Escolar Documentos
Profissional Documentos
Cultura Documentos
B7
Ethics
McGraw-Hill/Irwin
LEARNING OUTCOMES
1. Summarize the guidelines for creating an
information privacy policy
2. Identify the differences between an ethical
computer use policy and an acceptable
computer use policy
3. Describe the relationship between an email
privacy policy and an Internet use policy
B7-2
LEARNING OUTCOMES
4. Explain the effects of spam on an
organization
5. Summarize the different monitoring
technologies and explain the importance
of an employee monitoring policy
B7-3
INTRODUCTION
Ethics the principles and standards that guide
our behavior toward other people
Important ethical concepts stemming from IT
Intellectual property
Copyright
Fair use doctrine
Pirated software
Counterfeit software
B7-4
INTRODUCTION
ePolicies address information privacy and
confidentiality issues
ePolicies policies and procedures that address the
ethical use of computers and Internet usage
Privacy the right to be left alone when you want to
be, to have control over your own personal
possessions, and not to be observed without your
consent
Confidentiality the assurance that messages and
information are available only to those who are
authorized to view them
B7-5
Ethics
Individuals form the only ethical component of
an IT systems
B7-6
Ethics
Acting ethically and legally are not always
the same
B7-7
B7-11
B7-12
B7-13
B7-14
B7-15
B7-17
B7-18
B7-19
ANTI-SPAM POLICY
Spam unsolicited email
Spam accounts for 40% to 60% of most
organizations email and cost U.S.
businesses over $14 billion in 2005
Anti-spam policy simply states that
email users will not send unsolicited
emails (or spam)
B7-20
MONITORING TECHNOLOGIES
B7-22
MONITORING TECHNOLOGIES
Monitoring tracking peoples activities by
such measures as number of keystrokes, error
rate, and number of transactions processed
B7-24
2.
3.
4.
B7-28
2.
3.
4.