Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

Similar presentations


Presentation on theme: "Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education."— Presentation transcript:

1 Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education. Business Plug-In B7 Ethics

2 7-2 LEARNING OUTCOMES 1. Explain the ethical issues in the use of the information age 2. Identify the six epolicies an organization should implement to protect themselves

3 7-3 INFORMATION ETHICS O Ethics – The principles and standards that guide our behavior toward other people O Information ethics – Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself

4 7-4 INFORMATION ETHICS O Business issues related to information ethics O Intellectual property O Copyright O Pirated software O Counterfeit software O Digital rights management

5 7-5 INFORMATION ETHICS O Privacy is a major ethical issue O Privacy – The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent O Confidentiality – the assurance that messages and information are available only to those who are authorized to view them

6 7-6 INFORMATION ETHICS O Individuals form the only ethical component of MIS O Individuals copy, use, and distribute software O Search organizational databases for sensitive and personal information O Individuals create and spread viruses O Individuals hack into computer systems to steal information O Employees destroy and steal information

7 7-7 INFORMATION ETHICS O Acting ethically and legally are not always the same

8 7-8 Information Does Not Have Ethics, People Do O Information does not care how it is used, it will not stop itself from sending spam, viruses, or highly-sensitive information O Tools to prevent information misuse O Information management O Information governance O Information compliance O Ediscovery

9 7-9 DEVELOPING INFORMATION MANAGEMENT POLICIES O Organizations strive to build a corporate culture based on ethical principles that employees can understand and implement

10 7-10 Ethical Computer Use Policy O Ethical computer use policy – Contains general principles to guide computer user behavior O The ethical computer user policy ensures all users are informed of the rules and, by agreeing to use the system on that basis, consent to abide by the rules

11 7-11 Information Privacy Policy O The unethical use of information typically occurs “unintentionally” when it is used for new purposes O Information privacy policy - Contains general principles regarding information privacy

12 7-12 Acceptable Use Policy O Acceptable use policy (AUP) – Requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet O Nonrepudiation – A contractual stipulation to ensure that ebusiness participants do not deny their online actions O Internet use policy – Contains general principles to guide the proper use of the Internet

13 7-13 Email Privacy Policy O Organizations can mitigate the risks of email and instant messaging communication tools by implementing and adhering to an email privacy policy O Email privacy policy – Details the extent to which email messages may be read by others

14 7-14 Email Privacy Policy

15 7-15 Email Privacy Policy O Spam – Unsolicited email O Anti-spam policy – Simply states that email users will not send unsolicited emails (or spam)

16 7-16 Social Media Policy O Social media policy – Outlines the corporate guidelines or principles governing employee online communications

17 7-17 WORKPLACE MONITORING POLICY O Workplace monitoring is a concern for many employees O Organizations can be held financially responsible for their employees’ actions O The dilemma surrounding employee monitoring in the workplace is that an organization is placing itself at risk if it fails to monitor its employees, however, some people feel that monitoring employees is unethical

18 7-18 WORKPLACE MONITORING POLICY O Information technology monitoring – Tracks people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed O Employee monitoring policy – Explicitly state how, when, and where the company monitors its employees

19 7-19 WORKPLACE MONITORING POLICY O Common monitoring technologies include: O Key logger or key trapper software O Hardware key logger O Cookie O Adware O Spyware O Web log O Clickstream


Download ppt "Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education."

Similar presentations


Ads by Google