Top Banner

of 23

Business Plugin b2

Apr 09, 2018

Download

Documents

Batul Bharmal
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/8/2019 Business Plugin b2

    1/23

    1

    Ethics

    Business Plug-In B2

    Presented By:Suresh Machhar

  • 8/8/2019 Business Plugin b2

    2/23

    2

    Learning Objectives

    1. Summarize the guidelines for creating aninformation privacy policy.

    2. Identify the differences between anethical computer use policy and anacceptable computer use policy

    3. Describe the relationship between an e-mail privacy policy and an Internet usepolicy

  • 8/8/2019 Business Plugin b2

    3/23

    3

    4. Explain the effects of spam on anorganization.

    5. Summarize the different monitoringtechnologies and explain theimportance of an employeemonitoring policy

    Learning Objectives

  • 8/8/2019 Business Plugin b2

    4/23

    4

    INTRODUCTION

    Ethics the principles and standards thatguide our behavior toward other people

    Important ethical concepts stemming fromIT:

    Intellectual property

    Copyright Fair use doctrine

    Pirated software

    Counterfeit software

  • 8/8/2019 Business Plugin b2

    5/23

    5

    INTRODUCTION

    ePolicies address information privacy andconfidentiality issues ePolicies policies and procedures that

    address the ethical use of computers andInternet usage

    Privacy the right to be left alone when youwant to be, to have control over your ownpersonal possessions, and not to be observed

    without your consent Confidentiality the assurance that messages

    and data are available only to those who areauthorized to view them

  • 8/8/2019 Business Plugin b2

    6/23

    6

    Ethics

    Individuals form the only ethicalcomponent of an IT systems

  • 8/8/2019 Business Plugin b2

    7/23

    7

    Ethics

    Acting ethically and legally are notalways the same

  • 8/8/2019 Business Plugin b2

    8/23

    8

    INFORMATION HAS NO ETHICS

    Information has no ethics

    Information does not care how it is used

    Information will not stop itself from sendingspam, viruses, or highly-sensitive

    information

    Information cannot delete or preserve itself

  • 8/8/2019 Business Plugin b2

    9/23

    9

    Developing Information Management

    Policies Organizations strive to build a corporate

    culture based on ethical principles thatemployees can understand and implement

    ePolicies typically include:

    Ethical computer use policy

    Information privacy policy Acceptable use policy

    E-mail privacy policy

    Internet use policy

    Anti-spam policy

  • 8/8/2019 Business Plugin b2

    10/23

    10

    ETHICAL COMPUTER USE POLICY

    Ethicalcomputer use pol icycontains general principles to guidecomputer user behavior

    The ethical computer user policyensures all users are informed of the

    rules and, by agreeing to use thesystem on that basis, consent toabide by the rules

  • 8/8/2019 Business Plugin b2

    11/23

    11

    ETHICAL COMPUTER USE POLICY

    Six principles for ethical informationmanagement

  • 8/8/2019 Business Plugin b2

    12/23

    12

    INFORMATION PRIVACY POLICY

    The unethical use of information typicallyoccurs unintentionally when it is used fornew purposes

    For example, social security numbers startedas a way to identify government retirementbenefits and are now used as a sort ofuniversal personal ID

    Informationprivacypolicy- containsgeneral principles regarding informationprivacy

  • 8/8/2019 Business Plugin b2

    13/23

    13

    INFORMATION PRIVACY POLICY

    Information privacy policyguidelines:

    1. Adoption and implementation of aprivacy policy

    2. Notice and disclosure

    3. Choice and consent

    4. Information security

    5. Information quality and access

  • 8/8/2019 Business Plugin b2

    14/23

    14

    ACCEPTABLE USE POLICY

    Acceptableusepolicy (AUP) a policythat a user must agree to follow in order tobe provided access to a network or to the

    Internet

    An AUP usually contains a nonrepudiationclause

    Nonrepudiation a contractual stipulation toensure that e-business participants do not deny(repudiate) their online actions

  • 8/8/2019 Business Plugin b2

    15/23

    15

    ACCEPTABLE USE POLICY

  • 8/8/2019 Business Plugin b2

    16/23

    16

    E-MAIL PRIVACY POLICY

    Organizations can mitigate the risksof e-mail and instant messagingcommunication tools by implementingand adhering to an e-mail privacypolicy

    E-mail privacypolicy details theextent to which e-mail message maybe read by others

  • 8/8/2019 Business Plugin b2

    17/23

    17

    E-MAIL PRIVACY POLICY

  • 8/8/2019 Business Plugin b2

    18/23

    18

    INTERNET USE POLICY

    Internetusepolicy contains general principlesto guide the proper use of the Internet

  • 8/8/2019 Business Plugin b2

    19/23

    19

    ANTI-SPAM POLICY

    Spam unsolicited e-mail

    Spam accounts for 40% to 60% of mostorganizations e-mail and cost U.S.businesses over $10 billion in 2003

    Anti-spam policy simply states that e-mail users will not send unsolicited e-mails(or spam)

  • 8/8/2019 Business Plugin b2

    20/23

    20

    Ethicsinthe Workplace

    Workplace monitoring is a concern for manyemployees

    Organizations can be held financially responsible

    for their employees actions

    The dilemma surrounding employee monitoring inthe workplace is that an organization is placingitself at risk if it fails to monitor its employees,however, some people feel that monitoringemployees is unethical

  • 8/8/2019 Business Plugin b2

    21/23

    21

    MONITORING TECHNOLOGIES

    Monitoring tracking peoples activities by suchmeasures as number of keystrokes, error rate, andnumber of transactions processed

  • 8/8/2019 Business Plugin b2

    22/23

    22

    EMPLOYEE MONITORING POLICIES

    Employee monitoring policies explicitly state how,when, and where the company monitors its employees

  • 8/8/2019 Business Plugin b2

    23/23

    23