Chapter 8 Ethics and Technology

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Hart District Acceptable Use Policy Acceptable Use Policy.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved 3-1 Introduction  Reasons to study medical law and ethics Function at the highest professional.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved 3-1 LEGAL AND ETHICAL ISSUES in Medical Practice, Including HIPAA PowerPoint® presentation.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Boyertown Area School District Acceptable Use Policy.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Business Plug-In B7 Ethics.
Chapter 14: Ethics, Justice and Fair Treatment at Work
INTERNET and CODE OF CONDUCT
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
C4- Social, Legal, and Ethical Issues in the Digital Firm
STUDENT How to properly use your student account.
Electronic Use Policies.   Social Media  Internet.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Computer Ethics for Computer Users
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Making it Stick: Doing What’s Right in a Competitive Market
Monitoring Employees on Networks: Unethical or Good Business?
Essentials Of Business Law Chapter 28 Employment Law McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
© MISHCON DE REYA MAY 2014 RECRUITMENT INTERNATIONAL FINANCIAL DIRECTORS’ FORUM Protecting your business from unlawful competition.
Communicating Chapter Fifteen Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent.
Organizational Agility
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Chapter Twelve Digital Interactive Media Arens|Schaefer|Weigold Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
SOCIAL MEDIA POLICY 2012 Rutherford County. What is Social Media? “Content created by individuals using accessible and scalable technologies through the.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
December 25, 2015 Copyright © 2010 WeComply, Inc. All rights reserved. Appropriate Internet Use Note to Trainer.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
INTERNET SAFETY.
IT and Network Organization Ecommerce. IT and Network Organization OPTIMIZING INTERNAL COLLABORATIONS IN NETWORK ORGANIZATIONS.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Monitoring Employees on Networks
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
District Updates  1. Crisis Go App  2. Bullying Refresher  3. Social Media Policy  4. Teacher Web Pages.
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
Spreadsheet review. Primary key (also called key field): A field which is different for every record in the table Composite key When two fields together.
Cyber Liability: New Exposures Presented by: Henriott Group © 2007, , Zywave Inc. All rights reserved.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Cyber Liability Insurance for an unsecure world
Computers Are Your Future Twelfth Edition
E&O Risk Management: Meeting the Challenge of Change
Privacy & Confidentiality
Chapter 8 Ethics and Technology
Responsible Use Policy
Presentation transcript:

Chapter 8 Ethics and Technology Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

Ethics and Technology Vast amounts of information is available to employees and customers on their: Internet sites Intranet sites: Company’s internal Web site, containing information for employee access only Extranet sites: Private piece of a company’s Internet network that is made available to customers and/or vendor partners on the basis of secured access by unique password

Ethics and Technology Loss of privacy Companies have ability to send customers’ personal data anywhere in the world Employee monitoring

Do You Know Where Your Personal Information Is? Call centers were the result of the first wave of technological advancement Ethical obligations Notify the customer the country in which the call center is based Notify the customer the real name of person answering the call Notify the customer that their personal information is being transferred to other countries

Employer Position Monitoring of work-related activity will not be infringement of privacy Organization has an obligation to its stakeholders to operate efficiently It must ensure that company resources are not being misused or stolen It must ensure company data and proprietary information are closely guarded

Employer Position Technological advancements has made it difficult to determine where work ends and personal life begins Employees be notified of any electronic surveillance and the purpose of that surveillance Actions of a small number of employees in breaking company rules should not be used as a justification to take away everyone’s civil rights

Employer/Employee Position Arriving at a resolution of the arguments is difficult Technological advancements has made it difficult to determine where work ends and personal life begins Willingness to compromise has risen and fallen in direct relation to the prevailing job market

When Are You at Work? Telecommuting: Working from anywhere by logging into your company’s network remotely Computer and Smartphone has made the concept of being at work flexible Availability is now defined as accessibility

Employee Consent Thin consent: Employee has little choice When an employee receives formal notification that the company will be monitoring all e-mail and Web activity and it is made clear in that notification that his or her continued employment with the company will be dependent on the employee’s agreement to abide by that monitoring

Employee Consent Thick consent: Employee has an alternative to unacceptable monitoring When jobs are plentiful and the employee would have no difficulty in finding another position, then the employee has a realistic alternative for avoiding an unacceptable policy

The Dangers of Leaving a Paper Trail Documents written on the machines do the most harm Offensive email postings Viewing inappropriate Web sites Internet communication Damage from electronic trail of emails

Vicarious Liability A party may be held responsible for injury or damage even when he or she was not actively involved in an incident Cyberliability: Employers can be held liable for the actions of their employees in their Internet communications to the same degree as if those employers had written those communications on company letterhead

Vicarious Liability Extent of cyberliability in the top categories of litigation Discrimination Harassment Obscenity and pornography Defamation and libel Information leaks Spam

Figure 8.1 - Ten Commandments of Computer Ethics Source: Computer Ethics Institute, “Ten Commandments of Computer Ethics,” Computer Professionals for Social Responsibility, http://cpsr.org/issues/ethics/cei.