When should whistle blowing be attempted? 1. There must be a clear and great harm that can be avoided 2. The whistleblower must be in a clear position to report on the problem 3. The whistleblower must have a reasonable chance of success in stopping the harmful activity 4. The whistleblower feels that all other lines of action within the context of the organization have been explored and shut off Select the correct answer using the codes given below:

When should whistle blowing be attempted? 1. There must be a clear and great harm that can be avoided 2. The whistleblower must be in a clear position to report on the problem 3. The whistleblower must have a reasonable chance of success in stopping the harmful activity 4. The whistleblower feels that all other lines of action within the context of the organization have been explored and shut off Select the correct answer using the codes given below: Correct Answer 1, 2, 3 and 4

Whistle blowing is the act by an employee of informing the public or higher management of unethical or illegal behaviour by an employer or supervisor.

According to code of ethics of the professional engineering societies, engineers have the right to disclose the illegal and unethical behaviour of organisations.

When should Whistle Blowing be attempted?

  • Need: Should be clear about the problems to be conveyed.
  • Proximity: Should be in clear position to report the problem. Should have the expertise and first-hand knowledge about the problems.
  • Capability: Should have reasonable chance in success. Should be able to take care the financial security of their family.
  • Last resort: Attempted only for rare emergencies. Should try to work out formal and informal organization channels.
  • The whistle blower feels that all other lines of action within the context of the organization have been explored and shut off.

Related Questions

The conditions regarding selection from a list of suitable candidates to be called for interview after a written examination for appointment of management-level persons to a multi-national company providing accounting services and sales are mentioned below. Candidates: a) Must have a Bachelor's degree in Basic Science with 65% or more marks or BE with 55% or more marks. b) Must have passed the examination with 70% or more marks. c) Age must be between 25 to 30 years as of 1/4/18. d) Must have 3 years of experience in an Accounting Institution and must have a Diploma in Accounting with 60% or more marks. e) Must be currently getting CTC of Rs. 6 lakh or more per annum. If the candidate: 1) If he fulfills all the other conditions other than A above, he will be designated as Junior Accountant. 2) If he fulfills all the other conditions other than (d) and (e) above, he can be designated as Trainee-Accountant. If he fulfills all the above conditions including 5 years of experience, he can be designated as a Senior Accountant. He can be designated as Manager (Accounts) if he fulfills all the above criteria including educational qualifications of CA/ ICWA/ MBA (Finance). Study all the above information and answer the following question. Varun has passed the CA exam and has a bachelor's degree in basic science and a diploma in accountancy, having scored 75% or more in the written examination during his entire career and also in the written examination. His age is 27 years and with 4 years of experience in Accountancy, he has a CTC salary of 18 lakhs per annum. To which of the following positions can he be referred? Select from the given options.
In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested course of action logically follow (s) for pursuing. Statement: The India Risk Survey 2017 report ranks 'Information & Cyber Insecurity' as the biggest risk facing Indian companies. Indian organizations, both public and private, had witnessed over 27,000 incidents of security threat, from January 2017 till June 2017 alone. Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information. Small and medium businesses (SMBs), unfortunately, have been seeing rising incidences of cybercrime. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees  Courses of action: I. Mandate basic security practices and policies for all employees, such as 2-factor authentication, internet use guidelines and create and enforce rules on handling and protecting sensitive data. Conduct frequent training to sensitize employees about opening suspicious emails, encrypting their data, using strong passwords on their devices, installing security apps, and limiting activity over public Wi-Fi. Implement and enforce incident reporting to help ensure that even the smallest breach is report to management as well as the IT teams. II. Basics still matter and are some of the best defenses against viruses, malware, and other online threats. Assess the assets that are most at risk - data, servers, network - and ensure that the systems are updated with the latest security software, web browser, and operating system. Implement firewall security and run antivirus software after each update.  III. Ensure regular backup of all critical data - whether stored in-house or on the cloud. Run scheduled attack drills and stress tests to identify vulnerabilities and ensure that data restoration and business continuity are executed as planned.