1.
There are 4 main technology related ethical issues. They are:
A. Intellectual property: Intangible creative work that is embodied in physical form
B. Copyright: The legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents.
C. Fair use doctrine: In certain situations, it is legal to use copyrighted material
D. Pirated software: The unauthorized use, duplication, distribution, or sale of copy righted software.
E. Counterfeit software: Software that is manufactured to look like the real thing.
There is also the issue of privacy. Privacy is an issue as people have right to be left alone when they wish to be. Privacy is one of the prime barriers to the growth of e-business as many people can not accept the trust required in the privacy issues that needs to be accepted for e-business to grow.
2.
An example of a practice that would fall into the 2nd quadrant of the Acting ethically and legally are not always the same figure 4.4 (Essentials of Information systems, 134) is if you were to buy a copy of a software program and then make a copy of it (which is illegal) as a back up copy for yourself this would be considered ethical but is also illegal.
3.
An ethical computer use policy will contain general principles to guide computer user behaviour. An example of one of these policies is acceptable use policy which is a policy that a user must agree to follow in order to be provided access to a network or to the Internet.
4.
The 5 main technology security risks are as follows. Human error which is not intentional. Natural disasters unplanned natural occurring events. Technical failures like crashes and bugs. Deliberate acts like sabotage and hacking. Management failure which includes lack of procedures, documentation and training.
5.
To stop deliberate acts of security risks an organisation can implement strong passwords, password changes regularly, system audits, strong penalties for misuse of data and firewalls. This will also cut down human error.
To prevent disasters company's should have information stored off site and all information must be recoverable, with regular recovering testing. This is will help if a hard drive crashes or a bug destroys and computers information.
There is also corporate protection systems available to prevent external hackers entering the site and also will protect against intentional viruses.
6.
In the case that a disaster occurs a company should have a system in place to ensure that all data and information is easily recoverable. To prevent disasters company's should have information stored off site and all information must be recoverable, with regular recovering testing. This is will help if a hard drive crashes or a bug destroys and computers information.
No comments:
Post a Comment