Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Assignment : The Value of Fair Treatment in the Workplace

The year is 2025 and the U.S. Supreme Court has declared all laws prohibiting discrimination in the workplace to be unconstitutional.

In its opinion, however, the Supreme Court made clear that employers could voluntarily adopt policies and procedures prohibiting any and all forms of discrimination in the workplace.

The Supreme Court also made clear that employers could voluntarily adopt hiring practices to diversify their workforces provided such practices did not include express preferences based upon immutable characteristics.

You have been hired as a consultant by a large, nationwide retailer to examine the business case for ensuring that all of the employee protections are found within the federal anti-discrimination laws, as well as the business case for prohibiting any other forms of discrimination in the workplace.

Write a four to six (4-6) page report in which you:

Analyze the benefits and costs of voluntarily prohibiting three to five (3-5) federal forms of discrimination prohibited under the federal anti-discrimination laws.

Discuss the benefits and costs of voluntarily prohibiting a form of discrimination not covered by any of the federal anti-discrimination laws.

State the benefits and costs of voluntarily adopting hiring and promotion practices designed to diversify the workforce.

Evaluate the ethical considerations of not voluntarily prohibiting the forms of discrimination laws examined in the first part of your report.

Next, determine the ethical considerations of not voluntarily adopting hiring and promotion practices to diversify the workforce.

Provide a final recommendation to this retailer on whether or not they should ensure all, part, or none of the employee protections examined in the first part of your report.

Your recommendation should also include whether or not the retailer should adopt hiring and promotion practices designed to diversify the workplace.

Be sure to include a rationale for your recommendation along with an explanation for any rejections of contrary positions or other pertinent considerations.

Use at least three (3) quality academic resources in this assignment. Note: Wikipedia and other Websites do not quality as academic resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.

Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Analyze and apply the concepts of ethical decision making, corporate governance and corporate social responsibility.

Analyze and evaluate the employment-at-will doctrine and the statutory protections afforded employees.

Analyze and evaluate issues in modern contract law.

Use technology and information resources to research issues in law, ethics, and corporate governance.

Write clearly and concisely about law, ethics, and corporate governance using proper writing mechanics.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92549430

Have any Question?


Related Questions in Computer Network & Security

What comparison of means test was used to answer the

What comparison of means test was used to answer the question I need it now is there a relationship between parents highest level of education and socioeconomic status\need the entire script

The software company niksoft is selling a new defense

The software company NikSoft is selling a new defense against DDoS attacks. Their software looks at the source IP address on all incoming packets, and if it finds any IP address that accounts for more than 1% of traffic ...

Advanced wireless networks assignment -wlan design project

Advanced Wireless Networks Assignment - WLAN Design Project - Description: You need to form a group of at most four students, and select one of the case studies provided in Assessment module on VU Collaborate. In this pr ...

Question suppose you work in a network security company and

Question: Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have ...

Research assignmentproduce a formal 2000 word report in the

Research Assignment Produce a formal 2000 word report, in the format described in the supplied "Reports format and style" document, examining the various "Transition from IPv4 to IPv6". You are to research and compare th ...

1 these assignments need to be properly supported with

1. These assignments need to be properly supported with references to the scientific literature. 2. Use a 12pt font for the body of your assignment. 3. The assignment many be up to four (4) pages long, including any appe ...

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: a. What is the network mask used by the router? (in dotted de ...

Backgroundyou have obtained a contract position at a small

Background: You have obtained a contract position at a small marketing and advertising firm called the Colour Ability Corporation (CAC). Your contract responsibilities are to help them plan their emerging networking and ...

Buffer overflowthe common vulnerabilities and exposures cve

Buffer overflow The "Common Vulnerabilities and Exposures" (CVE) is a list of cybersecurity vulnerabilities that have been discovered, and they are collected in a database for everyone to see and improve or patch their s ...

Objectivespart 1 researching network attacks- research

Objectives Part 1: Researching Network Attacks - Research network attacks that have occurred. - Select a network attack and develop a report for presentation to the class. Part 2: Researching Network Security Audit Tools ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As