What outlines the corporate guidelines or principles governing employee online communications

Presentation on theme: "Business Plug-In B7 Ethics."— Presentation transcript:

1 Business Plug-In B7 Ethics

2 LEARNING OUTCOMES Explain the ethical issues in the use of information technology. Identify the six epolicies organizations should implement to protect themselves.

3 INFORMATION ETHICS Ethics—The principles and standards that guide our behavior toward other people Information Ethics—Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself Important ethical concepts stemming from IT: Intellectual Property Copyright Pirated Software Counterfeit Software

4 INFORMATION ETHICS

5 INFORMATION DOES NOT HAVE ETHICS, PEOPLE DO
Information Management—Examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively Information Governance—Is a method or system of government for information management or control

6 INFORMATION DOES NOT HAVE ETHICS, PEOPLE DO
Information Compliance—Is the act of conforming, acquiescing, or yielding information Ediscovery—Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry

7 DEVELOPING INFORMATION MANAGEMENT POLICIES
Organizations should develop written policies establishing employee guidelines, employee procedures, and organizational rules for information Epolicies—Policies and procedures that address the ethical use of computers and Internet usage

8 ETHICAL COMPUTER USE POLICY
Regardless of what business a company operates the company must protect itself from unethical employee behavior Ethical Computer Use Policy—Contains general principles to guide computer user behavior The users should be informed of the rules and, by agreeing to use the system on that basis, consent to abide by them

9 ETHICAL COMPUTER USE POLICY

10 INFORMATION PRIVACY POLICY
Information Privacy Policy—Contains general principles regarding information privacy In a large majority of cases, the unethical use of information happens not through the malicious scheming of a rogue marketer, but rather unintentionally

11 ACCEPTABLE USE POLICY Acceptable Use Policy (AUP)—A policy that a user must agree to follow in order to be provided access to a network or to the Internet Nonrepudiation—A contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions Internet Use Policy—Contains general principles to guide the proper use of the Internet

12 PRIVACY POLICY Privacy Policy—Details the extent to which messages may be read by others. One major problem with is the user’s expectations of privacy Spam—Is unsolicited Anti-Spam Policy simply states that users will not send unsolicited s (or spam)

13 SOCIAL MEDIA POLICY Social Media Policy—Outlines the corporate guidelines or principles governing employee online communications Social media policies a company might choose to implement include: Employee online communication policy Employee blogs Employee social network websites Employee Twitter, LinkedIn, and Facebook Corporate YouTube policy

14 WORKPLACE MONITORING POLICY
The dilemma surrounding employee monitoring in the workplace is that an organization is placing itself at risk if it fails to monitor its employees, however, some people feel that monitoring employees is unethical Monitoring—Tracking people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed Employee Monitoring Policies—Explicitly state how, when, and where the company monitors its employees

15 WORKPLACE MONITORING POLICY
Common Internet monitoring technologies: Key logger or key trapper software Hardware key logger Cookie Adware Spyware Web log Clickstream

The General Data Protection Regulation (GDPR) is a legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union (EU).

What is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy?

FIP (Fair Information Practices) is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

What is the process of extracting large amounts of data from a website and saving it to a spreadsheet or computer?

Data scraping, also known as web scraping, is the process of importing information from a website into a spreadsheet or local file saved on your computer. It's one of the most efficient ways to get data from the web, and in some cases to channel that data to another website.

Which policy simply states that email users will not send unsolicited emails?

The CAN-SPAM Act, a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have you stop emailing them, and spells out tough penalties for violations.