Presentation is loading. Please wait.

Presentation is loading. Please wait.

ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.

Similar presentations


Presentation on theme: "ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES."— Presentation transcript:

1 ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES

2 INTRODUCTION ICT Ethics, Security & Policy Issues Policy is acceptable use of guidelines Ethics is the right and wrong of IT (Information Technology) usage Security is a measures from anti-theft, anti- virus, anti-hacker, anti-fraud 2CIIT---ETHICS,POLICY AND SECURITY ISSUES

3 3 Ethical vs. Legal Issues Q Legal issues: Sometimes have a definitive answer Determination is made by others (not you) Ethical issues: Sometimes have a definitive answer You determine your course of action The law doesn’t make it “right”, Being “right” doesn’t make it legal CIIT---ETHICS,POLICY AND SECURITY ISSUES

4 4 Ethical Issues Ethical 1. pertaining to or dealing with morals or the principles of morality; pertaining to right and wrong in conduct. 2. in accordance with the rules or standards for right conduct or practice, esp., the standards of a profession. Examples: – Should companies collect and/or sell customer data? – Should IT specialists monitor and report employee computer use? CIIT---ETHICS,POLICY AND SECURITY ISSUES

5 Ethical Principals Three useful ethical principals: – An act is ethical if all of society benefits from the act. – An act is ethical if people are treated as an end and not as a means to an end. – An act is ethical if it is fair to all parties involved. 5CIIT---ETHICS,POLICY AND SECURITY ISSUES

6 6 Frameworks for Ethics Two basic frameworks – consequence-based Priority is given to choices that lead to a “good” outcome (consequence) The outcome outweighs the method – rule-based Priority is given to following the rules without undue regard to the outcome Stress fidelity to a sense of duty and principle (“never tell a lie”) Exist for the benefit of society and should be followed CIIT---ETHICS,POLICY AND SECURITY ISSUES

7 7 Four Ethical Issues of the Information Age Privacy - right of individual to control personal information Accuracy – who is responsible for the authenticity, fidelity, and accuracy of information? Property – Who owns the information? Who controls access? (e.g. buying the IP verses access to the IP) Accessibility – what information does an organization have the right to collect? Under what safeguards? 1: CIIT---ETHICS,POLICY AND SECURITY ISSUES

8 COMPUTER ABUSE Computer abuse includes Hacking, dissemination of software Worms, software Viruses, Trojan Horses (program that introduces viruses to computers), etc. 8CIIT---ETHICS,POLICY AND SECURITY ISSUES

9 ICT SECURITY ISSUES The protection of ICT data, facilities, software, hardware, services & processes is an increasingly challenging priority for every sector of society including education. Theft, hacking, and viruses, etc. can seriously compromise ICT systems, resulting in material loss and liability. The goal of ICT security is to ensure that ICT systems, data and transactions remain intact and optimized. 9CIIT---ETHICS,POLICY AND SECURITY ISSUES

10 DOMAINS OF ICT SECURITY ICT Security Targets The Following Domains: 1.Appropriate Use Of ICT Systems 2.Privacy & Confidentiality of Data 3.Integrity of ICT Systems 4.Protection of all ICT related Hardware, Software and Facilities 5.ICT Systems Functionality 10CIIT---ETHICS,POLICY AND SECURITY ISSUES

11 DETAILS OF ICT SECURITY 1. APPROPRIATE USE OF ICT SYSTEMS Effective ICT Security measures ensures that ICT systems are used as intended. 2. PRIVACY & CONFIDENTIALITY OF DATA Effective ICT Security measures protects the confidentiality and privacy of consumer and institution data and prevent copyright violations 3. INTEGRITY OF ICT SYSTEMS Effective ICT Security Systems ensure that Data remains uncompromised and provide for speedy data and systems recovery. 11CIIT---ETHICS,POLICY AND SECURITY ISSUES

12 DETAILS OF ICT SECURITY (contd..) 4. PROTECTION OF ALL ICT RELATED HARDWARE, SOFTWARE AND FACILITIES Effective ICT Security systems preserve the integrity of all ICT related systems and facilities including hardware & software, communication capabilities, and network systems. 5. ICT SYSTEMS FUNCTIONALITY Effective ICT Security systems optimize functionality of ICT systems in all circumstances. 12CIIT---ETHICS,POLICY AND SECURITY ISSUES

13 CONSEQUENCES OF ICT ETHICS, POLICY & SECURITY VIOLATION ICT Systems are essential and increasingly indispensable for efficient, timely and cost-effective socioeconomic, including educational transactions. They typically represent significant investments. ethical, policy & or security breaches can result in significant liability. Hence, ethical, policy and or security breaches must attract consequences consistent with ethical standards and institution policies. 13CIIT---ETHICS,POLICY AND SECURITY ISSUES


Download ppt "ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES."

Similar presentations


Ads by Google