Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.

Slides:



Advertisements
Similar presentations
The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
BUSINESS B2 Ethics.
Woodland Hills School District Computer Network Acceptable Use Policy.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
District networked computers give students access to a variety of educational programs, applications programs as well as the Internet. Providing a safe.
Facing Ethical and Legal Challenges C H A P T E R 2.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Little brother is watching you
Riverside Community School District
Business Plug-In B7 Ethics.
Factors to be taken into account when designing ICT Security Policies
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
INTERNET and CODE OF CONDUCT
Data Protection Act. Lesson Objectives To understand the data protection act.
General Purpose Packages
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Section 6 Theory Software Copyright, Viruses and Hacking.
Computer Legislation The need for computer laws Go to Contents.
COMPUTER ETHICS Do you know the difference between right and wrong?
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Unethical use of Computers and Networks
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Role of Communication Systems b INTERNET Hardware, Software, ServicesHardware, Software, Services Information searching, Publication of informationInformation.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
Teacher Rooming Equipment Rules / Expectations Login / Passwords Technical Issues Homework Printing.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Information Systems Unit 3.
Ethics...as related to computer technology. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate.
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
Welcome to the ICT Department Unit 3_4 Code of Conduct.
Computer Technology Timpview High School
Woodland Hills School District Computer Network Acceptable Use Policy.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Presentation of Acceptable Use Policy Kathryn Thomas UMUC EDTC 620 Summer 2012.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
Copyright Quiz How Well Do You Know Copyright?. Copyright Quiz: True or False Only materials with a copyright symbol,©, are protected. If it doesn’t have.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Welcome to the ICT Department Unit 3_5 Security Policies.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Netiquette internet manners, online etiquette, and digital etiquette The social code of network communication The social and moral code of the internet.
3.6 Fundamentals of cyber security
Unit 7 – Organisational Systems Security
Code of conduct Year 13.
Computer Misuse Act 1990 GCSE ICT.
What is Information Security?
How it affects policies and procedures
Woodland Hills School District
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Code of Conduct 344 Code of Conduct 344

Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees to use computer facilities to achieve organisational goals. Organisations do not mind employees generally surfing the Internet. Sending personal s is fine when in work. Downloading software onto a company network is acceptable practice. Making copies of organisational licensed software for home use is perfectly acceptable. Browsing through an employees personal folder is not acceptable, and violates their privacy.

Code of Conduct 344 There needs to be some guidelines to clarify:- What the organisation expects the employees to do. What the employees are allowed to do. Such guidelines are know as a Code of Conduct

Code of Conduct 344 Definition; An ICT Code of Conduct is an agreement made by an employee to obey the rules of the organisation and work within the specified guidelines as regards to the use of ICT and the Internet. This Code of Conduct will set out:- What is expected of the employee What is not acceptable Disciplinary action which may be taken

Code of Conduct 344 The Code of Conduct serves to prevent potential problems which may:- Damage or affect the organisations ICT system and data Cause offence or groups or individuals Allow the possibility of legal action against the organisation Potential Problems

Code of Conduct 344 Potential Problems Employees who work within the Code of Conduct will hopefully avoid problems which include: Introduction of Virus; Indiscriminate downloading of illicit software or opening of attachments Distribution of offensive material; Racial, sexual, other material likely to cause offence distributed using ICT, may lead to legal action against the organisation. Misuse of Data;Data which is use for the purpose it is not registered for under the DPA will leave the organisation open to prosecution under this act. Copying of Software;Software copied for personal/home use or sale, will break copyright laws and licensing agreement leaving prosecution a possibility

Code of Conduct 344 Contents of a Code of Conduct The Code of Conduct will set out for employees:- Responsibilities Authorisation Security Penalties for misuse

Code of Conduct 344 Responsibilities The Code will set out clearly the responsibility the employee has to the organisation through; Abiding by Legislation Protecting ICT systems and data from damage Respecting the rights of co-workers

Code of Conduct 344 Authorisation The Code will clearly define the employees authority to access data; amend data structures through; Levels of Access (Data) Editing authority at each level (update, delete, amend data) Re-naming tables, deleting/creating tables, amending relationships (Structure)

Code of Conduct 344 Security The Code will highlight the security practices which have to be observed by all employees, it will cover; Use of Passwords (disclosure/protection/renew) Use of Internet/ facilities Log-on/Log-off procedures Data transfer

Code of Conduct 344 Penalties for Misuse The Code will set out infringements to the Code of Conduct, and the penalties for each offence, including; Informal Warning Written Warning Dismissal Prosecution

Code of Conduct 344 Activity 1Using the Internet locate a code of conduct for an organisation 3Read the case study B.G. Computer Consultants and answer the questions which follow. 2Employing the content headings of:- Responsibilities Authorisation Security Penalties for Misuse Design an ICT Code of Conduct for Teachers and Pupils using the school network.

Code of Conduct 344 BG Computer Consultants Times are hard at B.G. Computer Consultants, with some employees been made redundant. Only last week, Tom was given 15 minutes to clear his desk before being escorted from the building; his User ID and password removed from the company network. Tom had downloaded an adventure game and installed it onto the network. Helen and Ian however, are fairly confident that their jobs as system analysts are secure, since they are both working on large contracts. Ian is on the verge of taking out a very large mortgage on a new house, and spends a fair portion of the working day browsing the Internet, for the best mortgage deal; using the facilities to confirm viewing appointments with estate agents. He has often told Helen that if the company “did the dirty on him”, he would get his own back in no uncertain terms. He has a friend who works in rival company who would love to gain access to the companies customer account details. One weekend Helen is working on a presentation at home. She is using a copy of the software she borrowed from the technician, and installed on her home PC. On the Monday at work she realised that she does not have all the data for the presentation. The figures she needs are in a file on the boss’s computer, and he is out at a meeting. She happens to know his password (unknown to him), and decides to look for the file. Purely accidentally she finds racially offensive and sexually explicit content in his inbox and outbox. She also comes across a memo, stating that Ian is to be made redundant as soon as the contract he is working on is complete.

Code of Conduct 344 BG Computer Consultants questions 1Compile a list of the characters in the case study and clearly state the possible infringement to an ICT Code of Conduct. Clarify the potential consequences of their actions 2Which infringement would you consider the more serious? 3Which posed the greatest risk to the organisation? Should Helen warn Ian about this, before he take out the mortgage? Who benefits? Who is harmed?