IBM Ethics Program
Monitoring
As well as engaging in rigorous ethical monitoring of its own practices through formal channels, IBM also has a kind of honor system whereby IBM employees are told to immediately report ethical violations regarding government contracts to the corporate management, "either directly or through the Open Door or Speak-Up programs" ("Business Conduct and Ethics," 2008, IBM.). Upper as well as lower-level members of the management are involved in ethics scrutiny, and ethical monitoring is the responsibility of all members of the company, not just management or specific personnel. Open Door programs mean that upper-level managers have an open door to hearing ethical problems, regardless of the source, even if they are not directly supervising the lower-employee with the grievance. The Speak-Up program, originally designed "the to handle minor administrative problems such as heating and parking," has since been expanded to allow employees to report ethical problems as well as areas that need improvement at the company ("Lend an Ear, 1981, Time Magazine).
Enforcement
IBM has an extremely rigorous ethics enforcement program and policy. It perhaps goes without saying that IBM notes that any employee found in violation of the law will be dismissed. However, this scrutiny extends to intense self-monitoring on the part of the corporation as a whole. According to its mission statement, it is "IBM's practice to voluntarily and promptly disclose known violations of government procurement laws to appropriate officials of government. In the event that IBM benefited economically from such known violations, it is our practice to reimburse the government customer accordingly" ("Business Conduct and Ethics," 2008, IBM.). In other words, IBM does not simply strive to uphold the law and ensure that violators within the company are punished. It also submits itself to intense self-scrutiny and self-monitoring, is committed to transparency in regards to violations and will go above and beyond the law even in the absence of a conviction to ensure that customers are treated fairly.
Works Cited
Business Conduct and Ethics." (2008). IBM Official Website. Retrieved 20 Jul 2008 at http://www.ibm.com/ibm/responsibility/company/management/policies/conduct.shtml
Lend an Ear." (7 Dec 1981). Time Magazine. http://www.time.com/time/magazine/article/0,9171,953249,00.html
Those guidelines must be respected in all instances -- every manager will feel as if his or her current crisis is the one sufficiently dire to contact an employee on vacation. If vacations become extensions of the office, the spiritually enriching aspects of human life will begin to be depleted, and on a practical level, if the company does not compensate workers for working on vacation, this is time
Most well-known was Robert Scoble of Microsoft. With the 2004 U.S. Presidential elections, blogs' growth accelerated dramatically as nearly every news network, candidate in both U.S. Senate and House of Representative races, and political pundit has their own blog competing for the publics' attention. The era of 2004 to today in fact has created a blogging industry that is pervasive in its availability of publishing platforms (USC Annenberg School of
The broader areas of Customer Relationship Management (CRM) serve as the foundation of client relationship management and analysis (Ravanas, 2007). There is the second weakness of also concentrating on the corporate donors as a largely homogeneous group. This can be seen in the approaches defined in the Club's annual report. The tailoring of individualized strategies can maximize the experiences of donors so they have a higher level of ownership in
Apple Corporation Company Compliance Plan-APPLE The Apple Corporation: Compliance plan The Apple Corporation has recently been beset by a series of scandals, regarding the discrepancy between how it manufactures its products and the ethics it claims to uphold in its compliance plan. On its website, the Apple Corporation has tried to inform and persuade the public that it is compliant with the standards it sets in its company compliance plan. For example, regarding
" (Johnson, 2005) the notion of ruling against the defendant in all identity theft or related cases may establish the wrong precedent for future cases. "On the other hand, if liability is too readily assessed, it will have the power to bankrupt valuable enterprises because of the often vast numbers of potential plaintiffs and consequent extensive resulting damages." (Johnson, 2005) Internet security and identity theft is a very pervasive problem globally.
Open source software has recently emerged as the frontrunner for many industries as the primary method of code production, as it is widely predicted to provide more options for its users in a quicker, quality improved, and cost effective format than the more traditional proprietary software. Linux, the dominant player in the market, is a considerable threat to the Microsoft operating system, which has successfully established itself in the global
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now