Free Essay

Eth 501 - Module 1 - Case 1

In:

Submitted By ken1
Words 1190
Pages 5
Trident University

(Student Name Here)

Module 1 Case 1

ETH 501 Business Ethics

(Professor’s Name Here)

(Date Here)

First and foremost, I will introduce the two companies or parties: Bank of America and Wikileaks.

Bank of America is the nation’s largest bank holding company and financial company that serves individual consumers, small and middle market business, corporations and governments. The services provide range from banking, investing, and asset and risk management. (Bank of America) On the other hand, Wikileaks is an international non-profit organization that publish private, secret, and classified media derives from anonymous news sources, leaks, and whistleblowers. (2011, Wikileaks)

According to Webster’s (1996) ethics is defined as the study of standards of conduct and moral judgment. The manner in which a company does business tells how competent and trusty worthy people can deal with the company. A company that not only promotes an ethical environment, but that lives the company’s goals, policies, and values is a company that when controversy and tough times occur will make the right decisions and weather the storm. If the company not only promotes a fair and positive environment, but also values and foster this environment, the company will be around a long...long time.

If Bank of America were to use the words that define what ethics is as a basis for their decision whether to process payments and do business with Wikileaks, this would make the decision to favor with Bank of America. Simply, because Bank of America believes that Wikileaks has been engaged in activities that were inconsistent with their internal policies for processing payments, I don’t feel it is a reason to discontinue processing their customers’ transactions (Musil, 2010). However, in the long-run if Bank of America’s intent is to cut ties with Wikileaks because the presumed information that could harm the company and their patrons was acquired through illegal means, then consequently, the right thing to do would be to sever ties.

The next step is to forward all involved parties that effective said date, as any utilitarian would that Bank of America will no longer process transactions that funds or supports directly or indirectly Wikileaks’ views.

With this known, since Wikileaks stated there was information in their possession that could or would affect a major American bank, why would this result in a company (the #1 financial company in the nation) purchasing web addresses if it did not have anything to hide. Was this in the best interest of the company or their patrons? (Chuiko, 2010) Or was Bank of America acting on behalf of their patrons in a deontological manner? If so, why were their patrons not provided the information or knowledge of what Wikileaks had or information retrieved from the purchased websites? In my opinion, it is because their actions were not in that of a utilitarian but done for the good of those that would be affected at the corporate level. This contractual right by Bank of America by cutting accessibility or indirect relations with Wikileaks still resulted in their patrons closing their accounts and joining other institutions such as Wachovia. Bank of America while refusing to process payments for accessibility to Wikileaks was also doing what we call in the U.S. Navy “ORM” – Operational Risk Management. I think Bank of America knew or was “tipped-off” that something unethical or questionable was going on that could potentially negatively affect not only the workplace, but the company holistic – perhaps, a meltdown of the top executives. Or was Bank of America acting on behalf of the U.S. Government also since Wikileaks had already released classified cables from the embassies from around the world? Consequently, Bank of America was a recipient of the Troubled Asset Relief Program (TARP) from the U.S. Government. Did Bank of America feel obligated to the U.S. Government? Or were they strongly encouraged?

Nonetheless, despite opposers of Wikileaks may say or think, the company prides itself as a site or domain that provides for all people information on governments’ and corporations’ unethical behavior or actions. I am sure supporters would say that Julian Asange and others at Wikileaks are only exercising their human and civil rights – the right to speak your mind (Study guide).

My question is, how was the information received and whether the information is Wikileaks’ to disclose? The truth is we will probably never know exactly who leaked the information to Wikileaks. I am sure the information did not belong to Wikileaks; therefore they were not authorized to disclose the information. Whether Bank of America was influenced by the U.S. Government or it was Bank of America’s own doing, they should be able to refuse payment but not without informing their patrons. This way their patrons can accept the decisions as it is for the good of all and have a choice to remain at Bank of America or close their accounts and open elsewhere.

Additionally, it would seem that Julian Asange and others at Wikileaks thought of themselves as doing the masses a service or their duty to provide information, it would appear what they thought was the truth – deontological ethics (Study guide). However, Wikileaks, still has and had a duty despite feeling they had the right to disclose information, to determine if it was authorized, legal, ethical, moral, and for the good of all that could be affected. As a patron of Bank of America, they have a moral and contractual duty to perform transactions on their behalf, regardless of where one chooses to spend their monies. When a person or entity has a choice of should they buy or support services offered that option is a good thing. Yet, when the person or entity has the option to deny the manner in which the services are to paid or settled I believe that decision is outside the scope of their responsibility.

In closing, I remain in support of Bank of America having the option to do or not do business with Wikileaks remains their choice, however Bank of America’s approach towards resolving their indirect relationship with Wikileaks should be handled in another way other than inserting themselves into how and where their patrons choose to spend their money. The fact they view the way out is to simply say “reasonable belief that Wikileaks may be engaged in activities that are, among other things, inconsistent with our internal policies for processing payments” in my opinion is a “catch-all phrase.”

References

Study guide, Power Point Presentation

https://www.bankofamerica.com/

Chuiko, V. (2010) Retrieved from http://www.chuiko.com/world/1955-bank-of-america- boycott-wikileaks-the-site-urged-supporters

Musil, S. (2010) http://news.cnet.com/8301-31921_3-20026103-281.html

http://www.thenewnewinternet.com/2010/12/20/wikileaks-urges-boycott-of-bank-of-america/

http://thenextweb.com/media/2010/12/18/bank-of-america-now-refusing-to-process-payments-belived-tobe-for-wikileaks/

Webster’s New World Dictionary and Thesaurus (1996). New World Dictionaries (p. 210, 2nd Ed). New York, Webster’s New World.

http://www.wiklileaks.ch

Wikileaks. (2011, May 28). Retrieved from Wikipedia: http://en.wikipedia.org/WikiLeaks

Similar Documents

Free Essay

Bus 501 Module One Case Assignment

...Trident University International Module 1 Case Assignment ETH 501: Business Ethics Dr. Mark Friske 24 November 2013 Introduction Adelphia Communications, one of the largest cable companies is the country at the time, is defunct as of 2006 due to multiple unethical decisions by the Rigas family. Any business, if subjected to unethical decision making to this extent, would be destined for failure and Adelphia Communications is no exception. The two main unethical actions that are highlighted are lying and stealing. Were these actions justified, deontologically speaking? How does Immanuel Kant’s categorical imperative apply to these two unethical actions in a business scenario? The Scandal Adelphia was a cable television company formed in 1952 by John Rigas and two other partners. John Rigas eventually bought out the partners of the company and grew the business with his brother and sons making it a family business. In 1986 the company became publically listed and eventually became the fifth largest cable company in the United States before it filed for bankruptcy in 2002 due to internal corruption. One example of the internal corruption at Adelphia was the accounting techniques that were used by the Rigas family. Billions of dollars in debt and liabilities were hidden from the public and off of the financial reports to make the company appear in better shape than it actually was. The former cable television company also would alter the amount...

Words: 1675 - Pages: 7

Free Essay

A Hands on Intro to Hacking

...this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed in USA First printing 18 17 16 15 14   123456789 ISBN-10: 1-59327-564-1 ISBN-13: 978-1-59327-564-8 Publisher: William Pollock Production Editor: Alison Law Cover Illustration: Mertsaloff/Shutterstock Interior Design: Octopod Studios Developmental Editor: William Pollock Technical Reviewer: Jason Oliver Copyeditor: Pamela Hunt Compositor: Susan Glinert Stevens Proofreader: James Fraleigh Indexer: Nancy Guenther For information on distribution, translations, or bulk sales, please contact No Starch Press, Inc. directly: No Starch Press, Inc. 245 8th Street, San Francisco, CA 94103 phone: 415.863.9900; fax: 415.863.9950; info@nostarch.com; www.nostarch.com Library of Congress Cataloging-in-Publication Data Weidman, Georgia. Penetration testing : a hands-on introduction to hacking / Georgia Weidman. pages cm Includes index. ISBN 978-1-59327-564-8 (paperback) -- ISBN 1-59327-564-1 (paperback) 1. Penetration testing (Computer security) 2. Kali Linux. 3. Computer hackers. QA76.9.A25W4258 2014 005.8'092--dc23 2014001066 I. Title. No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners...

Words: 117203 - Pages: 469

Premium Essay

Werefvd

...Python for Informatics Exploring Information Version 0.0.8-d2 Charles Severance Copyright © 2009-2013 Charles Severance. Printing history: October 2013: Major revision to Chapters 13 and 14 to switch to JSON and use OAuth. Added new chapter on Visualization. September 2013: Published book on Amazon CreateSpace January 2010: Published book using the University of Michigan Espresso Book machine. December 2009: Major revision to chapters 2-10 from Think Python: How to Think Like a Computer Scientist and writing chapters 1 and 11-15 to produce Python for Informatics: Exploring Information June 2008: Major revision, changed title to Think Python: How to Think Like a Computer Scientist. August 2007: Major revision, changed title to How to Think Like a (Python) Programmer. April 2002: First edition of How to Think Like a Computer Scientist. This work is licensed under a Creative Common Attribution-NonCommercial-ShareAlike 3.0 Unported License. This license is available at creativecommons.org/licenses/ by-nc-sa/3.0/. You can see what the author considers commercial and non-commercial uses of this material as well as license exemptions in the Appendix titled Copyright Detail. A The LTEX source for the Think Python: How to Think Like a Computer Scientist version of this book is available from http://www.thinkpython.com. Preface Python for Informatics: Remixing an Open Book It is quite natural for academics who are continuously told to “publish or perish” ...

Words: 68401 - Pages: 274

Premium Essay

Scp and Sap Apo

...Supply Chain Management and Advanced Planning Hartmut Stadtler ´ Christoph Kilger (Eds.) Supply Chain Management and Advanced Planning Concepts, Models, Software and Case Studies Third Edition With 173 Figures and 56 Tables 12 Professor Dr. Hartmut Stadtler FG Produktion und Supply Chain Management FB Rechts- und Wirtschaftswissenschaften TU Darmstadt Hochschulstraûe 1 64289 Darmstadt Germany stadtler@bwl.tu-darmstadt.de Dr. Christoph Kilger j&m Management Consulting AG Kaiserringforum Willy-Brandt-Platz 5 68161 Mannheim Germany christoph.kilger@jnm.de Cataloging-in-Publication Data Library of Congress Control Number: 2004110194 ISBN 3-540-22065-8 Springer Berlin Heidelberg New York ISBN 3-540-43450-X 2nd edition Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag. Violations are liable for prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springeronline.com ° Springer Berlin ´ Heidelberg 2000, 2002, 2005 Printed...

Words: 180845 - Pages: 724

Free Essay

Business Process Management

...Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany Richard Hull Jan Mendling Stefan Tai (Eds.) Business Process Management 8th International Conference, BPM 2010 Hoboken, NJ, USA, September 13-16, 2010 Proceedings 13 Volume Editors Richard Hull IBM Research, Thomas J. Watson Research Center 19 Skyline Drive, Hawthorne, NY 10532, USA E-mail: hull@us.ibm.com Jan Mendling Humboldt-Universität zu Berlin, Institut für Wirtschaftsinformatik Unter den Linden 6, 10099 Berlin, Germany E-mail: contact@mendling.com Stefan Tai Karlsruhe Institute of Technology (KIT) Englerstraße 11, Gebäude 11.40, 76131 Karlsruhe, Germany E-mail: stefan.tai@kit.edu Library of Congress Control Number: 2010933361 CR Subject Classification (1998): D.2, F.3, D.3, D.1, D.2.4, F.2 LNCS Sublibrary: SL 3 – Information Systems and Application, incl. Internet/Web and HCI ISSN ISBN-10 ISBN-13 0302-9743...

Words: 147474 - Pages: 590

Free Essay

Hacking the Art of Exploitation

...and explanations of how they work.” —COMPUTER POWER USER (CPU) MAGAZINE “This is an excellent book. Those who are ready to move on to [the next level] should pick this book up and read it thoroughly.” —ABOUT.COM INTERNET/NETWORK SECURITY ® San Francisco HACKING: THE ART OF EXPLOITATION, 2ND EDITION. Copyright © 2008 by Jon Erickson. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed on recycled paper in the United States of America 11 10 09 08 07 123456789 ISBN-10: 1-59327-144-1 ISBN-13: 978-1-59327-144-2 Publisher: William Pollock Production Editors: Christina Samuell and Megan Dunchak Cover Design: Octopod Studios Developmental Editor: Tyler Ortman Technical Reviewer: Aaron Adams Copyeditors: Dmitry Kirsanov and Megan Dunchak Compositors: Christina Samuell and Kathleen Mish Proofreader: Jim Brook Indexer: Nancy Guenther For information on book distributors or translations, please contact No Starch Press,...

Words: 139438 - Pages: 558

Premium Essay

Prueba

...TOLEDO. This documentation contains proprietary information of METTLER TOLEDO. It may not be copied in whole or in part without the express written consent of METTLER TOLEDO. METTLER TOLEDO reserves the right to make refinements or changes to the product or manual without notice. COPYRIGHT METTLER TOLEDO® is a registered trademark of Mettler-Toledo, LLC. All other brand or product names are trademarks or registered trademarks of their respective companies. METTLER TOLEDO RESERVES THE RIGHT TO MAKE REFINEMENTS OR CHANGES WITHOUT NOTICE. FCC Notice This device complies with Part 15 of the FCC Rules and the Radio Interference Requirements of the Canadian Department of Communications. Operation is subject to the following conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this...

Words: 37056 - Pages: 149

Premium Essay

Supply Chain

...THIRD EDITI ----- --·-- --·-- - - -- - O N -- SU PP LY CH AI N MA NA GE ME NT Stra tegy , Plan ning , and Ope ratio n Sunil Chopra Kellogg Schoo l of Manag ement Northwestern University Peter Meindl Stanfo rd University --------Prentice I-I all Uppe r Saddl e River , New Jersey ·--· PEAR SON -- · - · - - - "ibrary of Congress Cataloging-in-Publication Data :::hopra, Sunil Supply chain management: strategy, planning, and operation I Sunil Chopra, >eter Meind!.-3rd ed. p. em. Includes bibliographical references and index. ISBN: 0-13-208608-5 1. Marketing channels-Managemen t. 2. Delivery of goods-Management. i. Physical distribution of goods-Management. 4. Customer servicesvfanagement. 5. Industrial procurement. 6. Materials management. I. vfeindl, Peter II. Title. HF5415.13.C533 2007 658.7-dc22 2006004948 \VP/Executive Editor: Mark Pfaltzgraff ii:ditorial Director: Jeff Shelstad ;enior Project Manager: Alana Bradley E:ditorial Assistant: Barbara Witmer Vledia Product Development Manager: Nancy Welcher \VP/Executive Marketing Manager: Debbie Clare Vlarketing Assistant: Joanna Sabella ;enior Managing Editor (Production): Cynthia Regan flroduction Editor: Melissa Feimer flermissions Supervisor: Charles Morris Vlanufacturing Buyer: Michelle Klein Vlanager, Print Production: Christy Mahon Composition/Full-Service Project Management: Karen Ettinger, TechBooks, Inc. flrinter/Binder: Hamilton Printing Company Inc. fypeface: 10/12 Times Ten Roman :::redits...

Words: 138607 - Pages: 555

Premium Essay

Lulzking

...THIRD EDITI ----- --·-- --·-- - - -- - O N -- SU PP LY CH AI N MA NA GE ME NT Stra tegy , Plan ning , and Ope ratio n Sunil Chopra Kellogg Schoo l of Manag ement Northwestern University Peter Meindl Stanfo rd University PEAR SON --------Prentice I-I all Uppe r Saddl e River , New Jersey ·--· -- · - · - - - "ibrary of Congress Cataloging-in-Publication Data :::hopra, Sunil Supply chain management: strategy, planning, and operation I Sunil Chopra, >eter Meind!.-3rd ed. p. em. Includes bibliographical references and index. ISBN: 0-13-208608-5 1. Marketing channels-Managemen t. 2. Delivery of goods-Management. i. Physical distribution of goods-Management. 4. Customer servicesvfanagement. 5. Industrial procurement. 6. Materials management. I. vfeindl, Peter II. Title. HF5415.13.C533 2007 658.7-dc22 2006004948 \VP/Executive Editor: Mark Pfaltzgraff ii:ditorial Director: Jeff Shelstad ;enior Project Manager: Alana Bradley E:ditorial Assistant: Barbara Witmer Vledia Product Development Manager: Nancy Welcher \VP/Executive Marketing Manager: Debbie Clare Vlarketing Assistant: Joanna Sabella ;enior Managing Editor (Production): Cynthia Regan flroduction Editor: Melissa Feimer flermissions Supervisor: Charles Morris Vlanufacturing Buyer: Michelle Klein Vlanager, Print Production: Christy Mahon Composition/Full-Service Project Management: Karen Ettinger, TechBooks, Inc. flrinter/Binder: Hamilton Printing Company Inc. fypeface:...

Words: 141930 - Pages: 568

Premium Essay

Annual Report Example

...ANNUAL REPORT 2003 T R U ST I S A Q U E ST I O N O F Q U A L I TY, M O R E S O TO DAY T H A N EV E R B E F O R E . T H E S U C C E S S O F O U R B R A N D S S P E A K S F O R T H E T R U ST P LAC E D I N O U R P RO D U CT S , P RO D U CT S W H I C H A R E B A S E D O N A S I M P L E P R I N C I P L E T H AT I S T H E F O U N DAT I O N O F O U R E N T I R E C R E AT IV E P RO C E S S – A PA S S I O N F O R CA R S . A PA S S I O N W E WO U L D L I K E TO S H A R E W I T H YO U . > > > E AC H B R A N D I S A WO R L D O F I T S OW N . 4 06 10 12 14 Board of Management/Supervisory Board Report of the Supervisory Board The Board of Management Letter to our Shareholders Group values Financial Communication 18 Volkswagen share 24 Value-based management 26 Corporate Governance 30 40 46 50 53 58 60 66 Management Report Business development Net assets, financial position and earnings performance Volkswagen AG (condensed, according to German Commercial Code) Research and development Business processes Legal matters Risk report Outlook contents 40 ▼ net assets, financial position and earnings performance Sales revenue at prior year level Despite the negative effect of exchange rate movements, the Volkswagen Group generated sales revenue at the level of the previous year. However, earnings reflected unfavourable underlying conditions and special items. 12 ▼ letter to our shareholders Change and progress Our efforts are targeted at the goal of continuously...

Words: 59921 - Pages: 240

Free Essay

Ethical Hacking

...This page was intentionally left blank This page was intentionally left blank Hands-On Ethical Hacking and Network Defense Second Edition Michael T. Simpson, Kent Backman, and James E. Corley ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated...

Words: 185373 - Pages: 742

Premium Essay

Case

...Auditing Cases An Interactive Learning Approach FIFTH M F S D E D ITIO N S. B A. B M. G F. P Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Editor in Chief: Donna Battista Acquisitions Editor: Stephanie Wall Editorial Project Manager: Christina Rumbaugh Senior Managing Editor: Cynthia Zonneveld Production Project Manager: Carol O'Rourke Senior Operations Supervisor: Diane Peirano Printer/Binder: BindRite Graphics, Robbinsville Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on the appropriate page within text. Copyright © 2012, 2009, 2006, 2003, 2000 by Pearson Education, Inc., publishing Prentice Hall. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission(s) to use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may fax your request to 201-236-3290. Many of the designations by manufacturers and sellers to distinguish...

Words: 139985 - Pages: 560

Premium Essay

Ccna

...this section, answer the following questions:       What is the OSI model and why is it important in understanding networking? How does the third OSI model layer relate to administering routers? Which OSI model layer is concerned with MAC addresses? What protocols correspond to the Presentation and Session layers? What is the difference between the TCP and UDP protocols? What is the EIA/TIA 232 protocol concerned with? This section covers the following exam objectives:    103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 105. Describe the purpose and basic operation of the protocols in the OSI and TCP models 110. Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach OSI Model Facts The OSI model classifies and organizes the tasks that hosts perform to prepare data for transport across the network. You should be familiar with the OSI model because it is the most widely used method for understanding and talking about network communications. However, remember that it is only a theoretical model that defines standards for programmers and network...

Words: 73801 - Pages: 296

Free Essay

Assignments

...hie f The nu 50 mbers 6.7 % 13.01 Total dividend in FY2014 EBITDAF 1 ahead of prospectus CENTS PER SHARE $ 24 . 3% higher than forecast in the prospectus, including a 2 .00cps special dividend. Invested in communities and environmental projects 3.5M 2 New wind farms generating electricity Delivering on our commitment to shareholders In our first full-year results after partially listing on the New Zealand and Australian stock exchanges in October 2013, we have achieved solid results for shareholders. EBITDAF 1 , a key indicator of profitability, has exceeded the prospectus forecast by $36.9 million (6.7%). We have also delivered a higher-thanforecast full-year cash dividend for our shareholders, resulting in a 21.8% total shareholder return 2 to 30 June 2014 . 2014 highlights FRONT COVER Jeremy Takao, Russell School, Porirua, helping to celebrate first power at Meridian’s new Mill Creek wind farm near Wellington in May 2014. Meridian Energy Limited Annual Report for the year ended 30 June 2014 IN THIS REPORT 2 4 8 10 12 18 22 26 Company overview Report from our Chair and Chief Executive Our Board Our executive team Customers Generation Environment Community 30 People 34 Summary of Group performance 40 Directors’ statement 35.3 % Average NZ generation market share Sustainable outcomes for the environment This year we have committed $2 .1 million to support important environmental projects, including protecting the eel...

Words: 67800 - Pages: 272

Premium Essay

Nokia Annaul Report

...20-F 2011 Nokia Form 20-F 2011   As filed with the Securities and Exchange Commission on March 8, 2012. UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 20-F ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2011 Commission file number 1-13202 (Exact name of Registrant as specified in its charter) Republic of Finland (Jurisdiction of incorporation) Nokia Corporation Keilalahdentie 4, P.O. Box 226, FI-00045 NOKIA GROUP, Espoo, Finland (Address of principal executive offices) Riikka Tieaho, Director, Corporate Legal, Telephone: +358 (0)7 1800-8000, Facsimile: +358 (0) 7 1803-8503 Keilalahdentie 4, P.O. Box 226, FI-00045 NOKIA GROUP, Espoo, Finland (Name, Telephone, E-mail and/or Facsimile number and Address of Company Contact Person) Securities registered pursuant to Section 12(b) of the Securities Exchange Act of 1934 (the “Exchange Act”): Title of each class Name of each exchange on which registered American Depositary Shares Shares (1) New York Stock Exchange New York Stock Exchange(1) Not for trading, but only in connection with the registration of American Depositary Shares representing these shares, pursuant to the requirements of the Securities and Exchange Commission. Securities registered pursuant to Section 12(g) of the Exchange Act: None Securities for which there is a reporting obligation pursuant to Section 15(d) of the...

Words: 149449 - Pages: 598