Question: Reference: Before you make your decision about what option is the most ethical using the perspective of the Results Lens , you have to combine

Reference:

Reference: Before you make your decision about what option is the most

Before you make your decision about what option is the most ethical using the perspective of the Results Lens, you have to combine your analysis of the impact to each stakeholder with your knowledge of what will satisfy their ethical desires. You will then see if one option emerges as the best. Here are the options that we are considering:

Option 1:

Fire Jamal Moore for his unsanctioned illegal activity. Use the information he provided to discipline Aaron Webb for violating the NDA, even though the information was obtained illegally, because you want to put a stop to Aaron's actions.

Option 2:

Discipline Jamal Moore for his unsanctioned illegal activity. Discipline Aaron Webb for violating the NDA. In order to minimize conflict, don't fire either employee.

Option 3:

Use the information from Jamal Moore as the basis of firing Aaron Webb for violating the NDA, because protecting the NDA is your most important duty.

Option 4:

Because the rules are clear, fire Jamal Moore for his unsanctioned illegal activity, and fire Aaron Webb for violating the NDA.

Option 5:

Use the information from Jamal Moore to discipline Aaron Webb for violating the NDA. Caution Jamal Moore about his unsanctioned illegal activity. Coaching the employees instead of firing them will help the company in the long term.

Option 6:

Do not use the information provided by Jamal Moore. In order to maintain the status quo, do not do anything about the illegal hacking activity.

In the section below, choose the one option that will make each stakeholder the happiestthe option that will fulfill most of their ethical desires and goals. Beneath each of the stakeholders, I've listed the two criteria for happiness that we identified in the previous exercise. Please note that no single option may make every stakeholder happy: each stakeholder has slightly different interests that they care about in this situation. Which option best meets each stakeholder's ethical desires? Choose one option for each question!

1.

The Shareholders
1. All members of the company understand and honor the need for some information to be confidential, even though other information can be released.
2. Personnel issues are handled in such a way that people are treated with respect, minimizing the likelihood of litigation.
------ Options ------ 1 2 3 4 5 6

2.

Cary Bryant, General Counsel
1. Company leaders notify him of situations that have potentially problematic legal consequences.
2. He is not asked to condone illegal activity as a condition of his employment.
------ Options ------ 1 2 3 4 5 6

3.

You, Director of Information Technology
1. You are involved in determining when your direct reports should be disciplined, even if you don't make the final decision.
2. You are able to maintain the integrity of the IT system without relying on illegal behavior or violating company policies.
------ Options ------ 1 2 3 4 5 6

4.

Carol Tempest, VP of Human Resources
1. Supervisors follow company protocols when dealing with personnel issues.
2. Supervisors are able to distinguish between routine personnel matters and complex situations that require her involvement.
------ Options ------ 1 2 3 4 5 6

5.

Jamal Moore
1. The mystery of who is posting confidential company information on a blog site is solved.
2. He is seen as a valuable and talented employee whose actions are intended to assist the company.
------ Options ------ 1 2 3 4 5 6

6.

Aaron Webb
1. The company makes product information more accessible to the public and deals with safety issues.
2. He continues to be employed by the company.
------ Options ------ 1 2 3 4 5 6

Case File \#1 Of course, if the information Jamal got checks out, Aaron Webb is probably going to continue posting company material. Below you will find a summary of your job description for this dilemma. Knowing what is expected of you within your role will That's two heads that could be rolling help you understand your responsibilities better It's a tough job you have. Makes mine look a little easier. Director of Information Technology Ricardo Your role is responsible for managing all internal information systems functions which include systems programming, application programming, networks, and computer operations. Key responsibilities include establishing corporate standards for hardware and software, developing operating procedures, and defining service level agreements. Duties also include ongoing system and network monitoring and defining strategies, process, and policies to ensure stable and safe operation of Case File \#6 system resources. When faced with an ethical dilemma at work, we have resources at our fingertips to help us decide what to do like our Employee Handbook, key policies and procedures, and standard operating procedures. We also have to be aware of the federal, state and local laws that may apply to the situation. The dilemma you are facing deals with and proprietary information, social media and the use of company technology resources. Here are the key points you should remember Case File \#2 As you know, we've been working hard on the network, and l'm happy to inform you that our new security protocols are - As an employee, you are required to sign a proprietary agreement with the Company when you begin your finally in place. This includes a series of trace programs attached to our confidential material, firewalls for our internal network, and enhanced email security. employment. In that document you agree to hold in the strictest confidence confidential information which Additionally, I've created a few rudimentary search algorithms that will regularly check the web for key phrases related to our includes non-public information as it relates to research, product plans, or other information regarding the products, to ensure any leaks can be found quickly. Problems like that embarrassing situation last year should be a thing of Company's products or services and markets. the past. - The Company does not prohibit employees from posting on public forums outside of work. However, the Ricardo Pea Company does impose certain restrictions on these types of activities in order to protect its professional Information Systems Engineer G-BigSpert image and intellectual property. Employees are prohibited from posting any information about the Company or its products and product candidates in any public forum without the Compliance Officer's prior written approval Case File \#3 - The use of electronic communication equipment must comply with all laws and regulations and shall exhibit Well, it seems once you start looking for problems, they don't take long to appear. Right after starting up, the search the highest moral and ethical standards of business conduct. Illegal, unethical, or inappropriate behavior will program found a couple of blog postings about the company. It doesn't look too serious-at least 90% of the items aren't not be tolerated. The contents of e-mail and computer data files, may be accessed, reviewed, and disclosed confidential, and nothing posted is harmful. The author (anonvmous, of course) raises a few questions about our safety, but by the Company for its business purposes at any time, with or without notice or employee consent. You can check it out if you want, but in my opinion, it's not something to worry about. I bring it to your attention mainly to This should help you as you work through this ethical dilemma. Good luck! indicate that the system is working. Ricardo Pea Information Systems Engineer G-BioSpedt Case File \#4 yr problem w/ info leak is taken care of traced the post 2 employee by working backward and using trace programs. abl 2 get through his mail acct and into his home computer. his name is garon webb, works in rnd. computer has lots of sensitive company info that u def dont want posted. a friend Case File \#5 I see someone recently bypassed some of our security measures to send you an anonymous email about the info leak. The sender was Jamal Moore, if you were wondering, one of our techs. He mentioned yesterday that we needed to take "harsh action" against the leak, and he's certainly smart enough to get through the network to access a home computer. He's very talented, but this kind of invasion of privacy is probably not what the company wants to encourage

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!