Italy-Germany Government Bond Spreads shows the difference in yields between 10-year Italian bonds (BTPs) and German bonds (Bunds). Currently, BTP yields are higher than Bund yields, indicating that investors require a higher return to take on the risk of owning Italian debt versus German debt. The widening spread reflects increasing concerns from investors about Italy's fiscal situation and long-term economic prospects relative to Germany.
Mla dissertation brand strategy for the supermarket industry in hong kongTitleconnect
This document provides an introduction to a study on brand strategy for the supermarket industry in Hong Kong. It discusses the importance of branding and brand management. The study aims to examine how Hong Kong supermarkets develop brands and use branding to boost performance and success. It will analyze brand strategy and related concepts for the supermarket industry in Hong Kong. Both qualitative and theoretical research approaches will be used, including a case study of Park n' Shop supermarket. The literature review discusses the history and importance of branding. It explores how branding can benefit businesses, especially supermarkets in Hong Kong. The relationship between branding, brand management, and organizational performance and success will also be analyzed.
This document discusses remote access capabilities provided by Nabto that allow vendors to access devices located behind firewalls. Nabto's patented architecture allows direct peer-to-peer connections between devices and users through a simple web address. This eliminates the need for complex firewall configuration and reduces support costs. Nabto also provides lightweight web servers, security, and remote access even without internet connectivity.
The Tudor Dinasty and England's Rupture with Roman CatholicismKatyaTavares
This document provides a genealogical chart of English monarchs from Henry VII to Elizabeth I. It shows Henry VIII's wives Catherine of Aragon, Anne Boleyn, Jane Seymour, Anne of Cleves, and Catherine Parr. It also depicts events during the reigns of Henry VIII, including Catherine of Aragon's trial, Anne Boleyn entering London, the beheading of Sir Thomas More, the publication of the Great Bible and the First Book of Common Prayer under Edward VI, Protestants fleeing during Mary I's reign, and Mary I being called "Bloody Mary" for burning Bishop Ridley and Father Latimer at the stake.
This document presents a ZigBee-based home automation system that integrates a ZigBee home automation network and a Wi-Fi network through a common home gateway. The home gateway provides network interoperability, a simple user interface, and remote access. It also implements a "virtual home" to handle security and safety needs by checking communications before allowing them on the real home automation system. The system was developed to address limitations of existing home automation systems such as complex/expensive architectures, intrusive installations, lack of interoperability, inflexible interfaces, and inadequate security/safety features. It aims to provide a low-cost, flexible system that allows additional devices to be added easily and securely.
This document provides an overview of antenna measurement applications using Agilent PNA Series network analyzers. It discusses near-field and far-field antenna measurements, radar cross-section measurements, and banded millimeter-wave antenna configurations that can be performed. It also covers considerations for transmit and receive site configurations, measurement speed and optimization, interface requirements, and functional testing. Finally, it describes migrating from older 8510/8530 systems to the new PNA Series analyzers.
Italy-Germany Government Bond Spreads shows the difference in yields between 10-year Italian bonds (BTPs) and German bonds (Bunds). Currently, BTP yields are higher than Bund yields, indicating that investors require a higher return to take on the risk of owning Italian debt versus German debt. The widening spread reflects increasing concerns from investors about Italy's fiscal situation and long-term economic prospects relative to Germany.
Mla dissertation brand strategy for the supermarket industry in hong kongTitleconnect
This document provides an introduction to a study on brand strategy for the supermarket industry in Hong Kong. It discusses the importance of branding and brand management. The study aims to examine how Hong Kong supermarkets develop brands and use branding to boost performance and success. It will analyze brand strategy and related concepts for the supermarket industry in Hong Kong. Both qualitative and theoretical research approaches will be used, including a case study of Park n' Shop supermarket. The literature review discusses the history and importance of branding. It explores how branding can benefit businesses, especially supermarkets in Hong Kong. The relationship between branding, brand management, and organizational performance and success will also be analyzed.
This document discusses remote access capabilities provided by Nabto that allow vendors to access devices located behind firewalls. Nabto's patented architecture allows direct peer-to-peer connections between devices and users through a simple web address. This eliminates the need for complex firewall configuration and reduces support costs. Nabto also provides lightweight web servers, security, and remote access even without internet connectivity.
The Tudor Dinasty and England's Rupture with Roman CatholicismKatyaTavares
This document provides a genealogical chart of English monarchs from Henry VII to Elizabeth I. It shows Henry VIII's wives Catherine of Aragon, Anne Boleyn, Jane Seymour, Anne of Cleves, and Catherine Parr. It also depicts events during the reigns of Henry VIII, including Catherine of Aragon's trial, Anne Boleyn entering London, the beheading of Sir Thomas More, the publication of the Great Bible and the First Book of Common Prayer under Edward VI, Protestants fleeing during Mary I's reign, and Mary I being called "Bloody Mary" for burning Bishop Ridley and Father Latimer at the stake.
This document presents a ZigBee-based home automation system that integrates a ZigBee home automation network and a Wi-Fi network through a common home gateway. The home gateway provides network interoperability, a simple user interface, and remote access. It also implements a "virtual home" to handle security and safety needs by checking communications before allowing them on the real home automation system. The system was developed to address limitations of existing home automation systems such as complex/expensive architectures, intrusive installations, lack of interoperability, inflexible interfaces, and inadequate security/safety features. It aims to provide a low-cost, flexible system that allows additional devices to be added easily and securely.
This document provides an overview of antenna measurement applications using Agilent PNA Series network analyzers. It discusses near-field and far-field antenna measurements, radar cross-section measurements, and banded millimeter-wave antenna configurations that can be performed. It also covers considerations for transmit and receive site configurations, measurement speed and optimization, interface requirements, and functional testing. Finally, it describes migrating from older 8510/8530 systems to the new PNA Series analyzers.
El documento resume el análisis técnico-táctico de un partido entre Diablos Rojos y La Puebla. Diablos Rojos jugó con un sistema 1-5-3-2 defensivo a pesar de jugar en casa e ir perdiendo. Sus puntos débiles son la defensa de corners y falta de concentración de algunos jugadores. Para ganarles, se recomienda aprovechar los espacios que dejan al bascular y realizar transiciones rápidas antes de que se cierren.
The document describes a satellite communication system that uses Wavelet Filtered Multi-tone (WFMT) modulation to provide advantages over traditional QPSK modulation. WFMT modulation has a lower peak-to-average ratio, allows for a programmable spectrum, and can compensate for distortions from the satellite transponder and multipath propagation in urban environments. It provides similar energy efficiency to QPSK and multipath immunity comparable to OFDM. Simulation results show the WFMT spectrum meets requirements and has a higher tolerance for delay than existing systems.
M.Sc Dissertation: Simple Digital LibrariesLighton Phiri
My M.Sc. dissertation... it took me a total of 2 years and 61 days to finish--I LOVE TO COUNT! There are a few publications [1] based on this work---there is even a book chapter on the way.
You will notice from the structure of the manuscript that I used Information Mapping [2] principles. The content on the other hand is structured chronologically---based on the sequence of activities I undertook during my research.
I typeset the entire manuscript using LaTeX [3] and I am VERY proud of myself for doing that :p You would have to see the TeX source files [4] to see all corresponding packages I used. Block diagrams were rendered using PSTricks [5] and plots using R ggplot2 [6] package.
[1] http://scholar.google.co.za/citations?user=UIb4aEsAAAAJ&hl=en
[2] http://en.wikipedia.org/wiki/Information_mapping
[3] http://en.wikipedia.org/wiki/LaTeX
[4] https://github.com/lightonphiri/open-msc-thesis
[5] http://en.wikipedia.org/wiki/PSTricks
[6] http://en.wikipedia.org/wiki/Ggplot2
SCADA and HMI Security in InduSoft Web StudioAVEVA
The document discusses cybersecurity considerations for SCADA and HMI systems using InduSoft Web Studio. It begins with an agenda that includes enhancing cybersecurity on InduSoft projects and firewalls and other SCADA security considerations. The document then discusses guidelines for improving security on InduSoft projects such as implementing risk management processes, using strong passwords, encrypting sensitive data, and configuring appropriate network, database, file, and project security. It emphasizes the importance of cybersecurity awareness, training and certifications to enhance security.
This document is a study guide created by David J. Bolling for Management 318: Production and Operations Management at Southern Illinois University Carbondale. The study guide was developed based on lecture notes from Dr. White and is intended to supplement required course materials and help students prepare for exams. It includes chapters summarizing key concepts from each class, examples, practice problems, and samples from past exams. The author acknowledges relying heavily on Dr. White's teaching and hopes the study guide will benefit other students in the class.
1) The document discusses how Yammer was introduced and adopted by Grundfos, a global pump manufacturer, over a 3 week period to connect 1500 users.
2) Some key lessons learned from Grundfos' experience included starting with a clear purpose for using Yammer, communicating the purpose and how to use it clearly, and showing the value and examples of how people were using it successfully.
3) Community managers and champions played a vital role in encouraging participation according to the 90:9:1 principle where most people view rather than contribute content. The speaker emphasizes being available to help users and address any concerns about using Yammer.
Dissertation on environmental pollution and global warming 27 08-2013Patricia Rodrigues
This document provides an introduction to environmental pollution and global warming. It defines key terms like environment, environmental pollutant, and environmental pollution. It then discusses the genesis of environmental problems, noting that both developing and developed countries contribute to pollution in different ways. In India specifically, issues like river pollution, deforestation, industrial waste, and noise pollution are discussed. The document also examines the relationship between religious and cultural practices in India and environmental pollution. It argues that traditions like celebrating festivals by bursting firecrackers, disposing of waste in rivers, and using loudspeakers contribute to pollution problems.
This document discusses grooming and how child molesters manipulate their victims and environments. It defines grooming as preparing a victim for abuse through gauging their responses, boundaries, and vulnerabilities. Molesters groom not just the victim but also their family and community to gain trust and opportunities for abuse. The document emphasizes that grooming violates Scouting's values and that mandatory reporting of any suspected abuse is required to protect youth.
The document provides an overview of operations at retail industry in India. It discusses [1] the growing organized retail sector in India compared to the largely unorganized traditional retail sector, [2] the various formats of retail operations including trends in urban and rural retail markets, and [3] some of the key challenges in retail operations related to location and merchandise selection. The objective of the project report is to examine current supply chain and operations management practices in the retail industry.
Giantsnet est un groupe composé de jeunes étudiants professionnels, on est là pour vous , des tutoriels dans tout les domaines Administration des Systèmes & Réseaux ( Virtualisation, Supervision .. ), Sécurité, Linux, CISCO, Microsoft ... et pleins d'autres choses . Notre but c'est de partager l'information avec vous, vous avez qu’à nous suivre pour découvrir.
Facebook :https://www.facebook.com/souhaib.es
Page : https://www.facebook.com/GNetworksTv
Groupe : https://www.facebook.com/groups/Giants.Networks
Twitter : https://www.twitter.com/GNetworksTv
YouTube : https://www.youtube.com/user/GNetworksTv
TITULO PROPIO DE Formación y Dirección de Cantera de FútbolCOPLEF Madrid
Este documento describe un título propio de especialista universitario en formación y dirección de cantera en fútbol ofrecido por la Universidad Europea Miguel de Cervantes en colaboración con Total Agents Sport. El programa de un año de duración se centra en seis módulos que cubren temas como la creación y gestión de canteras, el desarrollo de jugadores, los sistemas y modelos de juego, la programación del entrenamiento, los recursos tecnológicos y el coaching deportivo. El objetivo es proporcionar una formación
This document provides definitions for various oddball terms and pictograms used in electronic communication, including symbols representing facial expressions (smileys), actions (dancing), foods (popcorn), and emotions (crying, surprised). Over 50 unique pictograms are defined in the section, with explanations of their meaning in electronic contexts. The document also notes some pictograms originated from text-based computer systems and serves as a reference for their interpretation.
Rahul Kantak was established in 1996 and is located in Porvorim-Bardez, Goa with a storage and distribution depot in Kundaim. It manufactures 22 products and produces around 8 lakh bottles per month. The company has departments for production, personnel, purchasing, accounting, engineering, packing, R&D, marketing, and quality control. It analyzes raw materials and has a process for raw material handling that includes storage, sampling, quarantine, approval, and dispersal.
L'utilisation d'internet dans les entreprises peut poser des problèmes juridiques.
Quelle est la frontière entre le droit des salariés à la vie privée même eu temps et au lieu de son travail et l'obligation de surveillance des employeurs ?
El documento resume el análisis técnico-táctico de un partido entre Diablos Rojos y La Puebla. Diablos Rojos jugó con un sistema 1-5-3-2 defensivo a pesar de jugar en casa e ir perdiendo. Sus puntos débiles son la defensa de corners y falta de concentración de algunos jugadores. Para ganarles, se recomienda aprovechar los espacios que dejan al bascular y realizar transiciones rápidas antes de que se cierren.
The document describes a satellite communication system that uses Wavelet Filtered Multi-tone (WFMT) modulation to provide advantages over traditional QPSK modulation. WFMT modulation has a lower peak-to-average ratio, allows for a programmable spectrum, and can compensate for distortions from the satellite transponder and multipath propagation in urban environments. It provides similar energy efficiency to QPSK and multipath immunity comparable to OFDM. Simulation results show the WFMT spectrum meets requirements and has a higher tolerance for delay than existing systems.
M.Sc Dissertation: Simple Digital LibrariesLighton Phiri
My M.Sc. dissertation... it took me a total of 2 years and 61 days to finish--I LOVE TO COUNT! There are a few publications [1] based on this work---there is even a book chapter on the way.
You will notice from the structure of the manuscript that I used Information Mapping [2] principles. The content on the other hand is structured chronologically---based on the sequence of activities I undertook during my research.
I typeset the entire manuscript using LaTeX [3] and I am VERY proud of myself for doing that :p You would have to see the TeX source files [4] to see all corresponding packages I used. Block diagrams were rendered using PSTricks [5] and plots using R ggplot2 [6] package.
[1] http://scholar.google.co.za/citations?user=UIb4aEsAAAAJ&hl=en
[2] http://en.wikipedia.org/wiki/Information_mapping
[3] http://en.wikipedia.org/wiki/LaTeX
[4] https://github.com/lightonphiri/open-msc-thesis
[5] http://en.wikipedia.org/wiki/PSTricks
[6] http://en.wikipedia.org/wiki/Ggplot2
SCADA and HMI Security in InduSoft Web StudioAVEVA
The document discusses cybersecurity considerations for SCADA and HMI systems using InduSoft Web Studio. It begins with an agenda that includes enhancing cybersecurity on InduSoft projects and firewalls and other SCADA security considerations. The document then discusses guidelines for improving security on InduSoft projects such as implementing risk management processes, using strong passwords, encrypting sensitive data, and configuring appropriate network, database, file, and project security. It emphasizes the importance of cybersecurity awareness, training and certifications to enhance security.
This document is a study guide created by David J. Bolling for Management 318: Production and Operations Management at Southern Illinois University Carbondale. The study guide was developed based on lecture notes from Dr. White and is intended to supplement required course materials and help students prepare for exams. It includes chapters summarizing key concepts from each class, examples, practice problems, and samples from past exams. The author acknowledges relying heavily on Dr. White's teaching and hopes the study guide will benefit other students in the class.
1) The document discusses how Yammer was introduced and adopted by Grundfos, a global pump manufacturer, over a 3 week period to connect 1500 users.
2) Some key lessons learned from Grundfos' experience included starting with a clear purpose for using Yammer, communicating the purpose and how to use it clearly, and showing the value and examples of how people were using it successfully.
3) Community managers and champions played a vital role in encouraging participation according to the 90:9:1 principle where most people view rather than contribute content. The speaker emphasizes being available to help users and address any concerns about using Yammer.
Dissertation on environmental pollution and global warming 27 08-2013Patricia Rodrigues
This document provides an introduction to environmental pollution and global warming. It defines key terms like environment, environmental pollutant, and environmental pollution. It then discusses the genesis of environmental problems, noting that both developing and developed countries contribute to pollution in different ways. In India specifically, issues like river pollution, deforestation, industrial waste, and noise pollution are discussed. The document also examines the relationship between religious and cultural practices in India and environmental pollution. It argues that traditions like celebrating festivals by bursting firecrackers, disposing of waste in rivers, and using loudspeakers contribute to pollution problems.
This document discusses grooming and how child molesters manipulate their victims and environments. It defines grooming as preparing a victim for abuse through gauging their responses, boundaries, and vulnerabilities. Molesters groom not just the victim but also their family and community to gain trust and opportunities for abuse. The document emphasizes that grooming violates Scouting's values and that mandatory reporting of any suspected abuse is required to protect youth.
The document provides an overview of operations at retail industry in India. It discusses [1] the growing organized retail sector in India compared to the largely unorganized traditional retail sector, [2] the various formats of retail operations including trends in urban and rural retail markets, and [3] some of the key challenges in retail operations related to location and merchandise selection. The objective of the project report is to examine current supply chain and operations management practices in the retail industry.
Giantsnet est un groupe composé de jeunes étudiants professionnels, on est là pour vous , des tutoriels dans tout les domaines Administration des Systèmes & Réseaux ( Virtualisation, Supervision .. ), Sécurité, Linux, CISCO, Microsoft ... et pleins d'autres choses . Notre but c'est de partager l'information avec vous, vous avez qu’à nous suivre pour découvrir.
Facebook :https://www.facebook.com/souhaib.es
Page : https://www.facebook.com/GNetworksTv
Groupe : https://www.facebook.com/groups/Giants.Networks
Twitter : https://www.twitter.com/GNetworksTv
YouTube : https://www.youtube.com/user/GNetworksTv
TITULO PROPIO DE Formación y Dirección de Cantera de FútbolCOPLEF Madrid
Este documento describe un título propio de especialista universitario en formación y dirección de cantera en fútbol ofrecido por la Universidad Europea Miguel de Cervantes en colaboración con Total Agents Sport. El programa de un año de duración se centra en seis módulos que cubren temas como la creación y gestión de canteras, el desarrollo de jugadores, los sistemas y modelos de juego, la programación del entrenamiento, los recursos tecnológicos y el coaching deportivo. El objetivo es proporcionar una formación
This document provides definitions for various oddball terms and pictograms used in electronic communication, including symbols representing facial expressions (smileys), actions (dancing), foods (popcorn), and emotions (crying, surprised). Over 50 unique pictograms are defined in the section, with explanations of their meaning in electronic contexts. The document also notes some pictograms originated from text-based computer systems and serves as a reference for their interpretation.
Rahul Kantak was established in 1996 and is located in Porvorim-Bardez, Goa with a storage and distribution depot in Kundaim. It manufactures 22 products and produces around 8 lakh bottles per month. The company has departments for production, personnel, purchasing, accounting, engineering, packing, R&D, marketing, and quality control. It analyzes raw materials and has a process for raw material handling that includes storage, sampling, quarantine, approval, and dispersal.
L'utilisation d'internet dans les entreprises peut poser des problèmes juridiques.
Quelle est la frontière entre le droit des salariés à la vie privée même eu temps et au lieu de son travail et l'obligation de surveillance des employeurs ?
earlegal #6 - Caméras et cybersurveillance du travailleur : quelles règles re...Lexing - Belgium
Quelle protection pour la vie privée de vos travailleurs ?
Internet, courriel, téléphone : que pouvez-vous contrôler et comment ?
Pouvez-vous installer des caméras de surveillance au sein de votre entreprise ?
Pouvez-vous licencier un employé pour un post Facebook ?
par Wivine SAINT-REMY et Elodie LECROART
Le Règlement Général sur la Protection des Données (RGPD) entrera en vigueur à la fin de la semaine, le 25 mai plus précisément.
Cette infographie présente les principaux points contenus dans le RGPD dans le but de comprendre les normes qui s'appliqueront à toutes les entités qui manipulent des données personnelles.
Droits et obligations des gérants et usagers des cybercafésGOTIC CI
Présentation de AMAN VLADIMIR, Cybercriminologue, Chargé de communication P.L.C.C., à l'Atelier de sensibilisation et de formation sur les droits et obligations des usagers des services, les 29 et 30 avril 2014 à l'Espace CRRAE UMOA.
Livre Blanc- Règlement Général européen sur la Protection des DonnéesTerface
RGPD : le grand défi pour protéger les données confidentielles : quelles conséquences pour les professionnels ?
Pour en savoir plus sur les destructeurs de documents professionnels, consultez notre site !
https://www.terface.com/destructeur-de-documents-13/
The World Drug Report 2012 provides an overview and analysis of recent illicit drug trends. It finds that global illicit drug use remains largely stable, with cannabis and amphetamine-type stimulants being the most widely used. Total production of coca and opium poppy has also remained stable, though opium production in Afghanistan has returned to high levels after being reduced by disease in 2010. Overall, the global illicit drug market showed no significant changes in patterns of use, production or health consequences in 2010.
Standard poorstakesvariousratingactionson16eurozonesovereigngovernments spmFreelance
S&P lowered credit ratings on 9 eurozone countries and affirmed ratings on 7 others. The outlooks on all but 2 countries are now negative, indicating a one-in-three chance ratings could be lowered in the next 1-2 years. S&P believes recent European policy initiatives may be insufficient and that risks include weakening growth and funding pressures. Ratings on Cyprus, Italy, Portugal and Spain were lowered by two notches while others saw one-notch decreases.
Décret no 2011 1919 du 22 décembre 2011 relatif au conseil national des activ...Freelance
Décret n° 2011-1919 du 22 décembre 2011 relatif au Conseil national des activités privées
de sécurité et modifiant certains décrets portant application de la loi n° 83-629 du 12 juillet
1983.
Décret no 2011 1919 du 22 décembre 2011 relatif au conseil national des activ...
2011
1. Le non-respect de la charte informatique est sanctionné par le licenciement | Analyse de jurisprudence du 20/09/2011 02/10/11 00:08
Commentaire de jurisprudence :
L'entreprise peut définir les conditions d'utilisation de son système informatique, afin
notamment d'organiser les rapports entre le réseau interne (intranet) et Internet dans
le respect de la liberté et de la vie privée des personnes y ayant accès, au moyen d'une
Charte d'utilisation du système informatique.
Ce document, définit notamment les conditions d'accès au réseau interne de l'orga-
nisme (intranet), les conditions d'accès à internet (dont le contrôle de l'usage des mes-
sageries électroniques) de même que l'utilisation de ces réseaux. Il précise aussi les
modalités de protection de la confidentialité des ressources et des secrets de l'entre-
prise.
Tel a été le cas dans l'affaire examinée par la Cour de cassation le 5 juillet 2011. En
l'espèce, une société de gestion disposait d'une charte informatique à l'usage des sala-
riés de l'entreprise, qui prévoit expressément :
que les mots de passe sont personnels et inaccessibles aux autres membres du
personnels ou aux tiers,
qu'il est fait interdiction aux salariés de quitter leur poste de travail sans avoir
fermé les fichiers créés ou ouverts,
qu'il est interdit aux salariés d'effectuer des opérations non autorisées,
l'obligation pour les salariés de ne pas communiquer d'informations confiden-
tielles à des tiers ou en interne.
Il était reproché à la salariée, secrétaire commerciale, d'avoir communiqué de façon
volontaire des informations confidentielles à une personne non habilitée appartenant
au personnel de l'entreprise.
Elle avait en effet quitté son poste de travail en laissant un collègue seul avoir accès,
grâce à ses codes d'accès personnel, à l'ensemble du réseau de la société. Un supé-
rieur hiérarchique se rendant plus tard dans le bureau de la secrétaire pour y cher-
cher un document, avait constaté que son micro-ordinateur était allumé. Alors qu'il
allait procéder à sa fermeture, il avait constaté qu'un fichier comportant plus de 2.400
références clients avait été établi et adressé par messagerie interne à un autre membre
du personnel.
Licenciée pour faute grave, la salariée a saisi le juge des prud'hommes.
Déboutée de son action par la Cour d'appel de Paris, elle forme un pourvoi en cassa-
tion en vain. En effet, la Haute juridiction a confirmé qu'en "méconnaissance des disposi-
http://www.net-iris.fr/veille-juridique/actualite/28209/le-non-respect-de-la-charte-informatique-est-sanctionne-par-le-licenciement.php Page 1 sur 2
2. Le non-respect de la charte informatique est sanctionné par le licenciement | Analyse de jurisprudence du 20/09/2011 02/10/11 00:08
tions de la charte informatique, la salariée avait permis à un autre salarié qui n'y était pas ha-
bilité d'utiliser son code d'accès pour télécharger des informations confidentielles", et que ce
comportement fautif "rendait impossible son maintien dans l'entreprise".
En conséquence :
le salarié qui viole ses obligations issues de la charte informatique manque à son
obligation générale de loyauté envers son employeur ;
tenue par une interdiction de communiquer des données confidentielles
même en interne, le fait de violer sciemment cette obligation est constitutif de la
part du salarié d'une faute d'une gravité telle qu'elle rend impossible son main-
tien dans l'entreprise pendant la durée du préavis, peu importe l'absence de re-
proches antérieurs et quelle que soit la classification professionnelle du salarié ;
une secrétaire est soumise, comme l'ensemble des membres du personnel, aux
mêmes règles s'agissant du respect des consignes de sécurité et codes de
conduites en matière d'usage informatique.
http://www.net-iris.fr/veille-juridique/actualite/28209/le-non-respect-de-la-charte-informatique-est-sanctionne-par-le-licenciement.php Page 2 sur 2