------------------------------------------
LEGAL ISSUES 3 * Data Protection Act 1998 3 * Freedom of Information 2000 4 * Computer Misuse Act 4 * Copyright Law 1997 5
-------------------------------------------------
ETHICAL ISSUES 6 * Examples of ethical issues 6 * Moral 6 * Whistle Blowing 7 * Disability 8 * Use of Information 8 * Codes of Practice 9 * Email 9 * Internet 9 * Internal Policies 10 * Intellectual Property 10 * Content 11 * Other 12 * Reporting bad practice or Breaches 12
-------------------------------------------------
OPERATIONAL ISSUES 12 * Security of Information 12 * Backups 13 * Health and Safety 13 * Processes 13 * Procedures 14 * Regulations 14 * Organisational Policies 14 * Costs 14 * For Development 14 * Modification 15 * Training 15 * System Upgrades 16 * Continuance Planning 17
-------------------------------------------------
TYPES OF ORGANISATIONS 18 * Public 18 * Private 18 * Not-for-profit 18 * Appendices 19 * Bibliography 26

Introduction
In this P3 report I will be writing about Legal, Ethical and Operational issues that affect organisations. They will be including:

* LEGAL ISSUES * Data Protection Act 1998 * Freedom of Information 2000 * Computer Misuse Act * Copyright Law 1997 * ETHICAL ISSUES * Examples of ethical issues * Moral * Whistle Blowing * Disability * Use of Information * Codes of Practice * Email * Internet * Internal Policies * Intellectual Property * Content * Other * Reporting bad practice or Breaches * OPERATIONAL ISSUES * Security of Information * Backups * Health and Safety * Processes * Procedures * Regulations * Organisational Policies * Costs * For Development * Modification * Training * System Upgrades * Continuance Planning * Appendices * Bibliography * TYPES OF ORGANISATIONS * Public * Private * Not-for-profit

Data Protection Act 1998
The Data Protection Act is an act that was put in place to protect the rights and privacy of individuals and to ensure that data or information that concerns them is not taken and used without their informed consent. The Act covers any personal information that is used about the individuals, and defines a certain category for very sensitive data that is then stored in this category, being more secure and strict about who is able to access this data than other personal data.

The Act itself covers electronic and non-electronic formats of data; however, non-electronic formats are filtered into a relevant filing system and then stored. This does not limit the intake of information that can be stored however as the categories have been broadened widely following the opening of the Freedom of Information. The only information that is now uncovered by the Data Protection Act is unstructured data relating to: * Appointments * Removals * Pay * Discipline
And other personnel matters, as these remain outside the Scope of the act (http://www.soas.ac.uk/infocomp/dpa/policy/overview/, 2014).

“Marks and Spencer has breached the Data Protection in not encrypting employee data held on a laptop, according to the Information Commissioner's Office (ICO).
The system contained pension details for 26,000 employees and was stolen from the home of a contractor.
Protecting such information is crucial, according to ICO assistant commissioner Mick Gorrill.
"It is essential that before a company allows personal information to leave its premises on a laptop there are adequate security procedures in place to protect personal information such as password protection and encryption," he said.
The ICO has issued Marks and Spencer with an enforcement notice ordering the company to ensure all laptop hard drives are fully encrypted by April.” (http://www.computing.co.uk/ctg/news/1820858/m-s-breached-data-protection-act#, 2014)

The impact on organisations the Data Protection Act has is that the organisation has to notify the Information Commissioner that the business is holding and processing personal information and data and the purpose in which need the information for and how they plan to use it.
It also Costs the organisation an annual fee of £35 to the Information Commissioner in order to notify them that they are under the Data Protection Act which then makes the public think that the data they give the organisation will be secure. They also need follow the 8 Data Protection Principles (Look in Appendix 1) to make sure the data or information is not abused. (http://www.justice.gov.uk/downloads/information-access-rights/data-protection-act/how-data-protection-affects_my-business.pdf, 2014)

Freedom of Information 2000
The Freedom of Information provides the public access to the information held by public authorities. Public authorities are forced to publish certain information about their activities and the members of the public are entitled to ask for any other information held by public authorities as well.
This act covers all information that is held by a public authority in England, Wales and North Ireland.
The Public Authorities that are in question are organisations such as government departments, local authorities, the NHS, state schools and police forces. This however can sometimes not stretch to organisations such as charities that receive grants and other certain private sector organisations that perform public functions.
The act does not give people access to their own personal data which includes information about themselves such as health records and credit reference files. In order for people to receive data held about themselves from a public authority is a good idea to make a request from the Data Protection Act 1998.
(http://ico.org.uk/for_organisations/freedom_of_information/guide/act, 2014)
A council has breached the Freedom of Information by failing to provide the commissioner with details about the Cost of employing education consultants.
“The authority spent £46,000 on two consultants but did not say how many days they worked or what each was paid. The council said it gave a breakdown of work and total Costs, but had "grave concerns" about releasing more details. The council has been given 35 days to provide the information or face High Court action.

The commissioner said she had not been provided with any firm arguments to support the council's view that disclosure of the information would prejudice the interests of the consultants or the council.”
(http://news.bbc.co.uk/1/hi/wales/8680412.stm, 2013)
This impact the Freedom of Information has on organisations is that it allows third parties and the public look at the information and data held by the business about employees and other parts of the business. This however can cause concerns by employees about the fact that there is no privacy about their progress etc.
(http://news.bbc.co.uk/1/hi/wales/8680412.stm, 2013)
Computer Misuse Act 1990 The Computer Misuse Act was designed to help lower the potential threat of computer based crimes and internet fraud. It was also created to make unauthorized access to certain sites a criminal offence and to also act as a deterrent for serious criminals to stop using computers in the way that can cause a criminal offence and hinder and impair access to certain data stored in a computer.

The Computer Misuse Act was broken by a BBC programme.
“A BBC programme has broken the Computer Misuse Act by acquiring and using software to control 22,000 computers, creating a botnet capable of bringing down websites. A technology law specialist has said that the activity is illegal.”
(http://www.out-law.com/page-9863, 2009)
The impact of the Computer Misuse Act on businesses would be more aimed to those who provide internet connections (Virgin Media, Sky etc.) this is because the organisations would have to monitor and protect the customers from any illegal websites and data by blocking them. They would also have to monitor for any people trying to gain access to illegal material and dealing with them in the correct manor. This would more often than not be to block the individual from the internet and any other sources in which they could access this material from.
Copyright Act 1997
The Copyright Act provides the creators of various media rights (Logos, Music, Books, Videos, Software etc.) control over how they are distributed into the public. It also creates limitations on how the public can use these media items, therefore making it the creators own and not being stolen by other people who could get the credit for creating it. It limits against actions such as making copies of the item and selling it, using the software on a network (unless a licence allows it) and renting the software without informed consent of the copyright holder.
(http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/2copyrightrev1.shtml, 2014) iTunes broke the Copyright Law by making Russian films available to download without the creator’s consent.
“Russian films are being made available through Apple's iTunes service without the consent of the copyright holders, the BBC has learned. The popular films, dating from the Soviet era, are being made available to download as smartphone apps. But the original film-makers have not given their permission for the films to go on sale. Apple said it took copyright complaints seriously and took action as soon as it received a complaint.”
(http://www.bbc.co.uk/news/technology-12310070, 2014)
The impact of the Copyright Law on organisations is that the business will be able to make any work that has been produced by them protected against rival businesses who want the idea, but it can also impact organisations as it will make the business more careful and search other businesses when creating an idea in case it has already been created and then make the organisation face charges.

Ethical Issues

Examples of Ethical Issues
Ethical Issues are the choices and consequences that are struck when considering what is right and what is wrong in an everyday situation. These decisions can be very important in certain situations.
Moral
Moral issues are basically the ‘right and wrong’ points or views in ICT. Theses can include * plagiarism * electronic tracking * DNA profiling * CCTV.
Plagiarism is when one person takes credit for another person’s writing, conversation, song or identity. This can be seen as a moral issue as it is illegal and not seen as the correct way of producing a professional document, song or identity. This would come under the Data Protection Act as it is data or information that cannot be published to the public in the form it was received in, it must be changed in order to make it the author’s own words before it is allowed to be sold and/or published. A good way to check this is by putting the information through a plagiarism checker to make sure it is not too similar to a document already published.
(http://dictionary.reference.com/browse/plagiarism, 2014)
Electronic tracking is a system in which vehicles, businesses and the general public are put under surveillance from remote transmitter units. This can be seen as a moral issue as some people may feel uneasy that they are under surveillance and also these cameras can potentially be hacked and therefore give away important information to others. This would come under the Electronic Communications Privacy Act, which is the act that prohibits unauthorised surveillance of various types of electronic communication such as E-mail. The reason it would come under this act however is in case businesses did not tell their employees they were being monitored or if cameras did get hacked and stole private information from the public.
(http://www.fbig.ca/glossary.html, 2014)
DNA profiling is a technique used that assists in the identification or individuals by their DNA make up. Most DNA sequences in humans are the same but there is enough unique information to distinguish one person from another. This can be seen as a moral issue as some people may not want to have their DNA on a genetic database because then they are on a system and other people will be able to find out important information about them and their background. This would come under the Data Protection Act as this database holds very important and personal data about individuals, concerning their criminal background as well as personal background.
(http://uk.ask.com/question/what-is-the-definition-of-dna-profiling, 2014)

CCTV is short for Closed Circuit Television and it is a visible or covert videoing system that is only intended for a small amount of viewers. It is commonly used for security in shops, banks and public services/transport (busses and trains etc.). This can be seen as a moral issue as they are seen as becoming too frequent and the public does not like knowing that they can be seen all the time wherever they go. This again can be the Electronic Communications Privacy Act as there could be unauthorised surveillance in certain areas that could monitor the public when it shouldn’t be able to.
(http://whatis.techtarget.com/definition/closed-circuit-television-CCTV, 2014)
Real examples of moral issues
Starbucks had sales of £400m in the UK last year, but paid no corporation tax. It transferred some money to a Dutch sister company in royalty payments, bought coffee beans from Switzerland and paid high interest rates to borrow from other parts of the business.
Amazon, which had sales in the UK of £3.35bn in 2011, only reported a "tax expense" of £1.8m.
And Google's UK unit paid just £6m to the Treasury in 2011 on UK turnover of £395m.
Everything these companies are doing is legal; it is avoidance and not evasion.
But the tide of public opinion is visibly turning. Even 10 years ago news of a company minimising its corporation tax would have been more likely to be inside the business pages than on the front page.
Accredited to: http://www.bbc.co.uk/news/magazine-20560359
Whistle Blowing
Whistle blowing is the act of reporting a concern about a wrong doing in a business. This means that the report must be a valid concern about any of the following factors: * Crime – this can be as basic as reporting a fellow colleague for shoplifting in their store or even using certain items in store such as eating a chocolate bar off the shelf etc. up to giving money from tills to friends or family. * Miscarriage of Justice – this basically means blaming someone for a crime they did not commit which could be framing somebody and blaming them for stealing certain items, or it could be as petty as mixing numbers up in a database and blaming it on another employee. * Dangers to health and safety and/or the environment. – this is a basic law and it could be leaving a wet patch on the floor and failing to put a wet floor sign down, or it could also be leaving a wire on the floor that somebody could trip on, to environmental dangers such as polluting nearby lakes or having an electric fence and electrocuting nearby wildlife.
(http://legal-dictionary.thefreedictionary.com/Whistleblowing, 2014)
A real whistleblowing scenario is Samy Kamkar, a computer hacker who exposed the illicit, global mobile phone tracking of all users, regardless of GPS or Location Services settings, on the Apple iPhone, Google Android and Microsoft Windows Phone mobile devices.
(http://en.wikipedia.org/wiki/List_of_whistleblowers, 2014)
The impact of whistle blowing on an organisation would be that the business would need to be cautious and moderate all the employees to make sure that no wrong doings are happening and therefore will not be prosecuted if any employees find anything bad and report the company. The business would also have to be careful in case the employee spreads the words about the wrong doing in the business, giving it a bad reputation losing customers.
Disability
Disability is a physical or mental deficiency which can affect the body or mind and will make them disadvantaged in an organisation as they will need special care and needs in order to complete every day activities.
Disability is an ethical issue as it is the way in which we treat others due to their certain type of disability. We can overcome these disabilities in ICT by using certain types of software such as Microsoft Access.
There was a case of which a woman was diagnosed with the disability MND and therefore could not speak and it was very difficult to find a way to create an easier way of communication for a limited budget. Microsoft Access is relatively cheap and was used in this case as the database to put any commonly used words or phrases which then, with the help of small other software packages that enable the sound to be played can rein act the speech which would sound very similar to the woman’s voice.
However, in some cases this is not always the case for ICT as some illnesses people have such as severe special needs may not have the mental capacity to use or understand the ICT needed in order to communicate in a certain way.
Having said this ICT is not always used to communicate with the disabled, it can be, such as with someone who is epileptic, used to trigger electrical impulses which regulate the abnormal electrical activity of an epileptic brain, reducing the chances of the person who has epilepsy ‘fitting’.
This would impact an organisation as it would create a workforce which would need special attention to be able to make them as capable as a normal worker. The organisation should also make sure that the disabled employee is treated equally, and not being bullied by other colleagues as this could lead to complaints by the employee, using word of mouth could spread, making potential employees not apply to available jobs as they may think if they have specific difficulties they will be harassed about them.
Use of Information
The use of information in organisations is a key concept to its survival. It uses information in ways that will not break any of the acts such as the data protection act and the Freedom of Information. It is important that the information is not used to harm others or publicised without the individual’s consent.
(http://www.business.qld.gov.au/business/exiting-business/valuing-a-business/information-used-in-a-business-valuation, 2014)
“Singer Michael Bolton was involved in a serious plagiarism lawsuit after his 1991 song "Love is a Wonderful Thing" was discovered to be "stolen" from the 1966 song by the Isley Brothers, reported EW.com. In 2000, the U.S. Ninth Circuit of Appeals fined Bolton $5.4 million, which Yahoo! reports "is the largest damages award ever made as the result of a music plagiarism case.”
(http://www.onlineclasses.org/resources/top-10-plagiarism-scandals-of-all-time/, 2014)
Codes of Practice
A code of practice is a “rule or regulation set up by an organisation that must be followed but does not always enforce the law” (http://ico.org.uk/~/media/documents/library/Data_Protection/Detailed_specialist_guides/personal_information_online_cop.pdf, 2014).
By this it means it is a set of rules the organisation makes in order to keep all staff out of danger and to complete work effectively such as ‘silence in the office’ or ‘do not run with hot drinks’ etc. they are not official rules that the law enforces, but they must be followed within the business and is usually located in the contract of employment when employees sign up to work.
Email
The codes of practice for emails in businesses are normally quite similar but can change slightly considering the jobs involved in a particular role (see Appendix 2).
An example of a code of practice is the Northumbria University’s code of practice concerning e-mails. It states how to use emails and how not to use emails in businesses.
It states that the guidelines are “for use within academic administration to enhance communication through email’s proper and effective use, maximising the benefits and safeguarding against abuse and overload of information.”
The impact of the emails code of practice on organisations is that workers will be influenced to do their work and be less tempted to muck around, sending inappropriate comments on emails to other staff as they will be afraid of the consequences if they get caught.

Internet
Internet codes of conduct are set rules used for internet browsing in businesses or services such as schools etc. the normal rules for schools would be things such as do not play games and do not search anything flagged as inappropriate material.
An example would be the British Council’s 11 policies containing information concerning how the council must use their computers, and not look at anything off task or inappropriate. This is the example of an internet code of practice used in the British council which shows that the ethical issues in this are to be sensible and to not do anything that is against these rules which is what the code of conduct is, it is an ethical list of rules to do in the business (see Appendix 3).

The impact of the internet code of practice on an organisation would be that the employees would be less likely to look at anything appropriate, however most inappropriate websites will have already been blocked by the IT department of the business. The employees would then have minimal distractions when working and will be able to focus fully on getting their work completed.

Internal Policies

Internal Policies are similar to codes of practice however they are slightly more official as they are used only by the business’s employees and must comply with legal legislations and are things such as health and safety.
An example would be the bank company Santander, as there are 3 internal policies which are of great importance to employees and contain information such as the “social and environmental policy, human rights policy and the stock market’s code of conduct” (see Appendix 4).
The impact of the internal policies is that they are enforced a lot more than other codes of practice and is more about the employee’s health, meaning that in the workplace , the internal policies will differ according to the risks that may take place but basic health and safety must be supported. This could mean that employees will be more careful, however if they did damage themselves the company may have to pay compensation for the employee, or if not set up adequately, fined for lack of health and safety regulations.

Intellectual Property
Intellectual property is the ownership of non-physical items such as names, designs, symbols and artwork etc. The code of practice for this is basically noting the Copyright Laws for the creator of the intellectual property, including the rights the person has to it and also the rights that co-workers have as well. An example of a copyright issue with intellectual property is the case of a street artist Shephard Fairey. He created an unofficial hope poster of Barack Obama in Obama’s first run for presidential election in 2008. The picture was later discovered to be made without Barack Obama’s consent.

(http://99designs.com/designer-blog/2013/04/19/5-famous-copyright-infringement-cases/, 2014)
The impact of intellectual property on organisations is that the organisations must be careful when creating pictures or logos that the source of the pictures or videos are legit, and that they are not from any illegal websites or without the individuals consent when concerning photographs. They must also make sure that no other companies have the similar or the same design of image, logo or website etc. when creating the businesses and that all creations are subject to copyright and cannot be stolen. The organisation could be given fines if any of the above principles are broken as it is not the business’s own work.
The Intellectual property Copyright and designs act is found in the (Appendix 5).

Content
Content is the “text matter of a document or publication in any form” (http://www.businessdictionary.com/definition/content.html, 2014) which makes up information found in anything, for example; reports, PowerPoints etc. This is important in a business as the content cannot be copied and pasted straight from a website and not referenced as this is plagiarism. It must also be monitored based on what the content is. For example if there is a more mature theme to the content that is found, the content must be blocked for users under the age of 18 as it is deemed unsuitable.
An example of content in the form of a code of practice would be a mobile phone company. They talk about three types of content and how it must be laid out differently. These include Commercial, Internet and illegal content (see Appendix 6).
The impact of content on an organisation is that it must be suitable for the target audience which the organisation focuses on. The content must be appropriate and link to the desires of the customer in order to get most sales. The organisation must also make sure that they reference any quotes they used from other people’s work and materials.

Reporting Bad Practice or Breaches
Reporting Bad Practice is very similar to Whistle Blowing as it is potentially raising concerns about the business and its colleagues for doing dishonest actions. The difference with this to Whistle Blowing however is that this is more in the eyes of the customer, reporting bad customer service or attitudes towards other workers etc. by doing this it is possible the customer can warn others about the business in question but will also be able to make the higher powers of the business fix or improve the problem, and satisfy the customer’s complaint.

An example of bad practice being reported would be Sony when the PlayStation 3 payment servers were breached and bad practice was found when their servers were found to have not been encrypted, making breaching/hacking the servers a lot easier. This was bad practice due to the fact it was careless, therefore leaving customers at risk of having their bank details stolen. It was also found that old outdated billing information was still kept on the servers which increases the chances of the payment information being stolen and less chance of the Sony servers realising that this is happening as little or no attention would have been given towards this outdated information.
“If the credit card numbers are no longer valid, then why is Sony still keeping them?”— Avner Levin, Ryerson University (http://www.cbc.ca/news/technology/sony-data-breach-update-reveals-bad-practices-1.986647, 2014)
The impact of breaches and bad practice on an organisation is that it can lead to customer’s details being hacked and losing money from their bank cards. This can then lead to word of mouth and many customers will be pushed away from using the business as they are seen as unreliable and therefore not a professional organisation.
Operational Issues
Security of Information
The Security of Information is the protection of information and information systems against unauthorised access or modification of data/information. This also includes the necessary actions that must be performed to counter threats from hackers and viruses etc.
(http://www.thefreedictionary.com/information+security, 2014)

Backups
Back up files are copied files and/or databases that are preserved in the event of equipment failure or other catastrophes. “Backups are a routine thing in larger organisations or businesses with mainframes and the administrators of smaller business computers. “The Backups are also normally offsite in another building so therefore if all the servers in the building get wiped or hacked the backup will not be affected.
(http://www.ingrammicro.com/ext/0, 2014)
For personal computer users who use computers either for leisure or small documents such as students’ coursework for A/AS levels, backups are also as necessary however it is often neglected and therefore loss of data is prone to occur here.
An example of data loss in an organisation is the crisis of HSBC losing a disc containing 370,000 customer details.
“The disc was lost four weeks ago after being sent by courier from the bank's life insurance offices in Southampton.”
“The customers' details included their names, dates of birth, and their levels of insurance cover.”
The impact of backups on an organisation is that the data will be safe so therefore if the data does become hacked or gets lost the business has foundations in which it can improve on. If the business does not have backups the business could potentially leave many customers open for fraud as any computer hacker could find the bank details which have been lost or even hacked.

Health and Safety
Health and safety is a mandatory point in the entire business world. In short, health and safety is a list of regulations and procedure which are intended to prevent accidents and/or injuries in the workplace or other public environments.

Processes
Processes of health and safety are the different checks which are needed to be performed to make sure that health and safety is being followed correctly and checked to make sure that the health and safety is as good as it can be to avoid any accidents.
An example of this would be the BOC Industrial Gases; they check the various different types of hazards and make sure they are not in the line of the employees to increase the health and safety. These include Electrical, Infra-Red and Ultra-Violet Radiation Generation of fume and gas, Hot metal, Noise and Naked flames. (See Appendix 7)
The impact of processes on an organisation is that it decreases the risk of accidents which will in turn decrease the chance that the business will have to pay out for compensation. It also helps the reputation of the business as the less accidents that happen; the less people are turned away by the business’s health issues, which include potential employees as well.

Procedures
Procedures in health and safety are the ways in which tasks are done depending on the situation of the health and safety in the business. If the staff at an organisation caught a virus, the procedure for the health and safety would be to either send the staff home or give them medicine and tissue in order to catch the cold and therefore not spread it.
An example of procedures could be of a first aider as they have to take action depending on the severity of a wound a patient has and what process they are at. For example, if the patient had a wound but it was already being treated, the first aider would not have to get to them as quick as somebody who had not been treated, as they are more vulnerable (see Appendix 8).
The impact on the procedure of Health and Safety on an organisation is that the quicker the organisation can treat a Health and Safety precaution the quicker and easier the procedure of improving the health and safety in an organisation is.
(http://transition-support.com/Process_versus_procedure.htm, 2014)

Regulations
Regulations are rules that are put in place to make sure that a product is not dangerous and is safe to use. It is very similar to quality control.
(http://www.collinsdictionary.com/dictionary/english/safety-regulations, 2014)
An example of a breach of the health and safety regulations would be a carpet company that was prosecuted by HSE (Health and Safety Executive) because an employee at this company was operating a carpet-beaming machine that was not set up correctly. It was not fixed or interlocked and the trip wire was not in the correct position, consequently leading to the employee becoming entangled in the machine causing serious injuries to the employee.
(http://www.hse.gov.uk/enforce/examples/machinery.htm, 2014)
The impacts of health and safety regulations is that the organisation would be able to test all the equipment used to make the product or service to make sure everything was in perfect order and therefore avoid any unintended accidents towards the employees or customers.
Organisational Policies
Organisational policies are basically a selection of routes the business can take leading into the future which determines how the organisation works in its different sectors (see Appendix 9 for organisational policies). Costs
Costs are basically payments going in and out of the business. Payments going out of the business are to pay for the business, such as taxes and or various insurance payments. They are also the funds which are put into an organisation to pay for performance or system upgrades, new instalments, better equipment, advertising and for new businesses, the foundations in which the business works upon. There are also Costs coming into the business, these are form consumers buying the business’s products and payments from various loans the business could have given to people if they are banks etc.
For Development
Costs for development are basically the Costs to start a project the business has planned for improvement such as supporting any charities or merging with other businesses, expanding the business’s market share creating more profit for the business. Any other Costs to the business are called operational Costs.
When spending Costs for development, a considerable amount of research must be included in this too. Research is needed so that the business knows clearly the consumers wants and needs in the market, therefore best suiting the company’s and consumers’ needs. An example of this could be a vacuum cleaner company, spending a considerable amount of money researching and developing improvements for the vacuum cleaner. The Costs in short term decrease the company’s profits but create the potential for higher profits in medium and long term, and as a result these improvements are vital when improving the idea.
The impact of development Costs on an organisation is that the more money the business puts into development, the bigger and more professional the business will become. It will make their products or service more reliable and better quality, whilst also making their logo and other computer based parts of the business more presentable and more professional. However, if the business spends a minute amount on development they will be a very small business with very little in the way of quality items or logos, which may drive away customers as it does not appeal to them.
Modification
Modification is the act of a business improving an object to make it better and run smoother and more reliable and will most likely be the result of continuous Costs to development.
(http://www.vocabulary.com/dictionary/modification, 2014)
Cost of modification are the funds used to change an existing product to make it perform better, often chosen by the user and can be modified by the user to what suits them best. An example of modification would be antivirus software. The specification of the antivirus software can be edited to what the consumer wants the software to protect against. The version of the antivirus software will be the same however the individual changes the consumer makes to make the product specific to them is the modification.
The impact modification has on organisations is that it can allow for better quality, faster equipment in order to make the employees work more effectively with less delays and better quality work due to more extensive features. The modification would also be able to be edited on filters and internet blockers as websites can be blocked according to the modifications the IT department place on the internet.

Training
Training is teaching an employee the skills needed in order to do the tasks set in a specific job. These vary widely in correspondence to the job in question. There can also be on and off the job training which means the training either takes place on the business site or off the business site in a college etc. The Costs of training basically means the payments the organisation makes to give the employees good training when starting the business. If the job involves dangerous tools or substances, good training would be required so that they do not injure themselves or others which could Cost more as it is more likely to be off-the-job training. This links into health and safety as if they are more likely to injure themselves the business would be at risk at paying a lot in compensation to their employees.
A real example of these types of centres is in the ASDA Company. These centres are called Stores of Learning (SOLs). They are “centres of excellence for technical and behavioural training”
“The key benefits of ASDA’s training are seen in:

* Increased colleague productivity - where customers are served and satisfied more quickly. This improves colleague efficiency, reduces Costs and leads to higher profitability.

* The quality of ASDA’s well trained colleagues. A pleasurable shopping experience means customers are more likely to return to the store to shop. This gives ASDA a competitive advantage.

* High morale which leads to a more motivated team. If colleagues are motivated to develop there are many opportunities open to them. The resulting sense of achievement that colleagues convey in their work contributes to a positive corporate image.

* ASDA aims to fill 80% of appointments through internal promotion.”

(http://businesscasestudies.co.uk/asda/meeting-business-needs-through-training-and-development/costs-and-benefits-of-training-and-development.html#axzz2u4N1neZs, 2014)
System Upgrades
A System Upgrade or a Software Update is a new version of a software or hardware designed to replace an older version of the same product. With Software Updates, the update is usually free and can be downloaded directly from the device and therefore changes the appearance of the Operating System and can fix any technical faults making the performance of the device improve rapidly, however if updating an old device to the newest software can create slow responses and can take up a lot of memory space due to the old device not being as technically advanced.
When a System Upgrade consists of an object such as a gaming console, the old console is sold at a discount so people who couldn’t afford it can buy one of the consoles can experience one of the company’s consoles. There is also the fact that if the user has an older console they have the option to ‘trade in’ the console to get a discount when buying the new console.
A real example of a System Upgrade would be the PlayStation 3 to the PlayStation4. The PlayStation 4 is the newer, next generation console which is the upgrade to the PlayStation 3 and the PlayStation 3 can be traded in to get a discount on the PlayStation 4.
A real example of a Software Update would be Apple’s iOS 6 to iOS 7. iOS 7 is a new version of Apple’s Operating System and increased the speed in which the iPod, iPhone and iPad performed; however older versions of these products would suffer, such as the iPhone 4 as the speed and memory capacity of this model can sometimes not be fast and/or big enough to run iOS 7 smoothly and effectively.
Continuance Planning
Business Continuance planning is the way in which the business examines the way it provides their products and/or services and it also can increase the business’s resilience to the occurrence of loss of information (see Appendix 10)
A real example of a continuance plan is Sony’s Business Continuity Plan (BCP). It includes disaster prevention which has the aim to help against natural disasters and find the “earliest possible recovery of operations, should interruption be unavoidable.”
(http://www.sony.net/SonyInfo/csr_report/governance/index11.html, 2014)

Types of Organisations
There are three types of organisations which are in the market today. They are Public, Private and Not-for Profit.
Public
The Public Sector is owned and run by the government for society. Taxes are normally the source of income that funds these businesses. Their aims are to provide essential public services and to use resources well to benefit the community.
There are two parts of the government that control the state, the central government and the Local government. The Central government control the public organisations such as the National Health Service (NHS), Prisons, Universities etc. The Local government controls Primary and Secondary education, Libraries and Social services etc.
The Public Sector provides a large range of services and part of this is provided free of charge such as schools and others are priced such as entrance to swimming pools and sports facilities. The public sector produces some goods and services such as education and healthcare and also buys in products such as tanks and roads.
There are some companies that are owned by the central government such as the Royal Mail and the BBC. Public Corporations receive grants from the government and raise finance from the public.
(http://www.slideshare.net/BusEd/different-types-of-business-organisation, 2014)
Private
The Private sector is owned and run privately by individuals. Some examples of these organisations include Sole traders, Partnerships and franchises. Their aims are to increase their market share, maximise their sales, grow in size and reputation and make a profit.
The sole traders and partnerships are funded by personal savings by the owner, but can also be funded by bank loans, government grants and forming partnerships. However Companies sell shares in the company in order to get finance.
(http://www.slideshare.net/BusEd/different-types-of-business-organisation, 2014)
Not-for-Profit (Voluntary groups)
Voluntary groups are not owned by any individual people; however somebody will be responsible for the business to achieve its goal and sets targets and budgets through its life cycle.
These types of organisations are set up to help a particular group of people, such as guide dogs for the blind, Cancer Research and Oxfam etc.
In order for these businesses to survive they must at least break even by spending no more than they take in through fundraising, grants and donations.

Appendices
Appendix 1
Data Protection Act 8 Principles 1. “Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless –

(a) at least one of the conditions in Schedule 2 is met, and
(b) in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met. 2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. 3. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. 4. Personal data shall be accurate and, where necessary, kept up to date. 5. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. 6. Personal data shall be processed in accordance with the rights of data subjects under this Act. 7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. 8. Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.”
(http://ico.org.uk/for_organisations/data_protection/the_guide/the_principles, 2014)
Appendix 2
Use email
• As a memo, BUT only where the text is short and to the point – the email is the electronic memo
• As a reminder/advance notice/flag of important meetings, information etc.
• To ascertain availability for meetings, BUT only if electronic diaries are not used. Otherwise use the online meetings request facility.
• To give standard information to a large group of people
• To flag where important/lengthy information is stored/being distributed e.g. public folder,
Intranet, hard copy circulation when and from whom
• To gather views/initial reactions quickly. Use the voting button facility
• To disseminate urgent news rapidly
• As a telephone substitute BUT only where a quick non-explanatory type of response with no follow on is expected. Do not use email
• To send large documents/attachments, especially to large numbers of people. These are better stored in folders, on the Intranet, circulated by hard copy
• To distribute committee papers (except for last minute urgent late papers) as bulk repro graphing of papers needed in hard copy form is cheaper
• As a substitute for formal documents where construction, language and presentation are particularly important
• For long term storage – save to networked or hard drives or delete
• For complicated queries/ongoing dialogues/explanations – this often takes longer than oral or face to face contact and misconceptions can arise
• As a substitute for face to face/telephone communication with colleagues. It is very important to maintain interpersonal relationships
• To shirk responsibility, especially for difficult personal communications
• For really confidential information – hard copy delivered direct to the addressee in a sealed envelope is more secure. This code of conduct is accredited to: (http://www.northumbria.ac.uk/static/5007/arpdf/emailcode.pdf, 2014)
Appendix 3
1. Internet computers will not be used to chat or for other illegal activity, to access illegal materials, or to access materials which by local community standards would be obscene.
2. Resource Centre employees are authorised to take prompt and appropriate actions to enforce the Rules of Conduct, and/or to prohibit use by persons who fail to comply with the Internet Acceptable Use Policy as stated or implied herein
3. Installation, downloading, or modification of software is prohibited.
4. Users will respect Copyright Laws and licensing agreements.
5. Users will not make any attempt to gain unauthorised access to restricted files or networks, or to damage or modify computer equipment or software.
6. Payment is required by users who incur charges for printing. Payment should be arranged with Resource Centre staff prior to printing.
7. Access sessions could be limited to thirty minutes. Such limitation will be dependent on facility-specific demand in order to provide access for the majority of users.
8. Users must end their session and leave the terminal when asked to do so by authorised Resource Centre staff.
9. Upon completion of an Internet access session, a user may be required to wait 30 minutes before signing up for another session. Such limitation will be dependent on facility-specific demand in order to provide access for the majority of users.
10. Users will respect the privacy of other users, and will refrain from attempting to view or read material being used by others.
11. By mutual agreement, two persons may share one access session as long as their behaviour or conversation does not disturb other users or Resource Centre staff.

(//www.britishcouncil.org/iraq-universities-resource-centres-code-of-conduct.htm, 2014)

Appendix 4 1. Social and environmental policy – This policy refers to the commitment of an organisation to laws, regulations, and other policies concerning environmental issues and sustainability, including air and water pollution, solid waste management, ecosystem management and wildlife and endangered species.
With credit to: http://en.wikipedia.org/wiki/Environmental_policy
The Social Policy refers mostly to guidelines, principles, legislations and activities that can affect the living conditions of humans.
(http://en.wikipedia.org/wiki/Social_policy, 2014) 2. Human rights policy – The Human rights policy refers to the treatment to fellow workers, especially in business in an equal manner with complete respect to one another. The government helps campaign for this policy to become more popular in business especially as well. 3. Stock market code of conduct – this is used to establish the behavioural criteria to be followed by those for whom the code is intended in relation to securities transactions in the area covered by the rules, its purpose being to help provide transparency and security to investors.
(http://www.gasnaturalfenosa.com/en/home/shareholders+and+investors/corporate+governance/1285338473565/internal+code+of+conduct+with+regard+to+the+stock+markets.html, 2014)
Appendix 5 1. Under the terms of the Copyright, Designs and Patent Act 1988, intellectual property created by an employee in the course of his/her employment belongs to the employer.
The Institute therefore initially owns all inventions that could be patented and copyright in all outputs in written and electronic form, created in the course of employment. 2. Intellectual property can be defined here as any intellectual output or associated skills that may be of strategic or commercial value to the Institute. This includes books, articles, multimedia packages, courseware, lecture notes, web-based materials, computer software, designs, video and similar material, animations, still images, audio items, research results and associated background material, and professional knowledge and skills. 3. While in principle the Institute owns the copyright of all works created in any form by staff in the course of their employment, it recognises the long-standing tradition that ownership of copyright in works created through the intellectual effort of a member of the academic staff shall with some important exceptions be vested in that individual, who is then free to assign it to publishers or other third parties and receive royalties or other payments in return. Such works shall be defined to include textbooks and academic articles and works of a similar nature. 4. The exceptions to the traditional treatment of copyright ownership set out in the previous paragraph will apply to the following material and in each case copyright will be owned by the Institute:

5. Institutional material defined to include any document printed or electronic, which is produced for administrative purposes, including promotion and marketing of the Institute’s courses, student and staff recruitment, papers prepared for any internal committee or similar body, material included in any University, Faculty or Departmental handbook for students and any other Institute purpose;

6. Any copyrightable material created by a member of staff whose job description specifically includes the creation of printed or electronic materials; teaching materials including course guides, hand-outs, lecture notes, slide shows, video and audio materials, assessment and examination questions, presentations over the intranet and similar materials;

7. Any copyrightable material which is produced specifically for academic programmes to be delivered over the internet, directly or indirectly through conversion of existing printed material. Material generated by prior agreement for which the Institute provides additional resources, including content commissioned from members of staff in the course of their employment for inclusion in courseware.

8. Material falling under paragraph 2.4 of this policy may not be copied or in any way utilised externally to the Institute without permission of the Institute Secretary.

9. In the event that a staff member leaves the Institute, the Institute retains its right, stated in 2.4 above, to use that material under implicit licence.

10. In return for having vested in them the copyright in all work which does not fall under the exceptions in paragraph 2.4 of this policy, members of staff grant the Institute an irrevocable royalty-free licence to copy their copyright work for administrative purposes, including distribution to staff and students on a non-profit basis, to governmental and non-governmental bodies, accreditation agencies and for similar or related purposes whether required by law or not.

11. where content has been developed as an aid to teaching, and is subsequently included in courseware, including distance learning materials, the Institute will licence this use from the member of staff free of charge and will expect to be granted a perpetual licence for the use of the content including a waiver of moral rights to allow for future re-use and re-editing.

12. The ownership of copyright in material generated by research and other activities initiated and funded by external sponsors may rest with the sponsor, or the sponsor and the institute may agree joint copyright.

13. Contracts governing support given by outside bodies should make clear 1.Who owns intellectual property arising from the work and 2. How this might be exploited.

(http://www.ioe.ac.uk/about/documents/About_Policies/IntellectualProperty.pdf, 2014)
Appendix 6
In a mobile phone company, the mobile phone business’s code of conduct on content talks mainly about 3 types of content. 1. Commercial content 2. Internet content 3. Illegal content
Commercial content is basically the mobile operators changing any settings on commercial contents such as advertisements and blocks them to users under the age of 18. This also goes for material such as magazines, films, videos and computer games.
The mobile phone company also controls an age verification which prohibits some contents of certain websites, games and films until the viewer is 18.
Internet content such as websites and search engine links are often ‘filtered’ or ‘blocked’ as the mobile phone companies cannot control the content offered on the internet. The filter is able to be set at a level that can filter out more commercially explicit content concerning the age of the viewer.
Illegal content is identified as being any content that is deemed unfit for viewing for anybody such as child pornography. Mobile phone companies work with the Internet Watch Foundation (IWF) and other law enforcement agencies that deal with reporting any content that may break the criminal law. If any illegal content is found on mobile phone internet browsers it will be taken down immediately, with relevant notice and take-down procedures.
IWF send URL’s to the mobile phone companies that contain potentially illegal content and then the appropriate actions will be taken to protect browsers from being exposed to such content, normally by blocking the browser from accessing such content.
An example of illegal content would be Jon Venables case of when he was found in Cheshire at the age of 27 with child abuse images on his computer. He was then sent to prison due to his inappropriate and illegal content and was banned from using a computer for five years.
(http://www.bbc.co.uk/news/uk-10735857, 2014)
Appendix 7
Processes of safety are the production line safety precautions. Taking a business such as a BOC Industrial Gases, they do a variety of dangerous tasks such as welding and cutting. The main safety issues other than welding and cutting that arise from this business are: * Electrical – these can include lose cables which could electrocute employees if they have water near them or do not have the correct equipment. * Infra-Red and Ultra-Violet radiation – these radiations are capable of damaging body cells after long exposures causing them to mutate creating cells that can create cancer if not treated correctly and if the workers do not have the correct equipment or uniforms when handling them. * Generation of fume and gas – these gasses could be poisonous to humans if they are inhaled in big quantities without the correct safety equipment. * Hot metal – this is quite a self-explanatory hazard, the metal will be hot and could potentially burn workers if they do not have protective/heatproof clothing on them in the workplace. * Noise – noise could be a problem as commands from managers from co-workers about hazards could be distorted or not heard at all which could cause problems in the workplace. * Naked flames – naked flames, like hot metal are dangerous as they can burn or catch fire to clothes if the clothing is not heat proof. The naked flame is also capable of, when mixed with a certain gas, being highly dangerous and could be prone to spreading or even exploding.
(http://www.boconline.co.uk/en/sheq/workplace-safety/index.html, 2014)
Appendix 8
An example of procedures could be of a first aider. The procedures and responsibilities that a first aider has will include:
Attend all calls for first aid assistance – this means that the first aider cannot put something in priority of a call; no matter how minor it is because if it is left it could very well become a major issue.
• Ensure their own safety at all times – this means that the first aider must keep their health up as well, for example, if the first aider has a cold and gives it to the patient, the person who is injured would become a lot worse.
• Provide assistance at all times in compliance with their ‘First Aid at Work’ training – this means that in any situation the first aider must use their skills for good when they performed their training, not just for calls but for other situations as well.
• Take charge of the casualty until a satisfactory level of recovery has been achieved or until the emergency services have arrived – this means that that the first aiders cannot leave the scene or stop treating the victim until an ambulance has arrived or the person has achieved suitable health. This is because if the first aider leaves early, there could be a delay for an ambulance, or the condition of the casualty could drop drastically, making them vulnerable to a fatality.
• Keep designated first aid boxes fully stocked and ensures that all items are within their expiry date – this is vital for a first aider as they must make sure all medicine used has not reached its expiry date and suitable for the victim, along with bandages and plasters, making sure they are not too old and have lost their quality too much.
(http://healthandsafety.southwales.ac.uk/media/files/documents/2012-07-25/OHSS_02.17.6.1_Duties_of_University_First_Aiders.pdf, 2014)
Appendix 9 * Employment status policy – this basically is how the company in future times will determine how the employment will work, such as any requirements needed or not needed and what happens in the interview etc. * Complaints Policy – this is how the organisation will deal with complaints as it improves and reaches the customers’ needs after experience with different complaints. * Health and Safety Policy – this policy will change in the future depending on what the government deems as a health and safety policy and how they deal with them over time. * Membership Policy – this is how becoming a member of a business will change in time with the business’s continuous development the managers will decide what will happen concerning this. * Sustainable Development Policy – this is the policy which manages environmental concerns within the business, and can link with the complaints policy because if the business consumes a large amount of fossil fuels or produces large amounts of waste the complaints could help to improve how to use more renewable energy sources and produce less waste or recycle. * Volunteering Policy – this is basically the management of volunteering in the business which is work experience and the business could decide with the development and improvement of the business what could be used as work experience and voluntary work and what wouldn’t.
(http://www.hr.msu.edu/documents/supportstaffpolproc/empstatus.htm, 2014)

Appendix 10 * Analysis — helps to identify critical and non-critical functions, time frames within which you need to resume critical functions, and the business and technical requirements for recovery. We also help you identify potential threats (e.g., earthquakes, fires, power outages, etc.), document the potential impacts of such threats and make a list of your recovery requirements. * Solution Design—helps to identify the most Cost-effective business continuance solution, including your minimum application requirements and the time frames in which they must be available. We also help you define ways to minimize potential exposures. * Testing and Organization Acceptance—Structured will help test plans and facilitate organizational acceptance. When plans fail or no longer meet expectations, Structured will help modify requirements accordingly. * Implementation— when the final plan is in place, documentation is finalized and should be executed in case of a disaster. * Maintenance—Business continuity plans must be evaluated periodically to ensure relevance and accuracy. For example, staffing information, client information, vendors and contacts must all be updated.
(http://www.structured.com/professional-services/business-continuance-planning, 2014)

Bibliography
//www.britishcouncil.org/iraq-universities-resource-centres-code-of-conduct.htm, 2014. British Council. [Online]
Available at: //www.britishcouncil.org/iraq-universities-resource-centres-code-of-conduct.htm
[Accessed 5 5 2014].
Anon., n.d. SOAS. [Online]
Available at: http://www.soas.ac.uk/infocomp/dpa/policy/overview/
[Accessed 4 5 2014]. http://99designs.com/designer-blog/2013/04/19/5-famous-copyright-infringement-cases/, 2014. 99 designs. [Online]
Available at: http://99designs.com/designer-blog/2013/04/19/5-famous-copyright-infringement-cases/
[Accessed 5 5 2014]. http://businesscasestudies.co.uk/asda/meeting-business-needs-through-training-and-development/costs-and-benefits-of-training-and-development.html#axzz2u4N1neZs, 2014. Business Case Studies. [Online]
Available at: http://businesscasestudies.co.uk/asda/meeting-business-needs-through-training-and-development/costs-and-benefits-of-training-and-development.html#axzz2u4N1neZs
[Accessed 5 5 2014]. http://dictionary.reference.com/browse/plagiarism, 2014. Dictionary.com. [Online]
Available at: http://dictionary.reference.com/browse/plagiarism
[Accessed 5 5 2014]. http://en.wikipedia.org/wiki/List_of_whistleblowers, 2014. Wikipedia. [Online]
Available at: http://en.wikipedia.org/wiki/List_of_whistleblowers
[Accessed 5 5 2014]. http://en.wikipedia.org/wiki/Social_policy, 2014. wikipedia. [Online]
Available at: http://en.wikipedia.org/wiki/Social_policy
[Accessed 5 5 2014]. http://healthandsafety.southwales.ac.uk/media/files/documents/2012-07-25/OHSS_02.17.6.1_Duties_of_University_First_Aiders.pdf, 2014. Health and Safety South Wales. [Online]
Available at: http://healthandsafety.southwales.ac.uk/media/files/documents/2012-07-25/OHSS_02.17.6.1_Duties_of_University_First_Aiders.pdf
[Accessed 5 5 2014]. http://ico.org.uk/~/media/documents/library/Data_Protection/Detailed_specialist_guides/personal_information_online_cop.pdf, 2014. Ico.org. [Online]
Available at: http://ico.org.uk/~/media/documents/library/Data_Protection/Detailed_specialist_guides/personal_information_online_cop.pdf
[Accessed 5 5 2014]. http://ico.org.uk/for_organisations/data_protection/the_guide/the_principles, 2014. ICO. [Online]
Available at: http://ico.org.uk/for_organisations/data_protection/the_guide/the_principles
[Accessed 5 5 2014]. http://ico.org.uk/for_organisations/freedom_of_information/guide/act, 2014. ICO. [Online]
Available at: http://ico.org.uk/for_organisations/freedom_of_information/guide/act
[Accessed 4 5 2014]. http://legal-dictionary.thefreedictionary.com/Whistleblowing, 2014. The Free Dictionary. [Online]
Available at: http://legal-dictionary.thefreedictionary.com/Whistleblowing
[Accessed 5 5 2014]. http://news.bbc.co.uk/1/hi/wales/8680412.stm, 2013. BBC News. [Online]
Available at: http://news.bbc.co.uk/1/hi/wales/8680412.stm
[Accessed 4 5 2014]. http://transition-support.com/Process_versus_procedure.htm, 2014. Transition support. [Online]
Available at: http://transition-support.com/Process_versus_procedure.htm
[Accessed 5 5 2014]. http://uk.ask.com/question/what-is-the-definition-of-dna-profiling, 2014. Ask Jeeves. [Online]
Available at: http://uk.ask.com/question/what-is-the-definition-of-dna-profiling
[Accessed 5 5 2014]. http://whatis.techtarget.com/definition/closed-circuit-television-CCTV, 2014. WhatIs.com. [Online]
Available at: http://whatis.techtarget.com/definition/closed-circuit-television-CCTV
[Accessed 5 5 2014]. http://www.bbc.co.uk/news/technology-12310070, 2014. BBC News. [Online]
Available at: http://www.bbc.co.uk/news/technology-12310070
[Accessed 5 5 2014]. http://www.bbc.co.uk/news/uk-10735857, 2014. BBC. [Online]
Available at: http://www.bbc.co.uk/news/uk-10735857
[Accessed 5 5 2014]. http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/2copyrightrev1.shtml, 2014. BBC bitesize. [Online]
Available at: http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/2copyrightrev1.shtml
[Accessed 5 5 2014]. http://www.boconline.co.uk/en/sheq/workplace-safety/index.html, 2014. BOC. [Online]
Available at: http://www.boconline.co.uk/en/sheq/workplace-safety/index.html
[Accessed 5 5 2014]. http://www.business.qld.gov.au/business/exiting-business/valuing-a-business/information-used-in-a-business-valuation, 2014. Queensland government. [Online]
Available at: http://www.business.qld.gov.au/business/exiting-business/valuing-a-business/information-used-in-a-business-valuation
[Accessed 5 5 2014]. http://www.businessdictionary.com/definition/content.html, 2014. Business dictionary. [Online]
Available at: http://www.businessdictionary.com/definition/content.html
[Accessed 5 5 2014]. http://www.cbc.ca/news/technology/sony-data-breach-update-reveals-bad-practices-1.986647, 2014. CBC. [Online]
Available at: http://www.cbc.ca/news/technology/sony-data-breach-update-reveals-bad-practices-1.986647
[Accessed 5 5 2014]. http://www.collinsdictionary.com/dictionary/english/safety-regulations, 2014. Collins Dictionary. [Online]
Available at: http://www.collinsdictionary.com/dictionary/english/safety-regulations
[Accessed 5 5 2014]. http://www.computing.co.uk/ctg/news/1820858/m-s-breached-data-protection-act#, 2014. Computing. [Online]
Available at: http://www.computing.co.uk/ctg/news/1820858/m-s-breached-data-protection-act#
[Accessed 4 5 2014]. http://www.fbig.ca/glossary.html, 2014. FBIG Investigations. [Online]
Available at: http://www.fbig.ca/glossary.html
[Accessed 5 5 2014]. http://www.gasnaturalfenosa.com/en/home/shareholders+and+investors/corporate+governance/1285338473565/internal+code+of+conduct+with+regard+to+the+stock+markets.html, 2014. Gas Natural fenosa. [Online]
Available at: http://www.gasnaturalfenosa.com/en/home/shareholders+and+investors/corporate+governance/1285338473565/internal+code+of+conduct+with+regard+to+the+stock+markets.html
[Accessed 5 5 2014]. http://www.hr.msu.edu/documents/supportstaffpolproc/empstatus.htm, 2014. Michigan State University. [Online]
Available at: http://www.hr.msu.edu/documents/supportstaffpolproc/empstatus.htm
[Accessed 5 5 2014]. http://www.hse.gov.uk/enforce/examples/machinery.htm, 2014. HSE. [Online]
Available at: http://www.hse.gov.uk/enforce/examples/machinery.htm
[Accessed 5 5 2014]. http://www.ingrammicro.com/ext/0, ,., 2014. Ingram Micro. [Online]
Available at: http://www.ingrammicro.com/ext/0,,25108_24315_24300,00.html
[Accessed 5 5 2014]. http://www.ioe.ac.uk/about/documents/About_Policies/IntellectualProperty.pdf, 2014. IOE. [Online]
Available at: http://www.ioe.ac.uk/about/documents/About_Policies/IntellectualProperty.pdf
[Accessed 5 5 2014]. http://www.justice.gov.uk/downloads/information-access-rights/data-protection-act/how-data-protection-affects_my-business.pdf, 2014. justice.gov.uk. [Online]
Available at: http://www.justice.gov.uk/downloads/information-access-rights/data-protection-act/how-data-protection-affects_my-business.pdf
[Accessed 4 5 2014]. http://www.northumbria.ac.uk/static/5007/arpdf/emailcode.pdf, 2014. Northumbria. [Online]
Available at: http://www.northumbria.ac.uk/static/5007/arpdf/emailcode.pdf
[Accessed 5 5 2014]. http://www.onlineclasses.org/resources/top-10-plagiarism-scandals-of-all-time/, :., 2014. Online classes. [Online]
Available at: : http://www.onlineclasses.org/resources/top-10-plagiarism-scandals-of-all-time/
[Accessed 5 5 2014]. http://www.out-law.com/page-9863, 2009. Out-Law. [Online]
Available at: http://www.out-law.com/page-9863
[Accessed 4 5 2014]. http://www.slideshare.net/BusEd/different-types-of-business-organisation, 2014. Slide Share. [Online]
Available at: http://www.slideshare.net/BusEd/different-types-of-business-organisation
[Accessed 5 5 2014]. http://www.soas.ac.uk/infocomp/dpa/policy/overview/, 2014. SOAS. [Online]
Available at: http://www.soas.ac.uk/infocomp/dpa/policy/overview/
[Accessed 4 5 2014]. http://www.sony.net/SonyInfo/csr_report/governance/index11.html, 2014. Sony. [Online]
Available at: http://www.sony.net/SonyInfo/csr_report/governance/index11.html
[Accessed 5 5 2014]. http://www.structured.com/professional-services/business-continuance-planning, 2014. Structured.com. [Online]
Available at: http://www.structured.com/professional-services/business-continuance-planning
[Accessed 5 5 2014]. http://www.thefreedictionary.com/information+security, 2014. Free Dictionary. [Online]
Available at: http://www.thefreedictionary.com/information+security
[Accessed 5 5 2014]. http://www.vocabulary.com/dictionary/modification, 2014. Vocabulary. [Online]
Available at: http://www.vocabulary.com/dictionary/modification
[Accessed 5 5 2014]. https://uk.answers.yahoo.com/question/index?qid=20090123023751AA4hib2, 2009. Yahoo answers. [Online]
Available at: https://uk.answers.yahoo.com/question/index?qid=20090123023751AA4hib2
[Accessed 5 5 2014].

Similar Documents

Premium Essay

Google

...1) In 2013 Google was the leading Internet search firm. Google owned 67 percent market share in search from home and work computers and a 97 percent share of searches performed by mobile devices. The two main competitors for Google in the search engine industry for market share is Microsoft Corporation’s Bing and Yahoo Inc.’s search. (Blystone, 2015). Google is well known and a leader in the search engine industry that the company became a verb. When people search for something on the Internet such as for a recipe they say, “ I goggled the recipe” (Blystone, 2015). The competition in the search engine industry for Google does come from the two related search engines yahoo search and Bing. However, the major competition in the search engine industry stems from searches with in websites and apps that offer more than just searches, such as Amazon, Inc. and Facebook, Inc. For example, Facebook Inc.’s CEO Mark Zuckerberg articulated that the company’s assets could be used to compete with search engines. Facebook Inc. can compete with search engines by the website uniquely being positioned to answer questions people may have such as, what sushi restaurants my friends have been to recently and liked? These query-based searches that can be done on Facebook potentially offer consumer something they could not do anywhere else (Blystone, 2015). Apple Inc. also created feature and operating system on their iPhone, iWatches, and Apple TV Siri that acts as a virtual personal assistant. With...

Words: 2270 - Pages: 10

Free Essay

Google

...MGT500 Aug 06, 2011 Essay Questions: Google Case Study 1. Do you think Google will be able to maintain its entrepreneurial culture in spite of its recent growth and increased size? Why or why not? It appears that Google will maintain its entrepreneurial spirit at least for the foreseeable future. Google now employs over 28,000 people around the globe and as of February this year, maintained a market share of 65.6% in the search engine industry (Kell, 2011). On top of this their additional product lines are impacting the market on global scale such as Gmail and Google Maps, making Google a major player in the technology sector. However, even with all explosive growth, Google recently confirmed its desire to maintain its entrepreneurial roots. As stated by Google CFO Patrick Pichette, “With scale there always becomes this tension of how do you keep the start-up philosophy, we don't want to lose our start-up philosophy" (Millman 2011). The question then becomes not do you want to remain entrepreneurial, but rather how do you maintain it. When the size of an organization reaches 28,000 it is inevitable that a more bureaucratic model becomes necessary to maintain organized operations. With bureaucracy and the stability it brings, innovation and flexibility tend to suffer. However, Google has proven it can maintain and grow revenues even while it aggressively expands the size of its operation. This is demonstrated by Google continuing to reinvent itself with new products...

Words: 1130 - Pages: 5

Free Essay

Google

...Introduction Google is a company that specializes in internet search and online advertising, and an important player in the knowledge-based services industry. Since its very beginnings, this company has focused on innovation and new ways of doing things more efficiently and effectively, and it has paid off for it. Its Human Resources (HR) practices are no exception either. Under the motif “best place to work for”, Google has become one of the best employers to work for, and has won numerous awards and listings from the best industry analysts. It attracts people from diverse backgrounds with its unorthodox methods of rewards and benefits, and using its innovative methods of evaluation, Google recruits employees with the best “innovative potential”, as the company says. Knowledge-based industries are dependent on its inputs of technology and human capital, so they face some serious HR challenges. Here recruitment and retaining employees are crucial and a major challenge as employees demand a different type of challenges and work environment than other industries, and also fitting the perfect people according to their jobs is also a major challenge here. So, intensive training and development of employees is important. Because employees are highly skilled and knowledgeable, they enjoy a high bargaining power unlike many other industries. So maintaining them requires a lot effort from the HR departments of the companies to retain and motivate them to be loyal, as they know many...

Words: 2566 - Pages: 11

Free Essay

Google

...each phase there’ll be a crisis that will cause the growth to stop. Thus, this crisis needs to be solved for the company to continue growing. Applying this model to the Google Corporation, we notice that during Phase1 (creativity), the culture that Larry Page and Sergey Brin start as the founders largely influences the leadership within the company. This culture is designed to encourage cooperation and rapid idea development. As the company enters phase 1, the founders feel the need of a strong manager who has the necessary knowledge and skill to introduce new business techniques. Page and Brin hire former Novell CEO, Eric Schmidt, as Google’s CEO and the company starts hiring more managers with experience, reducing the number of direct reports per manager. Then Phase 2 (Direction), the company starts to grow again with new capable managers in place. At the end of this phase a crisis develops from demands for greater autonomy on the part of lower-level managers. Google found that the solution would be through delegation. In phase three, Google managed not to lose control over everyday operations by having all the managers get in one room and talk through a consensus decision-making process. Hence, the Phase 3 (Revolution) is under way when top management seeks to regain control over the total company. Google was able to overcome this problem by putting additional effort into reporting up and communicating in all directions through the use of special coordination techniques and...

Words: 483 - Pages: 2

Premium Essay

Google

...Google 1 Google Modern Business 07.12.2013 Jawaher Al Maari Rana Al Khunini Ghalia Al Othman Fahdah Al Jebali Nada Al Jeraisy Hanan Al Yemni Supervised by/ Miss Ghada Al Mazroa 2 Google Table  of  Contents   3 3 4 4 4 5 5 5 5 5 6 6 6 6 6 7 7 7 7 7 7 8 8 8 9 10 11 11 12 INTRODUCTION PRODUCT  SERIES GOOGLE  SEARCH SEARCH  FEATURES  DEVELOPMENTS TIME  LINE GOOGLE  THE  COMPANY ·  1995 ·  1997 ·  1998 ·  1999 ·  2000 ·  2001 ·  2002 ·  2004 ·  2005 ·  2006 ·2007 ·2008 ·2010 ·2011 ·  2012 ·  2013 15TH  BIRTHDAY GOOGLE’S  CHALLENGES GOOGLE’S  TRANSLATION  PROBLEM GOOGLE  FIXED  THE  PROBLEM OUR  OPINION CONCLUSION REFERENCES Google 3 Introduction Google Inc. was born in 1998. Larry and Sergey the founders of “Google” named Google a play on the word “googol,” the mathematical term 1 followed by 100 zeros. (Google inc. ) Google Company went through a lot and began in a noticeably young life. Ever since Google was founded, it has grown to serve Millions of users around the world. Product  Series   When Larry and Sergey were only a Ph.D. students at Stanford University. They combined Google as a private owned company. However, an initial public offer took place afterwards on August 19,2004. Afterwards, Google moved to Mountain View, California. Their head office was placed there with the nickname Googolplex. It grew intensely since incorporation has triggered...

Words: 2247 - Pages: 9

Premium Essay

Google

...Company Overview In the beginning, Google was nothing more than a research project developed by two Stanford graduate students. In 1996, Sergey Brin and Larry Page had developed a search engine with a unique method of ranking search results. As the need for a relevant search engine on the internet became clearer and clearer, Brin and Page registered the Google.com domain in 1997 and officially formed Google, Inc. on September 7, 1998. Google had an advantage over other search engines at the time because their search results were ranked in a relevant manner; based on the number of sites linking to each specific page. Because of the high quality search results and their simple approach to searching, Google’s popularity has grown substantially over time. Along with their growth in popularity, Google has grown to employ more than 10,000 people worldwide, while also being ranked as the best company to work for by Fortune Magazine. The term ‘google’ was derived from a misspelling of the word ‘googol,’ which refers to 10100, and the name stuck. Also, due to the popularity of the world ‘google,’ Merriam-Webster added the term to their dictionary defining google as “to use the Google search engine to obtain information on the Internet.” As ‘googling’ things became more commonplace, Google’s revenues grew tremendously through the use of advertisements. Although Google’s advertising revenues have risen every year in the past five years, Google went public on August 19, 2004...

Words: 1127 - Pages: 5

Premium Essay

Google

...Journal of Case Research in Business and Economics Google: searching for value Ronald Kuntze The University of Tampa Erika Matulich The University of Tampa ABSTRACT Google is a company well known for providing a unique work environment for employees that provides plenty of benefits. However, these benefits come at a significantly higher cost structure. Are these costs worth it? How does providing value to the employee also provide value to the firm and to the customer? Can employee value be sustained during recessionary times? Keywords: Google, value, employee benefits, human resources Google: Searching for Value, Page 1 Journal of Case Research in Business and Economics Introduction The Google search engine has become so popular that it is now listed as a verb in the dictionary (Merriam-Webster 2009). The American Dialect Society members voted “Google” as the most used word of the year 2002 (Google, Google Milestones, 2009). Co-founded by Larry Page and Sergey Brin while students at Stanford University, Google was incorporated as a privately held company in 1998 (Google, Google Milestones, 2009) and is a textbook example of modern ‘employee-centric’ policies and benefits. Google has come a long way from its modest beginnings as a university project called the Backrub (Google, Google Milestones, 2009) to a billion-dollar company; but they have retained the collegiate vision of creative campus-like corporate environs and unparalleled employee perks...

Words: 4008 - Pages: 17

Free Essay

Google

...Google mission and Business model Google mission statement is very simple and clear. “Google’s mission is to organize the world’s information and make it universally accessible and useful”. Their vision for google is to make the search engine commanding so that understand “everything in the world” (Google) Google’s business model is Business Model Canvas. This model provides key information on the strategy of Google’s business. Google who is recognized as one of the top leading technology company in the world and one of the most widespread search engines on the internet that is used by many. Because Google is one of the most widely used search engine which attracts advertisers to Google services in order for them to reach a higher populated online users. According to investor.google.com, Google reported consolidated revenues of $18.10 billion year ending 2014. The network paid clicks are ads served on Google relating to ads increased 14%. Another stream of income that Google generates is from Cost-Per-Click which is when advertisers pay each time a user clicks on their advertisement. This also increased by 6 percent in the 4th quarter of 2014. Google will continue grow and revolutionize its business model as technology consistently change and people become more creative. The people who work for Google are those that do not have a single mind set. They must have the capacity to manage different task and those that have the potential to be future leaders....

Words: 679 - Pages: 3

Free Essay

Google

...3/3/2016 Google: The World’s First Information Utility? ­ Springer 4 How Google innovates Innovation at Google has been internally focused on building an IT infrastructure that is robust and enables easy creation of new products and services. Going forward, the information utility will require more externally­ oriented innovation focused on supporting external developers and customer applications. But how does Google foster the innovation that leads to new applications? This is an important question because most companies cannot expect to imitate its IT infrastructure, but they can imitate its innovation strategies. Google uses the following four strategies. 4.1 Explicit focus on R&D Google’s extraordinary revenue enables it to have a luxury few firms can enjoy today – an R&D lab that focuses on developing revolutionary hardware and software ideas along with complementary services. More than one­half of the company’s employees are engineers and scientists, and there might be hundreds of projects in development at any given time. Many prototypes are made available on the lab’s website for the interested public to download and try in the beta stage. By launching these beta products and services publicly to be tried out, Google can see which ones take off, get feedback, and incrementally improve them without having to scrap a product that might take off with further development. 4.2 Acquisition of talented people Google is among the most active high­tech companies in hiring top ...

Words: 1380 - Pages: 6

Free Essay

Google

...Google Google is founded by two Stanford University Ph.D. students, Larry Page and Sergey Brin. Google the search engine original named is BlackRub. It takes the name from a play on word Googol- the number 1 followed by 100 zeros, a reference to huge amount of data online. Google mission was: “to organize the words information and make it universally accessible and useful.” In recent year, Google had expand to many different field and become a multinational technology company that specialize in Internet-related services and products. Which is include online advertising, search, cloud computing, and software. Advertising is one of its main source for profit. Google’s is well positioned in demographics because it has a relatively young userbased. Nowadays, when people asking someone about something that they don’t know, the first word that come to their mind right away is “Google.” This is like a magic that will solve most of the problem. Even when I’m doing most of my research paper, Google is the place that I will go to. Google’s recent stocks are relatively low in a few weeks. However, Google are not really affected by this because most of it profit are coming from the advertising. We can said that Google is well-positioned compared to the downturn of the economy. Google’s political and legal is not going well with some legal issue. Google has faced concern on copyright issues because the company stores copies of third party web pages and images on their servers. In order...

Words: 1011 - Pages: 5

Free Essay

Google

...Google is probably the most popular search engine used these days. However, are you familiar with the personal data Google collects about people? According to Google’s privacy policy, they collect user data, like personal information that users give them, sign up information, such as, name, email address, telephone number and credit card information, as well as information about the devices that are used to log onto their systems. They also collect information about the services used and how they’re used, as well as IP addresses, and events of use like system errors. Google may also ask you to generate a publicly visible profile which may include your name and photo. However, according to Ian Paul, of PC World Magazine, it is not that simple, Google has our day to day habits, by having access to our calendars, as well as our locations and voices. I’m sure after reading the information above, you were unaware such detailed information was being collected. Well one positive note, Google freely admits, they gather this plethora of information, how they gather it, and how they will use it. Google also satisfies our worries, insuring this information is secure. Google states “we work hard to protect Google and our users from unauthorized access to or unauthorized alteration, disclosure or destruction of information we hold” (Policy). According to Dan Rowinski, of Read Write, “Google has one of the largest and most secure clouds in the entire industry” (Rowinski). So how does Google...

Words: 778 - Pages: 4

Premium Essay

Google

...manage innovation and a balanced scorecard of a business innovation model that describes inputs, processes, outputs, and outcome from generating ideas (Module 5, 2013). The innovation process will be ineffective if leaders attempt to measure the wrong things at the wrong time. Yet innovation has to be measured or else it cannot be managed (Davila, Epstein & Shelton, 2013). A closer look at Google Corporation will be done showing what innovation metrics are relevant to their organization and why. Google Corporation Inputs. Tangible and intangible elements that are devoted to a company’s innovation effort are considered inputs (Davila, Epstein & Shelton, 2013). Google has a very unique corporate culture that’s main goal is to keep employees happy and maintain productivity. It has been documented that a large portion of what Google does is based off of data (Bulygo, 2013). Google has created tests that they use to create an environment that facilitates happiness. This is important because happy employees tend to be more creative and productive. An example of this is at Google every employee is served free breakfast, lunch, and dinner. They tested to see what the optimal lunch line is; it was found to be about three to four minutes. If the line was any longer then employees would be wasting time, any shorter then there was not enough time for employees to meet new people (Bulygo, 2013). Processes. According to Davila, Epstein, and...

Words: 944 - Pages: 4

Free Essay

Google

...Executive Summary - The Google IPO The presentation will demonstrate the different types of fund raising process, and focus on the Dutch Auction as why Google chose such method and why our study object chose such method, then illustrate the result by comparing the latest stock price with the original offering price and demonstrating the purpose of raising the equity with the current performance of the company. Case background and Introduction to IPO Google started out as a research project of determining the importance of a website’s based on the number of pages, importance of those pages and number of backlinks by Larry Page and Sergey Brin in 1996. By 1998, the two genius incorporated Google as a privately held company. Along the years of rapid growth of the company, Google decided to go public and released IPO in 2004. IPO process can be divided into 6 stages namely preparation, planning, pre-marketing, marketing, IPO and aftermarket stage. In preparation and planning stage, issuing firm hires an investment bank as a lead underwriter which aligns with other firms to form syndicate in order to bear the risk. During the pre-marketing stage, underwriter put together a prospectus which describes full business disclosure, management team and strategy of the firm as a key document when marketing the firm. The IPO price and share allocation occurs once the key investors’ expressed their interest in terms of their intended price and quantity of shares. During the IPO stage...

Words: 900 - Pages: 4

Premium Essay

Google

...Google: New-Product Innovation at the Speed of Light 1. Based on the information in this chapter, identify major similarities and differences between the new-product development process at Google versus that found at most other companies. Google follows only five of the eight steps of the new product development process, which are: idea generation, idea screening, concept development and testing, and commercialization. The new product development process at Google is characterized by being fast, fluent, and without limits. Google encourages their employees to think outside the box and come up with new innovative ideas (idea generation and idea screening step). Then, once they have an idea proposed they send it to testing and start developing their product right away. They are not into having 2-year production and design plans (concept development and testing, and product development step). After this, they try to put a product into use no more than 6 months after development has started (commercialization). In the case of Twitter, they also come up with new ideas and some of them may be put to market without taking too much time developing the product. Similar to Google, Twitter keeps their innovations within the company. Nike is very different to Google. They do follow the eight steps in the new product development and take longer than Google to develop their products. Nike takes longer developing their products because they analyze and study what innovations their...

Words: 282 - Pages: 2

Free Essay

Google

...Google has announced its entry into the Mobile Virtual Network Operator and there are a lot of questions and talks around it. This project can have various outlooks to it. Some can argue that it a possible disruption in the industry as Google will refund, in the form of a credit, any money spent on data you didn't use. That's a significant change from the major carriers, whose revenues depend on charging a flat monthly fee for big buckets of data. Introducing this pay as you go service takes data fees into a new territory. But paying only $20 a month for Fi basics and each additional GB of data at $10, is only worthwhile if you already posses a Nexus 6. Project Fi does not offer any contract model so that means you will have to pay $649 for a 32 GB model, to obtain services of Project Fi. One of the main factors which I observed can play a role in Porject Fi’s adoption rate can be the compatibility with other devices and not only one smartphone. Another factor, which can play a role in Google Fi’s adoption rate, is the connectivity itself. Google has planned to start its project in the United States, and for the areas of the northeastern, which has excellent coverage from T-mobile and Sprint, it is a great deal. But if you move to regions like Montana then coverage can be a problem and hence it can play a role in customers adopting to the service. Another factor which can play a role in the adoption rate of this project is the cloud service offered by Google’s Fi as it...

Words: 626 - Pages: 3