tailieunhanh - Lecture Business driven technology (Business plug-in): Chapter 7 - Paige Baltzan, Amy Phillips

After studying this chapter you will be able to: Summarize the guidelines for creating an information privacy policy, identify the differences between an ethical computer use policy and an acceptable computer use policy, describe the relationship between an email privacy policy and an internet use policy, explain the effects of spam on an organization, summarize the different monitoring technologies and explain the importance of an employee monitoring policy. | BUSINESS PLUG-IN B7 Ethics LEARNING OUTCOMES Summarize the guidelines for creating an information privacy policy Identify the differences between an ethical computer use policy and an acceptable computer use policy Describe the relationship between an email privacy policy and an Internet use policy LEARNING OUTCOMES Explain the effects of spam on an organization Summarize the different monitoring technologies and explain the importance of an employee monitoring policy INTRODUCTION Ethics – the principles and standards that guide our behavior toward other people Important ethical concepts stemming from IT Intellectual property Copyright Fair use doctrine Pirated software Counterfeit software INTRODUCTION ePolicies address information privacy and confidentiality issues ePolicies – policies and procedures that address the ethical use of computers and Internet usage Privacy – the right to be left alone when you want to be, to have control over your own personal . | BUSINESS PLUG-IN B7 Ethics LEARNING OUTCOMES Summarize the guidelines for creating an information privacy policy Identify the differences between an ethical computer use policy and an acceptable computer use policy Describe the relationship between an email privacy policy and an Internet use policy LEARNING OUTCOMES Explain the effects of spam on an organization Summarize the different monitoring technologies and explain the importance of an employee monitoring policy INTRODUCTION Ethics – the principles and standards that guide our behavior toward other people Important ethical concepts stemming from IT Intellectual property Copyright Fair use doctrine Pirated software Counterfeit software INTRODUCTION ePolicies address information privacy and confidentiality issues ePolicies – policies and procedures that address the ethical use of computers and Internet usage Privacy – the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent Confidentiality – the assurance that messages and information are available only to those who are authorized to view them Ethics Individuals form the only ethical component of an IT systems Ethics Acting ethically and legally are not always the same INFORMATION HAS NO ETHICS Information does not care how it is used Information will not stop itself from sending spam, viruses, or highly-sensitive information Information cannot delete or preserve itself Developing Information Management Policies Organizations strive to build a corporate culture based on ethical principles that employees can understand and implement ePolicies typically include: Ethical computer use policy Information privacy policy Acceptable use policy Email privacy policy Internet use policy Anti-spam policy ETHICAL COMPUTER USE POLICY Ethical computer use policy – contains general principles to guide computer user behavior The ethical computer user policy

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.