Explain the
ethical issues surrounding information technology.
Intellectual property
Copyright
Fair use doctrine
Pirated software
Counterfeit software
Although these issues may not be illegal they
may still be unethical.
Privacy is a major ethical issue, and a right
to privacy is the law.
This is a particular issue surrounding
information technology information regarding customers, company’s, personal
information, internal employees is collected and stored to improve business
practices, giving IT the means to unethically breach privacy and
confidentiality expectations.
Privacy policy is featured by law on every
website however these statements are often deceptively (and unethically)
embedded very deeply within the site (preventing people from actually reading
it!). Privacy, confidentiality, security measures has increased over the years,
however those that have access to the most privileged information (such as
Governments) that are abusing their power more than ever.
Describe a
situation involving technology that is ethical but illegal.
Acting ethically and legally are not always the
same. Piracy is illegal but possibly ethical to the artists themselves as it
increases their market reach and consumer awareness, but decreases the profits
enjoyed by the record label. Copying a disc may be considered ethical, in that
property is not physically stolen however it is illegal due to intellectual
property laws.
Describe and
explain one of the computer use policies that a company might employ.
A company
may develop information management policies such as an acceptable use policy
including monitoring the content of staff emails and also internet use during
work hours. Many workplaces employ policies against the use of profane language
in emails and access to social media sites during work hours. These two
policies are known as email and internet use policies.
They may
also develop management policies to ensure staff is regularly changing
passwords and that passwords created are effective and secure.
What are the
5 main technology security risks?
1. Human error (which can then be prevented with training programs).
2. Natural Disasters (which can then be
prevented with crisis management plans and safe houses/back up information off
site)
3. Technical failures (which can then be
prevented with firewalls, protection programs)
4. Deliberate Acts (which can then be
prevented with security protection programs, firewalls)
5. Management Failure (which can then be
prevented by training staff to be able to manage information and responsibly
access company info. Management
should force users to constantly change passwords).
What is a disaster recovery
plan, what strategies might a firm employ?
Disaster recovery can be defined as the
process of regaining access to computer systems and data after a disaster has
taken place. All firms should have a comprehensive disaster recovery plan in
place
This plan lists things like:
-Communications plan
-Alternative Sites – hot or warm site
-Business Continuity
-Location of Backup data
All Firms must have business continuity plans
that outline exactly what happens in a disaster.
-Off Site Data kept in date order
-Hot or Warm sites
-Well documented Procedures
-Regular Recovery Testing

No comments:
Post a Comment