Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Hiring and selection practices
Employee rights and employer responsibilities
Employee rights and employer responsibilities
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Hiring and selection practices
Outside Employment (Moonlighting) and Activities Employees may not hold outside jobs or be involved in outside business, educational, community, political, and charitable activities that may impact CyberTech’s business interests, consume company resources or create conflicts of interest, or affect employee’s performance. An employee’s position at CyberTech is considered to be of primary importance over any outside employment. Furthermore, employees are expected to devote their full attention and energy to CyberTech while on the job. CyberTech HR’s approval should be sought if any doubt exists regarding the appropriateness of an employee’s involvement in outside activities. 4.6 Performance Reviews Reviews provide an opportunity …show more content…
A resignation is defined as a termination of employment at the will of the employee. All employees are requested to provide a minimum of two weeks advance notice of their intention to leave the company (more if specified in any engagement performance agreement). Paid time off may generally not be included in the notice period. In certain circumstances, employees who fail to give proper notice may be ineligible for re-employment. They may also be liable for damages as stated in their employment agreements.
CyberTech reserves the right to accept the resignation date as offered or may, depending on the situation, end the relationship immediately. Resignations later withdrawn will be considered on a case-by-case basis by management.
Offenses Warranting Immediate Termination There are a number of types of employee misconduct or malfeasance, which may result in an employee’s immediate termination. Examples of such misconduct include, but are not limited to, the following: 1. Absence without notification for one or more consecutive days. 2. Suspected theft, fraud or embezzlement. 3. Physical assault or threatening physical assault on employees or others on CyberTech’s property 4. Fighting on CyberTech’s
As technology improves, businesses expand and recruitment pools decrease, organizations contemplate ways to, not only reduce the overhead costs of doing business but, to attract new talent in a competitive employment marketplace (Darleen, 2012). To do so, many organizations have redefined what it means to ‘go to work’, in terms of not only the act of getting there, but how work is accomplished and where (Lojeski & Yuva, 2008). A study conducted three years ago by the Society For Human Resource Management (SHRM) reported that almost half of the organizations surveyed utilized virtual teams (Minton-Eversole, 2012). Anyone who conducts business using mobile technology devices is considered
Workers are also not being used to their full potential as the majority of the IT budget is going towards them to maintain the current system that they have in place. Carr determines that these problems can be fixed with relative ease by combining three different technologies, Web services, virtualization, and grid computing. The combination will allow for less technology to be wasted and processing power to be used to its full capacity. He tells the reader, this is what the individual will have to do to advance the information technology environment to its fullest potential and continues by listing examples of some of the possible corporations and sources from where this individual could come from, including big computing hardware contributors, information technology hosting operations, an internet extraordinaire and new start up innovators. He concludes the article by pointing out that as dubious as this may be, many other innovations similar to this started the same way and people should not fear to take action on this opportunity, as it will better humanity. I believe that the article provides some good points as it shows us that the
Examples include rumination of an employee due to drug use and layoffs during times of downturn (Noe, Hollenbeck, Gerhart, & Wright, 2014, p. 305). Voluntary turnover is turnover initiated by the employee, often when the organization would prefer to keep them (Noe, Hollenbeck, Gerhart, & Wright, 2014, p. 305). Examples of these are employee retirement, or when an employee takes a job at a different organization. Both turnovers are costly to the organizations, training new hires takes time and money and replacing those works is expensive. Employees that left because of extreme job dissatisfaction can deliver bad publicity and shine an unfavorable light towards the organization in which the employee
The law specifies the facts that can prompt employers to terminate employees from work, hence they are not allowed to terminate them at will (Fisher & Putman, 2016).
To further shore up his "IT as commodity" theory, Carr cites the fact that major technology vendors, such as Microsoft and IBM, are positioning themselves as "IT utilities," companies that control the provision of business applications over "the grid." Couple this IT-as-utility trend with the rapidly decreasing cost of processing power, data storage and transmission, and even the most "cutting-edge IT capabilities quickly become available to all."
There are certain guidelines and standards that each employee should be aware of, and expected to follow. This is what is normally used to measure a person’s job performance. When not living up to these qualifications, an employee may a gentle reminder of his failure to comply. If held accountable for unacceptable behaviors, it will often turn this performance around. If not, after a certain amount of warnings, it becomes obvious that this person does not take his job very seriously, and therefore may be dismissed.
The specific IT assets and technologies that are highlighted are internet applications, such as online transactions, human relations systems, wire systems and websites. Other resources are Blackberries, Android smart phones, I-Phones, cellular networks, short messages service (SMS), PC’s (include their operating systems), connected USB storage devices and any third-party software (Deloitte & Touche LLP, 2010).Most importantly, in this case, will be banking devices such as ATMs, kiosks, RFID enabled smartcards that allow secure financial access (Deloitte & Touche LLP, 2010). Finally included, are intranet portals, collaboration tools, authentication systems, voice over IP phones and private branch exchanges (PBX)’s, voicemail, identity management, log-on, password and user code technologies (Deloitte & Touche LLP,
During the past decade, the internet has revolutionized and changed the way organizations do business by offering rapid communication systems and enhanced information access and innovation of technological advancements have created a brave new workplace. Further, the internet enables organizations to decrease expenses, reduce product life cycle time, market goods and services more efficiently (Anandarajan et al, 2000). However, with these kinds of benefits, the internet provides employees with a technique
All workers and staff that access the company’s IT resources will be subject to this policy and any applicable provisions of the company.
The key issues of problems surrounding the application of ICT are: privacy, ownership, the responsibility, professionalism, social implications and values. It is beyond doubt that there are benefits of new technologies such as industry development, going to the moon, e- learning systems and improved diagnosis in various fields. Technology is advancing inevitable and with new advancement it creates a vacuum in the new legislation which is not always easy to deal with. The British Computer Society (BCS) and other professional computer organisations such as the Association of Computing Machinery (ACM) recognise the need for today’s graduates to be aware of the issues surrounding the use of computers in all aspects of society. The BCS is committed to raising the awareness of future computing professionals and requires that the social, legal...
Well, here we are discussing Quitting in the context of a Job. Most of the definitions given in the Dictionary are applicable here. There is one exception though. The word is used with a Capital letter throughout this book.
First of all, for the working peoples, the appearances of computer technology bring up a convenient
But in the use of the term “technology” today, there is far more associated meaning than automobiles or washing machines. It has ushered in an entirely new way of working, and in increasing numbers of organizations, increased options of just where work associated with a particular job will be done. More employees than ever have the option of working at home yet still being employed either full...
Organizations and individuals have to strategically position themselves in order to take advantage of the growing technology and achieve business competitive advantage while at it (DeHaven 2010 pg 1). Technology has enabled globalization; where ideas, products and services have been shared. This has promoted foreign businesses thus helping different economies all across the globe. Different organizations and individuals have realized that technology will keep growing and changing and the best strategy will be to adapt it other than holding to rigid ways of doin...
To remain competitive and employable in the twenty-first century workplace, society today must conform to the changing demands. Technology is one of the principal driving forces of the future; it is transforming our lives and shaping our future at rates unprecedented in history, with profound implications, which we cannot even begin to see or understand.