The Permissive Environment is the Perpetrator

Written by Felix P. Nater

Continued from page 1

In Assessingrepparttar above scenariorepparttar 131998 root cause ofrepparttar 131999 confrontation wasrepparttar 132000 unabated name calling, verbal abuse and innuendos, in a contributory and improperly supervised environment. Supervisors who fail to step in can be held civilly liable and responsible for their failure to act early or appropriately to prevent escalation or confrontations. In cases of death or serious injury between employees or customers, wrongful death law suits are often filed in addition to criminal prosecution. Not knowing is no longer a legitimate excuse. When supervisors fail to act appropriately, management hasrepparttar 132001 burden of investigating repparttar 132002 incident, dealing withrepparttar 132003 issue ofrepparttar 132004 aggressor over repparttar 132005 contributory behavior ofrepparttar 132006 instigator and decide on repparttar 132007 appropriate progressive actions (disciplinary or referral to local police) necessary.

And, so while a Zero Tolerance Policy is necessary and highly recommended, it should not be an absolute standard in administering discipline untilrepparttar 132008 "root cause" ofrepparttar 132009 contributory behavior becomes clear throughrepparttar 132010 Assessment Process. When controlling or addressingrepparttar 132011 potential fruits of unwelcome behavior or to more appropriately, prevent incidents dealing with a Workplace Security Issue, every situation should not be resolved inrepparttar 132012 same manner withrepparttar 132013 same administrative decision. Any broad-brush approach to enforcingrepparttar 132014 Zero Tolerance Policy soursrepparttar 132015 innocent bystanders and prejudicesrepparttar 132016 potential witnesses who may fear retaliation or retribution, factors which may further complicaterepparttar 132017 disciplinary process and/or criminal referral.

President of Nater Associates a security management firm specializing in workplace violence prevention. Felix retired as a postal inspector with 30 years experience.

A Hacker Inside Your Computer?

Written by Jim Edwards

Continued from page 1

Most people underestimate or are completely ignorant aboutrepparttar importance of information they send overrepparttar 131996 Internet when surfing websites and checking email. Even if you only use a simple dial-up account, you can unknowingly transmit a significant amount of sensitive information.

You can analyzerepparttar 131997 security of your web connection for free by going to . You can also verifyrepparttar 131998 presence of any known viruses or Trojan horses on your computer. The information I saw when analyzing my personal computer frankly shocked me. I saw data I didn't even know existed staring me right inrepparttar 131999 face after I performed this analysis.

To protect your computer hardware and sensitive data you should obtain a software package called a "firewall". A firewall, when combined with a good anti-virus program, helps stop unauthorized access on your computer, prevents virus infection, and "cloaks" your data ports against a hacker scanning for openings. and both offer excellent personal firewall and anti-virus software from their websites or you can buy them offrepparttar 132000 shelf at your local office supply store. A wise investment for anyone onrepparttar 132001 net... before it's too late!

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- "Finally a Simple, Video-Based Training System on CD-ROM that Teaches You Step-By-Step How to Make Real Money Online-100% Guaranteed!" You can start with a few bucks and a good idea to make lots of money online! I did, and I'll teach you how no matter what product or service you sell...

Jim Edwards writes a syndicated newspaper column in plain language for non-technical people about current Internet issues, challenges, news, HOT new tools... and much more! "The Net Reporter" ==>

    <Back to Page 1 © 2005
Terms of Use