SEARCH RESULTS

YOU WERE LOOKING FOR :Modern Business Breaches and Performance

Essays 271 - 300

Doctor - Patient Confidentiality

Hippocratic oath extends not just to what a patient might tell a doctor but also to what a doctor concludes in regard to a patient...

Counselors In The United States: Ethics And Standards Of Practice

"mirrors, in many ways, the development and maturation of the counseling profession" (p. 106). The American Counseling Asso...

Prosecutorial Misconduct?

was turned over to North Carolinas attorney general (Seattle Times, 2007). The Duke rape made national headlines and could ...

Case Scenario: Ethical/Legal Issue In Therapy

provides special conditions under which the counselor is bound by law to report; however, when a clients nonthreatening personal i...

The U.S. Invasion of Iraq is Justified by the U.N. Security Council Resolutions 660, 678 and 1441

Iraq refuses to comply with its obligation to implement resolution 660 (1990)" as well as other resolutions that had been passed i...

Contract Law

rule that "money damages do not constitute an adequate remedy for the breach of a real estate contract" (Iowa Supreme Court, 1977)...

Organizations, Technology, and 'Cyberliability'

In eight pages legislation and cases involving 'cyberliability' issues are discussed and include Internt transmittal of obscene or...

The EU Growth and Stability Pact Outlook in 2009

were laid down by the Maastricht treaty in 1992, and were seen as necessary in order to bring the economies of the different count...

Operations and Uses of Cellular Phones

she was that Ted was about as romantic as a rock when it came to gifts. He had given her the cell phone for her birthday and tonig...

Computer Espionage and Emergencies of National Security

In five pages this paper examines the computer espionage threats to national security and technology being developed to eliminate ...

Overview of Computer Security

In ten pages this research paper focuses on computer security and its breaches with statistics covering its type, incidences, and ...

Minor Client Confidentiality - The Ethical Dimensions

circle of students who are widely known at the school to engage in drug use and other delinquent activities. During counseling s...

Being a Security Manager

This research paper looks at what is involved in being a security manager and then discusses this role in relation to risk managem...

Contract Laws

a legal duty (Cornell University Law School, 2011). In each of these cases, the third party can enforce the contract in terms of i...

Chetum v Knarles

operate a facilities maintenance company that includes four other employees, one of whom is a licensed plumber. The company pays t...

IT Auditing and Internal Controls: Personal Experiences

it is secure, and companies that fail to secure vital information are at risk for a data breach. Studies show that data breaches a...

Patient Privacy and Health Care Ethics - An Organizational Study

Florida cancer center, one can successfully examine how organizational structure and governance, as well as an organizations cultu...

LEGAL ISSUES ARISING IN CHETUM AND KNARLES & BARKLEY

The plumbers yearly license renewal is paid by the firm as part of an employment agreement that was negotiated four years ago. Tha...

Span Systems and Citizen-Schwartz; Managing Risk

own duties under the contract (Fuller and Eisenberg, 2006). Under the contract if Span in terms of delivery on time, or qu...

Religion and Issues of Privacy

lawsuit, the disclosure must be public, that is, disclosure to a limited number of people or to those who have a legitimate need t...

Economic Problems of Greece and Spain in the 2008/9

amount of government borrowing not exceeding 60% of the GDP, the government deficit needs to be no more that 3% of GDP (European C...

Issues in Healthcare

This research paper pertains to three topics that have to do with health care issues. These issues are: patient confidentiality an...

Digital Information Security

This paper considers the recent data breaches that have compromised our personal security and made identity theft a real threat. ...

Department of Homeland Security - Ethical Violations

In a paper of three pages, the writer looks at the Department of Homeland Security. Instances of ethical breaches are explored. Pa...

Privacy and Confidentiality

identical. It refers to the obligations of individuals and institutions to use information under their control appropriately once ...

Hackers Against Retail Stores

This essay focuses on the hackers that were able to access credit card data and information from Target's network. The paper repor...

LITERATURE REVIEW ON CORPORATE INTEGRITY SYSTEMS

A literature review about integrity systems, their implementation and why ethical breaches take place in corporations. There are 3...

Ethics In Program Evaluation

program as a collection of organised activities which have been put together in order to achieve specific objectives, with the cor...

Is There an Incompability Issue Between the European Convention for Human Rights and Adverse Possession?

had abandoned or dispossessed the land. This was seen as legalising the theft of land where an owner did not exercise their rights...

Case Study of 2 Pharmaceutical Companies and Contract Issues

a health crisis and this takes priority (Legal Information Institute, 2005). Nonetheless, if Gentura offers the drug at a price b...