Chapter 4 Ethics and Information Security

download Chapter 4 Ethics and Information Security

of 1

Transcript of Chapter 4 Ethics and Information Security

  • 8/2/2019 Chapter 4 Ethics and Information Security

    1/1

    Chapter 4. Ethics and Information Security

    Ethics is the principles and standards that guide our behavior toward other people

    Intellectual property is intangible creative work that is embodied in physical form

    Copyright is the legal protection afforded an expression of an idea, such as song, video game, and sometypes of proprietary documents

    Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software

    Counterfeit software is a software that is manufactured to look like the real thing and sold as such

    Privacy include 1. Right to be left alone 2. Control your own personal possessions 3. Not to be observed

    without your consent

    Epolicies are policies and procedures that address the ethical use of computers and internet usage in the

    business environment

    CIO Magazines Size Principles for Ethical Information Management

    1. Information is a valuable corporate assets and should be managed as such, like cash, facilities, orany other corporate asset

    2. The CIO is steward of corporate information and is responsible for managing it over its life cycle-from its generation to its appropriate destruction

    3. The CIO is responsible for controlling access to and use of information, as determined bygovernmental regulation and corporate policy

    4. The CIO is responsible for preventing the inappropriate destruction of information5. The CIO is responsible for bringing technological knowledge to the development of information

    management practices and policies6. The CIO should partner with executive peers to develop and execute the organizations

    information management policies

    Ethical computer use policy contains general principles to guide computer user behavior. Example : the

    ethical computer use policy might explicitly state that users should refrain from playing computer games

    during working hours

    Information privacy policy contains general principles regarding information privacy

    Acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided access

    to a network or to the internet.

    Nonrepudiation is a contractual stipulation to ensure that ebusiness participants do not deny their online

    actions.