answersLogoWhite

0


Best Answer

enumerate the different legal risks anible safegaurds against each riskd complications that may occur in managerial communication.what are the poss

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are the safe guard against each legal risk?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Communications

Legal risk of business communication?

It depends on what country (or jurisdiction) your in....


Enumerate the legal risks and complications that may occur in business communication?

enumarate tha legal risk and compilcation that may occur in manageraial communication?


When a security standard conflicts with a business objective how the situation should be resolved by?

When a security standard conflicts with a business objective, there are a few questions that need to be answered before making a decision: 1) Is the standard a law? If it is, then the business objective needs to be changed to comply. For example: companies that have as an objective to spam the maximum number of people will find that they are in conflict with the law - they cannot legally achieve their objective. You could decide to just accept the risk of getting busted for failing to comply with the law, but that is extremely unethical. 2) What are the consequences of failing to apply the security standard? What vulnerabilities will the information systems have if the security standards are not adhered to? Get an unbiased analysis. In addition to the consequences of breaking the law already mentioned, some other risks might include: liability issues, loss of business, loss of reputation, lawsuits for invasion of privacy, lawsuits for failure to protect personal information, loss of sensitive data, disclosure of sensitive information to unauthorized entities including competitors or opponents, loss of ability to enforce corporate policies for computer use - depending on the security standard not implemented a company may find they have no legal recourse against someone who misuses their computer resources, co-opting of computer resources by outsiders - company computers might become part of a bot-net, etc. 3) What are the sources of threats to the computer systems? 4) Once a risks and threats have been identified, quantify their impact if the risk comes to pass, or the vulnerability is exploited. 5) Quantify the likelihood of each risk becoming reality. 6) For each risk, combine the impact and likelihood to produce an overall risk. 7) Identify options for risk avoidance (fixing the problem), mitigating it (lessening the impact if it happens), or risk transference (such as insurance) . 8) Determine the cost of each option for dealing with the risk and compare it to the cost of accepting each risk - weighted by the level of risk. 9) Modify the business objectives to adopt the best risk management strategy to address the identified risks. Generally if an independent, unbiased risk assessment is made, the costs of risk acceptance compared to avoiding, mitigating, or transferring the risks will dictate some changes to the conflicting business objective. Sometimes the conflict can motivate a business to examine technologies and methods they had not previously considered in order to resolve the conflict. Sometimes the conflict between security and the business objective drives innovators and inventors to resolve the conflict by developing new technologies that can satisfy BOTH the security standard AND the business objective.


What is the risk of network computing?

the risk of network computing is titing baluktot>>>>>>>>>>


Is risk management really about accountability wingmanship and communication?

what level of risk management is most often used in the workplace

Related questions

Is there a risk any data will be lost during the convert what can you do to guard against this risk?

e=mc2


Is it legale to get mods on Call of Duty blackops?

Legal: Yes. However you risk getting banned, as Treyarch has gone crazy with the banhammer. So its legal, but against game rules. Worst thing that can happen is youll be suspended.


Who is not at risk for legal penalties related to the use of illegal drugs?

People who do not use drugs are not at risk for legal penalties related to the use of illegal drugs.


Who bears the risk if the subject is insured against that particular risk?

The insurer


Who bears the risk if the subject is insured against particular risk?

The insurer


What is non-financial risk?

the non financialrisks are of many types susch as 1) risk to your life 2) legal risk 3) reputation risk


What are FOUR areas of law that Business Managers must adhere to?

Legal governance,Legal risk management,Legal compliance, and Legal Consistency.


Why is Tokyo at risk of an earthquake?

Earthquakes usually occur when two tectonic plates push against each other. All the high-risk areas are along fault lines, or boundaries between two plates.


When assessing for danger you need to ask yourself the following questions?

What are the potential risks (what could happen)? What are the causes of each risk? How likely is each risk to occur? What steps can be taken to minimise each risk? What can be done if each risk occurs? Are the risk factors likely to change (in either cause, likelyhood or effect). When will each risk need re-assessing?


What is the risk of back to back letter of credit?

Discrepencies are the main risk when presenting the documents specially ; the insurance and the commercial invoice , operational risk and legal risk


What do you know about insurable risk?

uninsurable risk means insuring against something that may happened unexpectedly. uninsurable risk means insuring against something that may happened unexpectedly.


What was life like in the Iraqi National Guard?

it's bad because the Iraqi national guard risk their life, they could be killed at any time.