Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.

Slides:



Advertisements
Similar presentations
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Advertisements

IT Security Policy Framework
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Expectations, Procedures, Policies Developed by Technology Services 1:1 Laptop Initiative.
BUSINESS B2 Ethics.
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Confidentiality & Records Management. What is Information Governance? What is Records Management?
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
Uintah School District Acceptable Use for Computer and Network Access.
Security, Privacy, and Ethics Online Computer Crimes.
Riverside Community School District
IST346: Information Ethics. Ethics  Ethics are the principles of conduct that govern a group of people.  Ethics are not morals.  Morals are the proclamation.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
INTERNET and CODE OF CONDUCT
Network security policy: best practices
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
HIPAA PRIVACY AND SECURITY AWARENESS.
Electronic Use Policies.   Social Media  Internet.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Computer Ethics for Computer Users
Ethics CPTE 433 John Beckett. Ethics & Morals Morals tell us what is right and good. –Religious people believe morals come from God –SAs often say something.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
CS3353: System Administration J. Childress KEP U331
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
The Legalities of Technicalities By Kellie Birdwell.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
Ethics in CS CS5493(7493). Work Place Ethics Definition Work place ethics are the rules of personal conduct established by social traditions and the employer.
CS5493(7493): Secure System Administration J. Childress Rayzor 2090
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
EECS 4482 Fall 2014 Session 8 Slides. IT Security Standards and Procedures An information security policy is at a corporate, high level and generally.
Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Legal and Ethical Issues in Computer Security Csilla Farkas
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Security and Ethics Safeguards and Codes of Conduct.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Security Information Management Firewall Management, Intrusion Detection, and Intrusion Prevention Intrusion Detection Busters Katherine Jackowski Elizabeth.
NETWORK SECURITY LAB Rehab AlFallaj. Learning Objective ■In this Lecture you will learn: –Ethical Issues related to network security.
JOHN MARSHALL COMMUNITY SCHOOL Media Center Mrs. Shepard Updated 2/8/14.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Solutions of Case Study 4 & 6
CompTIA Security+ Study Guide (SY0-401)
Chapter 13: The IT Professional
Protection of CONSUMER information
IS4680 Security Auditing for Compliance
BCT 2.00 Analyze Technology Issues
Red Flags Rule An Introduction County College of Morris
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
The Issues with Technology in education
What is Information Security?
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
AUP, EDP, & Centralized Printing
Chapter 13: The IT Professional
Presentation transcript:

Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social group.

SA Ethics The SA may have access to all –Files –Backups – –Internet usage –Corporate secrets –Private employee information

SA is in a position of trust The SA may be subject to –Polygraph tests –Personal back ground checks –Credit reports –Drug testing

Computer Resource Usage Employers are concerned about how computing resources are used. Do Employers have a right to monitor usage of computing resources by their employees? Employers have an ethical responsibility to notify employees of system monitoring.

User Code of Conduct All companies using computers should have a written code of conduct for general users and privileged users. –Government –Private sector –Academics –Home?

Computer Usage Policy If there is no written usage policy at your work place, make an effort to create one. All employees should sign a usage policy. The policy should be signed and kept on file, a copy kept for the employee. Read the course syllabus for CS3353.

Usage Policy Do not use agency resources for personal use: –Starting a new business –Hosting a personal web site –Downloading copyrighted materials –Downloading illegal materials. –Pirating software –There may be legitimate exceptions.

SA Ethics Treat all files not belonging to you as sensitive. Computing systems do not exist for the amusement of the SA. (SA Mantra) Accessing sensitive files should always be on a need to know basis only. This will require coordinating such access with management and security personnel. This applies to .

Ethics The computing system does not exist solely for the SA’s personal amusement. The SA is providing a service to users. The system-users will ultimately determine an SAs future based upon satisfaction. An SA must be objective in dealing with colleagues and customers.

Ethics Separate personal and professional views.

Ethics: Informed Consent Informing your customers of events that will impact their system usage.

Informed Consent: SLA SLA – service level agreement informs customers of –Maintenance scheduling –Limited Liability due to down time or catastrophic events. –Warnings for interruption of service.

SAGE Code of Ethics Integrity of SA is beyond reproach. No infringement on the rights of users. High standard of professional conduct. Continuing education Exemplary work ethic Professionalism in the performance of their duties.

Privileged Access Conduct Privileged usage requires responsibility Privileged usage is solely for necessary work- related uses. Procedures should be developed to minimize errors. (example: Backups of critical data should be made before system changes are implemented.) Procedure for addressing accidental access to information not otherwise available. Warnings explaining what to expect when policies are violated.

Privileged Access Conduct All policies should be in writing and made available to privileged users. Privileged users should sign the document to acknowledge they understand their responsibilities.

Privileged Access Conduct A list of privileged users should be kept up to date. When someone is terminated or leaves voluntarily, appropriate measures must be taken: –Change passwords –Close accounts –Exit interview

Privileged Access Conduct Passwords to privileged accounts should be changed regularly, at least twice a year. Privileged users may have their access restricted on a regular basis for auditing purposes.

Copyright Adherence Organizations should have policies stating that their members abide by copyright laws. Software piracy is pervasive and is actually stealing. Companies are concerned about the liability of using pirated software.

Examples Individually licensed PC software packages should be purchased for individual PCs Single-user installation disk should not be used on multiple machines. Manuals and media for software for a single machine should be stored in the room where the machine is located.

Piracy Software piracy is not an acceptable cost cutting measure. Companies faced with copyright litigation will attempt to implicate whoever let the violation happen and relay damages to those responsible.

Make Compliance Easy Use Open Source software when practical. When open source is not available, buy additional licenses at a bulk rate.

Working With Law Enforcement Organizations should have a policy outlining how to work with law enforcement agencies. Verify the identities of LEA people requesting information. Beware of Social Engineering!

Social Engineering Start with a small piece of information. Contact employees within a company claiming to be a LEA official, new employee, executive, etc. Leverage a piece of information into more useful information. Repeat until sufficient information is gathered to wreak havoc.

Privacy Expectations Many organizations consider the computer and all related data and resources to be property of the organization. Your files and may be owned by your employer. In the financial community, is monitored. (Informed Consent) Internet usage may be monitored.

Privacy Expectations Privacy laws may be different in another country where you are doing business. A policy on privacy and monitoring should be in writing and provided to all employees.

has a life of its own. It is difficult to permanently dispose of . Not private. Not secure. Should be treated as public information. There are special security software packages for managing .

Unethical/Illegal Requests Document any and all requests made by colleagues to do any illegal or unethical activity. Resist. Coercion may be used. Check the employee’s guidelines for what to do. If the request seems dubious, verify by checking company policies and laws.

Unethical/Illegal Requests If given a dubious request, ask for the request in writing. If your request is denied, refuse to do the request. Be careful about making accusations without evidence.