Ethical Issue Policy Report: Employee Privacy and Ethics Concerns

Verified

Added on  2019/09/30

|5
|586
|489
Report
AI Summary
This report provides an overview of an ethical issue policy, addressing concerns related to employee privacy and ethical regulations within an organization. The scenario involves an employee accessing and stealing personal photographs of another employee, highlighting breaches of ethical conduct and data security. The report examines the scope, stakeholders (victim, colleague, office ethics, social media), roles, and responsibilities. It emphasizes the importance of clear policies, government regulations for social media, and strict authentication measures to prevent fraud. The report references several sources including Verizon Business, Eric Goldman, SANS, and Pew Research Center, to support its arguments and provide context to the issues of data privacy and security in the modern workplace. The author suggests the need for employees to log off their systems, restrict data sharing, and be aware of workplace security protocols. It also calls for revisions to privacy policies and ethical guidelines. The report concludes with a call for stronger password protection and adherence to information security policies.
Document Page
Running head: Ethical Issue Policy
Paper B2- Organizational Ethical Policy
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Ethical Issue Policy
2
Overview of policy
The companies are already tangled to make their employee’s user friendly and aware about the
regulations related to the privacy and ethical regulations. As it is discussed in B1 that the
employee has stolen personal photographs of another employee without letting them know so
why he touched the system of other employee?? Why the employee has left their system opened?
Why the social media allows the access the information even after the session expired? Why the
user’s system does not auto locked if the user is not available at their workstation? There are
other various questions which break the ethical regulations of the organization and that needs t o
be considered by the company as the confidential information of the company might be used by
other competitors which impacts on the overall performance of the company (Goldman, 2007).
Scope
Stakeholders Roles Responsibilities
Me Victim of the whole scenario Should log off my system
before leaving my
workstation.
Colleague Who stole the personal
photographs
The ethical and privacy
regulations must be known
under the employment Office
Ethics.
Office colleagues Who took the scene as a joke
and make me embarrassed
They shouldn’t appreciate the
incident done by one of the
Document Page
Ethical Issue Policy
3
colleague.
Social media Store the data in cookies and
cache which enable to share
the personal information.
The browser and cookies
should be restricted to share
the information.
Purpose and procedures
The organization should share the privacy policies and ethical regulations among the employees
in order to avoid such issue. Secondly social media and other applications must be controlled
through government regulations in order to avoid such issues. According to the privacy right
clearing house (2010) there are approximately 350 Million who have lost their customer records
since 2005 when the data tracking started then the data breach incidents, , PUBLIC
PERCEPTIONS OF PRIVACY AND SECURITY IN THE POST-SNOWDEN ERA
(NOVEMBER, 2014)
Sanctions and enforcements
1. Organizational/ social media/ Browser regulations
The government regulated privacy guidelines must be followed by social media and other
applications.
The personal data should be removed after the session expired.
There must be strict authentication for every individual login in order to avoid fraud or
threat user entry (Baker, 2009).
Document Page
Ethical Issue Policy
4
2. Employees commitment to ethics
The privacy policy regulations need to be revisited in order to make the changes as per
the requirements.
The employee’s should take permission before accessing the user’s system.
The employees should restrict their system with strong passwords and they must be
aware about workplace security Information Security Policy.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Ethical Issue Policy
5
References
Baker, W. H., Hutton, A., and Hylender, C. D. (2009). The 2009 data breach investigations
report. Verizon Business. Retrieved January 31, 2010.
Goldman, E. (May, 2007). Social Networking Sites and the Law. Retrieved from
http://www.ericgoldman.org/Resources/socialnetworkingsitesandthelaw.pdf
Information Security Policy. SANS. Retrieved from-
http://www.sans.org/security-resources/policies
Office Ethics. Retrieved from-
http://www.swlearning.com/swepstuff/previews/files/careerreadiness/0538726164/
ethics_ch01.pdf
PUBLIC PERCEPTIONS OF PRIVACY AND SECURITY IN THE POST-SNOWDEN ERA
(NOVEMBER, 2014). The public feels most secure using landline phones, least secure
on social media. Retrieved from- http://www.pewinternet.org/2014/11/12/public-privacy-
perceptions/pi_2014-11-12_privacy-perceptions_02/
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]