Business Use of the Internet Thomas Lapp Computer Sciences Corporation Newark, Delaware.

Slides:



Advertisements
Similar presentations
Why do we need Government?
Advertisements

ETHICAL HACKING A LICENCE TO HACK
Example policy elements and their role in bandwidth management and optimisation.
What your employees are doing on the Internet? How much time they spend on the Internet? How much unchecked Internet usage costs? If Internet misuse was.
BUSINESS B2 Ethics.
Ministry Health Care Corporate Responsibility Program Medical Staff Education.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
By: Mrs. Allen.  To protect yourself and equipment, never tamper with or remove any power cords or cables (including mouse and keyboard)  To safeguard.
Module 2.2 Security, legal and ethical issues Theme: Finding solutions.
Legal and Ethical Issues: Privacy and Security Chapter Five.
ICT & Crime Cyberslacking. What is Cyberslacking? Cyberslacking is wasting time (usually online) when you should be working Either at work or at school.
Electronic employee monitoring
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
Computing Computing Ethics And policies that enforce behavior.
Computing Computing Ethics And policies that enforce behavior.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Raising Children. Children as a “Public Good” (Strober) Children as private goods leads to the conclusion that their economic and emotional care are the.
The 10 Deadly Sins of Information Security Management
Should Companies be allowed to fix employee wages? By Ethan Catherman.
INTERNET and CODE OF CONDUCT
Software Fundamentals Done by Shakila Sattar. Scenario and the Main Stakeholders Everybody now-a-days are linked to internet either for their work purpose.
Ethics and Security ISSA International Ethics Committee V2.1 4/27/07.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Cagayan Gaming Jurisdiction. Player Protection Probity Checking Software Testing Payment Solution and Business Plan Evaluation.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Current Network Schema Router Internet Switch PC.
CONTENTS  INTRODUCTION.  KEYWORDS  WHAT IS FIREWALL ?  WHY WE NEED FIREWALL ?  WHY NOT OTHER SECURITY MECHANISM ?  HOW FIREWALL WORKS ?  WHAT IT.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
ICS424 Computer and Professional Ethics Aj. Thoranin Intarajak.
Monitoring Employees on Networks: Unethical or Good Business?
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
A PRESENTATION BY MOSES HOWE E-Safety from a Youth Point of View.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
INTERNET SAFETY.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Bell Ringer Activity For each of the following functions, relate them to your own lives. –Planning –Organizing –Leading –Controlling.
Privacy Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
1 Internet Firewall Security Present by: Ying Fu Department of Computer Science South Eastern University February, 2001.
Computer Security By Duncan Hall.
Security and Ethics Safeguards and Codes of Conduct.
Review Internet Safety. Definition Phishing is fishing for personal and financial information disguised at legitimate business .
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Monitoring Employees on Networks
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
ITEC 1010 Information and Organizations Chapter V Expert Systems.
Chapter 14 Internal Control, Corporate Governance, and Ethics.
Social Media Policies: What Employers Can and Cannot Do Thomas D. Rees, Esq. High Swartz LLP February 23,
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Privacy and the Law.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Network Security Analysis Name : Waleed Al-Rumaih ID :
ETH 321 Education Begins / tutorialrank.com. ETH 321 Assignment Week 1 Alternative Dispute Resolution (ADR) Ethics and Risk Management Study (Dazzling.
Server Security Policy
דיני חברות ד"ר ויקטור ח. בוגנים
Chapter 5 Corporate Governance.
Internet law Business law.
PH Systems Require More than IT
COMPUTER ETHICS: Gender Effects and Employee Internet Misuse
CHAPTER FOUR OVERVIEW SECTION ETHICS

Company Overview MegaPath is a leading provider of managed IP communications services in North America Business Founded in 1996 HQ in Pleasanton, CA 1,000+
Presentation transcript:

Business Use of the Internet Thomas Lapp Computer Sciences Corporation Newark, Delaware

Defined Company systems are to be used exclusively for company business purposes

Computer Ethics Issue What constitutes company business purposes? Who defines what that is? Who enforces the policy?

Possible Solutions Honesty policy -- expect employees not to go where they should not –highest hit rates at playboy.com come from Fortune 500 businesses Enforcement of flagrant abusers –monitor firewall for major abuse and discipline these employees

Possible Solutions (Cont’d) Lock out sites –risk that someone will have legitimate need to access a site –who maintains the lock-out list?

Conclusions Determining business-use is not always black and white Trying to enforce a policy based on shades of gray is even more difficult