unit 4 p5 maria

18
Task 3 Maria Unit 4 P5 & P6 Michael

Upload: 20273006

Post on 07-Apr-2016

221 views

Category:

Documents


1 download

DESCRIPTION

E-Book showing Ethical and political issues in our world.

TRANSCRIPT

Page 1: Unit 4 p5 maria

Task 3 Maria Unit 4 P5 & P6 Michael

Page 2: Unit 4 p5 maria

Task 3 Maria Unit 4 P5 & P6 Michael

Legal and ethical issues in Nike Inc.

Legal issues

There are a number of legal issues related to the way Nike uses internal and external information and how they deliver it to their customers.

Legislation

Legislation is the collection of written principle that guides behaviour in our society.

Ethical issues

Nike’s ethical issues are the behaviour that Nike adheres to. Ethical issues are situations that requires Nike to choose between alternatives that must be evaluated as right ethical or wrong unethical.

Page 3: Unit 4 p5 maria

Task 3 Maria Unit 4 P5 & P6 Michael

Legal & Ethical Issues

LegislationsData protection Act 1998

The Data Protection Act controls how your personal information is used by organisations, businesses or the government.

Everyone responsible for using data has to follow strict rules called ‘data protection principles’. They must make sure the information is:

used fairly and lawfully used for limited, specifically stated purposes used in a way that is adequate, relevant and not excessive accurate kept for no longer than is absolutely necessary handled according to people’s data protection rights kept safe and secure

Page 4: Unit 4 p5 maria

Task 3 Maria Unit 4 P5 & P6 Michael

Freedom of information

The Freedom of Information Act (FOIA) gives you the right to access recorded information held by public sector organisations.

Anyone can request information – there are no restrictions on your age, nationality or where you live.

Your request will be handled under different regulations depending on the kind of information you ask for, e.g. the:

Data Protection Act if you ask for information an organisation holds about you Environmental Information Regulations (EIRs) if you ask for environmental information

Computer misuse act

The Computer Misuse Act 1990 is a law passed by the British government. It was introduced to try to fight the growing threat of hackers and hacking. The law has three parts. In the U.K., it is now a crime to. Access a computer without permission.

Examples of computer misuse act:

Hacking Email and chat room abuses Pornography Copying and distributing copyrighted software, music and film

Page 5: Unit 4 p5 maria

Task 3 Maria Unit 4 P5 & P6 Michael

Hacking

Hacking is where an unauthorised person uses a network, Internet or modem connection to gain access past security passwords or other security to see data stored on another computer. Hackers sometimes use software hacking tools and often target, for example, particular sites on the Internet.

Nike Inc in the computer and technology industry may benefit or lose drastically from instances of computer hacking. Independent firms specializing in hacking prevention software or network development stand to benefit tremendously as the impact of hacking spreads throughout the world. Small businesses in particular may expand operations exponentially if successful in obtaining and retaining a client base. However, a company in this field whose product or efforts fail in the face of hacking face a ruined reputation and thereby the potential loss of a client base and an inability to attract additional clients.

Copying and disturbing copyrighted software, music and film

This includes copying music and movies with computer equipment and distributing it on the Internet without the copyright holder's permission. This is a widespread misuse of both computers and the Internet that breaks copyright regulations.

It’s also important to understand that you can’t use information in your own publications or on your web site that has already been copyrighted by someone else unless you get permission from the owner to use it. Copyrights protect individuals’ intellectual property from just that kind of misuse. Before you photocopy any part of a work, book, publication or web site, make sure you are aware of the work’s copyright status and that you do not plan to use the information in any work you plan to make public or copyright yourself.

Page 6: Unit 4 p5 maria

Task 3 Maria Unit 4 P5 & P6 Michael

Email and chat room abuses

Internet services such as chat rooms and emails have been the subject of many well-publicised cases of impersonation and deception where people who are online pretend to have a different identity. Chat rooms have been used to spread rumours about well-known personalities. A growing area of abuse of the Internet is email spam, where millions of emails are sent to advertise both legal and illegal products and services.

Pornography

Page 7: Unit 4 p5 maria

Task 3 Maria Unit 4 P5 & P6 Michael

A lot of indecent material and pornography is available through the Internet and can be stored in electronic form. There have been several cases of material, which is classified as illegal, or which shows illegal acts, being found stored on computers followed by prosecutions for possession of the material.

Human Rights Act

Our rights in the UK courts and that public organisations (including the Government, the Police and local councils) must treat everyone equally, with fairness, dignity and respect.

Page 8: Unit 4 p5 maria

Task 3 Maria Unit 4 P5 & P6 Michael

Globalization has significantly changed the world we live in, presenting new and complex challenges for the protection of human rights. Nike has also had an impact on how we interpret situations. Human rights has not always benefited the societies in which they operate.

Amnesty International's research has highlighted the negative impact companies can have on the human rights of the individuals and communities affected by their operations.

Companies such as Nike cause harm by directly abusing human rights, or by colluding with others who violate human rights. Recently in the media there was accusation saying Nike are using child labour throughout Asia. Despite this potential to cause significant harm, there are few effective mechanisms at national or international level to prevent corporate human rights abuses or to hold companies to account.

This means those affected by their operations – often already marginalized and vulnerable - are left powerless, without the protection to which they are entitled, or meaningful access to justice.

Privacy act 1988

The Privacy Act 1988 (Privacy Act) is an Australian law which regulates the handling of personal information about individuals. This includes the collection, use, storage and disclosure of personal information, and access to and correction of that information.

Page 9: Unit 4 p5 maria

Task 3 Maria Unit 4 P5 & P6 Michael

Nike Whistle blowing

Unreliable Evidence’ is a series in which a group of lawyers discuss the legal issues around a topic under the chairmanship of Clive Anderson. The particular programme - broadcast on BBC Radio 4, on Saturday 21 September at 10 p.m. was about whistleblowing and included Sir Robert Francis Q.C.

Page 10: Unit 4 p5 maria

Task 3 Maria Unit 4 P5 & P6 Michael

After discussing what whistleblowing is the discussion widened to include ‘a duty of candour’ – telling a patient or their carer about errors in their care? It takes a bit of concentration to listen to, but I found it very interesting.

Whistleblowing is when a worker reports suspected wrongdoing at work. Officially this is called ‘making a disclosure in the public interest’.

A worker can report things that aren’t right, are illegal or if anyone at work is neglecting their duties, including:

someone’s health and safety is in danger damage to the environment a criminal offence the company isn’t obeying the law (like not having the right insurance) covering up wrongdoing

Organizational Policies

You can define Organization policies to restrict or permit specific rights to your organization members. By default, permissions for creating organization/personal group and sharing, publishing document is given to all organizations members. Roles defined are Super Administrator, Administrator or Moderator, and users.

Page 11: Unit 4 p5 maria

Task 3 Maria Unit 4 P5 & P6 Michael

Organization policies can only be set by the super administrator. The super admin can select roles and specify policies accordingly. For instance, if you feel that Organization groups can be created only by the administrator then you can restrict options accordingly and etc.

Nike has to keep all of this into consideration when they are applying policies and legal issues.

Code of practice

A code of practice is a set of written rules which explains how people working in a profession should behave. Written guidelines issued by an official body or a professional association to its members to help them comply with its ethical standards.

Quality assurance - An example of Nikes code of practice is quality assurance. Quality assurance we maintain the quality of what we do through constant ongoing review with our clients, of all aims, activities, outcomes and the cost-effectiveness of every activity. We encourage regular review meetings and provide regular progress reports. This consultancy has been accredited under a number of quality assurance schemes. Further details are available on request.

Conflict of Interest - Due to the sensitive nature of our particular consultancy services, we will not provide a service to a direct competitor of a client, and we generally try to avoid any dealings with competitor companies even after the cessation of services to a client.

Ethics - We always conduct our own services honestly and honourably, and expect our clients and suppliers to do the same. Our advice, strategic assistance and the methods imparted through our training, take proper account of ethical considerations, together with the protection and enhancement of the moral position of our clients and suppliers.

This critical code of practices must be applied to Nike Inc when taking this into consideration.

P6-

Security of Information

Page 12: Unit 4 p5 maria

Task 3 Maria Unit 4 P5 & P6 Michael

The protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit, and against denial of service to authorized users. Information security includes those measures necessary to detect, document, and counter such threats. Information security is composed of computer security and communications security.

NIKE has secure socket layer (SSL) technology, one of the most intricate platforms available. Your payment information will be encrypted from the moment you enter it until your transaction is processed, and will not be saved on a public server. Although Nike use encrypted security software, the security of information and payments transmitted by the Internet or via e-mail can't be guaranteed.

NIKE shall not be liable for any damages suffered as a result of the use of electronic means of communication, including - but not limited to - damages resulting from failure or delay in delivery of electronic communications, interception or manipulation of electronic communications by third parties or by computer programs used for electronic communications and transmission of viruses.

System Back Ups

A back is an Alternative or substitute resource employed or prepared to ensure continuity of an activity, program, or project in case the principle or primary resource fails or is unavailable.

Page 13: Unit 4 p5 maria

Task 3 Maria Unit 4 P5 & P6 Michael

Frequency of backups

In Nikes data programme some data is more valuable than other data and some data is changed more frequently than others. These are the kind of issues that must be taken into account when Nike is deciding how often to backup data their data or an area in their data.

Nikes value of the data determines how frequently the data is backed up.

If the data doesn’t change often then it doesn’t need to be backed up as often, maybe just after each change. If the data changes frequently then it should be backed up frequently (maybe every evening). It is important Nike back up their data in case such a disaster occurs and their files are data are damaged.

Health & Safety

Page 14: Unit 4 p5 maria

Task 3 Maria Unit 4 P5 & P6 Michael

Health and safety is Organized efforts and procedures for identifying workplace hazards and reducing accidents and

exposure to harmful situations and substances. It also includes training of personnel in accident prevention, accident

response, emergency preparedness, and use of protective clothing and equipment.

It is an employer's duty to protect the health, safety and welfare of their employees and other people who might be

affected by their business. Employers must do whatever is reasonably practicable to achieve this. this is really

important every employee at Nike knows exactly what to do in an event of a disaster.

This means ensuring workers and others are protected from anything that may cause harm, effectively controlling

any risks to injury or health that could arise in the workplace.

Employers have duties under health and safety law to assess risks in the workplace. Risk assessments should be

carried out that address all risks that might cause harm in your workplace.

Organizational Policies

You can define Organization policies to restrict or permit specific rights to your organization members. By default, permissions for creating organization/personal group and sharing, publishing document is given to all organizations members. Roles defined are Nike super Administrator, Administrator or Moderator, and users.Organization policies can only be set by the super administrator. The super admin can select roles and specify policies accordingly. For instance, if you feel that Organization groups can be created only by the administrator then you can restrict options accordingly and etc.

Nike has to keep all of this into consideration when they are applying policies and legal issues.

Business Continuance Plan

Page 15: Unit 4 p5 maria

Task 3 Maria Unit 4 P5 & P6 Michael

BCP' The creation of a strategy through the recognition of threats and risks facing a company, with an eye to ensure that personnel and assets are protected and able to function in the event of a disaster.

Learn how a process-driven crisis communication plan can be an integral part of a highly responsive crisis management infrastructure. This session will review NIKE's process-driven approach for crisis management planning, specifically focusing on crisis communications, and discuss how to set up, train, and activate different layers of your organization to respond during an incident to multiple internal and external audiences. An action-driven process takes the guess work out of what to do, how to do it, and who should do it during an event, enabling multiple functions within your organization to respond as an integrated team. You'll leave this presentation with a better idea of how to implement the framework and tools to help get you started on planning, training and testing.

Page 16: Unit 4 p5 maria

Task 3 Maria Unit 4 P5 & P6 Michael

Bibliography

http://www.businessdictionary.com/definition/ethical-issue.html#ixzz3Kpg6czuv

http://www.business.govt.nz/laws-and-regulations/employment-regulations/how-does-the-privacy-act-apply-to-my-business

http://www.businessdictionary.com/definition/code-of-practice.html#ixzz3KxrVAs94

http://www.businessdictionary.com/definition/backup.html#ixzz3L9D7rtso