Examples Of Blue Collar Crimes

Superior Essays
When conducting company business, for example, emails, voicemails, telephone extensions, and internet usage employee’s computers are only to be used for company business. Any employees that are authorized to use company internet many use it to access additional software. If software is needed or websites, not already on the company network, talk to your manager and or the IT department to get request authorized (Heathfield, 2016).
Company owned equipment devices or computers including but not limited to, office phones, cell phones, laptops, tablets, and iPads the company may provide should only be used for company business. The company owns all the information in or on their devices Internet use is only used for company business. There is a
…show more content…
A common example of this is when a doctor submits false health claims to insurance companies. Insurance fraud for example, is when a person or persons falsely reports that their office was broke into and the computers and laptops were stolen, and they file an insurance claim to replace equipment that was stolen this represents insurance fraud, this person is lying to obtain insurance money to replace equipment. (Lau, Johnson, 2014).
Blue-collar crimes are a generic term distinguish crimes that are white-collar crimes. When a person commits a property crime this is damages to someone’s property. An injury to a person’s body is a person crime. Larceny is committed by blue-collar people. Retail businesses have loss prevention related to shoplifting. Shoplifting is a serious and rampant crime. Employee theft I prevalent crime in any type of business that is out there. There is vandalism wrongful property damage any business can recipient of vandals (Lau, Johnson, 2014).
Technology has brought the workplace to great heights, never felt in generations that came before computers, and technical devices. However, employees normally use technology to improve their employer’s goals, employee can abuse technology for unlawful means such as downloading copyrighted materials for their own use, get revenge on an employer, and stealing personal information or a secret technique (Lau, Johnson,
…show more content…
The policy should state in a clearly defines and limits what the employee is authorized to access on the computer, any information obtained. There needs to be a proper example of how to use a work computer at work in the policy, disallow unauthorized encryption of emails on business computers. If computer policies are violated this can lead to punitive action, whether there will be warning will be given before any action is taken, and what result will be. There should be a zero-tolerance policy for communications that is disrespectful, biased, or harassment. (Rawson, 2015).
The board of directors should have a similar internet abuse policy like the one for the lower level employees. The board of directors at some point would have to make business decision this is were the business judgment rule would come in. the board would have to involved a decision to enforce the policy (Rawson,

Related Documents

  • Great Essays

    As we have learned, white collar crime can be difficult to precisely define and a wide variety of definitions have been looked at in the process. While there is no consensus on one definition, there is agreement among criminologists on the following being indicative of white collar crime including the occurrence of which is in a legitimate context, motivation that is derived from economic gain or occupational success, and a lack of direct, intentional violence (Friedrichs, pg 5). Trust and respectability are also very important terms in relation to white collar crimes that we do not see with conventional crime. An important sociologist, Edwin Sutherland pointed to the violation of trust as an important element of white collar crime and characterized…

    • 1582 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    For example, robbery, burglary, murder, property, and violent behaviors are blue- collar crimes. Offenders of the blue-collar crimes usually have to come in contact with the victim in court. In a blue-collar crime, the offender is sentenced depending on the charge of the crime. On the other hand, white-collar crimes people with high paid occupations.…

    • 152 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    In the case of the employee Jeffrey Brian Ziegler the question remains to whether he should have had a reasonable expectation of privacy in the contents of his work computer? I think that as this case presents information which stated, “when the employee were hired, they were told that their computer use was subject to monitoring and that computers should not be used for personal business” this information should have been sufficient enough for Mr. Ziegler to only use his work computer for intended work purposes (Walsh, 2013, p. 619). He should have gained a great understanding for his workplace policy, while using the company’s computer to look up child pornography. The fact that he held a private office still did not make it acceptable for visiting websites that contain pornography. So Ziegler filed a motion to suppress evidence due to how the employer proceeded in gaining the information from his office.…

    • 716 Words
    • 3 Pages
    Superior Essays
  • Great Essays

    As the progress of technological innovation marches on, it brings a new layer of complications to the labor relations process. More than ever, the challenge of balancing employee privacy with employer interests presents immense difficulties, especially with regards to social media. The two cases examined in the following pages form a framework for a cursory investigation of workplace privacy and an employer’s interest and legal rights to restrict the digital activities of their employees. In the first case, First Alert Medical Response (First Alert) ambulance service exercised those rights when they fired Betty Nelson over social media postings (Holley, Jennings, & Wolters, 2012). A recent Idaho Supreme Court decision supports First Alert’s actions.…

    • 1334 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    “Because it involves planning, risk, and skill, burglary has been a crime long associated with professional thieves who carefully learn their craft” (Siegel 385). This quote, found in Criminology by Larry Siegel, describes the level of commitment required for being a burglar. Burglary is part of a larger set of crime known as property crime, also called economic crimes. These crimes can be defined as, “criminal activity motivated by financial gain” (Siegel 370). Besides burglary, property crimes include theft, fencing, fraud and embezzlement.…

    • 757 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    2) Do not use cloud based applications to store company information. These services may transfer data to not secure parties. 3) Do not share your data (do not synchronize) with other devices at home or any other places; not even with family and friends. By doing this you are inviting others to your share your network and facilitating the way for intrusions. 4) Throughout work hours, employees must keep to the minimum the usage of private devices for personal motives.…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Property crime is the next category of general crime that includes among other crimes burglary (into shop, house or flat, also called breaking and entering and sometimes housebreaking), theft, larceny, shoplifting, pickpocketing, fraud, forgery, embezzlement, receiving stolen property, motor vehicle theft and unauthorized use of a vehicle. The term theft is sometimes used synonymously with larceny. Theft, however, is actually a broader term, encompassing many forms of deceitful taking of property, including swindling, embezzlement, and false pretences. Some states categorize all these offenses under a single statutory crime of theft.…

    • 258 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Bans are getting made on social media to prevent people from using technology from work to use for personal or non-business use (Lyncheski, 2010). The pros involve the rights of the employees while on social media. This is the case when a company didn’t allow their employees to discuss wages or employment to a third party. A national board then fined the company because this is unlawful (Horowitz, 2014). Social Media in the Workplace: Effects on Employees…

    • 743 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    White Collar Crimes

    • 205 Words
    • 1 Pages

    The Federal Bureau of Investigations currently has a white-collar crime unit that works alongside law enforcement agencies as well as the Security and Exchange Commission. the IRS, the United States Postal Inspection services as well as the Treasury Department’s Financial Crimes Enforcement Network to help isolate the target and engage business and governmental professional involved in white collar crimes. This multilayered operation investigates and assets in the prosecution of individuals and businesses involved in white collar crimes. I think that this program is essential in combating the problem of corporate crimes but in order to effectively bring an end to white collo= ar crimes the general public needs to become more educated on the…

    • 205 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    White collar crime, for all practical purposes, is just high-end criminals getting away with fraud and other felonies by hiding behind corporate veils and political agendas with little regard for their victims. Whether considering the elite white collar criminals like Madoff or the middle class violators, this cross section of criminals is different. In attempt to put aside the obvious favoritism and lopsided application of the law, white collar crime has the tenets to more than adequately fill the shoes of a couple different crime theories so nicely occupied by blue collar or no collar criminals. However, first, a definition is in order.…

    • 1578 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Essay Outline White-collar crimes, although not discussed very often, are on rise. When one hears the word crime, they are inclined to think violence or an unethical abuse of some sort. However, people rarely take corporate crimes such as fraud, theft, forgery, or embezzlement into a higher regard, as they do not highly affect the common citizen personally. Studying these executive crimes is important to raise awareness of deceit within society, and to protect and prevent unethical practices from occurring. The latent impact of these white-collar crimes is the emotional trauma, blackmail, and loss of finances.…

    • 1228 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    A theory that supports the actions of white collar crime is rational choice theory. “In rational choice theories, individuals are seen as motivated by the wants or goals that express their ‘preferences’”(Browning et. al, 2000). People in the everyday world are consumed by decisions daily from small things like deciding on dinner to major long term decisions such as last will and testimony. Based on the situation of the individual in particular decisions will vary.…

    • 1304 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    But generally, white collar criminals are not quite the same as the street culprits because these criminals will execute the crime with extreme consideration and accuracy. Also, the unlawful acts they carry are different. In case of conventional crimes, the majority of the criminals are uneducated and low class individuals who accomplish for their survival. Moreover, in this wrongdoing culprits are easily identified and caught. Some of the conventional street crime activities are robbery, murder, attack, and burglary.…

    • 1877 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    In 1939, the term “white-collar crime” began to be associated with frauds committed by business and government professionals. The phrase was mentioned during a speech given by Edwin Sutherland to the American Sociological Society. Sutherland defined “white-collar” as “a crime committed by a person of respectability and high social stats in the course of his occupation” (White Collar Crime). However, white-collar crimes are described in various ways. The Justice Department characterize white-collar crimes as deceit, embezzlement, forgery, or a breach of trust that does not result in threatening into anything physical or violence (United States Justice Department).…

    • 1844 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Linked to every single human being that uses technology, the biggest, most controversial feature of technology is privacy. With the advancement of the Internet, day to day activities and tedious tasks can be completed in no time. But the cost of using technology comes before our eyes when our personal information is at risk. Each action that we perform on the Internet is being monitored and recorded. With the push of a button, anyone can access an individual’s information on the Internet without permission.…

    • 830 Words
    • 4 Pages
    Improved Essays

Related Topics