Thursday, October 31, 2019
Logistics Essay Example | Topics and Well Written Essays - 1250 words
Logistics - Essay Example In the management of erection logistics suitability and adaptability of the carriers are very important. Some of the functions relating to logistics, such as chartering arrangement for barges, supply vessels, helicopters, etc., are outsourced through the external agencies for customized sea freight and air freight services. Other important factors that need to be considered include waste disposal, material handling equipments, inventory management and clearance of goods in airports and seaport. Human resources management involves recruitment of qualified, experienced and certified professionals for employment in various levels of the management structure. Strategic planning and coordination is essential for storage and movement of the materials in cost effective management. Based on the risk parameters established for storage and handling of various types of materials and machineries, special arrangements for movement of materials with care should be made. The procedures for this pur pose should be incorporated into the system for effective management. Planning and Coordination Field logistics vary from project to project, consequently, so does the planning process. Somuyiwa, and Adewoye (2010) stated: IT in supply chain has enabled the gathering, storing and analysis of unprecedented amounts of data. It equally facilitates planning at all levels through data analysis and sharing, which enable planning to occur at the strategic, tactical, and operational levels. Similarly, IT gathers, integrates, and analyzes logistical data to streamline local and global supply chain. (p.43) The distance between the project to the sea and airports and the traffic level are the important factors which govern the planning process. Storage and transshipment of the materials at the port or airport depends upon the frequency in schedules for arrival and departure of the careers. Online location of the careers is important for monitoring status of the shipments in relation to the sch edule of operations. This will enable timely clearance of the goods, making arrangements for storing in offshore supply bases or moving them to the respective offshore platforms. Offshore mooring or establishing floating warehouses near the offshore oilfields should be considered based on the cost factors involved. This should be balanced with the increased efficiency achievable in logistics management in terms of time or deadlines. Cost-benefit analysis will enable the management to firm up the plans in line with the overall strategic logistics management decisions. Advance checking of the documents related to the goods such as pro forma invoice, packing list, inspection certificate, insurance and test certificate is essential to avoid problems in the last minute. Also, the transport documents such as Shipping Order, Bill of Lading and Sea/Air Waybill, other financial documents like letters of credit or insurance documents and the government documents such as licenses and declarati ons should be checked in advance. This will be useful in identifying the inconsistencies. Rectification of the defects on time will avoid delays in clearance. Documentation is very important, especially in the case of port or airport with heavy traffic. Here, officers at various levels may have to be coordinated in case there is any discrepancy in documentation.
Tuesday, October 29, 2019
Accounting Terms and Concepts Essay Example | Topics and Well Written Essays - 250 words
Accounting Terms and Concepts - Essay Example Ownerââ¬â¢s equity can therefore be determined by subtracting the value of all liabilities from assetsââ¬â¢ value as shown in the following equation (Warren, Reeve and Duchac, 2011a). Communication of economic information to relevant stakeholders is one of the roles of accounting systems that ensure accurate data on an institutionââ¬â¢s financial activities. Accounting systems also establishes frameworks for developing and managing organizational culture and interpersonal relations among an organizationââ¬â¢s stakeholders. The systems achieve these through outlining values and standards for practice (Macintosh and Quattrone, 2010). Development of complex Information Technology systems has improved accounting work through computerized accounting and analytics for financial analysis. The technology has simplified the accounting process and improved accuracy through its electronic applications. Advanced Information Technology has also improved time efficiencies and ensures updated information for managerial functions (Warren, Reeve and Duchac, 2011b). Integrating accounting systems with systems of other departments in an enterprise is necessary because of its associated advantages to both accounting personnel and other users of financial information from other departments such as line managers and top managements. The involved data interoperability avails information to all internal stakeholders and therefore eliminates complete reliance on financial accountants for information, a factor that facilitates timely decisions in other departments. Integrating accounting systems also relieves accountants of the communication role and promotes their efficiency in consultancy services to other users of financial information. Further, integrated systems facilitate faster transfer of financial updates to all departments for informed decisions and actions (Maher, Stickney and Weil,
Sunday, October 27, 2019
Political Factors Affecting Education
Political Factors Affecting Education Education is the most important shared experienced in our lives it is so important and so all-pervasive that it is almost impossible to define. Education will not supply all the answers to the problems that beset us, either as individuals or as a nation, but if we set about it the right way, it is the best single means of promoting intellectual, moral, physical and economic wellbeing (Aldrich 1996 ). Education teaches us the joy of learning and gives us the qualifications for employment, which builds confidence and self esteem and gives us the skills and values to meet the demands of a fast changing worlds and society. (Estelle 2001 quoted in Chitty, C 2009). As education meet the demands of society so society is itself is a product of that knowledge or education which informs societal attitudes towards life and its problems, the value it attaches to the things of the world in general, the place of man in the universe in particular and the norm sets to which our thoughts and behavior must conform. The two contrasting regions of Peshawar and Khyber Agency in Pakistan have been selected for critical analysis and evaluation of the impact of varying social and political forces on the provision and type of education available in each area. Peshawar is a large city having a population of 2.9 million in 2005. The population is growing by 3.2 % annually and this growth rate is higher than most other Pakistani cities (Hayat 2006). Peshawars residents consist mainly of Pashtoon people with Hindkowans as the minority group. Languages such as Pashto, Persian, Urdu, Khowar, Dari, Hindko, Saraiki and Punjabi are spoken in Peshawar. Peshawar can be sub-divided into two distinct regions, namely the urban region, which accounts for 51.32 % of the population, and the rural area with holds the remaining 48.68 % of the population. The population had increased two fold in the previous two decades. (Gaffar 2005) .The area of Peshawar district extends from Warsak north to south Matani, a distance of over 30 miles, and 18 miles from Hayatabad east to Taro Jaba in the west. It is located at an altitude of 1138ft above sea level. Most of the citys dwellers are Muslims with some Hindus, Sikhs and Christians minorities. Historically Peshawar was the centre of the Indus civilization and home to many other communities like Bukharan Jews and Zoroastrians (Arbab 2000). The second area to be evaluated is that of Khyber Agency. Khyber Agency is a Federally Administered Tribal area of Pakistan. It encompasses an area ranging from Tirah valley to the Peshawar district. It borders Afghanistan to the East, Orakzai Agency to the north and Peshawar to the west. There are four main tribes the Mullagori, Shalmani, Shinwari and Afridi in Khyber Agency. According to 2007 estimates, Khyber Agency had a literacy rate of 34.2%. In world literacy rankings, Pakistan is listed as 160th of 177 countries, with an overall literacy rate of 49.9 %( Noreen 2008). The reason for selecting these Peshawar and Khyber Agency is that, whilst they are geographically close, they demonstrate clear differences in the type and standard of education they provide. These differences can, therefore, be usefully evaluated in terms of the social and political forces acting upon them. One such significant factor, is that Khyber agency has become a focal point for the war against terrorism which, this paper will argue, has been a dominant cause in the deterioration of the education system in that region. Before analyzing and evaluating the provision of education by the state, it is a matter to be taken in notice that high regard is accorded to education in Pakistan is enshrined in the constitution with education on the agreed legislative list of the central and provincial government. The 1973 constitution of the Islamic Republic of Pakistan recognizes the importance of education and says that the state shall: Encourage unity and observance of the Islamic moral standards Endorse with special care the educational and economic interests of backward areas. Eradicate illiteracy and provide free and compulsory secondary education. Make technical and professional education generally available and higher education accessible to all on the basis of merit. Enable the people of different areas, through education, training, agriculture and industrial development and other methods, to participate fully in all forms of national activities including employment in the services of Pakistan. Ensure full participation of women in all the spheres of national life (National education policy 2010) In many developed countries of the world the school system has been divided into the state school and private school sectors. The commentators Adonis and Pollard have recently complained that the education system in England is based on a division between state and private (so called public ) schools with prestige and resources going mainly to the later rather then to the former (Adonis, A and Pollard S 1998). Like Great Britain, education system in Pakistan is also divided into state and private school. The existing state school systems in both Peshawar and Khyber agency are almost the same as that are provided in the rest of Pakistan. In Peshawar and Khyber agency, however, the school system has a further sub-division having state schools, private schools and madrassa schools. Private schools are considered schools for the upper classes, entry to which are generally limited to students from rich families, whilst state schools are generally for lower, middle class people. Madrassa, however, are for those children from lower class family backgrounds who do not have an access to any of the above mentioned schools for a variety of reasons; a key factor being accessibility. The students of madrassa depend solely on charities provided by the general public. In Peshawar only 4.6 million students are enrolled in the Public Sector, Private Sector and Madrassa. The remaining 2.8 million children have no access to formal education (Hussein 2007). Average dropout rates up to Matriculation level are at 38% annually. There are many factors that impact on the drop out including access problems, social and cultural issues particularly among females, poverty, ignorance, lack of financial resources,(with government and families) corporal punishment and so on. More than half of the children in Peshawar drop out of school before completing the fifth grade. On average, females remain in school for 1.3 years and males for 3.8 years. (Sohrab 2007) The education system in both areas is broadly divided into three stages namely; Primary, Secondary and Higher education. The pre school stage is introduced for children less then 5 years old and is further divided into three stages, play group, Nursery and Kinder Garden. Students progress from Primary schools to Middle schools and then High school. After completing High school (SSC), successful students progress to college, and is called Higher Secondary State Education (HSSC). After Primary Education, unisex education is the communities preferred choice but co-education does exist in Private Institution in Peshawar although not in Khyber Agency. The curriculum is usually designed by the federal curriculum bureau in Islamabad with prominent educationalists setting the objectives of the curriculum. Every province has its own text book boards who implement the curriculum made by the federal curriculum bureau. The provincial text book board has limited authority but can make some change s to the curriculum, subject to the approval of federal curriculum bureau. The provincial text book board conducts and monitors exams through different exam boards. (Iqbal 2007)The curriculum designed by the federal bureau is implemented in both private and state schools in Peshawar and Khyber Agency. O level and A level education system is employed in private sector in Peshawar. In Both private and state institutions the common subjects are Urdu, English, Maths, Social Studies, Islamyat, Computer science, and other science subjects like Chemistry, Physics and Biology. In Private schools, the medium of instruction is English whilst state schools teach in Urdu. (Majeed 2007). Secondary education teaches the boy{sic} to apply the principle he is learning, and so to learn the principles by applying them, or so to use the instruments he is being made to know, as to perform or produce something, interpret literature or a science, make a picture or a book, practice a plastic or a manual a rt, convince a jury or persuade a senate, translate or annotate an author, dye wool, weave cloth, design or construct a machine, navigate a ship or command an army (Bryce 1895). Secondary education is viewed as preparing students for entry into a career and that is why, after gaining the higher secondary school certificate (HSSC), students in both areas can appear in the entry test for professional institutions like medical and engineering colleges. Those who are unsuccessful in the entry tests follow the arts path or other science subjects. Higher education takes students up to PhD level. Since 2002, the Higher Education Commission (HEC) has been empowered to carry out assessment, improvement and promotion of higher education, research and development, devise policies, guiding principles and priorities for higher education institutions and to set down conditions under which institutions, including those that are not part of the State educational system, may be opened and operated. The mandate of HEC encompasses all degree granting universities and institutions, both in public and private sectors and supports the attainment of quality education by facilitating and co-coordinating self-assessment of academic programs and their external review by national and international experts. HEC also supervises the planning, development and accreditation of public and private sector higher education institutions. Its goal is to facilitate the educational reform process (Ghani 2006). The main distinguishing features in the provision and type of education system in each area is due to differences in the implementation of educational strategies and the number and types of educational institutions available. There are plenty of schools, colleges and universities flourishing in Peshawar but not in Khyber Agency. Indeed, in Khyber Agency there are no universities or other professional colleges at all. After graduating from secondary school, the students of Khyber Agency must move to Peshawar or other parts of Pakistan, depending on their family circumstances, if they are to continue their education. Students from Khyber Agency face an additional problem when seeking admission to the institutions in Peshawar because of their tribal domicile, as the constitution of Pakistan limits, via a fixed quota, the number of Khyber Agency residents who can be admitted to State Professional colleges. Those students who do not come in the quota system have to pay for their education in private institutions. Those who can not afford these expenses are left/remain without further education. There are number of social factors that play into the poor public provision of education in Khyber Agency. These include low level of awareness among parents, low income status, lack of administration and control, less parental involvement, less opportunity to study, parents relationship with institutions and teachers, low literacy ratio, peer rejection, regarding its outcomes and impact on household well-being. The parents in Khyber Agency often lack the necessary vision to see the benefits that education can bring to the future of their children. Further difficulties such as the non-availability of transportation, communication and health, social and family priorities, influence often negatively the educational opportunities of students. Clear differences exist in the administration of education within the two regions. The expenditure of funds and the nature and scope of educational planning has affected the education system in Khyber Agency. Poor Economic conditions is another factor that lower the literacy rate of Khyber agency to below that of Peshawar region. The persistent under-investment by successive governments in Khyber Agency has left many schools, poorly resourced and lacking in physical infrastructure. Academic institutions, with few exceptions face financial problems and constraints. Mostly Public sector schools face financial constraints due to the high burden of students in crowed institutions where facilities for students are minimal. If financially possible, parents utilize the services of private institutions to help their children get better education. Alternatively, parents may employ external/private tuition or coaching to enhance their childrens competence because, as mentioned, most state schools are overcrowded with high students numbers per class which prohibits adequate student teacher interaction. In Khyber Agency, the average income of parents prevents most families from seeking to enroll their children into the higher standard and more competitive institutions or opt for external tuition and coaching. It is generally acknowledged that the education department as a whole is the most badly administered governmental sector in Pakistan in spite of the fact that educat ion plays such a vital role in the development of any country. As mentioned earlier, the national government has never allotted the necessary resources to this department, resulting in a poor literacy rate country-wide. A structured system for funding education is necessary based on local community needs and subject to audit control at regional level. In both regions, especially in Khyber Agency, current provision is characterized by poor governance and management, a traditional way of teaching, an outdated and inflexible curriculum, lack of qualified educators, inappropriate utilization of existing infrastructure, political interference in teacher selection and infrastructure development, poor supervision and control by government, gender discrimination and a poor evaluation and assessment system, that has made the existing provision of the education system incompatible with modern education system and therefore changes must be made. Khyber Agency has been totally isolated from the main stream political system. Political activities were not allowed and people could not participate in politics till 1998.the people were given the right to vote in 1998 general elections. The political party system is still very fragile in the area and controlled by the Federal government through the governor of Khyber Pashtoon khawa. Commissioner and political agent are answerable to the governor in what is a very complicated political system. There still prevails the most hated laws called FCR (frontier crime regulation) imposed by the British in colonial times. These were the draconian rules that were imposed by British government to suppress the people of Khyber Agency. Political involvement plays a vital role in the administration and governance of education. Peshawars regional government has a long established record of political interference in the administration and control of education while Khyber Agency is being weakened daily due to the insurgency and acts of terrorism, lack of accountability and nepotism. Teachers in the areas have many serious concerns. They are generally low paid, given the prevailing economic depression, and have often been driven to desperate measures to gain a modicum of their urgent demands such as improved working conditions. It is necessary to meet these demands to ensure that teachers, as the makers of the nations, can contribute to the development of students which in turn will result in the development of nation. Education is a constitutional right of every male and female. The high level of social anxiety and low literacy rate clearly indicate the need for fundamental changes in education system; such improvements would include a single medium of instruction for text books, sufficient funding and proper implementation of strategies and plans. Due to social and political pressure the government announces special reforms for the development of education sector that also applies in these two areas. At the start of the 21st Century, the Government of Pakistan took several initiatives underlining the education sector reform. Some of these reforms are National Education Policy (1998-2010); Education Sector Reforms (ESR) (2001-06), Education for All (EFA) by 2015, Ten Years Perspective Development Plan (2001-2011), Ten Years Perspective Development Plan (2001-2011), National Commission for Human Development (NCHD), Poverty Reduction Strategy Papers (PRSP), Medium Term Development Framework (MTDF) 2 005-10, and Education Millennium Development Goals.(National education policy 2010) Despite the above mentioned reforms which has been introduced by the government at various times, their positive impact has yet to reach many rural areas like that of Khyber Agency. As a consequence these areas have become breeding grounds for terrorism which will not only endanger Pakistan but will export terrorism to other countries of the world and thus endangering the whole world. The following recommendations, if properly implemented could improve the currant education system in both regions but particularly in Khyber agency. The existing system of education needs to be thoroughly scrutinized and audited to ensure transparency in order to address poor governance and management issues. A specialized Management Centre in Elementary and Secondary Education Department to provide accountability and proper training without nepotism and bias should be introduced. There is a need to empowering school heads to ensure they are free from political interference and control. A separate commission in the style of the public service commission could make appointments and standardize all grades. Maximum administrative and financial autonomy needs to be devolved down to school level with accountability of the school heads to community level. This make the monitoring and evaluation process more efficient and effective and new technology could be devised for the process. A revolutionary emphasis on education, social and economic development is critical in order to lay the foundations for educational development and poverty reduction in both of these areas. Without social and economic development, change cannot occur, as change never occurs in a vacuum. Private partnerships are critical for capitalizing upon social and other stakeholder such as NGOs, voluntary organizations, general public and private sectors. All stakeholders could be subject to regulatory mechanisms to ensure effective education development in both Peshawar and Khyber Agency. In both the regions rigid and hard line behavior has breed a biased and inflexible system allowing no space for students analytical thinking. This also prevents the development of life long skills that prepare students to face challenges in their daily life by exercising problem solving skills. In order to address these drawbacks the design of the curriculum should be based upon native, behavioral, unbiased and scientific research so that concepts taught should be made vertically and horizontally clear and should incorporate local, regional and global values of democracy, secularism, federalism, broadmindedness and non-violence. Finally to improve the education system in these areas education could be alignment with market demands, a uniform medium of instruction, the strengthening of the science facilities, Knowledge Park, Science and Technology Park should be established in both regions to impart standards through robust control and administrative techniques. All these efforts will help to improve the standard of education by replacing traditional modes of instruction with the use of technologies and productive work and problem solving skills will take the place of routine types of activities which will in turn help develop a knowledge based economy that responds to the needs of the people in a sustainable manner.
Friday, October 25, 2019
Being An International Student in a Post 9/11 World :: Terrorism Terrorists Essays
Being An International Student in a Post 9/11 World "Give me your tired, your poor, your huddled masses yearning to be free," just not your students. "I knew what was going to happen after 9/11. It was understood," said Tariq Halela, a 21-year-old student at Boston University. What he understood was simple: for an international student, living in the United States would never be the same. Halela, an Indian born Kuwaiti native, has been studying stateside for over two years. He is an accounting major and speaks four languages -- English, Arabic, Hindi and Gujarati -- fluently. "I love it here in the states," he said. "That is why I was so worried when I got a call from the ISO [international student's office] saying I could be deported." Confusion over the new immigration rules and regulations is what gave Halela his first deportation scare. With stricter visas guidelines, the culmination of new policies the Bureau of Immigration and Customs Enforcement (ICE) have undertaken is the Student Exchange Visitor Information System, or SEVIS. Now, new international students can choose to study at any one of the over 7,000 SEVIS-certified universities in America. The schools, in turn, provide a plethora of information on the students ranging from the mundane - name, enrollment verification, date of birth - to the normally considered private information such as grades and field of study. Essentially, the SEVIS is a program designed to keep tabs on all the approximately one million international students studying here in the U.S. The SEVIS keeps a database housing all of a student's information to determine whether he or she can stay in the U.S. or can be allowed to come here in the first place. Although the program seems like a reaction to the 9/11 attacks, the birth of SEVIS dates back to the early '90s. One of the men convicted of the 1993 bombing of the World Trade Center, Eyad Ismoil, had gained access to the U.S. through a student visa. In an attempt to help regulate the student visas system, Congress passed the Illegal Immigration and Immigrant Responsibility Act, which commissioned the government to create a system that manages information on all international students but Congress never pressed to make that system operational. When it was learned that two of the 9/11 highjackers, Mohamed Atta and Marwan Alshehi, also came tot he U.S. through student visas, Congress changed their tune.
Thursday, October 24, 2019
Legal issues
Are Deed. Charlie and Bella also liable for the lawsuit against the firm by their client Mr.. Laurent.? 2. If so how far responsible are the other partners for Jakes mistake? 3. If no other partner liable, what excludes them? 4. Are there any defenses to any of the members of the firm from being liable to the lawsuit? Law: Partnerships partnership Act 1891 (SLD) Nature of Partnership Determination of existence of partnership Joint venture partnership Liability of Incoming partner Dissolution of partnershipsCompany Law Khan v Amah [2000] ââ¬ËNature of partnership' Cox v Carlson [1916] ââ¬ËJoint venture and partnership' ââ¬â ââ¬Ëhow the partnerships are created and what sustains them' Hammerer Pity Ltd v Egg [1996] ââ¬ËLiability of retiring partner' ââ¬â does a recently retired partner have any liability to the losses or profits of the firm? ââ¬Ë Application ââ¬Å"The rule s that persons who agree to carry on a business activity as a joint venture d not become p artners until they actually embark on the activity in questionâ⬠(text, 328).This Is In regards to Bella who claimed she had no liability towards the lawsuit against the firm as she had only been working there a short while and was not at work the time the accident happened. Bella had however been working there with a ââ¬Å"view for profitâ⬠(Text, 328) which happened to be the activity in question. With this same question in mind t has been stated that â⬠It is possible for a person to be a partner even though they do not have a claim to the share of the profitâ⬠(text,328).Bella had not contributed any capital upon joining the firm but still took on the Job of a partner at the firm through assistance. Unlike the case of ââ¬Å"Coxâ⬠(text,331 ) whereby ACH party was found with different liabilities for their parts of the Joint venture ââ¬Å"Magic Zillionsâ⬠Is a deferent case as they were continuing with the business In an effort to get a profit. â â¬Å"Where there is profit sharing and a more integrated business structureâ⬠(text. 30) as n the case of Magic Zillions it means that there was an aim for profit which is what considers the determination of existence of a Partnership amongst all four persons. In order for a ââ¬Ëpartner' to have been qualified as retired there has to be written confirmation that Charlie had actually been excluded from his entity and all its business, but the case does not well specify this. The implied 1 OFF partner it means that they ââ¬Å"must contribute equally towards lossesâ⬠(text,335) and in this case the loss is the lawsuit which is aimed at everyone a part of ââ¬ËMagic Zillions'. A partner who retires from a firm does not thereby cease to be liable for the partnership debts incurred before their retirementâ⬠(text,343), this case of the Liability of retiring partner falls on Charlie. â⬠Charlie has since retired from the business due to stress and ill-health and h as limited personal fundsâ⬠( facts), although Charlie had been retired but still part of the entity during the accident it disqualifies him from not being liable for the lawsuit against ââ¬ËMagic Zillions' as he was a partner then when the accident happened.Conclusion On the balance of Probabilities the Magistrates court would find that Deed, Charlie, Jake as well as Bella are all partners of ââ¬ËMagic Zillions' due to the evidence and supporting cases mentioned above and all would have to contribute to the $30,000 to the plaintiff, Mr.. Laurent to cover the injures he faced upon entering the premises of the defendants, ââ¬ËMagic Zillionsâ⬠Legal Issues Security Awareness and Training Program (for Nancy Johnson and other similarly situated employees) Nancy Johnson and other employees were terminated from their jobs by the administrator of the company, US Bancorp Comprehensive Welfare Benefit Plan Committee. The ââ¬Å"Causeâ⬠of Johnsonââ¬â¢s termination of employment is ââ¬Å"willful and gross misconductâ⬠; when Johnson accessed the files of her supervisor containing the 2002 performance level of the companyââ¬â¢s employees. When Johnson was denied the severance payment (she was able to access a file that contains the proposed merging of US Bancorp with another company ââ¬â some employees would be terminated with severance payment, except those who were involved in gross misconduct), she requested for a summary judgment to the district court. The district court favored Johnson arguing that the company did not establish a security information system that would prevent employees from accessing the files of the company. The committee though wrote an appeal to the circuit court arguing that the court erred in its interpretation of the provisions of the plan. The circuit court agreed to the arguments of the committee, arguing that since no official interpretation as to the use of the terms ââ¬Å"willful and gross misconductâ⬠, the administrator of the plan can apply these terms to similar situations. The severance payment to Johnson was therefore denied. Information security awareness and training programs then should be designed based on the so-called Computer Fraud and Abuse Act of 1984. The statute ââ¬Å"criminalizes unauthorized access to a ââ¬Ëprotected computerââ¬â¢ with the intent to obtain information, defraud, obtain anything of value or cause damage to a computerâ⬠(Security Awareness Laws, http://www.massachusetts.edu/lawsfaq/faq.cfm#7).à The so-called ââ¬Ëprotected computerââ¬â¢ is a computer used for foreign or communication purposes (as in the case of the plaintiff) and for interstate interaction. Without authorization from the Department of Defense or the Foreign Affairs, accessing information from said institutions is deemed illegal. Also read: Explain Legal Issues, Policies and Procedures Relevant to Assessment Sharing of passwords, computer fraud, and damage of essential federal information are also deemed illegal. The law was extended to include private computers. In the case of the defendant (the corporation), it must institute narrower definitions as to the terms ââ¬Å"willful and gross misconduct.â⬠This will definitely also narrow the options for employees who are accessing important information from the companyââ¬â¢s database. The employees must be first acquainted ( by memorandum) of the sites allowed to use during office work. Security Awareness and Training Program (for Scott Moulton) The plaintiff, Scott Moulton accused the defendant of probing the formerââ¬â¢s network of clients. Defendant claims statements from Moulton concerning the defendant were defamatory. First is the statement made by Moulton to C.J. Johns, information systems manager for the Cherokee Countyââ¬â¢s Sheriffââ¬â¢s Office (December 19, 1999) that defendant had created security risks and that defendants network employees were stupid. The second is the statements made by Moulton that the way defendant planned to connect the Police Department to two systems created a security risk from the internet. Lastly, statements from the plaintiff said that defendantââ¬â¢s network had created a security risk. The plaintiff though argued that these statements were merely opinions. People may agree or disagree with the statements made. The court though granted the defendant summary judgment for the failure of the plaintiff to run a put test in the project. The plaintiff was also granted a summary judgment for the failure of the defendant to reduce the security risks. The US Congress passed a bill on July 2004, stating that internet probing of contractors to government websites (contractors duly approved to negotiate for the construction of website connections between government offices) can only be legal on three counts: 1) probing does not in any way create security risks for the government office involved, 2) the probing would not result to malversation of any public information, and 3) such probing must be requested by the client government office, with approval from its head office. Though the case was a posteriori since the bill was passed before the case was filed, it would be good for government offices to follow the guidelines of the law on internet probing of intergovernmental offices. Hence, law analysts saw the law as the ââ¬Å"most Balearicâ⬠safeguard of the government from hackers. Security Awareness and Training Program (for Dewey Watkins) The plaintiff, Dewey Watkins requested the district court to cancel a computer access code that had been assigned to him and was being used (with the supervisorââ¬â¢s approval) by another authorized employee. The code provided access to confidential records maintained for Tennesseeââ¬â¢s Medicaid Program. The plaintiff argued that the action of the supervisor violated the confidentiality provision of the state law. The plaintiff also accused EDS of terminating his employment when the former refused to participate in the ââ¬Å"illegalâ⬠conduct.à The circuit court however affirmed the decision of the district court to grant summary judgment in favor of EDS, for the reason that Tennessee law does not conflict with the general provision of the Confidentiality Law. There was no proof that other employees also use the computer access code, and if there was such a case, it would be legal. It is noteworthy that the same law discussed in case 1 also applies in this case. Sharing of passwords to access public documents is clearly prohibited by law. Nonetheless, although the terms ââ¬Å"public informationâ⬠was the focus of the case, it should be noted that public information are information that have direct link to the public in general. This constitutes government programs, strategic social and economic planning, and of course interstate activities. Security awareness programs must be based on the definition of public information in order to vindicate any instances of sharing passwords or revealing information from government-locked and secured database. References Nancy J. Johnson v. US Bancorp â⬠¦ United States Court of Appeals for the Eight Circuit. Appeal from the United States District Court of the District of Minnesota. September 9, 2005. Security Awareness Laws. 2006. University of Massachusetts. URL http://www.massachusetts.edu/lawsfaq/faq.cfm#7. Retrieved September 14, 2007. Scott Allen Moulton and Network Installation Computer Services, Inc., Plaintiffs v. VC3, Defendant. United States District Court, Atlanta Division. Watkins v. EDS. NO. 1:00-CV-434-TWT. United States Court of Appeals No. 03-6353. United states Court of Appeals for the Sixth Circuit. November 2, 2004. à Legal Issues Security Awareness and Training Program (for Nancy Johnson and other similarly situated employees) Nancy Johnson and other employees were terminated from their jobs by the administrator of the company, US Bancorp Comprehensive Welfare Benefit Plan Committee. The ââ¬Å"Causeâ⬠of Johnsonââ¬â¢s termination of employment is ââ¬Å"willful and gross misconductâ⬠; when Johnson accessed the files of her supervisor containing the 2002 performance level of the companyââ¬â¢s employees. When Johnson was denied the severance payment (she was able to access a file that contains the proposed merging of US Bancorp with another company ââ¬â some employees would be terminated with severance payment, except those who were involved in gross misconduct), she requested for a summary judgment to the district court. The district court favored Johnson arguing that the company did not establish a security information system that would prevent employees from accessing the files of the company. The committee though wrote an appeal to the circuit court arguing that the court erred in its interpretation of the provisions of the plan. The circuit court agreed to the arguments of the committee, arguing that since no official interpretation as to the use of the terms ââ¬Å"willful and gross misconductâ⬠, the administrator of the plan can apply these terms to similar situations. The severance payment to Johnson was therefore denied. Information security awareness and training programs then should be designed based on the so-called Computer Fraud and Abuse Act of 1984. The statute ââ¬Å"criminalizes unauthorized access to a ââ¬Ëprotected computerââ¬â¢ with the intent to obtain information, defraud, obtain anything of value or cause damage to a computerâ⬠(Security Awareness Laws, http://www.massachusetts.edu/lawsfaq/faq.cfm#7).à The so-called ââ¬Ëprotected computerââ¬â¢ is a computer used for foreign or communication purposes (as in the case of the plaintiff) and for interstate interaction. Without authorization from the Department of Defense or the Foreign Affairs, accessing information from said institutions is deemed illegal. Also read: Explain Legal Issues, Policies and Procedures Relevant to Assessment Sharing of passwords, computer fraud, and damage of essential federal information are also deemed illegal. The law was extended to include private computers. In the case of the defendant (the corporation), it must institute narrower definitions as to the terms ââ¬Å"willful and gross misconduct.â⬠This will definitely also narrow the options for employees who are accessing important information from the companyââ¬â¢s database. The employees must be first acquainted ( by memorandum) of the sites allowed to use during office work. Security Awareness and Training Program (for Scott Moulton) The plaintiff, Scott Moulton accused the defendant of probing the formerââ¬â¢s network of clients. Defendant claims statements from Moulton concerning the defendant were defamatory. First is the statement made by Moulton to C.J. Johns, information systems manager for the Cherokee Countyââ¬â¢s Sheriffââ¬â¢s Office (December 19, 1999) that defendant had created security risks and that defendants network employees were stupid. The second is the statements made by Moulton that the way defendant planned to connect the Police Department to two systems created a security risk from the internet. Lastly, statements from the plaintiff said that defendantââ¬â¢s network had created a security risk. The plaintiff though argued that these statements were merely opinions. People may agree or disagree with the statements made. The court though granted the defendant summary judgment for the failure of the plaintiff to run a put test in the project. The plaintiff was also granted a summary judgment for the failure of the defendant to reduce the security risks. The US Congress passed a bill on July 2004, stating that internet probing of contractors to government websites (contractors duly approved to negotiate for the construction of website connections between government offices) can only be legal on three counts: 1) probing does not in any way create security risks for the government office involved, 2) the probing would not result to malversation of any public information, and 3) such probing must be requested by the client government office, with approval from its head office. Though the case was a posteriori since the bill was passed before the case was filed, it would be good for government offices to follow the guidelines of the law on internet probing of intergovernmental offices. Hence, law analysts saw the law as the ââ¬Å"most Balearicâ⬠safeguard of the government from hackers. Security Awareness and Training Program (for Dewey Watkins) The plaintiff, Dewey Watkins requested the district court to cancel a computer access code that had been assigned to him and was being used (with the supervisorââ¬â¢s approval) by another authorized employee. The code provided access to confidential records maintained for Tennesseeââ¬â¢s Medicaid Program. The plaintiff argued that the action of the supervisor violated the confidentiality provision of the state law. The plaintiff also accused EDS of terminating his employment when the former refused to participate in the ââ¬Å"illegalâ⬠conduct.à The circuit court however affirmed the decision of the district court to grant summary judgment in favor of EDS, for the reason that Tennessee law does not conflict with the general provision of the Confidentiality Law. There was no proof that other employees also use the computer access code, and if there was such a case, it would be legal. It is noteworthy that the same law discussed in case 1 also applies in this case. Sharing of passwords to access public documents is clearly prohibited by law. Nonetheless, although the terms ââ¬Å"public informationâ⬠was the focus of the case, it should be noted that public information are information that have direct link to the public in general. This constitutes government programs, strategic social and economic planning, and of course interstate activities. Security awareness programs must be based on the definition of public information in order to vindicate any instances of sharing passwords or revealing information from government-locked and secured database. References Nancy J. Johnson v. US Bancorp â⬠¦ United States Court of Appeals for the Eight Circuit. Appeal from the United States District Court of the District of Minnesota. September 9, 2005. Security Awareness Laws. 2006. University of Massachusetts. URL http://www.massachusetts.edu/lawsfaq/faq.cfm#7. Retrieved September 14, 2007. Scott Allen Moulton and Network Installation Computer Services, Inc., Plaintiffs v. VC3, Defendant. United States District Court, Atlanta Division. Watkins v. EDS. NO. 1:00-CV-434-TWT. United States Court of Appeals No. 03-6353. United states Court of Appeals for the Sixth Circuit. November 2, 2004. Ã
Wednesday, October 23, 2019
Lab Safety Report Essay
The lab safety video has provided valuable information to better prepare me to be safe in lab and go by the Seminole State College Lab protocol. I watched the lab video link-http://flash.seminolestate.edu/vod/chemistry/startingwithsafety/startingwithsafety.html, and learned lab safety. The topics addressed were dressing appropriately, how to handle chemicals safely, Bunsen burner and glassware safety, and the emergency equipment available in the lab. I feel I have been informed of the proper procedures and rules to stay safe and protect my classmates, teacher and my personal safety in the laboratory setting. Before entering a lab one should consider the rules that need to be applied. The attire considered necessary are proper googles, long pants, long sleeves (not too loose), jewelry removed, gloves (if required), and apron (if necessary). Also a student is responsible for their behavior and should store personal items, not fool around, and never bring food and drinks to the lab. Then a lab can be conducted in a safe manner with the additional awareness provided in the following topics. The first topic addressed was how to handle chemicals safely. When using acids or bases in a lab proper eyewear, gloves, and aprons should be worn if necessary. The chemicals should be kept from the eyes and skin, and if happen to get in eyes use an eye wash or shower immediately. When mixing chemicals: read and reread labels, only mix chemicals when told to by teacher and use the proper sized (usually smaller) container. When using acid only add acid to water, not the reverse order. In the case of an accident, report the spill to teacher immediately. Upon lab clean up, throw materials in proper containers and do not pour acids down the sink. The second topic addressed was Bunsen burner and glassware safety. The Bunsen burner is dangerous and therefore precaution needs to be taken. The setup should start with the proper connection of the gas hose, and when ignited stand clear. The burner should be turned off immediately if the flame goes out, sputters or flames happen, or there is a smell of gas. The Bunsen burner can be used with glass beakers for heating chemicals. However,Ã the glassware should be checked for cracks, and once hot should be removed with tongs or gloves. When using fragile glass tubes, hands should be protected with leather gloves and lubrication should be used with rubber inserter and then washed off. If a thermometer is needed the appropriate temperature (alcohol or mercury- depending on temperature range) should be used and understood that no shaking is necessary. The Bunsen burner is among some of the equipment used frequently but can cause harm if used improperly. The final topic addressed the emergency procedures and equipment needed if accidents were to arise in the laboratory. The lab room is equip with first aid kits, fire extinguishers, fire blankets, eye wash stations, emergency chemical showers, and proper deposal containers. However, hopefully one will not need to be used with careful precautions and common sense. For example, if a breaker is on fire simply cover it to contain the flame before a fire extinguisher or evacuation is needed. The emergency equipment is there to ensure safety in case of an accident or emergency and should be used appropriately. In conclusion, the laboratory is a dangerous place if the proper concern for safety is not taken seriously. Therefore the video has given the proper guidelines and protocols needs to operate a safe lab for all to enjoy.
Subscribe to:
Comments (Atom)