You are on page 1of 4

SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY

SOFTWARE ENGINEERING DEPARTMENT


SPRING 2021

ORGANIZATION BEHAVIOR (HSE-204)


Assignment 1
Syeda Rabia Jamil
2018-SE-269
Section F (F1)

Semester: VII Batch: 2018


Due Date: 17TH-March-2021 Max Marks: 2.5

Instructions:
Question 1 [2.5
 Attempt all questions
marks]
The major task of any project manager is to ensure that a project finishes within the original budget,
with the required scope of work and within the required timescales, and to ensure that throughout this
process all the stakeholders, especially the client, are satisfied with the project results. A professional
organization usually collects different types of data from their customers which contain sensitive
information about them. (Smith and Denis) are doing a project together with number of people
involved in it. Denis is the most punctual, hardworking employee and does the entire project work on
time. Upon submitting the document to their manager Denis finds out that Smith has already
submitted the same document before him with a different name and claims that he himself has made
it. After investigation, by Denis he comes up to the point that Smith is stealing the code and uses it for
their own purposes without proper tagging the original developer.
Following must be in your own words and reflecting your learning:
A description of system from the above case study. Assume you are the Project Manager in company;
apply some Managerial roles, Mintzberg’s managerial roles and basic OB Model.

i. How should an organization protect the privacy and security of their customer Information?

Answer i:

According to this question I, as a manager will serve the following roles:


 Leader:
Guides and motivates employees to achieve organizational goals and informing them about the
customer rights and their privacy
 Liaison:
Acts as a go-between among individuals inside and outside the organization for better customer
satisfaction
 Resource allocator:
Designates the use of financial, human, and other organizational resources such as customer data
privacy policies.
 Monitor:
Includes seeking information regarding the issues that are affecting the organization. Also, this includes
internal as well as external information.

As a manager I would apply the following steps for the privacy and security of our customer Information:
 Data privacy audit must be conducted: The first step is to figure out what data your company needs,
what data it collects, and how data is processed. If you handle medical, financial, or minors' data, bear
in mind your legal responsibilities.

 Collection & retention of data must be minimized: Privacy advocates advice businesses to gather and
retain only the information necessary to offer their product or service. Businesses may also collect
additional data if they believe they will need it in the future. However, doing so increases the risk.

 Securing the data: Even if you don't collect credit card numbers, other personal information you hold
might be useful to identity thieves. Notifying consumers that their personal information has been
Page 1 of 4
compromised in a hack is humiliating, not to mention expensive and harmful. And in many cases, such
disclosure is mandated by law. As a result, make sure your network, databases, and website are safe.

 Privacy policy: The posting of a privacy policy on a commercial website is mandated by law. If your app
transmits data, most app platforms would need one as well. Cutting and pasting a boilerplate policy
isn't enough. Privacy policies are regarded by regulators as legally binding arrangements between you
and your customers.

 Communicate: Customers expect clear descriptions of company data practices at key moments, such
as when they're asked to provide data. Most consumers will happily supply personal data necessary for
a service they want. Privacy advocates recommend direct and upfront communication with customers
about data you collect and your plans for using it.

 Giving Choice: Customers want settings and features that allow them to choose whether or not to
share data, not sweet words about your respect for their privacy. They're looking for signs that
companies are "serving" them rather than "selling" them.

 Provide a way for people to voice their concerns: Offer consumers an online form or an email address
to use to communicate their privacy issues or problems. Also, don't forget to respond to their
messages. Such two-way contact will aid in the development of trust and loyalty, as well as the
avoidance of possible privacy issues.

APPLYING BASIC OB MODEL:

Input:

The customer data is taken as input into the organization

Process:

Make sure that the steps mentioned above are applied to protect and secure the customer’s data

Output:

The privacy and security of customer Information is ensured.

Conclusion:
Rather than being a one-time operation, protecting sensitive information assets in an organization is a
journey. It requires a methodical approach to identifying sensitive data, comprehending current business
processes, crafting acceptable access, use, and distribution policies, and tracking incoming and outgoing
communications. Finally, it's crucial to comprehend the possible costs and implications of failing to create a
mechanism to protect nonpublic information from the inside out.

ii. What kind of violation do you think will occur in this kind of situation?

Answer ii:
In this case Data Protection Act is violated
According to this question I, as a manager will serve the following roles:
 Disseminator:
Provides information about the violation to Smith and what actions should he take next.
 Negotiator:
I will serve the role of negotiator between the two employees
 Leader:
I will serve the role of a leader to lead and coordinate the activities of my subordinates because I am
responsible for the activities of my subordinates and I must motivate them to perform better.

APPLYING BASIC OB MODEL:

Input:

The Data Protection Act is violated by Smith because he stole the work of Denis and Copyright
Infringement is done by him.

Page 2 of 4
Process:

By serving the role of leader, negotiator and disseminator I handled this issue by communication to smith
and Denis on this issue.

Output:

Smith has done Copyright Infringement of Denis work so he will be punished for violating data protection
act.

iii. How the copyright of the intellectual property of that software developer will be ensured? Which

is the most appropriate in your opinion? Justify your answer.

Answer iii:

According to this question I, as a manager will serve the following roles:


 Disseminator:
Provides information about copyright of the intellectual property of our company
 Resource allocator:
Gives guidance about the company resources about copyright of the intellectual property.

I will tell Smith to follow the formal process of stopping them starts with contacting Denis to ask that he cease
the use of Smith’s copyright. This is done through a cease and desist letter. If Denis refuses to do so, Smith can
escalate the matter by suing Denis for infringement. This can be a lengthy process and requires a large amount
of evidence from Smith.

In following ways the copyright of the intellectual property of that software developer will be ensured:

1. Ensure your work is properly marked.


Since it specifies that the work is covered by law, a well worded notice will prevent infringement.
Although a copyright notice is not necessary (by statute, all work is protected by copyright), displaying one
demonstrates that you are mindful of copyright and take infringements of your work seriously.

2. Register your work.


If your work is infringed upon and your copyright claim is disputed (for example, in a plagiarism case where the
other party claims ownership of the work), you can need proof to back up your claim. As a result, the job must
be recorded.

3. Keep or register supporting evidence.


Supporting evidence falls into two categories:
 Evolution of ideas
This shows how far the project has progressed. Early draughts, synopses, rough recordings, drawings,
and other materials show that the work evolved over time rather than being plagiarized. While it is
possible to fabricate such evidence, doing so can be time consuming, so it can be useful evidence to
show that you produced the work from scratch over time.
 Footprints or watermarking
This is usually proof introduced into completed documents that can be used to classify the author in
any way, such as intentional errors or secret details that can be interpreted with special software.

4. Agreement between co-authors.


If you're working on a joint project, make sure you understand your roles, who owns what rights, and what
happens if anyone leaves.

Page 3 of 4
APPLYING BASIC OB MODEL:

Input:

The issue occurred within my team about Copyright Infringement of Smith which destroys the image of our
team, and organization

Process:

I as a manager took the above mentioned ways to ensure the copyright of the intellectual property of that
software developer (Denis)

Output:

Copyright of the intellectual property of that software developer is ensured

iv. Which type of fraud does Smith has to face from Denis in this regard which is the most

appropriate in your opinion. Justify your answer.

Answer iv:

According to me, Smith has to face Copyright Infringement Fraud from Denis. Copyright
infringement (colloquially referred to as piracy) is the unlawful use of works protected by copyright law without
permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to
the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to
make derivative works and Smith is stealing the code and uses it for his own purposes without proper tagging
the original developer.

According to this question I, as a manager will serve the following roles:


 Disseminator:
Provides information about the fraud type to Smith
 Negotiator:
I will serve the role of negotiator between the two employees
 Leader:
I will serve the role of a leader to lead and coordinate the activities of my subordinates because I am
responsible for the activities of my subordinates and I must motivate them to perform better.

APPLYING BASIC OB MODEL:

Input:

The Data Protection Act is violated by Smith because he stole the work of Denis and Copyright
Infringement is done by him.

Process:

By serving the role of leader, negotiator and disseminator I handled this issue by communication to smith
and Denis on this issue.

Output:

Smith has done Copyright Infringement of Denis work so he will be punished for violating data protection
act.

Page 4 of 4

You might also like