Verified Document

How Conduct An Investigation Of Misconduct At Work Essay

Prince Hotel

In advising Ms. Borden on how to proceed this Friday afternoon, the recommendation is to delay the termination meeting with Ms. Haunani Flow. Ms. Borden should be encouraged to postpone the meeting, at the least, so that there can be an investigation into the allegations against Mr. Stone and Ms. Flow. The anonymous note raises concerns about potential misconduct. It is no good to act hastily without more evidence. There could be legal ramifications, for instance. It is important also to emphasize to Ms. Borden that conducting due diligence is necessary to protect the hotels reputation and comply with employment laws.

Once the termination is delayed, the next step for Prince Hotel is to conduct the investigation into the claims made in the anonymous note, as well as the allegations against Ms. Flow. This would require gathering evidence and conducting interviews with witnesses, including employees who may have seen the interactions between Mr. Stone and Ms. Flow. The hotel should...

Flow might have made against Mr. Stone, as indicated in the anonymous note. The hotel should also hire ProService's legal team to make sure they are within the law throughout this process.

The legal risks...

…sexual harassment are relevant to resolving this situation. Ms. Flow is an at-will employee, but termination should not violate public policy or appear retaliatory for harassment complaints. Sexual harassment allegations must be investigated, as failing to do so may violate Title VII of the Civil Rights Act of 1964, and employers may be liable for not addressing harassment claims and for allowing a hostile work environment. Additionally, wage deductions without consent, such as the $270 from Ms. Flows paycheck, could violate wage and hour laws. Overall, the situation at Prince Hotel needs careful consideration of all the above mentioned points before action is…

Cite this Document:
Copy Bibliography Citation

Related Documents

Investigation of an IP Theft Using Digital Forensics Tools
Words: 1363 Length: 5 Document Type: Professional Writing

Digital Evidence: Plan of ActionIntroductionThis paper outlines the approach for examining digital evidence related to a suspected violation of company policy. It presents senior management with a plan for collecting and maximizing evidence in the case of John Smith, accused of digital IP theft. The methods described are grounded in forensic best practices and standards.Strategy for Maximizing Evidence Collection and Minimizing ImpactBased on the standards of ISO/IEC 27037 and National

Investigation and Police Organization
Words: 1443 Length: 3 Document Type: Discussion Chapter

evidence, it seems possible that an altercation occurred between the husband and wife and the two of them are 'covering' up this incident. Ideally, a detective with expertise in domestic violence cases should be in charge of the investigation. Separate officers should interview both the wife and husband before the couple has a chance to 'get their stories straight,' and note any inconsistencies between the two accounts. The other

Criminal Investigation
Words: 3054 Length: 10 Document Type: Research Paper

Criminal Investigation Investigative Task Force Assuming that legal authority was not an issue, should this investigation be conducted by VPD personnel or a multijurisdictional task force? This investigation should be carried about by VPD personnel as the lead agency and head of a multijurisdictional task force. There are several reasons for this. First, VPD was the first agency to begin investigation of the crimes because the first explosion and damage occurred there.

Antitrust Investigation: Google It Was Reported in
Words: 881 Length: 3 Document Type: Essay

Antitrust Investigation: Google It was reported in 2011 that the 'Wall Street Journal' reported that the FTC was preparing a major antitrust investigation into Google's core search advertising business. Specifically stated by the Wall Street Journal was: "The new FTC investigation . . . will examine fundamental issues relating to Google's core search advertising business, which still accounts for the overwhelming majority of its revenues. Those will include whether Google --

Criminal Investigation Scenario: Criminal Scene
Words: 2010 Length: 6 Document Type: Term Paper

As a result, if an illegitimate interrogation or investigation contributes to the identification of physical evidence, the investigation and physical evidence must be excluded from trial. In this case, the interrogation or investigation is excluded on the basis of the exclusionary rule while the physical evidence is excluded on the basis that it's the fruit or product of illegal interrogation. The significance of the exclusionary and the fruit of poisonous

Computer Forensic Investigation Making an
Words: 3228 Length: 12 Document Type: Research Paper

Typically, a database uses either the simple recovery model or the full recovery model. The full recovery model can be supplemented by switching to the bulk-logged recovery model before bulk operations." (Microsoft, 2010 P. 2). Meanwhile, our company will need to implement the full back up safeguard all our data. Under the full recovery model, the first step is to back up the transaction log. Combination of full back-up with

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now