Compliance Essays (Examples)

Studyspark

Study Document Study Document

Employment Law

Pages: 5 (1530 words) Sources: 3 Document Type:Case Study Document #:30263684

...Compliance II. Client’s Case
D. Application of the Law to the Facts
Was Jennifer in breach of the confidentiality agreement that she signed committing never to disclose confidential/proprietary information she encounters in the course of her employ at Greene’s’s?
Case in Brief: In Hallmark Cards, Inc. v. Janet L. Murley (2013), the defendant (Murley) parted ways with the plaintiff (Hallmark Cards) and was paid a total of $735,000 as the severance package. As Hallmark’s marketing vice-president, Murley had come across and was indeed in possession of some confidential information regarding the operations of the company. The said information was inclusive of, but was not limited to, market research and business plans. Upon the payment of the severance highlighted above, Murley amongst other things agreed to dispose-off any confidential documents and ensure that the company’s confidential information was not disclosed to any third party. Years later, the defendant got hired by a……

References

References

Frey, M.A. (2015). Essentials of Contract Law (2nd ed.). Mason, OH: Cengage Learning.

Gross, J.A. & Compa, L.A. (2009). Human Rights in Labor and Employment Relations International and Domestic Perspectives. Champaign, IL: Labor and Employment Relations Association.

Peacock, W. (2013). Breach of Contract, Confidential Info Leak Case: Hallmark Prevails. Retrieved from  https://blogs.findlaw.com/eighth_circuit/2013/01/hallmark-prevails-in-breach-of-contract-confidential-info-leak-case.html 

Studyspark

Study Document Study Document

White Collar Criminal

Pages: 5 (1593 words) Sources: 3 Document Type:Essay Document #:32631423

...Compliance Lifestyle Red Flags of Fraud Perpetrators
Introduction
As the Association of Certified Fraud Examiners (2010) points out, the average fraud perpetrator has—like David L. Miller—no prior fraud convictions. The offender is typically in the 30 to 45 years age range and is more likely to be male than female. Both of these characteristic profile traits fit Miller to a “t”. Moreover, four out of five fraud perpetrators are likely to work in the accounting department of an organization, again just like David L. Miller. And as the perpetrator ages so too does the level of fraud increase in terms of losses (Association of Certified Fraud Examiners, 2010)—again just like with the case of David L. Miller. This paper will analyze the case of David L. Miller and show why he fits the profile of a fraud perpetrator well and why companies tend not to press charges against people like him.……

References

References

Association of Certified Fraud Examiners. (2010). Who is Most Likely to Commit Fraud at Your Company? Retrieved from  https://www.acfe.com/press-release.aspx?id=1677 

Friedrichs, D. (2009). Trusted Criminals: White Collar Crime In Contemporary Society. Cengage Learning.

US Attorney’s Office. (2019). Attorney Convicted of Embezzling Over $1.5 Million from Virginia Senator, Canadian Business, and Autism Organization. Retrieved from https://www.justice.gov/usao-edva/pr/attorney-convicted-embezzling-over-15-million-virginia-senator-canadian-business-and-0

Studyspark

Study Document Study Document

Child Protection

Pages: 6 (1880 words) Sources: 7 Document Type:Case Study Document #:91826674

… might be a candidate for child neglect. There is a lot of evidence pointing at neglect, including the fact that there was no compliance with provisions of healthcare, failure to seek medical help, deprivation of food, and the child's apparent inability to thrive physically. Other points of ……

References

References

Australian Law Reform Commission (ALRC). (2010). Family violence: A national legal response. Canberra: ALRC.

Child Family Community Australia (CFCA). (2016). Australian legal definitions: When is a child in need of protection? (CFCA Resource Sheet). Melbourne: Australian Institute of Family Studies.

New South Wales Government. (1998). Children and Young Persons (Care and Protection) Act 1998.

NSW Government, (2018a). Child wellbeing and child protection fact sheet for NSW Health workers. Retrieved from https://www.health.nsw.gov.au/parvan/childprotect/Pages/child-wellbeing.aspx

NSW Government, (2018b). About child protection and wellbeing. Retrieved from https://www.health.nsw.gov.au/parvan/childprotect/Pages/default.aspx

WHO (2002). \\\\\\\\\\\\"Chapter 3: Child abuse and neglect by parents and other caregivers.\\\\\\\\\\\\" World report on violence and health. Retrieved from https://www.who.int/violence_injury_prevention/violence/global_campaign/en/chap3.pdf

World Health Organization. (2006). Preventing child maltreatment: a guide to taking action and generating evidence. Geneva, WHO.

Studyspark

Study Document Study Document

Gestalt Theory

Pages: 9 (2559 words) Sources: 3 Document Type:Research Paper Document #:29092375

...Compliance Abstract
Gestalt is a German word signifying a pattern or shape. The roots of Gestalt therapy can be traced to Max Wertheimer, who studied human perceptual illusions. Wertheimer’s research led to a holistic view of the human psyche that provided a necessary counterpoint to the fragmented, reductionist, and structuralist views that prevailed in research psychology. Gestalt therapy emerged after blending the principles of Gestalt with the goals of psychotherapy. In particular, Gestalt therapists like Frederick “Fritz” Perls used the concept of a Gestalt to emphasize the importance of holism in psychotherapy. Humanism also became a cornerstone of Gestalt therapy, which promotes an “I/Thou” therapeutic relationship based on points of contact between individuals who are connected in an integrated social network. Group therapy and art therapy are also methods used in Gestalt psychology.
Although the phrase may seem out of vogue, Gestalt psychology underwrites a lot of contemporary psychotherapies and therapeutic……

References

References

Corey, G. (2016). Theory and Practice of Counseling and Psychotherapy. Boston, MA: Cengage Learning.

Levine, T. B. Y. (2012). Gestalt Therapy: Advances in Theory and Practice. New York, NY: Taylor & Francis.

Woldt, A. L., & Toman, S. M. (2005). Gestalt Therapy: History, Theory, and Practice. Thousand Oaks, CA: SAGE Publications.

Studyspark

Study Document Study Document

Depiction Of Women In The Arabian Nights Novels

Pages: 5 (1561 words) Sources: 5 Document Type:Essay Document #:89991926

… the Arab World.
In the Arabian Nights tales, women are generally treated as lesser beings by men. If they do not act in compliance with men's wishes, they are either discarded, transformed into something else, or killed. For instance, in the tale about King Shahzaman and his ……

References

Works cited

Blythe, Andrea. Beyond Shahrazad: Feminist Portrayals of Women in the One Thousand and One Nights. Zoetic Press, 2019.

Haddawy, Husain, and Muhsin Mahdi, eds. Arabian Nights. English.; Alf Laylah Wa-laylah. WW Norton & Company, 1995.

Nicholas, Caleb, \\\\\\\\\\\\"Living Subversive Narratives: Shahrazad\\\\\\\\\\\\'s Stories of Women.\\\\\\\\\\\\" Honors Projects, Bowling Green State University, (2016). 269.

Shamma, Tarek. \\\\\\\\\\\\"Women and Slaves: Gender Politics in the Arabian Nights.\\\\\\\\\\\\" Marvels & Tales 31.2 (2017): 239-260.

Zafar, Attiya. Arabian Nights: Seaming the Embroidery of Feminism in the \\\\\\\\\\\\"Couch.\\\\\\\\\\\\" University of Management and Technology, 2019.

Studyspark

Study Document Study Document

Enhancing Communication Migration From 4G To 5G

Pages: 6 (1692 words) Document Type:Essay Document #:96575438

...Compliance Enhancing Communication, migration from 4G to 5G
Aims and objectives
1. To determine how the migration from 4G to 5G will enhance Communication
The primary aim of the dissertation is to determine how the migration from 4G to 5G will enhance Communication. Migration to 5G is expected to bring various enhancements as compared to the 4G. These enhancements include low latencies, high speeds, low power consumption, enhanced reliability, and greater terminal device densities. Also, and perhaps the most important features of 5G is the new network capabilities that could allow several virtual networks with differential performance capabilities to be supported by a single physical network (Alkhazaali 2017). Given these capabilities, this paper aims to determine how Communication will be enhanced.
2. To identify some of the challenges of 5G
Experience has shown that technology, however, how advanced, has some peculiar limitations that make it vulnerable. As a result, this dissertation……

References

References

Alkhazaali, N.H., 2017. Mobile Communication through 5G Technology (Challenges and Requirements). International Journal of Communications, Network and System Sciences, 10(05), p.202.

Gandotra, P., and Jha, R.K., 2016. Device-to-device communication in cellular networks: A survey. Journal of Network and Computer Applications, 71, pp.99-117.

Penttinen, Jyrki T. J., et al. 2019. "Deployment," in 5G Explained: Security and Deployment of Advanced Mobile Communications, Wiley, pp.271-291

Shen, Xuemin. "Device-to-device communication in 5G cellular networks." IEEE Network 29, no. 2 (2015): 2-3.

Tehrani, M.N., Uysal, M., and Yanikomeroglu, H., 2014. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), pp.86-92.

Zhang, A., and Lin, X., 2017. Security-aware and privacy-preserving D2D communications in 5G. IEEE Network, 31(4), pp.70-77.

Studyspark

Study Document Study Document

US Customs And Border Protection And Defense Intelligence Agency

Pages: 4 (1149 words) Sources: 6 Document Type:question answer Document #:85676019

...Compliance Private Security and Homeland Defense
Questions 2 and 3
Question 2:
The Intelligence Community is comprised of 17 agencies. These agencies work with Federal, State, Local, Tribal and Territorial partners to protect the homeland. Four of these agencies are intelligence elements of the Department of Defense Services – Army, Navy, Marine Corps and Air Force. Please pick ONE of these Department of Defense Services intelligence elements and explain its mission. In what ways does it contribute to the intelligence cycle? Provide examples.
The Department of Defense Services intelligence element that I selected in this particular case is the Defense Intelligence Agency (DIA). The stated mission of DIA is “provide intelligence on foreign militaries to prevent and decisively win wars” (DIA, 2020). Thus, it is important to note, from the onset, that this particular agency largely concerns itself with not only the gathering, but also the production of military intelligence. As……

References

References

Customs and Border Protection – CBP (2020). About CBP. Retrieved from  https://www.cbp.gov/about 

Department of Homeland Security – DHD (2016). Section 559 Pilot Program Donations Acceptance. Retrieved from  https://www.dhs.gov/sites/default/files/publications/Customs%20and%20Border%20Protection%20-%20Section%20559%20Pilot%20Program%20Donations%20Acceptance%20-%20FY%202016.pdf 

Defense Intelligence Agency – DIA (2020). Strategy. Retrieved from  https://www.dia.mil/About/Strategy/ 

Keating, T.J. (2011). Joint and National Intelligence Support to Military Operations. Washington, DC: DIANE Publishing.

Office of the Director of National Intelligence (2020). Defense Intelligence Agency. Retrieved from  https://www.intelligence.gov/index.php/how-the-ic-works/our-organizations/412-dia 

U.S. Government Accountability Office – GAO (2020). U.S. Ports of Entry: Update on CBP Public-Private Partnership Programs. Retrieved from  https://www.gao.gov/assets/710/704191.pdf 

Studyspark

Study Document Study Document

Case Conceptualization Group Therapy CBT And Psychodynamics

Pages: 10 (2982 words) Sources: 11 Document Type:Essay Document #:27547144

...Compliance Abstract
This case conceptualization covers a weekly outpatient relationships group consisting of fifteen members, ages 25-50. All group members have been formally diagnosed with Generalized Anxiety Disorder and/or Depression, and some with more than one clinical disorder. Additionally, all members have attended this group for at least six months, most of whom attend regularly on a weekly basis. The case conceptualization includes background information on the clients, behavioral observations, clinical interpretations, and diagnostic impressions based on the DSM-5. A treatment plan and interventions for the clients are grounded in two primary theoretical orientations including cognitive behavioral therapy (CBT) and psychodynamics. A summary of the treatment, including client reactions, plus future recommendations are also provided. Ethical issues and quandaries are presented in accordance with the American Counseling Association (ACA) Code of Ethics. Finally, limitations and supervision needs are discussed in light of scope of counseling practice.
Background: Presenting Problem
Clients’ Biopsychosocial……

References

References

American Counseling Association (2014). ACA Code of Ethics. Retrieved from:  https://www.counseling.org/resources/aca-code-of-ethics.pdf 

American Group Psychotherapy Association (2007). Practice guidelines for group psychotherapy. Retrieved from: https://www.agpa.org/docs/default-source/practice-resources/download-full-guidelines-(pdf-format)-group-works!-evidence-on-the-effectiveness-of-group-therapy.pdf?sfvrsn=ce6385a9_2

“Clinical Thinking Skills,” (n.d.). Retrieved from:  https://in.sagepub.com/sites/default/files/upm-binaries/44297_3.pdf 

Glasofer, D.R. (2019). Generalized anxiety disorder. Retrieved from:  https://www.verywellmind.com/dsm-5-criteria-for-generalized-anxiety-disorder-1393147 

MacNamara, A., Kotov, R. & Hajcak, G. (2016). Diagnosis and symptom-based predictors of emotional processing in generalized anxiety disorder and Major Depressive Disorder: An Event-Related Potential Study. Cognitive Therapy and Research 40(2016): 275-289.

Plummer, F., Manea, L., Trepel, D., et al. (2016). Screening for anxiety disorders with the GAD-7 and GAD-2: a systematic review and diagnostic metaanalysis. General Hospital Psychiatry 39(2016): 24-31.

Suszek, H., Holas, P., Wyrzykowski, T., et al. (2015). Short-term intensive psychodynamic group therapy versus cognitive-behavioral group therapy in day treatment of anxiety disorders and comorbid depressive or personality disorders: study protocol for a randomized controlled trial. Trials 16(2015):  https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4517633/ 

Thimm, J.C. & Antonsen, L. (2014). Effectiveness of cognitive behavioral group therapy for depression in routine practice. BMC Psychiatry 14(292):  https://bmcpsychiatry.biomedcentral.com/articles/10.1186/s12888-014-0292-x

Studyspark

Study Document Study Document

Veteran Benefits Administration

Pages: 8 (2465 words) Sources: 3 Document Type:Implementation Paper Document #:56829115

...Compliance Technology Proposal/Implementation Paper
A: Introduction
The Department of Veterans Affairs (VA) remains a vital entity in as far as the provision of key services to veterans in the country is concerned. The Veteran Benefits Administration (VBA), to a large extent, concerns itself with the administration of U.S. Department of Veteran Affairs’ programs. This is more so the case with regard to the provision or advancement of various forms of support to not only veterans and survivors, but also their dependents. Towards this end, some of the main programs that VBA administers include, but they are not limited to; pension and compensation, rehabilitation and employment, loan guaranty, and insurance. In the year 2016, the National Archives and Records Administration (2016) released a records management inspection report which was categorical that “the VA Records Management Program lacks several basic records management fundamentals.” The relevance of VA records cannot be overstated when it……

References

References

Aziz, A.A., Mohammad Y., Mokhtar, U.A. & Ambari, D.I. (2017). Establishing Policy for the Implementation of Electronic Document and Records Management System in Public Sector in Malaysia: The Influencing Factors. Advanced Science Letters, 23(11), 10732-10736.

National Archives and Records Administration (2016). Department of Veterans Affairs Records Management Program: Records Management Inspection Report. Retrieved from  https://www.archives.gov/files/records-mgmt/pdf/va-2016-inspection.pdf 

U.S. Department of Veteran Affairs (2020). About VBA. Retrieved from  https://www.benefits.va.gov/BENEFITS/about.a sp

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".