Sexual Harassment
The author of this report has been asked to assess and review an article that is related to the subject matter in the class text for this class. The topics that are there to be chosen from include regulation of employment, the employee/employer relationship, the Civil Rights Act/Title VII, affirmative action, race, gender, sexual harassment and affinity orientation. The author of this report shall focus on sexual harassment. While the ubiquity of sexual harassment training and enforcement of laws (not to mention lawsuits) relating to the same would seem to reduce the practice by offenders, sexual harassment is apparently still alive and well.
As described by the class text, sexual harassment is basically any behavior, action or condition that is sexualized in nature and that leads to a person being sexually threatened, denigrated or made uncomfortable. Examples of sexual harassment would include having a picture of a bikini-clad woman on a cubicle wall, telling sexually tinged jokes in front of people that are offended by them and making sexual advances even after the recipient of the advances has rebuffed the other person. As a general practice, telling such jokes, having such pictures and otherwise having these sort...
Human Resources The modern workplace is unlike ever before in that with globalization, different stakeholders in different time zones, and technology, there is often a blurring between the workplace, home, and the in-between time. Many managers carry their laptop or Smartphone with them and answer business correspondence during commute and after-work time, particularly if their customers are international. One of the things that contribute to theft of time in the workplace,
IRAC (Riordan) Any company that is a leader in an industry knows that what they sell had better be both quality and innovative in order to compete within their designated industry. Riordan Manufacturing is no different. Riordan has long been a company that offers both quality and innovative products in the plastic molding and parts industry. It also has a strong internal structure that works harmoniously with the objectives of
Ethical Analysis at Workplace / Ethic Principles Evaluation Specific situations at job in which decision-making was or was not based on ethical principles Participation in or response to the situation Whether or not you think the situation was handled correctly Suggestions for how the situation could be better addressed in the future Business ethics deals with a vast range of ethical or moral principles arising in the business context. It entails the actions of company
School Legal Entanglement Plan This Legal Entanglement Plan seeks to examine the policies, programs, strategies, and practices of a particular school with respect to its moral, legal, and ethical implications. The plan is developed based on a three-step process that will help in addressing the issue that could potentially become a liability or legal entanglement if left unaddressed. The plan will help in addressing the issue since it will be communicated
Code of Ethics "the time is always right to do what is right" (Martin Luther King, Jr.) "The first step in the evolution of ethics is a sense of solidarity with other human beings" (Albert Schweitzer). This paper presents a code of ethics for the Meadwestvaco (MWV) Specialty Chemicals Company. MWV produces activated carbon for use in beverages, sweetener, various food products, pharmaceuticals and chemical / gas/air environmental industries. Notwithstanding any particular product or
Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now