Welcome to the ICT Department Unit 3_4 Code of Conduct.

Slides:



Advertisements
Similar presentations
The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Northside I.S.D. Acceptable Use Policy
Woodland Hills School District Computer Network Acceptable Use Policy.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
The Woodlands High School
4.3.4 Legal V Moral Issues. Legal V Moral Issues Legal:- Is an action that is serious and against the law. This brings in the police or other local authorities.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
Riverside Community School District
Factors to be taken into account when designing ICT Security Policies
Health and Safety Legislation
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
VISD Acceptable Use Policy
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Telecommuting Teleworking Video-Conferencing Codes of Conduct
Higher Administration
Disciplinary Issues Palliative Medicine Registrar
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Chapter 6 Acceptable-Use Policies: Human Defenses Trevor Norsworthy Christina Richardson.
Computer Misuse The Kingsway School. Computer Misuse Computers have improved our standards of living for most of us. Some individuals and organisations.
Electronic Use Policies.   Social Media  Internet.
COM531 Multimedia Technologies Lecture 11 – Legal Issues.
Welcome to Causey Computer Lab! Computer Applications Mrs. Clements.
Computer Ethics for Computer Users
Computer Legislation The need for computer laws Go to Contents.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Computer Ethics A Necessity for the new era. Why is Computer Ethics Important? The creation and existence of new questions that older laws cannot answer.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Integrity of parliamentary staff in the Parliament of Montenegro Dražen Malović Head of Service for Human Resources and General Affairs ECPRD Seminar,
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Monitoring Employees on Networks: Unethical or Good Business?
Introduction to Computer Security PA Turnpike Commission.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Role of Communication Systems b INTERNET Hardware, Software, ServicesHardware, Software, Services Information searching, Publication of informationInformation.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Security and Ethics Safeguards and Codes of Conduct.
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Woodland Hills School District Computer Network Acceptable Use Policy.
Preparing to Work Contract of Employment. By the end of the lesson we will Know what a Contract of Employment is and what is contained in it Know the.
Presentation of Acceptable Use Policy Kathryn Thomas UMUC EDTC 620 Summer 2012.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Welcome to the ICT Department Unit 3_5 Security Policies.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Explaining strategies to ensure compliance with workplace legislation
WORKPLACE LEGISLATION
Ogletree, Deakins, Nash, Smoak & Stewart PC
GEC 0113 Ethics in IT Practices
Telecommuting (Teleworking)
Learning Area 1 Information And Communication Technology and Society
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Copyright, Designs and Patents Act 1988
Code of conduct Year 13.
Operational procedures for preventing misuse
TECHNOLOGY PROTECTION
Woodland Hills School District
Presentation transcript:

Welcome to the ICT Department Unit 3_4 Code of Conduct

What is a code of conduct? A code of conduct is an agreement between an employer to obey the rules of the organisation and work within specified guidelines.

Why have a guideline Employees need to know what & what not to do Employers need to protect themselves Disciplinary procedures need to be outlined to staff

Potential Problems Viruses Misuse Internet – inappropriate, time wasting Downloading software – takes up resources, licensing Distributing inappropriate material Data Illegal activity Copyright

What does it contain? Responsibilities Respecting the rights of others Legislation Licensing Authorisation Security Data Access Penalties Intellectual property rights

Penalties Informal warnings Written warnings Dismissal Prosecution Disinformation