Business Plug-In B7 Ethics.

Slides:



Advertisements
Similar presentations
BUSINESS B2 Ethics.
Advertisements

CHAPTER 4 E-ENVIRONMENT
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Information and Ethics, Information Security and Malicious Programs BSAD 141 Dave Novak.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
CHAPTER 05 Organizational Structures That Support Strategic Initiatives McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights.
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS
Chapter 29 Ethics in Accounting
Sarbanes-Oxley: where Information-Technology, Finance and Ethics Meet
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
4-1 Chapter Four Overview SECTION ETHICS –Ethics –Information Ethics –Developing Information Management Policies –Ethics in the Workplace SECTION.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Business Plug-In B7 Ethics.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
CSUN Information Systems IS312 Information Systems for Business Lecture 9 Ethic & Information Security.
Plug – In B7 Closing Case Two Pg. 357 By Gabe Carlson
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
Protecting People and Information: Threats and Safeguards
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
© 2005 by Nelson, a division of Thomson Canada Limited. 1 Business Ethics and Technology Search the Web If you are interested in ethics conversations.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Electronic Use Policies.   Social Media  Internet.
Business and Society: Ethics and Stakeholder Management, 5E Carroll & Buchholtz Copyright ©2003 by South-Western, a division of Thomson Learning. All.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
Corporate Social Responsibility
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Organizational Structures that Support Strategic Initiatives
ETHICS, POLICY & SECURITY ISSUES
Business Driven Technology Unit 1 Achieving Business Success Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
ETHICS, POLICY & SECURITY ISSUES
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 5-1 BUSINESS DRIVEN TECHNOLOGY Chapter Five: Organizational Structures that.
BUSINESS ETHICS Why is Business Ethics important in Business.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
Policy, Regulation, and Ethics Policy Systems and procedures must meet policy requirements. Regulation Organizations must comply with requirements of the.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Group 7 CIS03 June 09, Socially responsible computing is a major concern because of the many ways an information worker’s work can affect other.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Woodland Hills School District Computer Network Acceptable Use Policy.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
CBP Program – Business Etiquette Module 4: Business Ethics.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Chapter # 1 Overview of Ethics
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
Chapter 13 Security and Ethical Challenges.
Understand ethics and ethical decision-making.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Presentation transcript:

Business Plug-In B7 Ethics

LEARNING OUTCOMES Summarize the guidelines for creating an information privacy policy Identify the differences between an ethical computer use policy and an acceptable computer use policy Describe the relationship between an e-mail privacy policy and an Internet use policy

LEARNING OUTCOMES Explain the effects of spam on an organization Summarize the different monitoring technologies and explain the importance of an employee monitoring policy

INTRODUCTION Ethics – the principles and standards that guide our behavior toward other people Important ethical concepts stemming from IT Intellectual property Copyright Fair use doctrine Pirated software Counterfeit software

INTRODUCTION ePolicies address information privacy and confidentiality issues ePolicies – policies and procedures that address the ethical use of computers and Internet usage Privacy – the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent Confidentiality – the assurance that messages and information are available only to those who are authorized to view them

Ethics Individuals form the only ethical component of an IT systems

Ethics Acting ethically and legally are not always the same

INFORMATION HAS NO ETHICS Information does not care how it is used Information will not stop itself from sending spam, viruses, or highly-sensitive information Information cannot delete or preserve itself

Developing Information Management Policies Organizations strive to build a corporate culture based on ethical principles that employees can understand and implement ePolicies typically include: Ethical computer use policy Information privacy policy Acceptable use policy E-mail privacy policy Internet use policy Anti-spam policy

ETHICAL COMPUTER USE POLICY Ethical computer use policy – contains general principles to guide computer user behavior The ethical computer user policy ensures all users are informed of the rules and, by agreeing to use the system on that basis, consent to abide by the rules

ETHICAL COMPUTER USE POLICY

INFORMATION PRIVACY POLICY The unethical use of information typically occurs “unintentionally” when it is used for new purposes For example, social security numbers started as a way to identify government retirement benefits and are now used as a sort of universal personal ID Information privacy policy - contains general principles regarding information privacy

INFORMATION PRIVACY POLICY Information privacy policy guidelines Adoption and implementation of a privacy policy Notice and disclosure Choice and consent Information security Information quality and access

ACCEPTABLE USE POLICY Acceptable use policy (AUP) – a policy that a user must agree to follow in order to be provided access to a network or to the Internet An AUP usually contains a nonrepudiation clause Nonrepudiation – a contractual stipulation to ensure that e-business participants do not deny (repudiate) their online actions

ACCEPTABLE USE POLICY

E-MAIL PRIVACY POLICY Organizations can mitigate the risks of e-mail and instant messaging communication tools by implementing and adhering to an e-mail privacy policy E-mail privacy policy – details the extent to which e-mail messages may be read by others

E-MAIL PRIVACY POLICY

E-MAIL PRIVACY POLICY

INTERNET USE POLICY Internet use policy – contains general principles to guide the proper use of the Internet

ANTI-SPAM POLICY Spam – unsolicited e-mail Spam accounts for 40% to 60% of most organizations’ e-mail and cost U.S. businesses over $14 billion in 2005 Anti-spam policy – simply states that e-mail users will not send unsolicited e-mails (or spam)

Ethics in the Workplace Workplace monitoring is a concern for many employees Organizations can be held financially responsible for their employees’ actions The dilemma surrounding employee monitoring in the workplace is that an organization is placing itself at risk if it fails to monitor its employees, however, some people feel that monitoring employees is unethical

MONITORING TECHNOLOGIES

MONITORING TECHNOLOGIES Monitoring – tracking people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed Key logger or key trapper software Hardware key logger Cookie Adware Spyware Web log Clickstream

EMPLOYEE MONITORING POLICIES Employee monitoring policies – explicitly state how, when, and where the company monitors its employees

Closing Case One Sarbanes-Oxley The Sarbanes-Oxley Act (SOX) of 2002 is legislation enacted in response to the high-profile Enron and WorldCom financial scandals to protect shareholders and the general public from accounting errors and fraudulent practices by organizations Sarbanes-Oxley is where information technology, finance, and ethics meet

Closing Case One Questions Define the relationship between ethics and the Sarbanes-Oxley Act Why is records management an area of concern for the entire organization? What are two policies an organization can implement to achieve Sarbanes-Oxley compliance? Be sure to elaborate on how these policies can achieve compliance Identify the biggest roadblock for organizations that are attempting to achieve Sarbanes-Oxley compliance

Closing Case One Questions What types of information systems might facilitate SOX compliance? How will electronic monitoring affect the morale and performance of employees in the workplace? What do you think an unethical accountant or manager at Enron thought were the rewards and responsibilities associated with their job?

Closing Case Two Invading Your Privacy Can your employer invade your privacy through monitoring technologies? Smyth verses Pillsbury Company Bourke verses Nissan Motor Corporation McLaren verses Microsoft Corporation

Closing Case Two Questions Pick one of the cases above and create an argument on behalf of the employee Pick one of the cases above and create an argument against the employee Pick one of the cases above and create an argument on behalf of the employer’s use of monitoring technologies Pick one of the cases above and create an argument against the employer’s use of monitoring technologies