This article discusses the importance of IT code of ethics policy for organizations, its policy statement, and unacceptable use policy. It covers the principles and consequences of violating the codes.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INFORMATION TECHNOLOGY ETHICS Information Technology Ethics Name of the Student Name of the University Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 INFORMATION TECHNOLOGY ETHICS Table of Contents Question 1..................................................................................................................................2 Question 2..................................................................................................................................3 Question 3..................................................................................................................................4 References..................................................................................................................................6
2 INFORMATION TECHNOLOGY ETHICS Question 1 Introduction on the Need of IT Code of Ethics Policy ThereisahighrequirementofITcodeofethicspolicyforeachandevery organization. The organizational code of ethics eventually cover the legal and systematic behaviour of their clients. This type of policy includes policy statement about the reason for the proper existence as well as purpose of the company (Lawrence & Weber, 2014). This particular policy addresses the several consequences of violating the codes and even methods for reporting the violations of those codes. There are several reasons for considering go adopt this type of policy. Integrity is highly maintained with this ethical policy.
3 INFORMATION TECHNOLOGY ETHICS Question 2 Policy Statement The IT code of ethics policy provides the set of principles, which support a proper culture of stronger governance and even the highest ethical conduct after defining the integrity, behaviour and professionalism of the employees. The policy statement comprises of few key principles (Frolic & Drolet, 2013). These principles are as follows: i) The actions should be governed by the high standards of confidentiality and integrity. ii) The organizational decisions should made in accordance to the spirit as well as letter of law. iii) The respective business should be conducted ethically and honestly with the best skills or judgement for the stakeholders’ benefits. iv) The organizational actions should be for the unambiguous advantage of the company. v) The organizational actions must seek for enhancing the reputation as well as performance of the organization (Tesar, 2016). The personnel should comply with the code of ethics policy and this should be applied to every business activity with the stakeholders for operating and conducting the business.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 INFORMATION TECHNOLOGY ETHICS Question 3 Unacceptable Use Policy a)Excessive Non-Priority Use of Computing Resources The priority for the utilization of computing resources should be provided to the activities related to the organizational vision and mission. The network or computing resources are restricted in capacity (Galliott, 2016). For conserving the IT resource capacities for each user, the individual must exercise the restraint while using such resources. The organizational members should require the non-priority utilization of IT resources. b)Unacceptable System and Network Activities The unacceptable as well as network activities majorly involve the proper engagement within the effecting security breach and malicious utilization of the network communications. The configuration information is obtained about the system and network for which the users do not comprise of any administrative responsibility. Moreover, the proper engagement within the activities that are intended to hide the identity of the users and purposely increment the network traffic, often create danger for the systems and networks (Gillespie, 2014). Another effective network activity would be the circumvention of user authentication or access of data, systems and accounts, which the users are not expressly authorized for accessing. The interfering and denying of the services to any other user over the campus network outside the organization. c)Unauthorized Use of Intellectual Property The users should not utilize the networks for violating the legal as well as ethical rights of the organization that is protected by the copyright, patents, other intellectual properties, trade secrets and other laws and regulations. These types of violations involve
5 INFORMATION TECHNOLOGY ETHICS providingprinciplesandengagementofunauthorizedcopyingandpublicationofthe copyrighted materials like sources, music and video or even a software without license. Breaching of confidential agreements and disclosure of trade secrets are other significant examples of unauthorized utilization of intellectual properties. d)Inappropriate or Malicious Use of IT Systems and Information The inappropriate or the malicious utilization of several IT systems are extremely vulnerable for all organizations. A proper setting up of file sharing, where the protected intellectual properties are illegal shared and there is intentional introduction of malicious programs within network and server like Trojan horses, worms, viruses and many more (Gasper, 2016). Moreover, the change of the other users’ passwords, authorization and access is also an example of such breaching. The inappropriate utilization or sharing of the organizational authorized information technology resources and privileges is again one of the most vital examples of the malicious as well as inappropriate utilization of the information technology systems or information for any particular organization. e)Misuse of Electronic Communication The electronic communication is important for carrying out the major activities and should not be misused under any circumstance. The major prohibitions of the electronic communicationsare sending the unsolicitedmessageslike junk mailsand advertising materials as well as the engagement within harassment through the electronic communication whether via frequency, message size and language. The broadcasting of electronic mails from the organization for soliciting support of the ballot measures with the help of systems of emails.
6 INFORMATION TECHNOLOGY ETHICS References Frolic,A.N.,&Drolet,K.(2013).Ethicspolicyreview:acasestudyinquality improvement.Journal of medical ethics,39(2), 98-103. Galliott, J. (2016).Commercial space exploration: Ethics, policy and governance. Routledge. Gasper, D. (2016). Ethics of development. Gillespie, A. (2014).International environmental law, policy, and ethics. OUP Oxford. Lawrence, A. T., & Weber, J. (2014).Business and society: Stakeholders, ethics, public policy. Tata McGraw-Hill Education. Tesar, M. (2016). On ethics, policy and the philosophy of education.