Professional Documents
Culture Documents
Chapter 1 - The Corporation and Its Stakeholders
Chapter 1 - The Corporation and Its Stakeholders
Market stakeholders
Ma
Arguments for CSR
Balances corporate power with responsibility
Discourages government regulation
Promotes long term profits for businesses
Improves stakeholder relationships
Enhances business reputation
Arguments against CSR
Lowers economic efficiency and profit
Imposes hidden costs passed on to stakeholders
Imposes hidden costs passed on to stakeholders
Requires skills business may lack
Places responsibility on business rather than individuals
Social entrepreneurs are individuals who act to pursue opportunities
attract support and build new organizations to create sustainable social
value.
B Corp- Benefit corporation, blend social objective with financial goals. the
social and financial goals are assessed by an independent nonprofit
organization b labs. More than 500 orgs registered as B corp.
Greening of Management
Environmental regulations establish minimum standards for
environmental performance
Many firms are now voluntarily moving beyond compliance to
improve environmental performance in all operational areas
This is referred to as the greening of management
Three reasons companies take this path Gain competitive
advantage
Gain legitimacy
Moral commitment to ecological responsibility
Stages of Corporate Environmental Responsibility (down to Line manager involvement Codes of environmental conduct Cross-
top arrow) Clean technology - Businesses develop innovative, new functional teams Rewards and incentives Environmental audits to track progress
technologies that support sustainability Product stewardship - Environmental Audits A way for green companies to track their progress
Managers focus on envrnmntl impacts associated with full life-cycle of a toward meeting environmental goals More recently, many firms have moved to
product Pollution prevention - Focuses on minimizing or eliminating integrate their social and environmental reporting into a single sustainability report
waste before it is created Environmental Management as a Competitive Advantage Cost savings -
Ecologically Sustainable Organization Companies that Companies that reduce pollution and hazardous waste, reuse or recycle materials, and
operate consistently with principles of sustainable development operate with greater energy efficiency can reap significant cost savings Product
Is an “ideal,” absolute standard against which real organizations can differentiation - Companies that develop a reputation for environmental excellence and
be measured Some visnary companies are trying to achieve this that produce and deliver products and services with concern for their sustainability can
Supportive government policies and widespread movement among attract environmentally aware customers Technological innovation - Technological
many businesses and other social institutions will be needed for ESOs to innovation can lead to imaginative new methods for reducing pollution and incrsing
succeed efficiency Reduction of regulatory risk - Companies that are proactive with respect
Environmental Partnerships Voluntary, collaborative to their environmental impacts are often better positioned than their competitors to
partnerships with environmental organizations and regulators to achieve respond to new government mandates Strategic planning Companies that
specific objectives Draw on the unique strengths of the different cultivate a vision of sustainability must adopt sophisticated strategic planning
partners to improve environmental quality or conserve resources techniques
Environmental Management in Practice Organizational Chapter 11 –
elements of many proactive green companies Top management
involvement in sustainability
Chapter 12 – Managing technology and innovation All the user has to do is click the links or view the message to activate the pharming
Threats from Technology – Spam and Unsolicited Commercial E- attack on their computer Threats from Technology – Internet Censorship Many
mail Spam refers to unsolicited commercial e-mails (UCE or junk e- people believe that information on the Internet should be universally accessible. Some
mails) sent in bulk to valid e-mail accounts Has become big business people believe that restrictions should be placed on some categories of information
and big headache for business Organizations and individuals have Some countries have imposed censorship on broad categories of online information
adopted use of spam blockers, but sometimes difficult to sort out bad The Chinese government operates one of the most sophisticated systems of Internet
emails Government has attempted to monitor, control and prosecute censorship in the world It requires all China-based Web sites and blogs to register with
spammers using Internet for illegal activity U.K. and Italy also has the government and blocks access to many kinds of information, including material
anti-spam legislation Threats from Technology – Phishing critical of the government Socially Beneficial Uses of Technology Technology
Practice of duping computer users into revealing their passwords or and Education Enables students in poor and remote communities to access the
other private data under false pretenses The Anti-Phishing Working world’s best libraries, instructors, and curses available through the Internet
Group, a U.S. industry association, reported in 2008 an 827 percent Technology has brought education online – By 2007,more than 3.9 million post-
increase in password stealing, from 3,362 cases in January 2008 to secondary students were taking at leas one online course Medical Information via
31,173 cases in December 2008 In 2009, about 1 in 300 e-mails the Internet By 2009, the Internet had become the primary source for health
contained some form of a phishing attack, an increase of more than 30 information for 70 percent of Americans Another emerging issue focused on digital
percent from the previous year Threats from Technology – Pharming medical records, or how a patient’s medical records should be stored and linked to other
Domain name system (PNS) poisoning, is a hacking technique that health care providers
redirects a user’s computer from a legitimate Web site to another site by Special Issue: The Digital Divide Gap between those that have technology and
altering the user’s computer or router Pharming attacks were first those that do not Recently, some evidence has suggested that the digital divide in
reported in the 1990s, e-mail and wireless computing provided hackers the United States is becoming smaller Progress in narrowing the digital divide in
and criminals opportunities developing countries has been slower, but still evident Programs have been
developed to narrow the global digital divide • University of Michigan and Google •
One Laptop per Child (OLPC)
Chapter 13 – Managing technology and innovation Government and Industry Efforts to Combat Piracy Companies have sought
Protecting Privacy The potential for breaches of privacy are assistance on the issue of software piracy from governmental agencies and the courts
everywhere Employees have access to new technologies at work and both inside and outside the United States In 1998, the United States passed the
companies may be monitoring usage, raising employee concerns about Digital Millennium Copyright Act, making it a crime to circumvent antipiracy
invasions of privacy Businesses have adopted privacy policies to measures built into most commercial software agreements between the manufacturer
explain what use of the company’s technology is permissible and how it and the user In China, where experts estimate that 90 percent of all software in the
will monitor employee activities More aggressive efforts by cyber use is unlicensed, government officials have also take steps to curb
criminals resulted in a steep rise of attacks on information security piracyAnother approach businesses have tried to protect music copyrights
Recent technological advancements have increased the number of involves streaming GDPR PRIVACY: The Right to Respect for Private Life
ways that privacy violations may occur Managing the Protection of (Need to Prevent Undue Interference in Private Life) Article 7: Everyone Has
Privacy Platform for Privacy Preference Project (P3P) provides the Right to Respect for His or Her Private and Family Life, Home and
users with software that enables them to define what information they are CommunicationsPrivacy is a Fundamental Human Right PERSONAL
willing to divulge on the Internet Since 2008, representatives from DATA: “All Information” That Relates to an “Identified or Identifiable Natural
the United States and 27 European countries have gathered annually for Person”. Very broad to include both objective and subjective data;
Data Privacy Day The event, which brings together privacy demographics, work hours, test scores, political opinions, social media posts,
professionals, government leaders, academics and students, and business user behind an IP address, etc.PROTECTION OF PRIVATE DATA:
executives, was designed to raise awareness and generate discussion Everyone Has the Right to Protection of Personal Data Concerning Him or Her
about data privacy practices and rights Managing the Protection of APPLICABILITY All Member States of EU and all companies doing
Privacy The Children’s Online Privacy Protection Act of 1998 business in the EU or collects, processes, or stores data about EU
(COPPA) requires commercial Web sites to collect a verifiable form of citizens.Violations: Fine up to 20 million Euros or 4% of global revenue of
consent from the parent or guardian of any user below the age of 13 the firm whichever is higher – high risk versus low risk Applies to natural
It will be difficult to achieve international government control of person and not legal entities such as corporations, etc. DATA PROTECTION VS
privacy, especially as it pertains to the Internet The management of PRIVACY RIGHTS Data Protection Broader than Privacy Protection
privacy may need too come from the Internet companies themselves Data Protection Includes other Fundamental Rights and Freedoms
Technology Advances Pros – greater efficiency and productivity, Includes all Kinds of Data Regardless of Relationship to Privacy Data
greater availability of information, faster dissemination of information, Protection limited in Scope: Refers to Processing of Information and may
better life styles, improved working environ. Cons – Misuse of Disregard Other Aspects of Privacy and Freedom CONSENT Collection:
information, ability to amplify and spread misinformation, costs of Obtained and Processed Fairly and Legally Specific Purpose: User control
protecting information and reputation, speed at which technology and transparency Freely Given Consent: No deception, intimidation,
becomes obsolete coercion, or negative consequences Informed : Understand what they are
Management of Information Security Businesses now acutely consenting to in ordinary language Unambiguous: Affirmative action of the
aware of maintaining information security Information security and individual required.Explicit Consent Required for Special Categories of Data
various computer-related crimes cost U.S. businesses an (race, ethnic origin, political opinions, religious or philosophical beliefs,
estimated $67 billion annually, according to an FBI study How union membership, genetic data, biometric data, health data, sexual
to best manage information security remains a major challenge for orientations or sex life) Data Controller Accountable to Demonstrate
businesses The corporate nemesis responsible for creating and Consent (by whom, when, where, and how) AgeRequirement: 13 but
spreading computer zombies, viruses, and worms is called a computer member countries can increase to 16 Unbundled, Active Opt-in, Granular
hacker Although businesses are spending millions of dollars to (separate), Easy to Withdraw and No Imbalance of Power NOTICE OF
protect the information they sore from hackers and other criminals, REQUIREMENT Rights of Individuals Storage Period Transfer to
some organizations have discovered that their own Other CountriesContractual Requirements Purpose of Processing
employees can be their worst security leak Business Response Automated Decision-Making Right to Lodge ComplaintLegal
to Information Security Invasions Businesses have invested more Requirements Provide Sources of Personal Data Right to Withdraw
resources in protecting their information The Federal Trade Consent. DATA SUBJECT ACCESS REQUESTS Concise, precise,
Commission began a series of workshops offered to businesses, such as intelligible, and easily accessible form using plain and clear language
“Protecting Personal Information: Best Practices for Businesses” Requests in Writing including Electronic Means Without Undue Delay (1
The simple five key principles advocated by the FTC were these: month of receipt) Free of Charge unless Excessive or manifestly
take stock, scale down, lock it, pitch it, and plan ahead unfounded Identity Issue: May request verification Exceptions: National
Companies now using honeypots, a system used by security Defence, Criminal Issues, Public Security and Interests, Breaches of Ethics
professionals to lure hackers to a fabricated website that can track all their Investigation, Rights and Freedom of Others, Enforcement of Civil Law
movements Protecting Intellectual Property Intellectual property Claims Right to Rectification: Obligation to Inform Third Party recipients of
The ideas, concepts, and other symbolic creations of the human the request Right to Erasure (Right to be Forgotten) Data no longer
mind Protected in U.S. by copyright, patent and trademark laws necessary for the purpose Individual Withdraws Consent Successful
Theft of intellectual property, artistic performance, or copyrighted exercise of the right to object Unlawful processing of data Compliant
material exploded with the entrance of the Internet and global connectivity with EU member state law Right to Restriction of Processing (Accuracy of
Whether it is computer-based software, musical recordings, video Data, objection to processing, unlawful processing of data, and data no
movie productions, or electronic versions of books, piracy is on the rise longer necessary for the purpose)Right to Portability: Right to have
and victims are retaliating turning to governments for enforcement and personal data transmitted to another controller when technically feasible
protection of their rights, or seeking collaborative solutions to this ethical (Only data provided by the subject and not inferred data such as health score
challenge or credit score). Right to Object Processing: Data subject can object to the
processing of data (exceptions: legitimate interests of the company override the
processing of data, public interest or exercise of official authority, scientific or
historical research for developing statistical models). Automated Decision
Making: Right to object when negative action has taken place and requires
human intervention.
Chapter 14 – Stockholder Rights and corporate governance Executive Compensation: Is it Justified? Arguments of proponents of high
Stockholders Stockholders (also called shareholders) The legal executive pay Well-paid managers are simply being rewarded for outstanding
owners of business corporations Types of stockholders performance High salaries provide an incentive for innovation and risk-taking
Individual stockholders are people who directly own shares of stock Not many individuals are capable of running today’s large, complex organizations
issued by companies Institutions, such as pension funds, mutual funds, Arguments of critics of high executive pay Inflated executive pay hurts the ability of
insurance companies, and university endowments • Called institutional U.S. firms to compete with foreign rivals Multimillion dollar salaries cause resentment,
investors Objectives of Stock Ownership To produce a return greater sap the commitment of hardworking lower and midlevel employees As many
than they could receive from alternative investments extravagantly compensated executives preside over failure as they do over success
Stockholders make money when the price of the stock rises (capital Executive Compensation Reform Has been the subject of shareholder pressure
appreciation) and when they receive their share of the company’s earnings Some companies have changed the way they set executive pay; have compensation
(called dividends) Bull markets (in which share prices rise overall) committees of entirely outside directors and tie pay more directly to company performance
alternate with bear market (in which share prices fall overall) Although Small number of companies set multiple of executive pay versus others workers
stock prices can be volatile, stocks historically have produced a higher return Government regulations Under U.S. rules, corporations must disclose top 5
over the long run than many other types of investments Some investors executives’ compensation and the rationale for it Allows shareholders to vote on
use stock ownership to achieve social or ethical objectives Discussed executive and director compensation United Kingdom requires such a vote
further under “social investment Major legal rights of the shareholders Shareholder Activism – Rise of Institutional Investors Many owners both
– To receive dividends if declared, To vote on – members of board of individual and institutional take actions to protect their own interests called activism As
directors, major mergers and acquisitions, charter and bylaw changes, shown earlier, holdings have increased significantly; have become more assertive in
Proposals by stakeholders, to receive annual reports on the company’s promoting interests of their members Have large blocks of stock so not easy to sell if
financial condition, to bring shareholder suits against the company and become dissatisfied, therefore strong incentive to work to change management policy
officers, to sell their own shares of stocks to others Corporate Council of Institutional Investors Represents institutions and pension funds with
Governance Corporate governance - Refers to the process by which investments collectively exceeding $3 trillion in holdings Developed a Shareholder Bill of
a company is controlled, or governed Board of directors - An Rights Research shows involvement of institutional investors can improve company
elected group of individuals who have a legal duty to establish performance Shareholder Activism – Social Investment Social investment
corporate objectives, develop broad policies, and select top-level Refers to the use of stock ownership as a strategy for promoting social objectives;
personnel to carry out these objectives and policies also called social responsibility investment Social screening of stock Some
Boards of Directors Vary in size, composition, and structure to best stock purchasers choose stocks based on social or environmental criteria, called social
serve the interests of the corporation and shareholders Survey of screens In 2007, $2.7 trillion invested in socially responsibility funds; approximately 1
governance practices in leading firms in the Americas, Europe, and Asia in 9 investment dollars Rapid growth in similar funds in Europe and beyond
Pacific: Average board size was 10 members Shareholder Activism –
Typically, 8 of the 10 are outside directors (not managers of the Social Responsibility Shareholder Resolutions Social responsibility
company) Work of the Board is done through committees: shareholder resolutions A resolution on an issue of corporate social responsibility
Typical committees: Compensation, Executive, Nominating, Audit placed before stockholders for a vote at the company’s annual meeting Has
Audit has key role to review financial reports, recommend outside been a significant rise in social responsibility shareholder resolutions in recent years – about
auditors, and oversee integrity of internal financial controls 650 were sponsored in 2007 Sponsorship is often from a coalition of groups, like
Boards of Directors Board members are elected by shareholders at the Interfaith Center on Corporate Responsibility Resolutions can be about social issues, not
annual meeting, where absent owners vote by proxy company’s ordinary business Only garner about 15% of votes, yet their influence is
Process is not truly democratic, but tends to be self- perpetuating stronger as company managers respond ahead of annual meetings so they will be withdrawn
The board nominating committee, working with the CEO and chairman, Shareholder Activism – Shareholder Lawsuits If owners think they or their
develops a list of candidates. Once approved by the Board, the names of these company have been damaged by actions of company officers or director, they have right to
individuals are placed on the proxy ballot. Because alternative candidates are bring lawsuits Can be initiated to check abuses, for example insider trading, inadequate
often not presented, the vote has little significance. Key Features of stock buyout price, or lush executive pensions Some corporations have claimed were target
Effective Boards or principals of good governance 1. Select outside of frivolous shareholder lawsuits As result Congress passed legislation making it more
directors to fill most positions 2. difficult for investors to sue corporations for fraud Securities and Exchange
Hold open elections for members of the board 3. Appoint an independent lead Commission (SEC) Government agency charged with protection of stockholder
director and hold regular meetings without the CEO present 4. Align director interests Established in 1934 in the wake of the Great Depression Mission is to
compensation with corporate performance protect stockholders’ rights by making sure that the stock markets are run fairly and that
5. Evaluate the Board’s performance on a regular basis investment information if fully disclosed Unlike more government agencies, generates
Executive Compensation Executive compensation is a key Board revenue to pay for its own operations SEC – Information Transparency and
function An important mechanism for aligning the interests of the Disclosure Giving stockholders more and better company information is one of best
corporation and its stockholders with those of its top managers ways to safeguard investor interests. In recent years, management has tended to disclose
Many critics feel that this system is not working and executive pay has more information than ever before to stockholders and other interested people. Although
become excessive Executive compensation in the U.S., by international the overall trend has been to greater transparency, some observers felt that a lack of
standards, is very high In 2008, the U.S. chief executives of the largest disclosure about complex financial instruments that became common in the mid-2000s, led
corporations earned, on average, $8.4 million (composed of salaries, bonuses, investors to underestimate their risk.
benefits and stock options)
• Stock options is controversial subject on its own
Chapter 15 – Consumer protection Dilemma: how to protect consumer privacy while fostering internet commerce
Consumerism/consumer movement – the organized activates, Proposed solutions: 1. Consumer self-help - Internet users should use technologies that
collective efforts by consumers in many countries to safeguard their own enable them to protect their own privacy 2. Industry self-regulation -Internet-related
rights Reasons for Consumer Movement businesses advocate being allowed to regulate themselves 3. Privacy legislation - Favour new
Complex products have enormously complicated the choices consumers government regulations protecting consumer privacy online Product Liability The
need to make Services, as well as products, have become more legal responsibility of a firm for injuries caused by something it made or sold In U.S. and
specialized and difficult to judge When businesses try to sell both some other countries, consumers have right to sue and collect damages if harmed by unsafe
products and services through advertising, claims may be inflated or they may product Strict liability – doctrine under which the U.S. courts have held that
appeal to emotions Some businesses have ignored product safe manufacturers are responsible for injuries resulting from use of their products,
Consumer rights – 1. The right to be informed - Protection against whether or not they did it knowingly; consumers can also prevail even if they partly at
misleading advertising, labeling; given the facts to make an informed fault for the injuries Product liability systems of other nations differ significantly from
purchasing decision 2.The right to safety - Protection against the marketing that of the United States Product Liability Reform In 2005, Congress passed the
of good that are hazardous to health or life 3. The right to choose - Class Action Fairness Act - significant product liability reform The two key elements of this
legislation were:
Assurance of access to a variety of products and services at competitive
Most class-action lawsuits moved from state to federal courts Attorneys in some kinds
prices 4. The right to be heard Assurance that consumer interests will
of cases were paid based on how much plaintiffs actually received, Business Efforts for
receive fair consideration in government policy and courts 5.The right to CONTINUED Reform of Product Liability Laws Set up uniform federal standards
privacy - Assurance that information disclosed in a commercial transaction is for determining liability Shift the burden of proving liability to consumers Require
not shared Responsibilities of Consumers Keep yourselves informed the loser to pay the legal costs of the winner Limit punitive damages Establish
as best as possible Exercise due care when making decisions in the liability shields for certain kinds of products Positive Business Responses to
marketplace Consider the detrimental consequences that may arise from Consumerism Quality management Emphasizes defining the customer’s needs,
ill-considered decisions Honor reasonable obligations arising from your analyzing the quality of finished products Building products right the first time reduces
decisions. Goals of Consumer Laws 1. To provide consumers with better liability and improves brand loyalty Complex issue of what to do when business produces
information when making purchases 2. To protect consumers against possible safe, high quality product but that is used by others in dangerous ways Voluntaryindustry
hazards 3. To promote competitive pricing 4. To promote consumer choice 5. codes of conduct Consumer affairs departments Product recalls Voluntary
To protect privacy Consumer Protection in the Digital Age product recalls or product recalls under government pressure