Preview

Ethical Implications of Results-Only Work Environment

Satisfactory Essays
Open Document
Open Document
512 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethical Implications of Results-Only Work Environment
Ethical Implications of Results-Only Work Environment

Ethical Dilemma
With technological advances and the rising popularity of the flexible work environment labeled Results-Only Work Environment (ROWE), the ability to work anywhere and everywhere poses the issue that sensitive company data could be compromised in a telecommuter environment. With an employee’s remote access to company documents, email, systems and proprietary information, there is an elevated risk of equipment theft and security breach.

Stakeholders & Their Decision-Making Processes * Executive Management – executive team would need to determine if there would be an ROI justification for supporting a flexible work environment. Executive management must evaluate whether ROWE would align with current corporate strategic goals and objectives. * Human Resources – HR is instrumental in developing ROWE policies and processes, evaluating positions that would qualify for the benefit, facilitating ROWE transition (with supervisors and managers), determine performance standards for ROWE employees and administer employee discipline for violators of ROWE guidelines. * Information Technology – IT is especially key in the transition into ROWE. They will need verify remote capabilities are working properly and additionally, guarantee all security software, operational systems and wireless access is updated and glitch-free. * Finance (Internal Audit Manager) – finance will need to ensure proper audits are complete and reports are processed accurately.

Potential Solutions & Their Ramifications * Evaluate the necessity of a job position for the need to adapt to a flexible work environment. Does the position justify the need to work remotely? In cases of threat of hacking, finance or legal positions would be especially sensitive to data security. * Develop and implement a structured flexible work environment security policy. A concise, structured policy for telecommuting

You May Also Find These Documents Helpful

  • Good Essays

    The purpose of this policy is to describe what steps must be taken to ensure that users connecting to the corporate network are authenticated in an appropriate manner, in compliance with company standards, and are given the least amount of access required to perform their job function. This policy specifies what constitutes appropriate use of network accounts and authentication standards.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    A security policy defines limitations on individual behavior or system performance and details activities that are permitted, controlled or prohibited within the company. In order for policies to be effectual, senior management must endorse them, they must be communicated to all employees, undergo recurring reviews, and be assessed for usefulness. A security program encompasses all of the required pieces necessary to successfully protect a business. It should include policies, requirements, standards and procedures. Security plans should be operative at all levels of a corporation to be effective. Management should communicate a formal explanation of what is acceptable by all employees. Management should also clearly dictate what the consequences of noncompliance are. Organizations can use the ISO-27002:2005 as an outline to create a security policy.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    MGT2 Task3

    • 5037 Words
    • 21 Pages

    Identify and install the latest security software on all telecommuters' PCs and enforce strict rules for information access including password policy management.…

    • 5037 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue four. You must research and formulate a plan to implement monitoring and analysis based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently. You must determine system implementation and access in accordance with defined IT criteria as well as how to collect information for identification of and response to security breaches or events.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Mism Phs Case Study

    • 610 Words
    • 3 Pages

    3. What are the operational IT/MIS challenges and benefits posed by the systems now in…

    • 610 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Feedback: Christine this is a good start where you have demonstrated a sound understanding of ways to maintain a secure work environment. Can you take it one step further and provide a specific example of how security can be maintained also? Consider some of the ways that this is done at your current or previous workplace. (2.3)…

    • 620 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ACCG 315 reflaction 2

    • 673 Words
    • 2 Pages

    According to industry partner’s presentation, that accountant has variety roles in the verification field. The auditor should ensure financial statements are not materially misstated and be able to giving a true and fair view. The auditor should demonstrate professional scepticism---being able to form an opinion. The auditor opinion is intended to provide reasonable assurance for financial statement and adding the value and credibility of the financial statement produced by management. Consequently increase the user confidence in rely on the financial statement and reduce investor’s risk. Accountant work in a professional firm as an auditor should Mitigating risk and acting as a third line of defence for clients. Using their knowledge of management accounting to help the client in controlling and minimising the risk of business, ensuring the operation of finance are in a right track. There are much more requirement for accountant working in auditing fields such as being compliance with regulatory standards, working in a collaborative team, be able to build a relationship with the client and other internal people.…

    • 673 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Our auditors understand you are responsible for making all the financial records and responsible for the information. Our goal is to advise you to take the appropriate accounting principles and assist in the preparation of your financial statement; but the responsibility for the financial statement reminds on you. The responsibility includes the maintenance and establishment of adequate records and effective internal controls over financial reporting. A member of management will be responsible for identifying and ensuring the entity complies.…

    • 492 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    |1. |The stock count is to be carried out for 14 divisions, wherein, one division will be covered in one day. |Project Team, CA Firms and Store. |…

    • 1388 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    School rules

    • 1754 Words
    • 8 Pages

    - Supervise the production of information/ promotional materials for broadcast and print media (TVCs, AVPs)…

    • 1754 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    duties and responsibility

    • 468 Words
    • 2 Pages

    Assist with preparation and coordination of the audit process including organizing files to make sure…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    An internal accountant will provide management with the necessary information needed to handle issues that arise, as well as preform system audits to maintain internal accountability. Setting forth a reliable internal audit system will build stability within the company and assist with violations occurring with laws and regulations. The role of an internal accountant will include, but are not limited to, working closely with the owners and department managers to evaluate the company’s performance in the most vital areas of operation and review the policies and procedures to ensure they are in line with the company’s mission and goals. More specifically, the internal accountant will evaluate the assets, financial accuracy, and that the standards of the government and industry are being followed correctly. The internal accountant will also serve as a security measure for the company and their assets.…

    • 673 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Manages the financial resources of the business and reports on the financial position & performance…

    • 193 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Managerial accountants carry titles such as CFO (Chief Financial Officer), controller, and treasurer. The CFO deals with all finance and accounting issues within the organization; the controller and treasurer report to the CFO with matters that aid in decision making. The controller is the organization’s top accounting officer; the treasure is concerned mainly with raising and managing cash. (p. 17-18)…

    • 402 Words
    • 2 Pages
    Good Essays