Premium Essay

Unit2

In:

Submitted By kimsky12
Words 522
Pages 3
EMC Confronts Harassment Charges

EMC Confronts Harassment Charges

Kaplan University
MT203-02: Human Resource Management
Dana Williams
April 30, 2013

EMC Confronts Harassment Charges
Introduction
According to a lawsuit that files by two women of EMC allege sexual comments, company-paid trips and the failure to promote women for the same experience on the same basis as male employees where discrimination against. Women were being paid lower wages that may have been creating a hostile and offensive environment to women, making it harder for women to work there. The firm gathered 30 sworn affidavits from women supporting allegations that the work-place was hostile and discriminatory. (Noe, Hollenbeck, Gerhart, & Wright, 2009).

Review/Analysis of the Case
Answer to question #1-In the book it states that sexual harassment is unwelcome sexual advance, sexual favors, and any other verbal or physical contact. In this case according to the complaint that the women filed there where sexual comment, company paid trip to strip club and retaliation toward women who complained. Sexual harassment that goes on in a workplace worldwide on a regular basics. The law that was violated in this case was the unwanted sexual comment. Harassment does not have to be of a sexual nature, however, and can include offensive remarks about a person’s sex. For example, it is illegal to harass a woman by making offensive comments about women in general. http://www.eeoc.gov/laws/types/sexual_harassment.cfm

Answer to question #2- Yes, I think that they can continue to sell aggressively but to avoid charges of sexual harassment and sexual discrimination they need to change their policy and give training class on what is sexual harassment and what is not. Maybe there are some employees there that don’t understand what sexual harassment is are how and

Similar Documents

Premium Essay

Unit2

...------------------------------------------------- Level 3 Sub Dip/Extended Diploma in Business - Academic Year 2013-14 Candidate | | | Unit No. | Unit 5 ; Unit 2 ; Unit 18 | | Unit Name | Business accounting, Business resources and managing a business event | * | Qualification | Btec Level 3 | | Start Date | September 2013 | | Deadline | November 2013 | | Assessor | Maria Pillay | | Unit 5 – Business accounting | | | Criteria | To achieve the criteria the evidence must show that the student is able to: | Page No. | Achieved? | P1 | Describe the purpose of accounting for an organisation | | | P2 | Explain the difference between capital and revenue items of expenditure and income | | | P3 | Prepare a 12 month cash flow forecast to enable an organisation to manage its cash | | | P4 | Prepare a profit and loss account and balance sheet for a given organisation | | | P5 | Perform ration analysis to measure the profitability and liquidity and efficacy of a given organisation | | | M1 | Analyse the cash flow problems a business might experience | | | M2 | Analyse the performance of a business using suitable ratios | | | D1 | Justify actions a business might take when experiencing cash flow problems | | | D2 | Evaluate the financial performance ad position of a business using ratio analysis | | | Unit 2 – Business resources | | | Criteria |...

Words: 624 - Pages: 3

Premium Essay

Unit2

...Travis Avery NT2580 Project Part 2 Purpose - This policy defines the security configurations users and Information Technology (IT) administrators are required to implement in order to ensure the integrity, availability, and confidentially of the network environment of Richmond Investments(R.I). It serves as the central policy document with which all employees and contractors must be familiar, and defines regulations that all users must follow. The policy provides IT managers within R.I. with policies and guidelines concerning the acceptable use of R.I. technology equipment, e-mail, Internet connections, network resources, and information processing. The policies and restrictions defined in this document shall apply to all network infrastructures and any other hardware, software, and data transmission mechanisms. This policy must be adhered to by all R.I. employees, temporary workers and by vendors and contractors working with R.I. Scope- This policy document defines the common security requirements for all R.I. personnel and systems that create, maintain, store, access, process or transmit information. This policy also applies to information resources owned by others, such as vendors or contractors of R.I., in cases where R.I. has a legal obligation to protect resources while in R.I. possession. This policy covers all of R.I. network systems which are comprised of various hardware, software, communication equipment and other devices designed to assist the R.I. in the creation...

Words: 598 - Pages: 3

Premium Essay

Unit2

...Barclays Bank Critical Essay Abstract [The abstract should be one paragraph of between 150 and 250 words. It is not indented. Section titles, such as the word Abstract above, are not considered headings so they don’t use bold heading format. Instead, use the Section Title style. This style automatically starts your section on a new page, so you don’t have to add page breaks. Note that all of the styles for this template are available on the Home tab of the ribbon, in the Styles gallery.] Keywords: [Click here to add keywords.] Barclays Bank Critical Essay The way that Barclays Bank and its alleged collaborators manipulated the London Interbank Offered Rate is one of the most unethical acts I have personally heard of. This is because they collaborated with fellow businesses in the financial lending sector to create an appearance of a healthy and stable economic situation when the inverse was true. While this is morally despicable they were trying to maintain their profitability in a difficult economic time. However this is no excuse for the way they ignored their corporate responsibility to their consumers. This act shows that Barclays bank is very low in terms of ethical development. According to the books pyramid of corporate social responsibility they would be on the bottom. As their actions were motivated purely to meet their economic responsibilities by being profitable. It can be argued that they did what they needed to do in a tough economical time to meet the requirement...

Words: 615 - Pages: 3

Premium Essay

Unit2 Crisis

...Unit 3- Case 1+2 Michaela Konen Kaplan University WE are presented with two cases, in both cases we need to use the 6 step model that we have learned from our book. “1. Define problem. 2. Ensure client safety. 3. Provide support. 4. Examine alternatives. 5. Develop a plan. 6. Obtain commitment (James, 2008, pg 76).” It is important to know the steps so we can have a successful intervention. Case 1 You have been called out to a scene in which a 35-year-old woman is experiencing a crisis. Her husband just committed suicide and she is distraught about her circumstances. What information would you want to know before intervening? After finding out the necessary information, how would you handle this case? Before going to talk with the client I would want to know if she found her husband or was even home when he committed suicide. I would also like to see if I can find out anything about her mental health, or see if she has a criminal record. This is just to protect myself and others around. When people experience a crisis like this there emotions are all over the place from being sad to getting angry. I would want to get as much of her information as I could before heading out her way. When you arrive you have only a certain amount of time. So assessment are don’t fast, since we don’t have time to do a in depth one like you would have at a facility. “Objective assessment is based on an appraisal of the client’s functioning in three areas that may be referred to as...

Words: 1505 - Pages: 7

Free Essay

Unit2 P3

...Physical Resources Physical resources are resources that are available to a business organization in the form of buildings and other tangible machineries needed for day-to-day operation. Tesco has many physical resources it uses daily. One of the main physical resources is the building itself. The building is required for success of the business for obvious reasons. It is needed so the customers can actually access and buy from the business. Without the main building, the business would be a disaster as it will not be suitable for shoppers especially in cold or rainy weather which is the normal weather in England. Another physical resource Tesco has is the shelves which display the product for customers to buy. It is necessary for Tesco to have their products displayed neatly and tidy for customers to be able access the product easily. Without anything for the products to be held in a high position, the products will be scattered everywhere on the floor making shopping and sorting out the products difficult. Technological Resources Technological resources are resources that are usually intangible such as software, music or text. They too are owned by the business and have to be managed. One of the main technological resources that Tesco has is the software they use at the tills. This software will calculate all the sales made and how much is made. By having this technology, time is saved as there wont be people counting the money themselves where there will be more chance...

Words: 357 - Pages: 2

Premium Essay

It301 Assignment-Unit2

...| | |The Basement Upgrade | |Project Charter & WBS | |Kaplan University | |Andrea Meeves | |8/12/2013 | | | Worksheet: The Project Charter Project Name: Basement Upgrade Project Manager: Andrea Meeves Project Tracking Number: A1234 Date: August 12, 2013 Project Justification: This project will address the water damage issue that has been identified under the current flooring located in the basement. The project will also address some water damage located in the basement bathroom. This project is being under taken to increase the value of the home and complete...

Words: 1181 - Pages: 5

Premium Essay

Btec Unit2 P6 Sample

...A budget allows a business to plan because it states what money is available and what the money can be used for. For example, a business has one hundred thousand pounds’ worth of a budget. Fifty thousand pounds of that budget has to be spent on wages, twenty thousand has been spent on table and chairs, ten thousand has been spent on IT, ten thousand has to be spent on resources such as paper, printer ink and stationery and the remaining ten thousand has to be spent on lighting. This example has planned what the business needs to spend their money on. The business can only spend their budget on the equipment that is needed; the business cannot spend the budget on desired items. Monitor: A budget allows a business to monitor because it shows what money of the budget has been spent and what the budget has been spent on. For example, a business has budgeted to spend fifty thousand pounds on wages but in that time they have given pay rises, the business now has to pay sixty thousand pounds on wages. Monitoring the budget shows that pay rises have been granted to employees but it also shows that other sectors of the budget have had to be compromised. If one sector has risen and other sectors haven’t been compromised but have stayed the same means that the budget has been exceeded. When monitoring a budget, it also shows if a budget has been exceeded. Exceeding a budget means that the business has spent more money than they should have but can also mean that the business...

Words: 1692 - Pages: 7

Premium Essay

Unit2 Edgar Allan Poe

...Unit 2 Edgar Allen Poe (1809-1849) [pic] The American Romanticism I. What is Romanticism Originated in the second half of the 18th century, romanticism was a key movement in the Counter-Enlightenment, a reaction against the Age of Enlightenment. Romanticism emphasized intuition, imagination, and feeling, to a point that has led to some Romantic thinkers being accused of irrationalism. Romanticism focuses on Nature; a place free from society's judgement and restrictions. Romanticism blossomed after the age of Rationalism, a time that focused on handwork and scientific reasoning. Washington Irving and James Fenimore Cooper, and those of the late period contain Ralph Waldo Emerson, Henry David Thoreau, Walt Whitman, Nathaniel Hawthorne, Herman Melville, Edgar Allan Poe. II.Features of American romanticism Edgar Allen Poe(1809 - 1849) the most controversial and most misunderstood literary figure. a Bohemian(吉普赛人), depraved(堕落) and demonic(恶魔的), a villain(恶棍) with no virtue at all. Mark Twain declared his prose to be unreadable. But Eliot proclaimed him a critic of the first rank. He enjoyed respect and welcome greatly in Europe. He is the father of psychoanalytic criticism. In deed, Poe places the subconscious condition of the mind under investigation and probes beneath the surface of normal existence. What interests him most is the deep abyss of the unconsciousand subconscious mental activity of the people, His theories for the short story and poetry are remarkable...

Words: 3130 - Pages: 13

Premium Essay

Swot Analysis Unit2 L3 Btec Business

...Marketing Plan SWOT Analysis |Strengths | | | |These must be based on the internal strengths and JUSTIFIED in relation to the market research | |Grade: 1 | |The school has been awarded multiple grade: 1’s which shows it is at the top of its league, the best at what it does. The fact that| |they have been awarded Grade:1’s means that there is no room for improvement. Gosforth academy still improved even though it was | |awarded Grade:1, there is no higher award but the school was said to be outstanding, but in the intro is stats that not only is the| |school outstanding but it is expiry, the school that other schools should look up to. | |Satisfactory | |There is not a single satisfactory grade for any part of Gosforth academy, there are even only 2Grade:2’s, the fact is the school | |is always above average. The marks of Grades are, there are 8 topics that are graded, the school achieved 2, Grade:...

Words: 1974 - Pages: 8

Free Essay

Microsoft Environment Analysis Unit2 Assiginment 2

...1. Advisory 2757760: Vulnerability in Internet Explorer could allow remote code execution. This vulnerability has been investigated my Microsoft and a link to the appropriate update has been issued on the Advisory page. 2. Advisory 2755801: Vulnerabilities in Adobe Flash Player in IE 10. The software affected by this vulnerability are both 32/64-bit Windows 8 systems, and also Windows Server 2012. An update has been published that fixes this by updating the Adobe Flash libraries in IE 10 that are affected. It is also possible to temporarily remedy this by changing up the registry files with the text provided on the Advisory page. The Administrator may also disable Flash Player from running on IE 10 via group policy on Windows 8 and Server 2012. 3. Advisory 2736233: Microsoft has released new kill bits for ActiveX after multiple requests by Cisco concerning vulnerabilities in some of its services; Cisco Secure Desktop, Cisco Host scan, and Cisco Any Connect Secure Mobility Client are all services that are affected by ActiveX vulnerability. This affects most Windows XP/7 systems, along with Server 2003/2008 software. 4. Advisory 2661254: Update for Minimum Key Certificate Length. RSA keys being used in certificates that are less than 1024 bits in length are vulnerable to attackers duplicating the certificates, phishing, and man in the middle attacks. Examples of the services that are affected are encrypted emails and private PKI environments. It is suggested that this update is...

Words: 377 - Pages: 2

Free Essay

Lab 2

...Managing Files CH 6, Lab 1: Managing Files 1. [Denise@localhost ~]$ mkdir Unit2 2. [Denise@localhost ~]$ cd Unit2 [Denise@localhost Unit2]$ mkdir memos reports 3. [Denise@localhost Unit2]$ cd [Denise@localhost ~]$ touch memo.one [Denise@localhost ~]$ touch memo.two [Denise@localhost ~]$ touch memo.three [Denise@localhost ~]$ touch report.jan report.feb report.mar 4. [Denise@localhost ~]$ cp memo.one Unit2/memos 5. [Denise@localhost ~]$ cp memo.two Unit2/memos/memo.2 6. [Denise@localhost ~]$ mv memo.three Unit2/memos ((I removed the forward slash & it worked. Not sure if it is correct or not, but I am going to continue anyway…..)) [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three /Unit2/memos mv: cannot move `memo.three' to `/Unit2/memos': No such file or directory [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three/Unit2/memos.3 mv: missing destination file operand after `memo.three/Unit2/memos.3' Try `mv --help' for more information. 7. [Denise@localhost ~]$ mv memo.three Unit2/memos [Denise@localhost ~]$ mv report.jan report.feb report.mar Unit2/reports 8. [Denise@localhost ~]$ cd Unit2/reports [Denise@localhost reports]$ cp report.mar report.mar.orig 9. [Denise@localhost...

Words: 1139 - Pages: 5

Free Essay

Math

...INTEGRATION INTEGRATION Techniques of anti-derivatives x n+1 + c , n ≠ −1 n +1 dx ± ∫ g ( x) dx Power rule n ∫ x dx = Sum and difference ∫ [ f ( x) ± g ( x)] dx = ∫ f ( x) ∫ kf ( x) 1 Constant multiple rule dx = k ∫ f ( x) dx , k constant Anti-derivatives of logarithmic ∫ ax dx = a ln | x | +c ; ∫ ax ∫ e dx = 1 f ′( x) dx = ln | f ( x) | + c f ( x) Anti-derivatives of exponential e ax + c; a ∫ f ′( x)e f ( x) dx = e f ( x ) + c ∫ cos x dx = sin x + c ∫ sin x dx = − cos x + c ∫ tan x dx = − ln | cos x | +c Anti-derivatives of trigonometric ∫ cot x dx = ln | sin x | +c ∫ sec x dx = ln | sec x + tan x | +c ∫ csc x dx = − ln | csc x + cot x | +c ∫ sec ∫ csc 2 x dx = tan x + c x dx = − cot x + c 2 ∫ sec x tan x dx = sec x + c ∫ csc x cot x dx = − csc x + c 1 INTEGRATION Techniques of integrations: - substitutions ∫ f ( g ( x)) g ′( x) dx = F(g(x)) + c u = g(x), du = g′ (x) dx ⇒ ∫ f (u)du = F (u ) + c Area between two curves If f(x) > g(x) for all x in [a, b], then the area of the region between the graphs of f(x) and g(x) and between x = a and x = b is given by A = ∫ [ f ( x) − g ( x)] dx a b Double integrals (a) Computing the double integral over a rectangular If R is the rectangular a < x < b and c < y < d, then ∫∫ (b) R d b b d     f ( x, y ) dxdy = ∫  ∫ f ( x, y ) dx  dy = ∫  ∫ f ( x, y ) dy  dx     ca ac   Computing the double integral over a nonrectangular...

Words: 676 - Pages: 3

Premium Essay

Linux Networking

...NT-1430 Unit 2 Lab Lab Objectives * Perform basic system administration tasks * Creating users * Setting user passwords * Group membership and management * Working with the Linux filesystem structure * Creating files, directories * Commands, options, arguments * Copying files, moving/renaming files, deleting files * File and directory permissions Lab 1 Record your answers in the spaces provided. 1. Start your virtual machine 2. Log into the system as root with the password you specified last week 3. Create a user account for yourself with the following convention: [First Initial][Last Name] Example: John Doe would be jdoe a. Be careful, as Linux is a case-sensitive OS. Jdoe != jdoe b. Record the command used: __________________________________________________ 4. Set a password for your newly created account. Record the command used. ____________________________________________ 5. Create and set passwords for the following users: c. mark d. max 6. Log out of root and log back in as your newly created account 7. Run the following commands in sequence, and then report your findings: e. ls f. ls –a g. ls –l h. ls –al 8. Run the following commands and report your results. What is different about step 6? i. ls /tmp j. ls –a /tmp k. ls –l /tmp l. ls –al /tmp 9. Which command will display your present...

Words: 1169 - Pages: 5

Premium Essay

Random

...+You Search Images Maps Play YouTube News Gmail Drive Calendar More Sign in Screen reader users, click here to turn off Google Instant. About 2,680 results (0.33 seconds) Search Results Nt2580 - College Essays - Hendrome www.termpaperwarehouse.com › Computers and Technology Nov 11, 2012 – Nt2580. Making tradeoffs due to economic scarcity and that every society faces ... For a given set of laboratory services, there is a defined cost. Nt2580 Lab 4 - Term Papers - Jrains www.termpaperwarehouse.com › Computers and Technology Jan 18, 2013 – Nt2580 Lab 4. 1. Define why change control management is relevant to security operations in an organization. Change control is a systematic ... NT2580 Introduction to Network Security stankong.bol.ucla.edu/NT2580/index.htm Welcome to NT2580 Introduction to Network Security ... Home Work , Labs, PowerPoint , Project and Exam Reviews. Fall Quarter 2012 ... Itt tech nt2580 lab 6 - 6 ebooks - free download www.getbookee.org/itt-tech-nt2580-lab-6/ Itt tech nt2580 lab 6 download on GetBookee.org free books and manuals search - 094 ALB 01-09-13 01-09-13 Vol 37-a. Nt2580 unit 9 lab - 4 ebooks - free download www.getbookee.org/nt2580-unit-9-lab/ Nt2580 unit 9 lab download on GetBookee.org free books and manuals search - NT2580 Introduction to If ti S itInformation Security. Nt2580 unit 6 lab - 4 ebooks...

Words: 435 - Pages: 2

Premium Essay

Transformation

...0 2 4 6 8 2 4 6 x y Diagram 1.1 . . P Q | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 1. (a) Diagram 1.1 shows points P and Q drawn on a Cartesian plane. Transformation T is the translation . Transformation R is a clockwise rotation of about the centre Q. State the coordinates of the image of point P under each of the following transformations: (i) T2 (ii) TR [4 marks] (b) Diagram 1.2 shows two hexagons, EFGHJK and PQREST drawn on square grids. | | | | | | | | | | | P Q R S T E F G H J K Diagram 1.2 | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | (i) PQREST is the image of EFGHJK under the combined transformation WV. Describe in full, the transformation: (a) V (b) W (ii) It is given...

Words: 582 - Pages: 3