IT Ethics Policy Assignment: Protecting Data and IT Systems

Verified

Added on  2020/07/22

|7
|1244
|93
Homework Assignment
AI Summary
This assignment delves into the critical realm of IT ethics, emphasizing the necessity of robust policies to safeguard business data and systems. It examines the core reasons for establishing ethical guidelines, which include preventing data breaches, protecting intellectual property, and fostering a secure working environment. The assignment outlines the elements of an effective IT ethics policy, encompassing policy statements that define acceptable behaviors and unacceptable uses of IT resources. It details specific examples of unacceptable actions, such as misuse of computing resources, network activities, intellectual property, IT systems, and electronic communication. The conclusion underscores the significance of these policies in mitigating cybercrimes, ensuring data confidentiality, and promoting a more effective and secure IT environment. The assignment highlights the practical application of these policies in real-world scenarios to guide IT professionals and organizations.
Document Page
Assignment
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................1
TASK 4............................................................................................................................................1
CONCLUSION................................................................................................................................3
REFERENCES:...............................................................................................................................4
Document Page
INTRODUCTION
The rules and regulations in IT regulate its functioning and operations. This provides a
structure on which the system will work. In this, standards are set to ensure the proper
functioning of IT system. The ethical policy covers all the aspects of IT security systems. Ethical
rules help in protecting the business data and information. This is useful in preventing the data
from getting leaked or hacked. Also, it helps in keeping the business information confidential.
This is the main reason behind developing IT ethics. Besides this, cyber-crime and other illegal
activities are prohibited. Acceptable Use of Information Technology Resources, Brain Dahlin
(2015). Moreover, various issues related to IT can be resolved. This assignment shows the need
of IT ethics policy and what actions will be taken in breach of that policies.
TASK 4
Need of policy- Ethical policies are needed to ensure that data and information of business as
well as employees are protected. Also, it is necessary to protect the data as it can be misused by
any person in illegal activities. Besides this, it is necessary to protect the intellectual property, it
included patents, formulas, etc.. A strong ethical IT policy will prevent spams within the
organisation. Moreover, if standards are set then employees will work according to it. This will
ensure that there is no leakage of data and no misuse of electronic media. These ethics are similar
in every organisation allowing them to work in effective manner. Policy will restrict any misuse
of IT resources. Data of employees must be secured to provide them a better working
environment.
Policy statement- These statements describes the policies that have to be followed while
working with IT. It determines various laws and regulations related to IT. It states that work have
to be done in proper format and way. Ethical Guidelines for Information Technology Users,
(2010). Also, it contains guidelines on how to perform a specific work. There are various policy
statements such as peer to peer, E- mail, anti-spam policy, etc. Statement is a document that
prescribes acceptable methods or behaviours. Moreover, it will be easy to identify what policy is
made for which purpose. Also, it will be able to identify weak areas where improvement can be
done
Unacceptable use of policy- It states that what actions must be taken if any person breaches the
policy statement or not follows it. This means that person has violated the policy. For this, there
1
Document Page
are various situations described in which this can occur. A person may intentionally or
unintentionally break the policy. For this, a policy has been made that has to be accepted by all.
These are described as below:-
a) Excessive non-priority use of computing resources- It refers to inappropriate use of
computer resources. This means that if any person uses resources which are not provided to
them, it will lead to breach of policy. Policy on Ethical Use of Information Technology
Resources, (2018). In this case, the resources can be external or internal. Also, if resources are
used excessively then person will held liable for this. The resources provided will be protected
with anti-virus and different software. This will restrict using of unnecessary resources in that.
b) Unacceptable system and network activities- It means communicating by breaking the
boundary of network. For this, a proper network structure will be created by using firewalls and
restrictions. Moreover, communication will have to be done only with certain resources that are
available. System will consist of various security measures. The network developed will cover
only a particular area. And if access is want outside it, then permission has to be taken.
c) Unauthorized use of intellectual property- The policy made for this will include the proper
system that is implemented. Ethical policies in IT, (2015). Moreover, the intellectual property
will be highly protected with software. Also, only particular people will have the authority to
access the database. This will allow them to maintain security of database and protecting it from
any unauthorized access. A track record of those people who are using property will be
maintained. This will ensure its integrity.
d) Malicious use of IT systems and Information- To reduce the malicious use of information,
strict rules will be made. The information will be protected in database with high security
measures. Only certain people will be given permission to access the data. Also, it will be
allowed for a limited time period. Besides this, IT system will be protected with strong
passwords. No other user will be allowed to use it.
e) Misuse of electronic communication- It is related with using electronic sources of media to
communicate. Employees often use this to communicate with each other. To reduce the misuse
of this, only specific sources will be allowed to communicate. Also, there will be limitations of
using these sources. There will be no involvement of any external sources. Furthermore, all the
2
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
information or data that has been shared will be tracked to see its effectiveness. This will give an
idea on how information is shared between employees.
So, with all these policy statements, an effective IT code of ethics can be generated. This
will be helpful in reducing cyber-crimes and spams. Also, it will ensure that data is protected and
kept confidential. Policies clarifies what methods or behaviour will be acceptable and not.
Moreover, this enables IT system working more effective. Also, policies are developed to protect
misuse of data and information.
CONCLUSION
From this assignment, it is concluded that IT ethics protects the information and data of
business. For this, strict policies are made to ensure effective working of IT systems. Also, it is
essential to reduce cyber-crime and spam in business. If not, it can lead to major consequences
and losses. Furthermore, there are different policy statements related to IT. Policies clarifies what
methods or behaviour will be acceptable and not. It helps in protecting the data and reducing
harm to IT systems.
3
Document Page
REFERENCES:
Online:
Acceptable Use of Information Technology Resources, Brain Dahlin (2015). [Online] Available
Through: <https://policy.umn.edu/it/itresources>
Ethical Guidelines for Information Technology Users, (2010). [Online] Available Through:
<https://www.ipfw.edu/offices/its/policies/ethical-guidelines/ethical-guidelines.html>
Ethical policies in IT, (2015). [Online] Available Through:
<http://policies.cua.edu/infotech/compethicsfull.cfm>
Policy on Ethical Use of Information Technology Resources, (2018). [Online] Available
Through: <https://www.bradley.edu/campuslife/studenthandbook/policies/policies/
resources/>
4
Document Page
5
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]