Question

In: Operations Management

ou are the project manager on a project that is critical to the ongoing success of...

ou are the project manager on a project that is critical to the ongoing success of ABC Co. While repairing the laptop being used by one of the key members of your project team, a technician has found a few files and a very large folder that has been encrypted. The files include:

(i) what might be illegal photographs of a person who appears to be a teenager; and

(ii) a pirated video game. The technician has not tried to unencrypt the large folder. ABC’s technology use policy:

(i) allows some personal use of company laptops; and

(ii) prohibits all illegal and unlawful content. The use policy does not expressly address searches. What steps should you take? Explain your reasoning for each step with reference to applicable statutes and cases.

Solutions

Expert Solution

As a business owner, you value the privacy of company secrets and procedures, which is why you expect your employees to maintain some standard of confidentiality. It can be difficult, however, to understand when that trust has been violated, because the breach of confidentiality definition can be a moving target. If your employees have signed a confidentiality agreement, then the breach of confidentiality definition is easy to understand. But confidentiality in employment is implicit, regardless of whether employees have signed an agreement. The following actions can be taken if any illegal use of office equipment has been done by an employee .

Termination of Employment

A major penalty for breach of illegal use is termination of employment. This is especially true if the employee in question signed a illegal use agreement prior to starting the job. In most cases, this agreement has an explicit breach of illegal use definition that includes a termination clause. In other words, an employee who signs this type of agreement agrees that a violation of illegal use is also a violation of the employment contract. The penalty for breach of illegal use isn’t restricted to employees who have signed illegal use agreements, however. For example, if you own a computer security company and an employee’s laptop is stolen, and that employee didn’t encrypt sensitive data on that computer per company policy, it could constitute a breach of illegal use.

Paying Civil Lawsuit Damages

Employees can also be subject to a civil suit for breach of illegal use. For example, if you run a healthcare clinic and one of your doctors discloses medical information to a person not authorized to receive that information, the breach of patient illegal use consequences could include a civil lawsuit for medical malpractice. Healthcare privacy is essential, not only to protect a patient’s right to decide who has access to sensitive information but also to protect doctors and other healthcare professionals from malpractice claims. Breach of patient illegal use consequences can include a sizeable award for damages and a loss of reputation for a doctor or healthcare clinic. To guard against these types of breach of patient illegal use consequences, many healthcare businesses purchase malpractice insurance.

Standing Trial in a Criminal Case

Another possible employee consequence for breach of illegal use is defending against criminal charges. Such a charge is typically reserved for serious or extreme cases in which the breach caused significant financial, physical or emotional loss. For instance, if an employee’s breach of confidentially involved theft of your proprietary information or intellectual property that was later used for financial gain, criminal charges may be warranted. Theft is a violation of criminal law that in some instances can be punishable by a stiff fine or imprisonment. As a business owner, you would report the theft to law enforcement, and the state or federal government would charge your employee with the crime.

Loss of Reputation

Although a tarnished reputation may not seem as harsh as a big fine, it can have serious, long-term consequences for an employee who is guilty of breach of illegal use. This is especially true if the employee works in a specialized industry in which competing companies are very familiar with one another. Employers will not look favorably on any prospective employees who were terminated due to a illegal use breach, or convicted of a crime related to that type of violation. In the long run, a person who violates the privacy of a patient or client, or violates the illegal use of an employer, will find it difficult to shake that reputation for the rest of their professional life.


Related Solutions

What are the critical success factors for a project manager? What skills should project managers have...
What are the critical success factors for a project manager? What skills should project managers have to be successful in this job?
a) Explain what is meant by the critical perspective of accounting b) Evaluate the ongoing project...
a) Explain what is meant by the critical perspective of accounting b) Evaluate the ongoing project of the Financial Accounting Standards Board (FASB) and the International Accounting Standards Board (IASB) to converge their conceptual frameworks from a critical perspective. c) Are critical theorists likely to support moves to find a way to measure externalities in seeking to calculate a sustainable profit? d) Would critical theorists support or oppose the development of standards for sustainability reporting.
Project control is a critical success factor for a project’s completion. What are some issues that...
Project control is a critical success factor for a project’s completion. What are some issues that may surface for what reasons?
what are the causes, treatments, success rates and any ongoing research for hemianopia??
what are the causes, treatments, success rates and any ongoing research for hemianopia??
Location is a critical success factor in the success or failure of a restaurant. Which component...
Location is a critical success factor in the success or failure of a restaurant. Which component of the team domains is this most closely associated with? a. Ability to Execute b. Mission, Aspirations, and Risk c. None of the options provided d. Connectedness
A project manager decided to use critical ratio (C/Rij for WP j of project i) to...
A project manager decided to use critical ratio (C/Rij for WP j of project i) to prioritize and schedule the remaining work packages to be done for three concurrent projects with the data in the table below. The technical sequence (precedence) are WP1>WP2>WP4>WP4, for each of the three projects. For an illustration, the first project is due by day 4. Its first work package requires 2 days at workstation 1. Project ID Due Date Processing time for WP1 Processing time...
You have been appointed project manager for a company critical project. After a detailed WBS analysis...
You have been appointed project manager for a company critical project. After a detailed WBS analysis you have identified 15 key activities that make up the project. The following table details for each activity its duration and its preceding activities. Activity Preceding Activity Duration Days A - 8 B - 6 C A 5 D A 9 E B 5 F B 12 G D,E 4 H C 5 I H 12 J G,F 7 K J 10 L J...
In an organisation which are concerned wit continuous improvement and with ongoing business success, managers must...
In an organisation which are concerned wit continuous improvement and with ongoing business success, managers must build trust-based relationships, develop effective communication systems and processes, share information, base decision-making on consultative processes and provide opportunities for staff to develop the competencies they need. They need to network and they must also be aware of relevant legislation, codes of practices and ethical principles. Describe at least 10 actions you, as a manager, would take to achieve these things an explain why...
List your responsibilities as a Software Development Project Manager, and explain how you measure the success...
List your responsibilities as a Software Development Project Manager, and explain how you measure the success and failure in any project? Give examples.
What special characteristics should a recovery project manager possess? Which of these is more critical for...
What special characteristics should a recovery project manager possess? Which of these is more critical for the role of recovery project manager vs. project manager and why? Answer with 250 words.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT