
Please Respond to the (2) peers below:
Question 1 was:
Refer to the Chapter 8 textbook reading. Who can be found guilty of business crime and what is the key to establishing criminal liability? Using the Internet,
research and post an example of a business crime committed in the last two years and all who were held criminally liable. (See the examples of types of
business crimes in the chapter reading.)
When it comes to crime and privacy protection in the workplace, do private employees have a reasonable expectation of privacy? What about public
employees? Why or why not? What is the test for the tort of invasion of privacy?
If management’s interest is to make sure its employees are productive, can management monitor computers, workstations, phones, et cetera? Why or why
not?
Peer Response:
Recently there has been a popular criminal case in particular which has garnered much attention from the media. The case has captivated the public’s
interest and has even led to the creation of a dramatic television miniseries on the streaming service Hulu. The case in which I am referring to is the criminal
fraud trial of Theranos founder Elizabeth Holmes. Elizabeth Holmes created Theranos, a health technology company, in Silicon Valley, CA when she was only
19 years old and claimed to have developed a blood testing technology that would revolutionize the medical lab industry. The proclamations made by
Elizabeth Holmes about her product enabled her to gain millions in financial backing from high-profile investors including the company Walgreens. However,
over time it was discovered and leaked by employees of Theranos that Ms. Holmes’ product did not work as she stated it would, and she eventually ended up
being indicted for her deceptive actions. In an CNBC online article on the outcome of the criminal trial, Khorram reported “the jurors convicted Holmes, 37, of
one count of conspiracy to commit wire fraud and three counts of wire fraud against specific investors. U.S. District Court Judge Edward Davila will sentence
Holmes at a later date. Each wire fraud count carries a maximum sentence of 20 years in prison and the conspiracy count carries a maximum of five years”
(Khorram,1). In the case of Elizabeth Holmes, the business crime was defrauding Theranos’ investors and she was found criminally guilty by a jury for her
wrongdoing.
Business crimes are criminal acts that are committed either within or against a corporation. In both cases, criminal liability can be extended to any and all
individuals who participated in the crime or who were aware or the illegal actions. According to Jennings “those in management positions at firms whose
employees actually commit criminal acts can be held liable if they authorize the conduct, knew about the conduct but did nothing, or failed to act reasonably
in their supervisory positions. Liability for crimes also extends to employees who participate with the company” (Jennings, 2). When prosecuting individuals
for business crimes, one must provide elemental proof that an individual was conscious of the crimes and knew about the wrong actions which occurred.
This is known as the mens rea of a crime that has taken place.
When it comes to crime and privacy protection in the workplace, private employees should have a reasonable expectation of privacy, unless it has been made
clear to them that any activity or communication they engage in on the company’s equipment can be accessed by the organization. Management can choose
to monitor the activity of their private employees while at work, as long as the employees were informed about the potential monitoring and supplied their
consent. On the other hand, public employees should not have a reasonable expectation of privacy while at work because they are typically government
employees whose workplace activities are made visible due to the Sunshine Laws and the nature of their work being public servants to the community or
country. The test for the tort of invasion of privacy is whether an individual’s private property was improperly searched without a warrant, or probable cause,
or observed in plain sight out in the public.
Question 2 was:
Explain why it is appropriate to connect the points on a line graph, but the points on a scatter plot should not be connected.
Peer Response:
Line graphs and scatterplots are similar in that they record individual data values as marks on a graph. The difference between these two formats is how the
line is created.
In line graphs, the line is created by connecting each individual data point to show local changes, in this way, the local change from point to point can be
seen.
Usually scatterplots have a single line running through them. The line of the scatterplot represents the trend of the relationship between the two variables,
rather than joining the dots together as with a line graph. Scatterplots are used to analyse patterns of the relationship between two sets of continuous da


