Describe the steps the administrator of an information technology system or computer network in a business environment might take to protect against the crimes discussed in Chapter Ten?

Week Three Activities
Directions: All references and citations should be from the book The Legal Environment of Business by Cross & Miller, which I gifted to you. It is the 11th edition. Please separate each activity and each activity should be around 275 words. Chapter covered are 10, 11, 12, &13.

Activity 3.1: Contract Principles
1. For the first paragraph, describe the fundamental aspects of a legally binding contract.
• Under what circumstances should the law enforce a promise that the promisor does not wish to keep?
• Under what circumstances should promisors be excused?
• Give an example from your personal experience of an oppressive, one-sided contract, to which you or someone you knew, was bound. What happened?
For the second paragraph discuss:
o Should the law be changed to hold sellers legally accountable for the often exaggerated opinions and promises that they make to customers?
o Why/not?
o Would such a change in the law create even greater problems?
o If so, what?
o Defend your answer using concepts from the reading.
For the third paragraph, select and discuss Case Analysis 12.2 pg. 245 or 12.3. pg. 253
• Describe the situation; articulating the facts.
• What are the main legal issues the court dealt with?
• What contract principals won out and why?

Activity 3.2: Technology Issues and Cybercrime
1. For the first paragraph:
• Describe two aspects of how the legal environment is becoming more complex for leaders and managers as both the Internet and other globalization trends permeate organizational cultures.
• What key things should a leader and manager remember in order to stay on top of this changing milieu?
For the second paragraph:
o Describe the steps the administrator of an information technology system or computer network in a business environment might take to protect against the crimes discussed in Chapter Ten?
o How do those become more complex in the context of jurisdiction discussed earlier?
o Who has jurisdiction in what situations?

For the third paragraph, consider Bus. Scenario 10-2 Cyber Scam (p. 209).
o Is this crime?
o If so which one(s)
o Why?

Describe the steps the administrator of an information technology system or computer network in a business environment might take to protect against the crimes discussed in Chapter Ten?
Scroll to top