Company owned equipment devices or computers including but not limited to, office phones, cell phones, laptops, tablets, and iPads the company may provide should only be used for company business. The company owns all the information in or on their devices Internet use is only used for company business. There is a …show more content…
A common example of this is when a doctor submits false health claims to insurance companies. Insurance fraud for example, is when a person or persons falsely reports that their office was broke into and the computers and laptops were stolen, and they file an insurance claim to replace equipment that was stolen this represents insurance fraud, this person is lying to obtain insurance money to replace equipment. (Lau, Johnson, 2014).
Blue-collar crimes are a generic term distinguish crimes that are white-collar crimes. When a person commits a property crime this is damages to someone’s property. An injury to a person’s body is a person crime. Larceny is committed by blue-collar people. Retail businesses have loss prevention related to shoplifting. Shoplifting is a serious and rampant crime. Employee theft I prevalent crime in any type of business that is out there. There is vandalism wrongful property damage any business can recipient of vandals (Lau, Johnson, 2014).
Technology has brought the workplace to great heights, never felt in generations that came before computers, and technical devices. However, employees normally use technology to improve their employer’s goals, employee can abuse technology for unlawful means such as downloading copyrighted materials for their own use, get revenge on an employer, and stealing personal information or a secret technique (Lau, Johnson, …show more content…
The policy should state in a clearly defines and limits what the employee is authorized to access on the computer, any information obtained. There needs to be a proper example of how to use a work computer at work in the policy, disallow unauthorized encryption of emails on business computers. If computer policies are violated this can lead to punitive action, whether there will be warning will be given before any action is taken, and what result will be. There should be a zero-tolerance policy for communications that is disrespectful, biased, or harassment. (Rawson, 2015).
The board of directors should have a similar internet abuse policy like the one for the lower level employees. The board of directors at some point would have to make business decision this is were the business judgment rule would come in. the board would have to involved a decision to enforce the policy (Rawson,