Legal risks at Seneca College in Toronto

Emergence of Hip Hop Culture in Contemporary World
October 20, 2019
Philosophy Methods and Applications
October 22, 2019

Legal risks at Seneca College in Toronto

Legal risks at Seneca College in Toronto

Risk analysis can be understood as a determined process that concerns defining and analyzing the most outstanding dangers to businesses, individuals, and government agencies. The dangers are mainly posed by the natural and human-caused events Legal risks at Seneca College in Toronto. However, a risk analysis report can either be classified as quantitative or qualitative one. The two report analyses are quite similar apart from slight differences typical of each of them. A qualitative risk analysis eliminates the use of numerical probabilities as well as predictions of loss while quantitative methods concern definitions of several threats, speculating the extent of vulnerabilities as well as defining the countermeasures that facilitate retaliation (Smith & Hodges, 2009).

Seneca College in Toronto has been experiencing legal risks in human resource management.

Pre-employment screening

Most companies carry out pre-employment screening before employing a potential applicant. During the process, the employer examines and analyzes an applicant’s background to screen and justify the accuracy of the information provided. However, Seneca College in Toronto has been accused of failing to conduct pre-employment screening on some job applicants. For instance, the company does not look into relevant information and qualification of the job application (Smith & Hodges, 2009).

Management contract

An institution will be considered the best if it has met the pre-qualification conditions and it offers the best cost, which in this case will be the lowest cost. Under the law, an institution is a legal person and hence a separate legal entity from the owner. If there is breach of the contract, then the person to be sued is the company but not the owners. If after the execution of the contract Jerry wants to sell the company, there is no legal barrier restricting him from selling the company. The custom transportation company will not seize to exist after the departure of Jerry. The new management can be sued on behalf of the company, and they should make any corrections after the completion of the contract. In a contract setting, the person offering the contract is left with retention money, which can be used in case a fault in work done is discovered after execution of contract. In a contract, the ethical behavior is right of lien for both the contractor and the contracted. The commission has a right to stay with the retention money if the company does not do the work correctly and use it to pay another contractor who will do the part not done well (Smith & Hodges, 2009).

Contract laws emphasis the fact that agreements made between or among parties in a transaction must be honored. This has mechanisms in place to ensure that parties uphold their terms of agreement thought the transaction session. These laws protect mostly those transactions that are long term in nature. For example, an infrastructure contract between a company and the government. Such contract may span for several years, which qualifies the need for mechanisms to be put in place to guide both parties during work progress until it is completed. Violation of any of these terms by any of the trading partners means that a contract law has been broken and this necessitates a further step from the affected partner.

Contract laws give a contracting partner the constitutional right to know if the other partner is credit worthy. This factor plays a role in preventing future payment disputes in case of defaults from any of the parties. This law ensures that there are mechanism and measures, which are in place to enable debt recovery in circumstances of payment defaults. This may apply to scenarios where payments are made through cheques that bounce. Contract law empowers the courts to collect debts if such scenarios of payment default arise. Seneca College might face legal risks in contract management since its contracts lacks the above information (Smith & Hodges, 2009).

Admissions

Seneca College needs to handle the issue of student admission because it enrolls students from local area and discriminate other places. The College should read this a risk because it might affect its performance and face opposition from different people.
Privacy and confidentiality

Seneca College will use the personal information we collect from you and its controlled subsidiaries and affiliates to enable the features you use and provide the services or carry out the transactions you have requested or authorized. The information may also be used to analyze and improve the operation of the college.

Except as described in this statement, personal information you provide will not be transferred to third parties without your consent. We occasionally hire other companies to provide limited services on our behalf, such as performing statistical analysis. We will only provide those companies the personal information they need to deliver the service, and they are prohibited from using that information for any other purpose.

Seneca College may access or disclose information about a student including the content of your communications in order to

  • comply with the law or respond to lawful requests or legal process
  • protect the rights or property of Seneca college staff including the enforcement of our agreements or policies governing your use of the software
  • Act on a good faith belief that such access or disclosure is necessary to protect the personal safety of Seneca college employees.

Information collected by or sent to Seneca college database may be stored and processed for security purposes. Seneca College is committed to helping protect the security of your information. We use a variety of security technologies and procedures to help protect your information from unauthorized access, use, or disclosure (Smith & Hodges, 2009).  . For example, we store the information you provide on computer systems with limited access, which are located in controlled facilities. When we transmit highly confidential information (such as a credit card number or password) over the Internet, we protect it with encryption, such as the Secure Socket Layer (SSL) protocol of the college database.

Work Cited

Smith, P., & Hodges, A. (2009). Principles of employment law. Boston, MA: West.

Physician Practice Business Plan for your Medical Group

Physician Practice Business Plan for your Medical Group