Saturday, 15 September 2012

Week 5, Chapter 4: ETHICS & SECURITY

Blog Questions


Explain the ethical issues surrounding information technology.

Intellectual property
Copyright
Fair use doctrine
Pirated software
Counterfeit software
Although these issues may not be illegal they may still be unethical.
Privacy is a major ethical issue, and a right to privacy is the law.
This is a particular issue surrounding information technology information regarding customers, company’s, personal information, internal employees is collected and stored to improve business practices, giving IT the means to unethically breach privacy and confidentiality expectations.
Privacy policy is featured by law on every website however these statements are often deceptively (and unethically) embedded very deeply within the site (preventing people from actually reading it!). Privacy, confidentiality, security measures has increased over the years, however those that have access to the most privileged information (such as Governments) that are abusing their power more than ever.



Describe a situation involving technology that is ethical but illegal.
Acting ethically and legally are not always the same. Piracy is illegal but possibly ethical to the artists themselves as it increases their market reach and consumer awareness, but decreases the profits enjoyed by the record label. Copying a disc may be considered ethical, in that property is not physically stolen however it is illegal due to intellectual property laws.

Describe and explain one of the computer use policies that a company might employ.
A company may develop information management policies such as an acceptable use policy including monitoring the content of staff emails and also internet use during work hours. Many workplaces employ policies against the use of profane language in emails and access to social media sites during work hours. These two policies are known as email and internet use policies.
They may also develop management policies to ensure staff is regularly changing passwords and that passwords created are effective and secure.

What are the 5 main technology security risks?
1. Human error  (which can then be prevented with training programs).
2. Natural Disasters (which can then be prevented with crisis management plans and safe houses/back up information off site)
3. Technical failures (which can then be prevented with firewalls, protection programs)

4. Deliberate Acts (which can then be prevented with security protection programs, firewalls)

5. Management Failure (which can then be prevented by training staff to be able to manage information and responsibly access company info.  Management should force users to constantly change passwords).


What is a disaster recovery plan, what strategies might a firm employ?

Disaster recovery can be defined as the process of regaining access to computer systems and data after a disaster has taken place. All firms should have a comprehensive disaster recovery plan in place
This plan lists things like:
-Communications plan
-Alternative Sites – hot or warm site
-Business Continuity
-Location of Backup data
All Firms must have business continuity plans that outline exactly what happens in a disaster.
-Off Site Data kept in date order
-Hot or Warm sites
-Well documented Procedures
-Regular Recovery Testing

No comments:

Post a Comment