Download presentation
Presentation is loading. Please wait.
Published byIsaac Gibbs Modified over 8 years ago
1
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics
2
B7-2 LEARNING OUTCOMES 1.Summarize the guidelines for creating an information privacy policy 2.Identify the differences between an ethical computer use policy and an acceptable computer use policy 3.Describe the relationship between an e-mail privacy policy and an Internet use policy
3
B7-3 LEARNING OUTCOMES 4.Explain the effects of spam on an organization 5.Summarize the different monitoring technologies and explain the importance of an employee monitoring policy
4
B7-4 INTRODUCTION Ethics – the principles and standards that guide our behavior toward other people Important ethical concepts stemming from IT –Intellectual property –Copyright –Fair use doctrine –Pirated software –Counterfeit software
5
B7-5 INTRODUCTION ePolicies address information privacy and confidentiality issues –ePolicies – policies and procedures that address the ethical use of computers and Internet usage –Privacy – the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent –Confidentiality – the assurance that messages and information are available only to those who are authorized to view them
6
B7-6 Ethics Individuals form the only ethical component of an IT systems
7
B7-7 Ethics Acting ethically and legally are not always the same
8
B7-8 INFORMATION HAS NO ETHICS Information does not care how it is used Information will not stop itself from sending spam, viruses, or highly-sensitive information Information cannot delete or preserve itself
9
B7-9 Developing Information Management Policies Organizations strive to build a corporate culture based on ethical principles that employees can understand and implement ePolicies typically include: –Ethical computer use policy –Information privacy policy –Acceptable use policy –E-mail privacy policy –Internet use policy –Anti-spam policy
10
B7-10 ETHICAL COMPUTER USE POLICY Ethical computer use policy – contains general principles to guide computer user behavior The ethical computer user policy ensures all users are informed of the rules and, by agreeing to use the system on that basis, consent to abide by the rules
11
B7-11 ETHICAL COMPUTER USE POLICY
12
B7-12 INFORMATION PRIVACY POLICY Information privacy policy - contains general principles regarding information privacy –Would you mind if your Visa company shared all of your purchasing information? –Who owns the information on your Visa? –Why would people want to purchase Visa information?
13
B7-13 ACCEPTABLE USE POLICY Acceptable use policy (AUP) – a policy that a user must agree to follow in order to be provided access to a network or to the Internet An AUP usually contains a non-repudiation clause –Nonrepudiation – a contractual stipulation to ensure that e-business participants do not deny (repudiate) their online actions ( therefore, keep all your emails)
14
B7-14 ACCEPTABLE USE POLICY
15
B7-15 E-MAIL PRIVACY POLICY Organizations can reduce the risks of e-mail and instant messaging communication tools by implementing and adhering to an e-mail privacy policy E-mail privacy policy – details the extent to which e-mail messages may be read by others (e-mail is not safe)
16
B7-16 E-MAIL PRIVACY POLICY
17
B7-17 E-MAIL PRIVACY POLICY
18
B7-18 INTERNET USE POLICY Internet use policy – contains general principles to guide the proper use of the Internet
19
B7-19 ANTI-SPAM POLICY Spam – unsolicited e-mail Spam accounts for 40% to 60% of most organizations’ e-mail and cost U.S. businesses over $14 billion in 2005 Anti-spam policy – simply states that e-mail users will not send unsolicited e-mails (or spam) Use X2009abc at stfx dot ca to disguise email address
20
B7-20 MONITORING TECHNOLOGIES Monitoring – tracking people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed –Key logger or key trapper software –Hardware key logger –Cookie –Adware –Spyware –Web log –Clickstream
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.