Upload
batul-bharmal
View
219
Download
0
Embed Size (px)
Citation preview
8/8/2019 Business Plugin b2
1/23
1
Ethics
Business Plug-In B2
Presented By:Suresh Machhar
8/8/2019 Business Plugin b2
2/23
2
Learning Objectives
1. Summarize the guidelines for creating aninformation privacy policy.
2. Identify the differences between anethical computer use policy and anacceptable computer use policy
3. Describe the relationship between an e-mail privacy policy and an Internet usepolicy
8/8/2019 Business Plugin b2
3/23
3
4. Explain the effects of spam on anorganization.
5. Summarize the different monitoringtechnologies and explain theimportance of an employeemonitoring policy
Learning Objectives
8/8/2019 Business Plugin b2
4/23
4
INTRODUCTION
Ethics the principles and standards thatguide our behavior toward other people
Important ethical concepts stemming fromIT:
Intellectual property
Copyright Fair use doctrine
Pirated software
Counterfeit software
8/8/2019 Business Plugin b2
5/23
5
INTRODUCTION
ePolicies address information privacy andconfidentiality issues ePolicies policies and procedures that
address the ethical use of computers andInternet usage
Privacy the right to be left alone when youwant to be, to have control over your ownpersonal possessions, and not to be observed
without your consent Confidentiality the assurance that messages
and data are available only to those who areauthorized to view them
8/8/2019 Business Plugin b2
6/23
6
Ethics
Individuals form the only ethicalcomponent of an IT systems
8/8/2019 Business Plugin b2
7/23
7
Ethics
Acting ethically and legally are notalways the same
8/8/2019 Business Plugin b2
8/23
8
INFORMATION HAS NO ETHICS
Information has no ethics
Information does not care how it is used
Information will not stop itself from sendingspam, viruses, or highly-sensitive
information
Information cannot delete or preserve itself
8/8/2019 Business Plugin b2
9/23
9
Developing Information Management
Policies Organizations strive to build a corporate
culture based on ethical principles thatemployees can understand and implement
ePolicies typically include:
Ethical computer use policy
Information privacy policy Acceptable use policy
E-mail privacy policy
Internet use policy
Anti-spam policy
8/8/2019 Business Plugin b2
10/23
10
ETHICAL COMPUTER USE POLICY
Ethicalcomputer use pol icycontains general principles to guidecomputer user behavior
The ethical computer user policyensures all users are informed of the
rules and, by agreeing to use thesystem on that basis, consent toabide by the rules
8/8/2019 Business Plugin b2
11/23
11
ETHICAL COMPUTER USE POLICY
Six principles for ethical informationmanagement
8/8/2019 Business Plugin b2
12/23
12
INFORMATION PRIVACY POLICY
The unethical use of information typicallyoccurs unintentionally when it is used fornew purposes
For example, social security numbers startedas a way to identify government retirementbenefits and are now used as a sort ofuniversal personal ID
Informationprivacypolicy- containsgeneral principles regarding informationprivacy
8/8/2019 Business Plugin b2
13/23
13
INFORMATION PRIVACY POLICY
Information privacy policyguidelines:
1. Adoption and implementation of aprivacy policy
2. Notice and disclosure
3. Choice and consent
4. Information security
5. Information quality and access
8/8/2019 Business Plugin b2
14/23
14
ACCEPTABLE USE POLICY
Acceptableusepolicy (AUP) a policythat a user must agree to follow in order tobe provided access to a network or to the
Internet
An AUP usually contains a nonrepudiationclause
Nonrepudiation a contractual stipulation toensure that e-business participants do not deny(repudiate) their online actions
8/8/2019 Business Plugin b2
15/23
15
ACCEPTABLE USE POLICY
8/8/2019 Business Plugin b2
16/23
16
E-MAIL PRIVACY POLICY
Organizations can mitigate the risksof e-mail and instant messagingcommunication tools by implementingand adhering to an e-mail privacypolicy
E-mail privacypolicy details theextent to which e-mail message maybe read by others
8/8/2019 Business Plugin b2
17/23
17
E-MAIL PRIVACY POLICY
8/8/2019 Business Plugin b2
18/23
18
INTERNET USE POLICY
Internetusepolicy contains general principlesto guide the proper use of the Internet
8/8/2019 Business Plugin b2
19/23
19
ANTI-SPAM POLICY
Spam unsolicited e-mail
Spam accounts for 40% to 60% of mostorganizations e-mail and cost U.S.businesses over $10 billion in 2003
Anti-spam policy simply states that e-mail users will not send unsolicited e-mails(or spam)
8/8/2019 Business Plugin b2
20/23
20
Ethicsinthe Workplace
Workplace monitoring is a concern for manyemployees
Organizations can be held financially responsible
for their employees actions
The dilemma surrounding employee monitoring inthe workplace is that an organization is placingitself at risk if it fails to monitor its employees,however, some people feel that monitoringemployees is unethical
8/8/2019 Business Plugin b2
21/23
21
MONITORING TECHNOLOGIES
Monitoring tracking peoples activities by suchmeasures as number of keystrokes, error rate, andnumber of transactions processed
8/8/2019 Business Plugin b2
22/23
22
EMPLOYEE MONITORING POLICIES
Employee monitoring policies explicitly state how,when, and where the company monitors its employees
8/8/2019 Business Plugin b2
23/23
23