preview

Re: Week 2 Assignment

Good Essays

Summarize the employment-at-will doctrine discussed in the text and then evaluate three (3) of the six (6) scenarios described by determining: a. Whether you can legally fire the employee; include an assessment of any pertinent exceptions to the employment-at-will doctrine. b. The primary actions(s) that you should take to limit liability and impact on operations; specify the ethical theory that best supports your decision. According to the text the employment-at-will doctrine is a legal rule that developed in the nineteenth century, giving employers unfettered power to “dismiss their employees at will for good cause, for no cause, or even for cause morally wrong, without being thereby guilty of a legal wrong. Its legal …show more content…

In essence he is committing an act of stealing funds from the company when they have to pay for his personal phone calls. He was given the blackberry for company business, not his personal gain. Therefore, when he started using it for his own business he began stealing. Stealing is punishable in the criminal courts if the company chooses to press charges. Therefore, being fired should be the least of his worries. The company has grounds to fire him and proof of his wrong doing with telephone records. The second scenario is “After being disciplined for criticizing a customer in an email (sent from his personal email account on a company compute), Joe threatens to sue the company for invasion of privacy. In this case the company was right in disciplining Joe, because he not only used the company’s computer to possible damage a relationship with a customer, but he tried to cover it up by using his personal email address. The whole problem with this is that he used the company computer to access his personal email, which opens his personal email up to be monitored when utilizing the company’s network/wifi. Also, with his law suit, it has been proven that when utilizing the company owned material, you are subject to surveillance. A good example is in the text with Michael A. Smyth v. The Pillsbury Company. The judge found that the company had a write to access the email because during surveillance, there was proof of wrong doing that could potentially

Get Access