Explain the ethical issues surrounding information technology.
Privacy - one of the largest ethical issues that faces organisations today. Privacy is in the interest of a person in protecting their life from unwanted intrusion and public scrutiny.
Confidentiality - is the principle that certain information will remain outside the public domain.
Confidentiality - is the principle that certain information will remain outside the public domain.
Intellectual property: the right to do, or omit to do, certain acts with intangible propertyollection of rights that protect creative and intellectual effort.
Copyright: the exclusive right to do, or omit to do, certain acts with intangible property, such as song, video games and some types of propriety documents.
Fair use doctrine: in certain situations, it is illegal to use copyright material.
Pirated software: the unauthorised use of duplication, distribution, or sale of copyrighted software.
Couunterfeit Software: software that is manufactured that is look like the real thing and sold as such.
Baltzan, Phillips, Lynch, Blakey (2010)
Describe a situation involving technology that is ethical but illegal.
A pearson received an offer for a mobile phone service from AT&T Wireless. This offer revealed that AT&T Wireless had used Equifax, a credit reporting agency to identify Claire Pearson as a potential customer. The Fair Credit Reporting Act is the United States forbids repurposing credit information except when the information is used for “a firm offer or credit insurance”.
Describe and explain one of the computer use policies that a company might employee
Acceptable Use Policy: is a policy a user must agree to follow in order to be provided access to a network or to the internet. For example, school students or employees of a business.
Conditions are: Not using the service as part of violating any law
Not attempting to send junk email or spam to anyone who does not want to recieve it
Not attempting to break the security of the computer network or user
Not posting commercial messages to groups without prior permission
Not attempting to mail a bomb site.
What are the 5 main technology security risks?
Biometrics: Physical Characteristics
Tokens: Small electronic devices that change user passwords automatically.
Phishing: Fruadulent email that can gain personal information
Identity Theft: forging someone else's identity
Smart Card: Contains embedded technologies that can store information
Outline one way to reduce each risk.
What is a disaster recovery plan, what strategies might a firm employee?
A Disaster recovery plan is a detailed process for recovering information or an IT system in the event of a catastrophic disaster.
- Strategies:
- Business Continuity Planning (BCP) is a plan is a plan for how organisations will recover and restore their business after the disaster has occurred.
- Cold Site: does not have any any computer computer equipment, but employees can go there after the disaster has occurred.
- Hot Site: separate and fully equipped facility where the company can go immediately after the disaster and resume their business.
No comments:
Post a Comment