Chapter Two Ethical & Legal Issues.

Slides:



Advertisements
Similar presentations
Chapter 17 Completing the Audit Engagement McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Advertisements

Intellectual Property Basics for Business Owners David M. Knasel, Esq. Dominion Business Law PLC Tysons Corner | Leesburg, VA
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Completing the Audit Engagement
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Intellectual Property Boston College Law School February 10, 2009 Trade Secret – Part 2.
Chapter 17 Completing the Engagement McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
New HR Challenges in the Dynamic Environment of Legal Compliance By Teri J. Elkins.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Social Responsibility of Business and Government
© 2012 Cengage Learning. All Rights Reserved. Principles of Business, 8e C H A P T E R 4 SLIDE Social Responsibility and Business Ethics Government.
INTERNET and CODE OF CONDUCT
ESSENTIAL STANDARD 2.00 Understand the nature of business. 1.
Per Anders Eriksson
CHAPTER Section 16.1 Legal Issues Section 16.2 Insurance Protecting Your Business.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Essential Standard 2.00 Understand the nature of business. 1.
Social Responsibility of Business and Government
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Intellectual Property, Nondisclosure agreements, Electronically Monitored Workplaces, And high level thinking questions.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
After completing this lesson, participants will be able to:  Identify ethical, legal, and policy issues for managing research data  Define copyrights,
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Chapter 17 Completing the Audit Engagement McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Professional, Legal and Ethical Issues CPSC 356 Database Ellen Walker Hiram College (Includes figures from Database Systems by Connolly & Begg, © Addison.
Objective 2.05 Understand responsible actions for conducting business. 1.
Essential Standard 2.00 Understand the nature of business. 1.
ESSENTIAL STANDARD 2.00 UNDERSTAND THE NATURE OF BUSINESS. 1.
© 2012 Cengage Learning. All Rights Reserved. Principles of Business, 8e C H A P T E R 4 SLIDE Social Responsibility and Business Ethics Government.
Lecture 11: Law and Ethics
© 2012 Cengage Learning. All Rights Reserved. Principles of Business, 8e C H A P T E R 4 SLIDE Social Responsibility and Business Ethics Government.
1 UNDERSTAND THE NATURE OF BUSINESS. ESSENTIAL STANDARD 2.00.
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 17-1 Chapter Seventeen Completing the Engagement Chapter Seventeen.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Bryce K. Earl, Esq. and Thomas G. Grace, Esq Presentation To: Association of Corporate Counsel January 26, 2010 ______________________________ Covenants.
Understand responsible actions for conducting business. 1.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Lexmundi.com TRADE SECRET PROTECTION IN THE DIGITAL AGE Eric H. Rumbaugh Partner Michael Best & Friedrich LLP Lex Mundi member firm for Wisconsin This.
Protection of Trade Secrets; current issues WIPO-UKRAINE SUMMER SCHOOL ON INTELLECTUAL PROPERTY – JULY 2011.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
©McGraw-Hill Education. All rights reserved.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Krysti Cox Dustin Hamilton Angela Pagenstecher Jeff Pike.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Chapter 4: Laws, Regulations, and Compliance
Protecting your Managed Services Practice: Are you at Risk?
Copyright, Intellectual Property, and Privacy 1 Lesson Plan: BMM A9-4.
Introduction to Business © Thomson South-Western ChapterChapter Social Responsibility of Business and Government Social Responsibility Government.
Essential Standard 2.00 UNDERSTAND THE NATURE OF BUSINESS. 1.
1. 2  Common socially responsible practices of businesses  Government protection  Consumer Bill of Rights  Government regulation and assistance 3.
Intellectual Property Basics for Business Owners David M. Knasel, Esq. Dominion Business Law PLC Tysons Corner | Leesburg, VA
TRADE SECRETS workshop I © 2009 Prof. Charles Gielen EU-China Workshop on the Protection of Trade Secrets Shanghai June 2009.
Technology Transfer Office
Understand Responsible Actions for Conducting Business
The Demand for Audit and Other Assurance Services
Understand the nature of business.
4 Social Responsibility of Business and Government
4 Social Responsibility of Business and Government
Completing the Audit Engagement
Learning Area 1 Information And Communication Technology and Society
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
4 Social Responsibility of Business and Government
Intellectual Property
IP and legal issues Super-project.eu.
Chapter # 6 Intellectual Property
Understand the nature of business.
Presentation transcript:

Chapter Two Ethical & Legal Issues

Why a Code of Ethics? Not all people act ethically under all circumstances. Written guidelines are not a guarantee, but ethical codes help keep honest people honest!

IRREGULAR AND ILLEGAL ACTS Irregular act : reflects an intentional violation of corporate policies or regulatory requirements or an unintentional breach of law Illegal act : represents a willful violation of law

EXAMPLES Fraud Computer crimes Nonconformity with agreements & contracts between the organization & third parties Violations of intellectual property rights Noncompliance with other regulations & laws.

Unethical and Illegal Behavior Categories Ignorance Accident Intent Deterrence Feare of penalty Probability of being caught Probably of penalty being administered

Overview of Responsibilities Plan the IT audit engagement based on an assessed level of risk that irregular and illegal acts might occur, and that such acts could be material to the subject matter of the IT auditor’s report. Design audit procedures that consider the assessed risk level for irregular and illegal acts. Review the results of audit procedures for indications of irregular and illegal acts.

Report suspected irregular and illegal acts Assume that the act is not isolated; Determine how the act slipped through the internal control system; Broaden audit procedures to consider the possibility of more acts of this nature; Conduct additional audit procedures; Evaluate the results of expanded audit procedures;

Consult with legal counsel and possibly corporate governance bodies to estimate the potential impact of the irregular and illegal acts, taken as a whole, on the subject matter of the engagement, audit report and organization. Report all facts and circumstances of the irregular and illegal acts (whether suspected or confirmed) if the acts have a material effect on the subject matter of the engagement and/or the organization. Distribute the report to appropriate internal parties, such as managers who are at least one level above those who are suspected or confirmed to have committed the acts, and/or corporate governance bodies.

Regulatory & Legal Issues Auditors need a working knowledge of regulations and laws so they at least can determine when to refer matters to legal counsel.

Legal Contracts A contract is an agreement between or among two or more persons or entities (businesses, organizations or government agencies) to do, or to abstain from doing, something in return for an exchange of consideration. Law provides remedies, including recuperation of losses or specific performance.

Employment Contracts Unilateral Contract – Employee is not bound. Cannot include that employee must work for stated period of time.

Confidentiality Agreements Employee agrees not to divulge confidential information Should describe nature of protected information List permissible uses of such information Identify remedies for non-compliance State term of agreement

Trade Secret Agreements A trade secret reflects a wide array of information that derives independent economic value from not being widely disclosed or readily ascertainable. Enforceable for indefinite period of time.

Discovery Agreements For employees hired to develop ideas and innovations. Agreement transfers ownership of discovery to employer. Prevents employees from claiming the discovery as their own property.

Non-Compete Agreements Employee agrees to not work for competing employer (including self) for Specified time (must be reasonable) Specified geography Prevents employee from working for other companies in connection with the design or sale of a competitive product. Monetary remedy may be awarded to company for violation

Trading Partner Contracts Ratifies agreements between companies & their trading partners with written contracts. IT auditors examine Trading Partner Contracts as to the sale and purchase of goods and services.

Computer Crime & Intellectual Property Computer Crime includes any behaviors that are deemed by states or nations to be illegal hacking into an entities network stealing intellectual property sabotaging a company’s database denying service to others who wish to use a Web site harassing or blackmailing someone violating privacy rights engaging in industrial espionage pirating computer software perpetrating fraud and so on.

Intellectual Property Intellectual Property (IP) referst to valuable creations of the mind. Most of computer crime involves the theft or misuse of Intellectual Property (IP). Two Categories of Intellectual Property: Industrial Property Patents, trademarks Individual Property Copyrights of literary and artistic works.

Cyber Information Crimes Three Breaches involving electronic information: Confidentiality – Access without authorization Integrity – Modification of data without authorization Availability – Authorized user denied access

Auditors & Cybercrime Auditors need general knowledge of cybercrime law Auditors may run across suspicious activities May help companies ward off potential acts.

Privacy Known as a “penumbra right.” Existing Laws narrow in scope, but expanding in response to the seriousness of the problem. The international community is working to protect privacy rights (e.g., EU “Safe Harbor”)

What is protected? Any personally identifiable information, factual or subjective, that is collected by an organization. Information is considered private if it can be specifically tied to or identified with an individual.

Subjective Information Factual Information Age Name Income Ethnicity Blood type Biometric images DNA Credit card numbers Loan information Medical records Opinions Evaluations Comments Disciplinary actions Disputes

IT Auditor’s Role in Privacy To ensure that management develops, implements and operates sound internal controls aimed at the protecting private information it collects and stores during the normal course of business. To assess the strength and effectiveness of controls designed to protect personally identifiable information in organizations.