Business Ethics (Group Assignment)
Business Ethics (Group Assignment)
ETHICS
Faculty of Business, Economics and Accountancy,
UMS
GROUP PROJECT
(30%)
ETHICS IN THE VIRTUAL
WORLD
INSTRUCTIONS:
1.
2.
Section (A)
Group Member (10 students are allowed NOT MORE NOT LESS)
1. Ruhadznilmy Eldika Fadriz bin
2. Mohd ShahMersing
Reizal bin Ambran
3. Muhammad Asis bin Lasemman
4. Mohd Marzuki bin Mohd Azhar
5. Muhammad Nasrul bin Alwi
6. Alvin bin Paun
7. Abu Hasan bin Hj. Maidi
8. Mohd Faizal bin Mahsud
9. He Chuan
10. Zhang Jing Yao
Matric No:
1. BB13110503
2. BB13161011
3. BB13161110
4. BB13161103
5. BB13110320
6. BB13110016
7. BB13161086
8. BB13110289
9. BB13170731
10. BB13170684
Section (B)
Assignment Requirement:
1.
2.
Assignment Output:
1.
2.
Reminder: Essay and guidelines must be professionally written i.e. format and language/grammar.
Referencing is the utmost important. Students are strongly recommended to read on how to reference
sources where Harvard style is highly recommended. Improper referencing will be penalised 20% of
total given marks. A total absence of referencing will results in the report being rejected. Plagirised
essay will be failed.
Any documents (journal articles, newspapers clippings, reports etc.) used must be compiled as
an appendix. Students are required to upload one softcopy in the Smart2 UMS. No hardcopy
is required.
For ofice use only:
ITEMS
Content
Consistency
In-Depth
Creativity
Originality
TOTAL
GRADE
Important Notes:
Date of issue: Week 1 (08.09.2015)
(28.10.15) by 4PM
MARKS
/20
/20
/20
/20
/20
/100
Penalty for late submission: 10% deduction from TOTAL GIVEN MARKS, and 5% for every extra week
after date of submission.
There is no re-submission for this assignment.
Vicarious Liability
Vicarious liability can be defined as a situation where the third
party is
wife,
and
employer
liability
in
and
the
the
Cyber-Liability
In this modern era, being digital is a way of life and
other
networks
or
be bought and
against
both the first and third party risks caused by cyber-liability. The
insurance program.
1.1
i)
Vicarious Liability
The concept of vicarious liability usually applies to employer
vicarious liability.
the scope of
the legal right to control (p.669). Based on this factor, the third
party can transfer the
had
inherent
According to Kraakman
authority
(1999),
to
control
vicarious
the
employee.
liability
is
(p.670).
Any
act that causes any harm to the third party made by the
employees during work hours will lead the employer to
become liable
employer.
incentive
and
doing
Cyber-Liability
All educational institutions have a variety of exposure
channels that
organizations
and
data
to
some
factors
that
cause
cyber-liability.
Social
sites
such
as
share personal
in student-athlete, social
media
use
are
considered
universities
as
have
their students
postings.
students
(Shannon Fort,
from
dangerous
or
criminal
behavior
2008).
1.2
i)
Vicarious Liability
There are several efects of vicarious liability. First, vicarious
liability
their agency
relationships,
as
providing
them
independent
as
with
excessive
contractors.
that
The
can
afect
controlling
or
deemed
vicarious
their expected
employee agents.
Some
organizations
may
even
ii)
Cyber-Liability
There are many efects of cyber-liability used by any trader
who runs
their
business.
Cyber
criminals
could
exploit
this
unsupported
software
and
operating
system
up-to-date.
subsequent
business
impact
of
cyber
attacks
or
incidents
countries
could
disrupt
importance
of
governments
of
research
and
liabilities
(Allianz
Group
greater
Economic
Research, 2014).
1.3
i)
Vicarious Liability
There are numerous steps to minimize vicarious liability risks.
The first
2013).
them.
goods, which
when
contemplating
hiring
any
new
employee,
meticulously
verified.
If
the
checks on potential
those
in
illegal behavior
of money.
these random
checks beforehand.
control
inappropriate behavior,
prongs,
which
aware
that
distinguish
any
out
between
complaints
will be reported to
consequences.
spell
practically
clearly
According
parties
to
infringing
and
be
non-
right to
infringement
is
evident.
Legal
control,
Cyber-Liability
Honig Conte Porrino (2015) has summarised the following
steps to
helping in
This protects
found, make
improvements.
1.4
Conclusion
In conclusion, in the perspective of employer and employee
relationship about the vicarious liability, the employer is more
concerned about the problems rather than their employees.
This is
employees are
Thus,
employers
kinds
of
should
problems.
sneak
away
We can never run away from any threat in this world. The
cyber
to us to avoid
Internet. Protecting it
is
never-ending
process.
Villains
will
with
hesitancy
and
or
March
small
single
protect
2.0
Guidelines
University
on
Managing
Cyber-Liability
Among
Students
invention
in
the
history
of
mankind,
liability
coverage.
Today,
over
60%
of
cyber-liability.
Everyone
has
students in universities.
risks:
random
b)
Stop plagiarism
Students should be conscious or fully aware that
plagiarism is a
for
your
exam
nowadays,
but
questions
getting
or
those
has
students;
violent
videos,
inapproriate literatures,
erotic
etc.
that
pictures,
fake
and
contain
vulgar
control
themselves
or
References:
1. Allianz Global Corporate & Specialty (2014). A Guide to Cyber
Risk: Managing the Impact of Increasing Interconnectivity.
[Online]
Available
from:
https://www.allianz.com/v_1441789023000/media/press/documen
t/Allianz_Global_Corporate_Specialty_Cyber_Guide_final.pdf
[Accessed 22 October 2015].
2. AON Risk Services (2008). Cyber Liability & Higher Education Aon
Professional Risk Solutions White Paper. [Online] Available from:
http://www.aon.com/about-aon/intellectualcapital/attachments/riskservices/cyber_liability_higher_education.pdf
[Accessed
22
October 2015].
3. Arlen, J., & MacLeod, W., B. (2005). Beyond Master-Servant: A
Critique of Vicarious Liability. USC Law and Economics Research
Paper
No.
04-28,
14-24.
[Online]
Available
from:
http://weblaw.usc.edu/centers/class/class-workshops/usc-legalstudies-working-papers/documents/04_28_paper.pdf
[Accessed
21 October 2015].
4. Bertra, J. (2003). Employer Liability for the Wrongful Acts of its
Employees, McCarthy Tetrault, 1-5. [Online] Available from:
www.mccarthy.ca/pubs/Wrongful_Acts.pdf [Accessed 20 October
2015].
5. Brock, C., & Blackwell. Vicarious Liability in the Non-Profit Sector.
[Online]
Available
from:
www.casselbrock.com/files/docs/parks_vicariousliability.pdf
[Accessed 20 October 2015].
6. Fasken Martineau Institute
(2013).
Vicarious
Liability
for
from:
http://www.fasken.com/files/Event/64e79902-
Available
from:
http://www.filetransferglossary.com/cyber-liability/
[Accessed 21
October 2015].
8. Honig Conte Porrino Insurance Agency Inc. (2015). 5 Ways to
Reduce
Cyber
Liability
Exposure.
[Online]
Available
from:
http://honigconte.com/ways-to-reduce-cyber-liability-exposure/
[Accessed 23 October 2015].
9. James, F., Jr. (1954). Vicarious Liability. Faculty Scholarship Series.
[Online]
Available
from:
http://digitalcommons.law.yale.edu
669-673.
[Online]
Available
from:
11.
Leavitt Group News & Publications (2015). The Case for Cyber
Liability
Insurance.
[Online]
Available
from:
from:
http://legal-
dictionary.thefreedictionary.com/Vicarious+Liability [Accessed 23
October 2015].
15. Wan, K., S. (2010). Monopolistic Gatekeepers Vicarious
Liability for Copyright Infringement. Regent University Law
Review,
Vol.
23
(65),
75-77.
[Online]
Available
from:
https://www.regent.edu/acad/schlaw/student_life/studentorgs/law
review/docs/issues/v23n1/02Wanvol.23.1.pdf
October 2015].
[Accessed
19