Chapter 4 Ethics and Information Security
-
Upload
anas-wicaksono -
Category
Documents
-
view
225 -
download
0
Transcript of Chapter 4 Ethics and Information Security
-
8/2/2019 Chapter 4 Ethics and Information Security
1/1
Chapter 4. Ethics and Information Security
Ethics is the principles and standards that guide our behavior toward other people
Intellectual property is intangible creative work that is embodied in physical form
Copyright is the legal protection afforded an expression of an idea, such as song, video game, and sometypes of proprietary documents
Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software
Counterfeit software is a software that is manufactured to look like the real thing and sold as such
Privacy include 1. Right to be left alone 2. Control your own personal possessions 3. Not to be observed
without your consent
Epolicies are policies and procedures that address the ethical use of computers and internet usage in the
business environment
CIO Magazines Size Principles for Ethical Information Management
1. Information is a valuable corporate assets and should be managed as such, like cash, facilities, orany other corporate asset
2. The CIO is steward of corporate information and is responsible for managing it over its life cycle-from its generation to its appropriate destruction
3. The CIO is responsible for controlling access to and use of information, as determined bygovernmental regulation and corporate policy
4. The CIO is responsible for preventing the inappropriate destruction of information5. The CIO is responsible for bringing technological knowledge to the development of information
management practices and policies6. The CIO should partner with executive peers to develop and execute the organizations
information management policies
Ethical computer use policy contains general principles to guide computer user behavior. Example : the
ethical computer use policy might explicitly state that users should refrain from playing computer games
during working hours
Information privacy policy contains general principles regarding information privacy
Acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided access
to a network or to the internet.
Nonrepudiation is a contractual stipulation to ensure that ebusiness participants do not deny their online
actions.