CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

BUSINESS B2 Ethics.
Ethics, Privacy and Information Security
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Understanding Issues in Implementing Technology in the Classroom Legal, Ethical, Social, and Human Issues National Educational Technology Standards for.
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
Security Issues and Ethics in Education
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
Computer Ethics in Information Technology
Chapter 3 Ethics, Privacy & Security
Security Awareness Norfolk State University Policies.
Ch15QQ 1. Hardware theft includes the theft of portable computers as well as desktop computers. 2. A surge suppressor can be used to protect a computer.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Security Issues, Ethics, & Emerging Technologies in Education
Digital Citizenship WARREN HILLS REGIONAL MIDDLE SCHOOL.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Monitoring Employees on Networks: Unethical or Good Business?
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Security and Ethics Privacy Employment Health Crime Working
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
ETHICS, POLICY & SECURITY ISSUES
ETHICS, POLICY & SECURITY ISSUES
Essential Components: Acceptable Use Policy Presenter: John Mendes.
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Desktop Security: Making Sure Your Office Environment is Secure.
Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree.
EDT 608 Unit 8 Acceptable Use Policies. EDT 608 Unit 1 AUP and Freedom Scanning the Internet carries a much greater weight of responsibility than simply.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Woodland Hills School District Computer Network Acceptable Use Policy.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Presentation of Acceptable Use Policy Kathryn Thomas UMUC EDTC 620 Summer 2012.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Inutsystems.com. INut offers guaranteed Computer Repair Services for all computer hardware including monitors, motherboards, hard disks and power supplies.
Security Issues & Ethics in Education By Maud Mushayamunda.
Chapter 16 – Careers in Information Technology
Legal and ethical issues
CHAPTER FOUR OVERVIEW SECTION ETHICS
Chapter 13 Security and Ethical Challenges.
Social Issues in Computing
Social Issues in Computing
CHAPTER FOUR OVERVIEW SECTION ETHICS
Standard 6: Educational Leaders understand the social, legal, and ethical issues related to technology and model responsible decision-making related to.
Woodland Hills School District
Presentation transcript:

CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?

Ways to stay out of (or get into) trouble: b Security b Information Privacy b Ethics

SECURITY b Computer Viruses, Virus Detection and Removal b Unauthorized Access and Use b Theft b System Failure b Backup Procedures

INFORMATION PRIVACY b Rights of privacy, accuracy, property, and accessibility. b Employee Monitoring

ETHICS b Information Accuracy b Acceptable Use Policy b Internet Security and Privacy b Objectionable Materials b Copyright (Fair Use)