Read the following story and answer the four questions below at least 50 word re

by | Jan 14, 2022 | Public Administration | 0 comments

Read the following story and answer the four questions below at least 50 word response per question>
Bill, an IT supervisor for 5 years at Acme Roadrunner Data (ARD) (not a real company) is returning with his work laptop from a month long vacation with his wife in Asia. They couple visited Thailand, Vietnam, China, and South Korea. To stretch 15 days of accrued vacation into the month that he needed, Bill taking advantage of the time difference and ARD’s telecommuting policies, would log on and do his work remotely knowing that he could get a full day’s work done in 3-4 hours. He used local hotel and coffee shop Wi-Fi and ARD’s VPN. With work finished he would join his wife sightseeing. Upon his return to the USA Bill is stopped in customs. They ask to see his laptop which Bill hands over reluctantly. Customs and Border Patrol (CBP) turns it on and asks Bill for his password. Bill because of his supervisor role has a master password that gives him access to almost all the systems that ARD has. He uses this same password for the laptop which contains a master copy of the ARD’s proprietary software and user data which is encrypted with the same password.
Bill believes that he will be fired if he gives CBP access to such sensitive company information and refuses. Protesting his rights as an American citizen he asks why they want access to his laptop. CBP says that they are cracking down on the importation of child pornography and searching people coming from SE Asia where the problem is rampant. They go on to say that unless they are given access Bill and his wife will be detained in a CBP holding facility. Complicating matters is that fact that Bill and his wife took some risqué photos together with their digital SLR. Having run out of room on their SD card and not trusting such photos to the cloud, Bill stored them temporarily on his laptop until he could get home. Bill uses his one phone call to call the ARD Legal Department. After several days in detention with an ARD corporate lawyer present Bill gives up his password to CBP. After thoroughly examining the laptop and its files, including the encrypted ones the laptop is returned by CBP to Bill and he and his wife are released.
Q1: BEFORE, What should have been the company policy/policies before this situation that would have prevented it? (Think creatively but also practically)
Q2: DURING, How should ARD, corporate legal, and Bill be handling this situation?
Q3: AFTER, Now that this has happened, how should ARD handle the situation with Bill? What new policies should be implemented (circle back to Q1)? What went right for Bill in this Scenario? How might Bill have better handled the situation? What were Bill’s mistakes?
Q4: SPIRITUALLY, Imagine that you are Bill’s boss, what would be an ethical and Biblical way for you to deal to deal with Bill’s situation?

Categories

Timely Delivery

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Affordable Prices

Top Quality Papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university, or professional, and we will assign a writer who has a respective degree.

24/7 Support

Our support agents are available 24/7 and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

100% Plagiarism Free

Plagiarism is the biggest crime in the academic world. We have strict measures to ensure that all the essay papers are written from scratch to maintain originality and avoid plagiarism.

Professional Writers

We have hired a team of professional writers who provide expert essay help. Most of them are native speakers and PhD holders who are able to take care of any assignment you need help with.

We Protect Your Privacy

Anonymous Communication

We offer nameless communication between clients and writers. We value privacy on both sides.

Secure Payments

We do not collect or store any payment information. The order form is protected using SSL 256-bit encryption.

Personal Data Protection

Your personal information remains private and secure under our comprehensive privacy policy. We strictly follow the rules.

Why Us?

Exceptional quality, professional writers, secure and private, always on time. This is how our clients described their experience working with us. We value our clients above all and strive to uphold the high standards that we have set.

Quality is everything. We make sure that each completed paper that we send is an absolute masterpiece. It is well-written, thoroughly thought out, follows guidelines, has impeccable format and completely original. You can be confident that your paper is one-of-a-kind because we double-check it for plagiarism. Your instructor will be impressed when you turn in your paper.

Quality

Our Team

Wileyscholars.com has special quality assurance team guarantees that all the papers are plagiarism-free and meet the standards or specific requirements of certain academic institutions (these may vary, you know, and they may vary even between different teachers). Upon placing an order, you can communicate with your writer during the entire process and even after it is completed. This ensures a customized service, meeting the exact needs and expectations of any, even the most demanding customers.

Contact Us

support@wileyscholars.com

Get Started

PROVIDING STUDENTS WITH CUSTOM ACADEMIC PAPERS SINCE 2007