Presentation is loading. Please wait.

Presentation is loading. Please wait.

BUSINESS B2 Ethics. 2 Learning Outcomes Summarize the guidelines for creating an information privacy policy Identify the differences between an ethical.

Similar presentations


Presentation on theme: "BUSINESS B2 Ethics. 2 Learning Outcomes Summarize the guidelines for creating an information privacy policy Identify the differences between an ethical."— Presentation transcript:

1 BUSINESS B2 Ethics

2 2 Learning Outcomes Summarize the guidelines for creating an information privacy policy Identify the differences between an ethical computer use policy and an acceptable computer use policy Describe the relationship between an privacy policy and an Internet use policy Explain the effects of spam on an organization Summarize the different monitoring technologies and explain the importance of an employee monitoring policy

3 3 Introduction Ethics – the principles and standards that guide our behavior toward other people Important ethical concepts stemming from IT: Intellectual property Copyright Fair use doctrine Pirated software Counterfeit software

4 4 Introduction ePolicies address information privacy and confidentiality issues ePolicies – policies and procedures that address the ethical use of computers and Internet usage Privacy – the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent Confidentiality – the assurance that messages and data are available only to those who are authorized to view them

5 5 Ethics Individuals form the only ethical component of an IT systems

6 6 Ethics Acting ethically and legally are not always the same

7 7 Developing Information Management Policies Organizations strive to build a corporate culture based on ethical principles that employees can understand and implement ePolicies typically include: Ethical computer use policy Information privacy policy Acceptable use policy privacy policy Internet use policy Anti-spam policy

8 8 Ethical Computer Use Policy contains general principles to guide computer user behavior ensures all users are informed of the rules and, by agreeing to use the system on that basis, consent to abide by the rules

9 9 Information Privacy Policy contains general principles regarding information privacy The unethical use of information typically occurs “unintentionally” when it is used for new purposes For example, social security numbers started as a way to identify government retirement benefits and are now used as a sort of universal personal ID Information privacy policy guidelines: Adoption and implementation of a privacy policy Notice and disclosure Choice and consent Information security Information quality and access

10 10 Acceptable Use Policy a policy that a user must agree to follow in order to be provided access to a network or to the Internet contains a nonrepudiation clause Nonrepudiation – a contractual stipulation to ensure that e-business participants do not deny (repudiate) their online actions

11 11 Privacy Policy details the extent to which message may be read by others

12 12 Internet Use Policy contains general principles to guide the proper use of the Internet

13 13 Anti-spam Policy states that users will not send unsolicited s (or spam) Spam – unsolicited Spam accounts for 40% to 60% of most organizations’ and cost U.S. businesses over $10 billion in 2003

14 14 Ethics in the Workplace Organizations can be held financially responsible for their employees’ actions The dilemma surrounding employee monitoring in the workplace is that an organization is placing itself at risk if it fails to monitor its employees, however, some people feel that monitoring employees is unethical

15 15 Monitoring Technologies Monitoring – tracking people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed

16 16 Employee Monitoring Policies explicitly state how, when, and where the company monitors its employees

17 17 Closing Case Two: Spying on Employees Many organizations have taken the Big Brother approach to Web monitoring and track Internet usage and read employees’ to help prevent lost productivity Current research indicates that the effects of such employee monitoring are even worse than the lost productivity from employee Web surfing

18 18 Closing Case Two Questions 1. Explain the ethical issues involved in employee monitoring 2. Summarize the adverse effect employee monitoring can have on employees. Summarize the potential issues an organization can face if it does not monitor its employees. If you were the CEO of an organization, would you choose to monitor your employees? Why or why not? 3. Identify the relationship between information privacy and monitoring 4. Summarize the different monitoring technologies and rank them in order of least invasive to most invasive for employees


Download ppt "BUSINESS B2 Ethics. 2 Learning Outcomes Summarize the guidelines for creating an information privacy policy Identify the differences between an ethical."

Similar presentations


Ads by Google