Free Essay

Incident 18-1

In:

Submitted By barbie49701
Words 416
Pages 2
Incident 18-1

University of Phoenix
6/08/2012

Mel Gibson needs to follow the company polices for the use of alcohol on the property. Almost every company has a no alcohol use policy. Alcohol is a substance that alters a persons motor skills and ability have any control whatsoever. It can be a danger to oneself and co-workers. This is why people are not allowed to drink on the job. I worked for a company last summer that had a no alcohol policy. An employee always reeked of beer his the entire time he worked. The manager of the shop asked me about James and I told her, “Yes, I have smelled the beer but never saw him drinking in the shop.” One day about a week later my co-worker Kennor told me that James left his back pack open in the back and there were 6 unopened cans of beer in there. Later that day I went into the bathroom and washed my hands. While drying them one of my rings fell in the garbage. I had to dig in the garbage to find it. I found it and 2 empty beer cans at the bottom. Now I had proof that James was drinking on the job. Having proof that James was drinking on the job I had a big decision to make. One option was to tell the manager. The other option would be to keep it to myself and allow James to continue drinking on the job. Carefully weighing out my options I decided the correct thing to do. Which was get the manager show her the empty beer cans and tell her about Kennor seeing the unopened cans. I felt really bad turning James in, yet for the safety of all who worked in the shop it was the correct thing to do. It's not always the easiest thing to follow the rules when you really like your co-workers. Sometimes you just want to let things slide but in a business environment it's not acceptable at all. The manager immediately took pictures of the empty beer cans in the garbage and confronted James. Having already warned him several times about reeking of beer and staggering around the shop, he was fired. Usually with matters like this you get a verbal or written warning. Then your fired. Mel Gibson should have done the same. By not following company policy Mel would be putting his own job at risk.

Similar Documents

Free Essay

National Response Plan

...establish consistent, often times comprehensive changes to the way it accomplishes Emergency Response operations. The catastrophic events of both September 11, 2001 and the lingering tragedy of Hurricane Katrina proved to be instantaneous prompts for the evolution of governmental amendment to and eventual restructure of the overarching procedural standard for incident response in the country. One of the many important after-effects would become what was labeled the National Response Framework, or NRF. A detailed outline of the NRF structure and intent follows. The template is a doctrinal approach to the domestic partnerships and implementation of resources above and beyond those rules set by the National Incident Management System (NIMS) and the Incident Command System (ICS) (FEMA, 2012). The sole purpose of the 90-page document is to ensure that government executives, private sector, nongovernmental organization (NGO) leaders, and emergency management practitioners across the nation understand domestic incident response roles, responsibilities and relationships in order to respond more effectively to any type of incident. General administrators of NRF-specific guidance will typically be policy-level personnel or heads-of-agencies, who directly or strategically coordinate echelon and subordinate agencies at all eventual layers of government emergency response. It is guided mainly by the data and regulatory information offered to emergency managers at the NRF Resource Center...

Words: 2281 - Pages: 10

Premium Essay

A Guide of Service Desk

...Answers to Review Questions Chapter 1 1. An increasing dependence on computing technology and the complexity of computing technology. 2. A single point of contact within a company for managing customer incidents and service requests. 3. To enable people and businesses to continuously use the computing technology they acquired or developed. 4. Technical support was considered a necessary evil that disrupted the development of new products and systems. 5. (1) Developers missed deadlines because they were being diverted to technical support calls, leaving little time for their primary job of programming. (2) Information was not being captured, so developers had to discover the same solution again and again. (3) Recurring problems were neither identified nor resolved. (4) Technology users, who expected quick and accurate solutions to their problems and requests, were extremely dissatisfied when their demands were not met. 6. Vendors began offering discounts to customers who “screened” calls internally before calling the vendor. 7. A customer can be either internal or external to a company. 8. Customer support involves helping the customer understand and benefit from a product's capabilities, not just installing and fixing the technology. 9. (1) The rapid commercialization of the Internet. (2) Increasingly more affordable and portable computing technology. 10. company size, company goals, and customer expectations 1 11. Formal support enables a company to maximize its technical...

Words: 6553 - Pages: 27

Free Essay

Analyse and Project Design

...1. Initial product backlog 4 1.1 Acceptant 4 1.2 Head of department 4 1.3 Specialist(1) 5 1.4 Specialist(2) 5 2. Use-case 6 2.1 Use-Case descriptions 7 4. Classs diagram 13 5. Class definition 14 1.5 Class Schademelding 14 1.5.1 Data descriptions 14 1.5.2 Operation descriptions 14 1.6 Class Verzekerde 15 1.6.1 Data descriptions 15 1.6.2 Operation descriptions 15 1.7 Class Behandelaar 16 1.7.1 Data descriptions 16 1.7.2 Operation descriptions 16 1.8 Class Rol 16 1.8.1 Data descriptions 16 1.8.2 Operation descriptions 16 1.9 Class KostenSpecificatie 17 1.9.1 Data descriptions 17 1.9.2 Operation descriptions 17 1.10 Class Polis 18 1.10.1 Data descriptions 18 1.10.2 Operation descriptions 18 1.11 Class Dekking 18 1.11.1 Data descriptions 18 1.11.2 Operation descriptions 19 1.12 Class Geraakte Dekking 19 1.12.1 Data descriptions 19 1.12.2 Operation descriptions 19 1.13 Class Taxatie 19 1.13.1 Data descriptions 19 1.13.2 Operation descriptions 20 6. Sequence Diagram 21 1.14 Example screens 22 7. 26 8. ERD 26 8.1 Explanation of the ERD per table 26 8.2 Constraints 29 8.3 Business rules 30   1. Initial product backlog 1.1 Acceptant As an acceptant, I want to be able to log in with my username and password so that I can handle incoming damage reports. As an acceptant, I want to able to find a customer if I fill in his/her zip code, so that I can see the customer’s information As an acceptant, I want to see the policies of the customer...

Words: 3679 - Pages: 15

Premium Essay

Sec578

...Practices Administration Physical and Operation Security Paper 1 Professor : Dr.Jude Lamour Submitted by: Otis McCall Contents Topic: 1. How do Administrative Controls demonstrate "due care?" 2 2. How does the absence of Administrative Controls impact corporate liability? 4 3. How do Administrative Controls influence the choice of Technical and Physical Controls? 6 4. How would the absence of Administrative Controls affect projects in the IT department? 7 1. How do Administrative Controls demonstrate "due care?" Administrative controls demonstrate due care by putting in place the necessary policies , procedures, and practices to reinforce policies of the organization. These controls are divided up into various elements from access list to control spaces, password and user identification for employees, separation of duties to ensure you mitigate the possibility of theft or take steps directed by management to limit incidents that can be perpetuated by employees. Thus, you cannot guard against collusion but you can have policies and procedures that limit the actual ability to carry out such incidents. The administrative controls that we will look at provide...

Words: 1531 - Pages: 7

Premium Essay

Training

...Chapter 7 Prevention of Sexual Harassment 7–1. Overview The prevention of sexual harassment is a commander’s responsibility. The EOA plays a pivotal role by assisting the commander with policy awareness, training, command climate assessments, complaints processing and overall advisory assistance concerning the prevention of sexual harassment. 7–2. Chain of command responsibilities Commanders and supervisors will— a. Ensure that assigned personnel (to include RC personnel under their jurisdiction) are familiar with the Army policy on sexual harassment. b. Publish and post written command policy statements for the prevention of sexual harassment. All statements will be consistent with Army policy. They will include the local command’s commitment to the Army’s policy against sexual harassment and will reaffirm that sexual harassment will not be tolerated. The statement will explain how and where to file complaints and will state that all complainants will be protected from acts or threats of reprisal. Each ACOM/ASCC/DRU, installation, separate unit, agency, and activity down to company, troop or battery level will publish a sexual harassment command policy statement. Units should coordinate these policy statements with the servicing staff judge advocate or legal advisor before publishing them. c. Continually assess and be aware of the climate of command regarding sexual harassment. Identify problems or potential problems. Take prompt, decisive action to investigate...

Words: 36437 - Pages: 146

Premium Essay

Wferhy5Tuj

...Gerontologist Vol. 41, No. 5, 572–575 Copyright 2001 by The Gerontological Society of America The Ageism Survey: First Findings Purpose: To develop an instrument that can be used to answer three questions: What is the prevalence of ageism in various societies? Which types of ageism are more prevalent? Which subgroups of older people report more ageism? Methods: A survey instrument was developed listing 20 types of ageism. This instrument was tested on a convenience sample of 84 persons older than age 60. Results: The instrument appears to have satisfactory reliability and validity. The survey found that the experience of ageism was widespread and frequent among these respondents. The majority reported several incidents of ageism and over half of the incidents were reported to have occurred “more than once.” The most frequent types were persons showing disrespect for older people, followed by persons showing assumptions about ailments or frailty caused by age. Implications: Researchers now have a reliable and valid instrument for measuring the prevalence of ageism in various societies and of various types of ageism experienced by various groups of older persons. This may aid in reducing the prevalence of ageism in our society. Nevertheless, ageism is widespread in our society, in contrast to more traditional societies where old age is honored and respected (Palmore & Maeda, 1985). Yet nobody knows how much ageism there is, nor how prevalent the various forms...

Words: 2488 - Pages: 10

Premium Essay

Mgt 210 Innovative Educator/Mgt 210.Com

...MGT 210 Entire Course For more course tutorials visit www.mgt210.com MGT 210 Week 1 CheckPoint 1 Incident 1-1: Promotion Into Supervision MGT 210 Week 1 CheckPoint 2 Article Review on Diversity in the Workplace MGT 210 Week 1 Assignment Article Search MGT 210 Week 2 CheckPoint Incident 2-2: Bad Times at Quality Shoe MGT 210 Week 2 DQ 1 and DQ 2 MGT 210 Week 3 CheckPoint: Incident 6-2: What Should I Do Next? MGT 210 Week 3 Assignment: Exercise 7-2: “In-Basket” MGT 210 Week 4 CheckPoint: Work Team Concepts MGT 210 Week 4 DQ 1 and DQ 2 MGT 210 Week 5 CheckPoint Recruiting, Selecting, Orienting, and Training MGT 210 Week 5 Assignment: Exercise 10-2: OJT MGT 210 Week 6 CheckPoint: Employees’ Union MGT 210 Week 6 DQ 1 and DQ 2 MGT 210 Week 7 CheckPoint: Incident 14-1: No Extra Effort MGT 210 Week 7 Assignment: Exercise 15-3: Test Your Leadership Style MGT 210 Week 8 CheckPoint: Incident 18-1: Changes in an Employee’s Behavior MGT 210 Week 8 DQ 1 and DQ 2 MGT 210 Week 9 Capstone CheckPoint MGT 210 Week 9 Final Project: Best Practices Manual for Supervisors ------------------------------------------------------------- MGT 210 Week 1 Assignment Article Search For more course tutorials visit www.mgt210.com Assignment: Article Search Resources: Appendix A, University Library, Ch. 1 (p. 19) of Supervision: Key Link to Productivity, and the References within the References Page section of Ch. 2 in Axia College’s Writing Style Handbook Review the six supervisory...

Words: 747 - Pages: 3

Free Essay

Paper

...FBI Study Finds Active Shooter Incidents Increasing By: Amanda Vicinanzo, Senior Editor 10/22/2014 ( 9:40am) In partnership with Texas State University’s Advanced Law Enforcement Rapid Response Training Center, the FBI in 2014 initiated a study of active shooter incidents to provide law enforcement and first responders with data to help them better prevent, prepare for, respond and recover from future incidents.   The report, A Study of Active Shooter Incidents in the United States Between 2000 and 2013, evaluated 160 active shooter incidents, including those at Virginia Tech, Sandy Hook Elementary School, the US Holocaust Memorial Museum, Fort Hood, the Aurora (Colorado) Cinemark Century 16 movie theater, the Sikh Temple in Wisconsin, the Washington Navy Yard and numerous other tragic shootings.   Special Agent Katherine Schweit, who heads the FBI’s Active Shooter Initiative, says she hopes the study “demonstrates the need not only for enhanced preparation on the part of law enforcement and other first responders, but also for civilians to be engaged in discussions and training on decisions they’d have to make in an active shooter situation.”   The FBI emphasized that the report evaluates active shootings, a term more specific than “mass shootings,” which does not encompass all mass killings or shootings in public places. The FBI defines active shooters as “individuals actively engaged in killing or attempting to kill people in populated areas (excluding shootings...

Words: 6325 - Pages: 26

Free Essay

Charleston Sofa Fire

...Charleston Super Sofa Fire Charles Rigsbee Durham Tech, Community College Introduction On June 18, 2007, the City of Charleston’s Fire Department lost nine of their firefighters, when they became trapped fighting a fire inside of the Sofa Super Store. This tragedy was the single greatest loss of firemen on duty in the United States since 343 fire fighters died in the collapse of the World Trade Center on Sept. 11, 2001. Issues that plagued the Charleston Fire department on the day of the incident included the lack of a proper incident command system; no accountability system and water supply issues hampered firefighting and rescue efforts that dreadful day. Furthermore, the Sofa Super Store’s lack of sprinkler systems in vital areas resulted in heavy fire loads created by high volumes of highly combustible furniture; compliant building additions also contributed to the deaths of the 9 firemen. The Fire On June 18, 2007, approximately at 6:56 pm, a fire was spotted by someone driving along the Savannah Highway in front of the store. The passerby notified store employees of the fire outside of the loading dock. The manager attempted to extinguish the fire with portable extinguishers but was unable to bring the fire under control. At 7:08, Charleston County 911 Center received a call reporting the fire at the store. Within 2 minutes, Engines 11 and 10, ladder 5 and Battalion 4 were dispatched. Battalion 4 was the first unit on scene, his intimal size up indicated...

Words: 1702 - Pages: 7

Free Essay

Physics Lenses

...Chapter 15: Refraction and Lenses Refraction of Light If water waves in a ripple tank travel from water with a depth of 1 cm into a shallow area with a depth of .3 cm, the water will slow down. In a ripple tank the depth can be changed by placing a sheet of plexiglass or glass in the water. In the picture to the right the area to the left is deeper water and the the the right is shollow. The picture shows that when the water travels into a shallow area and slows down, the wavelength will shorten. We learned in the last chapter that when waves travel into a new medium the frequency remains the same so if the wavespeed decreases, the wavelength must decrease. If the wavefronts cross a boundary at an angle and slow down we get a bending of the front. This bending of the path of the waves as they pass from one medium to another is called refraction. It occurs because the leading edge of the front slows down while the front in the faster medium keeps its original speed. If the path of the wave front changes, the path of a ray will also change. Here bending occurs when the ray crossing the boundary is not perpendicular to the boundary. Physicists have invented a concept called the index of refraction (symbol is n) to indicate how much the speed is changed when working with light waves. The equation is: The index of refraction is a ratio, so it has no units. Some times the term index of refraction is called optical density. A material with a higher...

Words: 4755 - Pages: 20

Premium Essay

2012 Us Cost of Cyber Crime Study Final6

...2012 Cost of Cyber Crime Study: United States Sponsored by HP Enterprise Security Independently conducted by Ponemon Institute LLC Publication Date: October 2012 Ponemon Institute© Research Report 2012 Cost of Cyber Crime Study: United States Benchmark Study of U.S. Companies Ponemon Institute October 2012 Part 1. Executive Summary We are pleased to present the 2012 Cost of Cyber Crime Study: United States, which is the third annual study of US companies. Sponsored by HP Enterprise Security, this year’s study is based on a representative sample of 56 organizations in various industry sectors. While our research focused on organizations located in the United States, many are multinational corporations. For the first time, Ponemon Institute conducted cyber crime cost studies for companies in the United Kingdom, Germany, Australia and Japan. The findings from this research are presented in separate reports. Cyber attacks generally refer to criminal activity conducted via the Internet. These attacks can include stealing an organization’s intellectual property, confiscating online bank accounts, creating and distributing viruses on other computers, posting confidential business information on the Internet and disrupting a country’s critical national infrastructure. Consistent with the previous two studies, the loss or misuse of information is the most significant consequence of a cyber attack. Based on these findings, organizations need to be more vigilant...

Words: 9057 - Pages: 37

Free Essay

Interrogatory

...                               TO:  DEFENDANT, SOUTH WESTERN HOSPITAL TO:   JOHN DONG             Under the authority of Rule 33 of the (Title of Rules), Plaintiff, by and through its attorneys, request that Defendant, answer, in writing and under oath, within 30 days of receipt hereof, the interrogatories hereinafter set forth. DEFINITIONS 1.         "COMPLAINT" shall mean and refer to Plaintiff's complaint originally filed on 08-10-15 in Department XVII of the Santa Clara County District Court, Case No. C126447. 2.       "PROPERTY" shall mean and refer to the real property owned by the Defendant.    3. "YOU", "YOUR", "YOURS", and/or "DEFENDANT" shall mean and refer to as well as, his agents, attorneys, employees, accountants, family members, investigators, or any other person acting on his behalf. INTERROGATORIES INTERROGATORY NO. 1:             Describe in detail the number of employees and each employee’s job duties on the date of the incident in this case.  INTERROGATORY NO. 2: Identify any warning, caution, "wet floor", or other relevant signs that were displayed in the area where the incident occurred, including their verbiage, size and exact location. INTERROGATORY NO. 3: Please provide the full name, title, address and phone number of each employee present in the building at the time of this...

Words: 746 - Pages: 3

Premium Essay

Multi Layered Systems.

...Security Domains and Strategies, Project 1 Nearly all businesses today are connected to the Internet. This detail makes any company, large or small, a target for hackers, network attacks and malware. The largest security threat to any company today is internal, and specialists in the field suggest you protect your company by layering components in a full security strategy that includes technology, policies, procedures, and best practices. The fact is that small businesses today face the same basic data protection challenges as large businesses. The dangers and potential costs of unprotected data can be catastrophic. By layering security using complementary technologies, your small to mid-sized business IT services can address all of the threats it faces. Needless to say, IT support is unquestionably needed for business data protection. It is highly recommended that you pick a company that truly understands the needs of a small business. The great thing today is that it is not necessary for IT technicians to be on site in order to service your IT network. Whether the security threats are malicious or due to inadvertent employee error, the results are the same: loss of revenue and productivity, and potential liability for the company. What Are the Questions? As organizations begin to build their incident response capability, they are looking to determine the best strategy for putting such a structure in place. They not only want to know what has worked well for others, but...

Words: 394 - Pages: 2

Premium Essay

Other

... | Distribution List |Name |Organization |Title | | | | | | | | | | | | | | | | | Table of Contents 1. Introduction 4 1.1 PURPOSE 4 1.2 Scope 4 1.3 Definitions, Acronyms, and Abbreviations 5 1.4 References 6 1.5 Overview 7 2. Participants 8 2.1 SIGNATORIES 8 2.2 Contacts 8 2.3 Responsibilities 8 3. Service...

Words: 3930 - Pages: 16

Premium Essay

Adolescent Bullying

...to be a rite of passage. In some occasions it is common, such as college fraternity hazing. “Bullying is typically defined as aggressive peer-to-peer behavior in which (1) there is an intention to harm or disturb the victim; (2) the aggression occurs repeatedly over time; and (3) there is an imbalance of power, with a more powerful person or group attacking a less powerful one” (Elias, Zins 46). Bullying tends to occur between the 6th grade and 10th grade. What is astonishing is that 75% of children have admitted to being bullying at some point of their lives during the school years. Victims of bullying tend to be quiet, sensitive, withdrawn, have low self-esteem, poor social skills, and feelings of being rejected. “Between 1992 and 2001, 35 incidents occurred in which students showed up at their school or at a school-sponsored event and started firing at the schoolmates and teachers. These incidents, represented most starkly by the incident at Columbine High School, in Littleton, Colorado, left 53 dead, and 144 injured” (Deadly, 1). These incidents were a wake-up call for people in this country. It was appalling to think that this could be happening in our country, in our state, or even city. The perpetrators of these crimes were children. They were all under the age of 18 and still in school. On December 1, 1997 in quiet West Paducah, Kentucky, a 14 year old freshman, Michael...

Words: 873 - Pages: 4