Presentation is loading. Please wait.

Presentation is loading. Please wait.

McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.

Similar presentations


Presentation on theme: "McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7."— Presentation transcript:

1 McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7

2 4-2 ETHICS Ethics – the principles and _________ that guide our behavior toward other people Issues affected by technology advances –Intellectual propertyIntellectual property intangible creative work –CopyrightCopyright legal protection afforded intellectual property –Fair use doctrineFair use doctrine legal use of _______________ material –Pirated softwarePirated software unauthorized use of software –Counterfeit softwareCounterfeit software Software manufactured to look real and sold as such

3 4-3 ETHICS Privacy is a major ethical issue –Privacy – the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consentPrivacy –Confidentiality – the assurance that messages and information are available only to those who are authorized to view themConfidentiality

4 4-4 ETHICS One of the main ingredients in trust is privacy

5 4-5 INFORMATION ETHICS Individuals form the only ethical component of IT

6 4-6 Information Has No Ethics Acting ethically and legally are not always the sameethically and legally

7 4-7 DEVELOPING INFORMATION MANAGEMENT POLICIES Organizations strive to build a corporate culture based on ethical principles that employees can understand and implement ePolicies typically include:ePolicies –Ethical computer use policy –Information privacy policy –Acceptable use policy –E-mail privacy policy –Internet use policy –Anti-spam policy

8 4-8 Ethical Computer Use Policy Ethical computer use policy – contains general principles to guide computer user behaviorEthical computer use policy The ethical computer user policy ensures all users are informed of the rules and, by agreeing to use the system on that basis, __________ to abide by the rules

9 4-9 Ethical Computer Use Policy

10 4-10 Information Privacy Policy The unethical use of information typically occurs “unintentionally” when it is used for new purposes –For example, social security numbers started as a way to identify government retirement benefits and are now used as a sort of universal personal ID Information privacy policy - contains general principles regarding information privacyInformation privacy policy

11 4-11 Information Privacy Policy Information privacy policy guidelines 1.Adoption and implementation of a privacy policy 2.Notice and disclosure 3.Choice and consent 4.Information security 5.Information quality and access

12 4-12 Acceptable Use Policy Acceptable use policy (AUP) – a policy that a user must agree to follow in order to be provided access to a network or to the InternetAcceptable use policy An AUP usually contains a nonrepudiation clause –Nonrepudiation – a contractual stipulation to ensure that e-business participants do not deny (___________) their online actionsNonrepudiation

13 4-13 Acceptable Use Policy

14 4-14 E-Mail Privacy Policy Organizations can mitigate the risks of e- mail and instant messaging communication tools by implementing and adhering to an e-mail privacy policy E-mail privacy policy – details the extent to which e-mail messages may be read by othersE-mail privacy policy

15 4-15 E-Mail Privacy Policy

16 4-16 E-Mail Privacy Policy

17 4-17 Internet Use Policy Internet use policy – contains general principles to guide the proper use of the InternetInternet use policy

18 4-18 Anti-Spam Policy Spam – unsolicited e-mailSpam Spam accounts for 40% to 60% of most organizations’ e-mail and cost U.S. businesses over _____ billion in 2007* *http://www.capemax.com/spam_cost.php Anti-spam policy – simply states that e- mail users will not send unsolicited e- mails (or spam)

19 4-19 ETHICS IN THE WORKPLACE Workplace monitoring is a concern for many employeesWorkplace monitoring Organizations can be held financially responsible for their employees’ actions The dilemma surrounding employee monitoring in the workplace is that an organization is placing itself at risk if it fails to monitor its employees, however, some people feel that monitoring employees is unethicalmonitoring employees is unethical

20 4-20 Monitoring Technologies

21 4-21 Monitoring Technologies Monitoring – tracking people’s activities by such measures as number of keystrokes, error rate, and number of transactions processedMonitoring Common monitoring technologies include: –Key logger—software that records keystrokes & clicks –Hardware key logger—hardware that captures keystrokes –Cookie—small ______ deposited on a computer that keeps information about web site visits –Adware—software that generates ads on a computer –Spyware—software that tracks online use –Web log—info kept on a server about online visits –Clickstream—records all aspects of a web site session

22 4-22 Employee Monitoring Policies Employee monitoring policies – explicitly state how, when, and where the company monitors its employees

23 4-23 PROTECTING INTELLECTUAL ASSETS Organizational information is intellectual capital - it must be protected Information security – the protection of information from accidental or intentional misuse by persons inside or outside an organizationInformation security E-business automatically creates tremendous information security risks for organizations

24 4-24 PROTECTING INTELLECTUAL ASSETS


Download ppt "McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7."

Similar presentations


Ads by Google