4. What mayhappen if anIJM memberaccepts orgives bribes?14. Invitingyourcolleagueout fordinner is ...2. Finish thisdefinition: “At itsheart, ___ isabout the abuseof a system forprivate gain.”7. Why areTerrorist-Financingpolicies soimportant forIJM?15. Recordingthat you workedmore hours thanyou actually didis an example of___.3. How doesIJM tolerateethicalinfractions?1. Ethicaltraining isimportantbecause IJMcommits to theprinciple of ___.12. What areviable groundsto report anethicalinfraction?5. What is theONE exceptionto IJM’s zero-tolerance policyfor bribes?11. Whichgroup isespeciallyvulnerable toethicalviolations?6. Sending anemail with atypo in it is anexample ofwhich ethicalviolation?13. T/F:IJM allowsretaliationagainst awhistleblower.8. T/F:Terroristfinancing canonly occurwhen done onpurpose.FREESPACE9. T/F:Safeguardingaffects everyonewho comes intocontact with IJM.10. Is it everOK todiscriminateagainst yourcolleagues?4. What mayhappen if anIJM memberaccepts orgives bribes?14. Invitingyourcolleagueout fordinner is ...2. Finish thisdefinition: “At itsheart, ___ isabout the abuseof a system forprivate gain.”7. Why areTerrorist-Financingpolicies soimportant forIJM?15. Recordingthat you workedmore hours thanyou actually didis an example of___.3. How doesIJM tolerateethicalinfractions?1. Ethicaltraining isimportantbecause IJMcommits to theprinciple of ___.12. What areviable groundsto report anethicalinfraction?5. What is theONE exceptionto IJM’s zero-tolerance policyfor bribes?11. Whichgroup isespeciallyvulnerable toethicalviolations?6. Sending anemail with atypo in it is anexample ofwhich ethicalviolation?13. T/F:IJM allowsretaliationagainst awhistleblower.8. T/F:Terroristfinancing canonly occurwhen done onpurpose.FREESPACE9. T/F:Safeguardingaffects everyonewho comes intocontact with IJM.10. Is it everOK todiscriminateagainst yourcolleagues?

Ethics Live Session BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. 4. What may happen if an IJM member accepts or gives bribes?
  2. 14. Inviting your colleague out for dinner is ...
  3. 2. Finish this definition: “At its heart, ___ is about the abuse of a system for private gain.”
  4. 7. Why are Terrorist-Financing policies so important for IJM?
  5. 15. Recording that you worked more hours than you actually did is an example of ___.
  6. 3. How does IJM tolerate ethical infractions?
  7. 1. Ethical training is important because IJM commits to the principle of ___.
  8. 12. What are viable grounds to report an ethical infraction?
  9. 5. What is the ONE exception to IJM’s zero-tolerance policy for bribes?
  10. 11. Which group is especially vulnerable to ethical violations?
  11. 6. Sending an email with a typo in it is an example of which ethical violation?
  12. 13. T/F: IJM allows retaliation against a whistleblower.
  13. 8. T/F: Terrorist financing can only occur when done on purpose.
  14. FREE SPACE
  15. 9. T/F: Safeguarding affects everyone who comes into contact with IJM.
  16. 10. Is it ever OK to discriminate against your colleagues?