967 resultados para Corporate criminal liability
Resumo:
Waitrose has a strong commitment to organic farming but also uses products from 'conventional' farms. At the production stage, Waitrose own-label products are fully traceable, GM-free and all suppliers undergo a detailed assessment programme based on current best practice. Crop suppliers to Waitrose operate an authenticity programme to certify that each assignment is GM-free and produce is screened for pesticide residues. Waitrose sources conventional crops grown from 'Integrated Crop Management Systems' (ICMS) using best horticultural practices. The 'Assured Product' scheme regulates all UK produce to ICMS standards and these audits are being extended worldwide. Business is withdrawn from suppliers who fail the audit. In relation to this, Waitrose has increased its Fairtrade range as in its view 'Buying these products provides direct additional benefit to workers in the developing countries where they are produced and assists marginal producers by giving them access to markets they would not otherwise have'. Currently, Waitrose is developing its own sustainable timber assessment criteria. For livestock, protocols are in place to ensure that animals are reared under the 'most natural conditions possible' and free range produce is offered where animals have access to open space although some produce is not from free-range animals. Waitrose also use a 'Hazards Analysis Critical Points' system to identify food safety hazards that occur at any stage from production to point of sale and to ensure that full measures are in place to control them. In addition, mechanisms have been implemented to reduce fuel use and hence reduce CO2 emissions in the transport of products and staff, and to increase the energy use efficiency of refrigeration systems which account for approximately 60% of Waitrose energy use.
Resumo:
In this study, we examine how organisations in Fiji communicate or legitimise their profit. We base the need for understanding this phenomenon on the following premise. Organisations are part of a wider society, and in competition for scarce resources. Organisations obtain the rights to consume resources upon conception, but must continually legitimise their rights of existence and the need to access the resources. Legitimacy is the ability to continue to justify one’s authority to exist in a society. Organisations rights to resources are contractual, and have a moral obligation to act in a responsible manner and justify their outcomes, actions, and activities to external stakeholders. Such justifications would be an attempt at legitimizing their existence by some form of impression management. Impression management refers to the process by which individuals attempt to influence the impression of others (Melo et al. 2009). In corporate reporting, impression management occurs when management selects, display, and presents that information in a manner that distorts readers’ perceptions of corporate achievements (Neu 1991; Patten 2002), and is managed best through disclosures (O’Donovan 2002). In developing economies, there is significant Government protection that creates near-monopoly sectors and industries. The rendered protection permits organisations to provide essential services to the community at reasonable costs. Organisations in these sectors and industries have an ominous need to legitimise their position and actions. The bond between the organisations and the society is much stronger, making organisations devote more effort in communicating their activities. Protection permits organisations to make reasonable profits to sustain their operations. Society may not accept abnormal profits from operational efficiencies. Profit is fundamental to the society’s perception of an organisation, amplifying the need for the firm to justify a level of profit. Abnormal profit for organisations construes bad news, and organisations would make relevant disclosures to manage stakeholder impressions on profit (Patten 2002). Organisations can manage impressions by disclosing information in a particular way. That is, organisations would want to put the impression that the abnormal profit is justified and the society will obtain its benefits in future. Such form of impression management requires unambiguous disclosure of information. The readability of corporate disclosures is an important indicator of organisational abnormal profit-related legitimacy efforts in developing economies.
Resumo:
This study examines the occurrence of misappropriation-type fraud within Australian listed firms and the relation between the incidence of this type of fraud and a firm's governance strength. We measure governance strength using factors relating to traditional corporate governance, such as board composition, CEO duality, and audit committee composition, as well as factors relating to information technology governance. In our study, we use actual dollar amount of fraud reported by listed companies responding to the 2004 KPMG Fraud Survey as one of three different misappropriation measures and publicly available firm-specific data to measure the other variables in the model. Our study found that where the chief executive officer (CEO) also holds the position of chairperson of the board of directors, the likelihood of fraud increases. We also find that the greater the number of independent directors on the audit committee, the lower the level of fraud. Taken together, these results are particularly encouraging as they provide support for regulatory bodies such as the Australian Stock Exchange (ASX) and the Australian Securities and Investment Commission (ASIC), which place considerable emphasis on the importance of establishing good corporate governance practices. The study provides empirical evidence that employing good corporate governance reduces the risk of the misappropriation of assets.
Resumo:
This article addresses in depth the question of whether section 420A of the Corporations Act 2001 (Cth) imposes ‘strict liability’ upon a controller for the failure of an agent or expert to take reasonable care. The weight of existing authority appears to suggest that controllers are liable under s 420A for the carelessness of their agents or expert advisers. However, a closer analysis of the text of the provision and relevant Australian and UK case law demonstrates that this aspect of the statutory construction of s 420A remains very much an open question. This article ultimately contends for a construction of s 420A which requires a controller to adequately supervise and scrutinise, but which does not render a blameless controller strictly liable for all careless acts and omissions of agents and expert advisers.
Resumo:
Over the last two and a half decades, corruption in the police service in Australia has come under increased official and public scrutiny. Numerous scandals involving police officers has caused concerned about the integrity and ethics within the Police Service. This paper examines the Wood Royal Commission, specifically looking at testimony from Trevor Haken. This paper provides insights into the nature of police corruption as well as the process or ‘slippery slope’ corrupt officers go through. This paper also contributed to the existing literature by providing knowledge into the types of corruption used by police officers in real-life situations, and deepening understanding of how corruption emerges and why. It specifically confirms the literature on slippery slope arguments about police corruption and the role of trust in building a corrupt career. The paper contributes to the existing literature by providing insights into the nature of corruption used by police officers in real-life situations, and deepens the understanding of the process of corruption. The findings also contribute to our understanding that corruption is not just an individual incident but rather a result of reoccurring incidents that are generated by the nature of work, organizational structure and society in relation to corruption.
Resumo:
Information security has been recognized as a core requirement for corporate governance that is expected to facilitate not only the management of risks, but also as a corporate enabler that supports and contributes to the sustainability of organizational operations. In implementing information security, the enterprise information security policy is the set of principles and strategies that guide the course of action for the security activities and may be represented as a brief statement that defines program goals and sets information security and risk requirements. The enterprise information security policy (alternatively referred to as security policy in this paper) that represents the meta-policy of information security is an element of corporate ICT governance and is derived from the strategic requirements for risk management and corporate governance. Consistent alignment between the security policy and the other corporate business policies and strategies has to be maintained if information security is to be implemented according to evolving business objectives. This alignment may be facilitated by managing security policy alongside other corporate business policies within the strategic management cycle. There are however limitations in current approaches for developing and managing the security policy to facilitate consistent strategic alignment. This paper proposes a conceptual framework for security policy management by presenting propositions to positively affect security policy alignment with business policies and prescribing a security policy management approach that expounds on the propositions.
Resumo:
There is a tax amendment bill which will be debated. The Government has promised to outline its plan for the reform of the taxation system sometime this year. The plans appear to go beyond the mere introduction of some sort of goods and services tax to reform of the whole taxation system including fiscal relations with the States. Not for profit organisations will find their taxation environment will change. Governments are reluctant to permit exemptions to a GST style arrangements. GST trade offs such as reduced income tax rates and abolishing indirect taxes are useless to nonprofit organisations, as many are already exempt from such imposts. Administrative changes to tax collections may also have an impact. If the government decides to make an individual PAYE taxpayer return optional in exchange for no or standard deductions, this may have an effect on fundraising. The FBT and salary packaging schemes that not for profit organisations use will be under intense scrutiny. A regionalisation of the ATO along the successful model of the ASC would see discrete areas such as not for profit exemptions being centralised in one regional office for the whole of Australia. For example the Tasmanian ASC Office has the responsibility for much work in respect of corporate charities and not for profit companies.
Resumo:
This paper is a selected review of research on issues surrounding the investigation of intra-familial child sexual abuse for children aged eight and above, in the criminal justice system. Particular attention is paid to features of the investigative interview in relation to the child's level of understanding, ability to report and likely emotional response when the proceedings take place. Best practice by police and social care agencies involves establishing valid and reliable information from children while attending to their developmental level and emotional state. The review aims to distil principles optimising this process from both the investigative judicial perspective and the child's focus, as well as from the inter-agency perspective and information sharing. Recommendations are made for improving the interview process based on research and methods from a range of disciplines and to optimise information recording in a format easily shared between agencies. Updated and ongoing training procedures are key to successful practice with training shared across police and social work agencies. The focus of this review is informed by preliminary findings from pilot research in progress on behalf of the Metropolitan Police Child Abuse Investigation Command.
Resumo:
This paper presents a number of characteristics of the Internet that makes it attractive to online groomers. Relevant Internet characteristics include disconnected personal communication, mediating technology, universality, network externalities, distribution channel, time moderator, low‐cost standard, electronic double, electronic double manipulation, information asymmetry, infinite virtual capacity, independence in time and space, cyberspace, and dynamic social network. Potential sex offenders join virtual communities, where they meet other persons who have the same interest. A virtual community provides an online meeting place where people with similar interests can communicate and find useful information. Communication between members may be via email, bulletin boards, online chat, web‐based conferencing or other computer‐based media.