Free Essay

Ethical Computer Use Policies

In:

Submitted By neltech
Words 386
Pages 2
Ethical Computer Use Policies
Mr. XX
Ms. DARLENE RINGHAND
CIS 500
January 28th, 2012

Ethical Computer Use Policy
Offensive language and offensive material policy
Effective: January 28th 2012
This policy is for all employees that use any desktop computer, laptop, PDA or any device that’s connected to this company network. It is everyone responsibility to use them in an ethical and professional manner without violating any laws. By signing this policy you agree to abide by the following conditions: * Do not view any nudity or sexual content online. * Do not publish, email, or distribute any obscene and or offensive content. * Do not download, print or store any files or services having sexually explicit content. * Do not send picture, photograph, and drawing or similar visual representation displaying sexual content. * Do not view any websites or send emails promoting crime or violence. * Do not view any websites or send emails promoting or criticizing religious beliefs. * Do not view or send Illegal material, such as child pornography. * Do not view or send Information that is sexual in nature that can be considered harassment.
If anyone is found guilty of abuse they will be held accountable and may be subject to disciplinary action.
Employee Signature:
Date:
Ethical Computer Use Policy
Spam policy
Effective: January 28th 2012
This policy is for all employees that use any desktop computer, laptop, PDA or any device that’s connected to this company network. It is everyone responsibility to use them in an ethical and professional manner without violating any laws. By signing this police you agree to abide by the following conditions: * Do not manipulate identifiers like email headers to disguise the source of any content transmitted through the company network. * Do not email from a third party email server without permission. * Do not use the company computer systems to transmit unauthorized material. This includes any promotional materials, URLs, junk mail, chain letters, or any other form of unauthorized solicitation that you may upload post, email, transmit, or otherwise make available. * Do not use the companies email servers to harvest others email addresses for purposes of sending unsolicited or unauthorized material. * Do not upload, posting, email, or transmit the same message multiple times.
If anyone is found guilty of abuse will be held accountable and may be subject to disciplinary action.
Employee Signature:
Date:

Similar Documents

Premium Essay

Cis 324

... WEEK 10 8/28/13 Explain computer ethics Computers are special technology and they raise some special ethical issues. In this essay I will discuss what makes computers different from other technology and how this difference makes a difference in ethical considerations. In particular, I want to characterize computer ethics and show why this emerging field is both intellectually interesting and enormously important. On my view, computer ethics is the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology. I use the phrase "computer technology" because I take the subject matter of the field broadly to include computers and associated technology. For instance, I include concerns about software as well as hardware and concerns about networks connecting computers as well as computers themselves. A typical problem in computer ethics arises because there is a policy vacuum about how computer technology should be used. Computers provide us with new capabilities and these in turn give us new choices for action. Often, either no policies for conduct in these situations exist or existing policies seem inadequate. A central task of computer ethics is to determine what we should do in such cases, i.e., to formulate policies to guide our actions. Of course, some ethical situations confront us as individuals and some as a society. Computer ethics includes consideration of...

Words: 1695 - Pages: 7

Premium Essay

Legal and Ethical Issues Relating to Business Information

...Legal and Ethical Issues Relating to Business Information Introduction I this task I’m going to explain the legal and ethical issues in relation to the use of businesses information and also I’m going to explain operational issues as well in the last park of the task i going to analyse the legal ethical and operational issues using appropriate examples . Most people do not feel safe in putting or giving their personal details on different social networks like Facebook and Twitter and another organization who uses the personal detail from the people or customers , the reason being of many hackers invading other people's privacy this also can happen with many businesses as well such as Tesco ,Asda e.g. if they do not have a security system to keep them safe . Legal Issues These are various items of legislation to protect the use of business information. Data Protection Act 1998 is one of the legal issue business information. Many businesses store use information about people. The Data Protection Act protects information held about people from being misused. The information stored by businesses on databases must be: ✓ Obtained fairly and lawfully ✓ Used only for the purposes stated during collection ✓ Adequate, relevant and not excessive in relation to the intended use ✓ Accurate and up to date ✓ Not kept for longer than necessary ✓ Processed in line with your rights ✓ Subject to procedures to prevent unlawful processing, accidental loss, destruction...

Words: 2188 - Pages: 9

Premium Essay

Ethics in Cyberspace

...Ethics in Cyberspace What is Cyberspace? Cyberspace is a global community of people using computers in networks. For ensured functionality, virtual communities with Internet support depend on rules of conduct, likewise with any other society. Business people like librarians and information technologists must have matured knowledge about ethical issues for their companies’ welfare and to protect and mentor other users. What is ethics? Ethics is the art of determining what is good or right. It can also be defined as a way of life or general pattern, a set of rules of conduct or moral code. Ethical guidelines are based on values. The Association of Computing Machinery (ACM) is a national organization that has a developed statement of its values. ACM’s every member is expected to uphold the Code of Ethics and Professional Conduct which includes these morals: 1) contribute to society and human well-being 2) avoid harm to others 3) be honest and trustworthy 4) be fair and take action not to discriminate 5) honor property rights including copyrights and patents 6) give proper credit for intellectual property 7) respect the privacy of others 8) honor confidentiality. New moral issues occur due to the nature of electronic communication. Individuals and organizations should be proactive in examining these concerns and developing policies which protect liabilities. Top issues which need to be discussed include: privacy of mail, personal...

Words: 851 - Pages: 4

Premium Essay

It Law and Ethics

...there is sufficient time to cover the material. Unless the students have not had the opportunity to read the material in advance (in some settings, the textbooks are not made available until the first class meeting), it may be prudent to have a general discussion of the topic, with detailed lecture to follow at the next class meeting. The subject matter can be covered in 1.25 to 2.5 hours. Lecture Notes and Teaching Tips with Quick Quizzes Introduction As a future information security professional, it is vital that you understand the scope of an organization’s legal and ethical responsibilities. To minimize the organization’s liabilities the information security practitioner must understand the current legal environment and keep apprised of new laws, regulations, and ethical issues as they emerge. By educating employees and management about their legal and ethical obligations and the proper use of information technology and information security, security professionals can keep an organization focused on its primary objectives. Law and Ethics in Information Security...

Words: 4470 - Pages: 18

Premium Essay

Redn

...The use of Business information ‘issues and constraints’ Handbook The use of Business information ‘issues and constraints’ Handbook Contents Legal issues in relation to the use of information --- 3 Ethical issues in relation to the use of information --- 5 Operational issues in relation to the use of information --- 8 Legal issues in relation to the use of information As a big organization there various types of information pass through our company on daily basis, however there are three main legislations that are on place to protect the use of business information, which are: * Data protection 1998 * The Freedom of information Act 2000 * The Computer misuse Act 1990 Data Protect Act 1998 protects the information held about people whether they are employees or the customers from being misused by our organisation which hold the information. For example our organisation has to make sure in order to comply with the Data Protect Act by ensuring the information we stored in our database is: * Gathered fairly and lawfully (for example when our customers are applying our club card rewarding scheme they are all given the same application form to fill to make sure there is not any bias involved in the process). * Used only for the purpose we stated during the collection, for example when our customers are applying...

Words: 2424 - Pages: 10

Premium Essay

Management Information Systems

...FIT, MUST 1 Chapter 4 Ethical and Social Issues in Information Systems 2 Management Information Systems Chapter 4 Ethical and Social Issues in Information Systems LEARNING OBJECTIVES • Identify the ethical, social, and political issues that are raised by information systems. • Identify the principles for conduct that can be used to guide ethical decisions. • Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property. • Assess how information systems have affected everyday life. 3 Management Information Systems Chapter 4 Ethical and Social Issues in Information Systems Is Your Student Loan Data on Loan? • Problem: Insufficient privacy protections for sensitive data related to student loans. • Solutions: Improve system security and protect student information to restore confidence in the system. • Revoke over 52,000 user IDs suspected of misusing access to students’ private information. • Demonstrates IT’s role in providing quick and convenient access to data. • Illustrates how the very same technology has the potential to threaten privacy and cause more harm than good. 4 Management Information Systems Chapter 4 Ethical and Social Issues in Information Systems Understanding Ethical and Social Issues Related to Systems • Past five years: One of the most ethically challenged periods in U.S. history • Lapses in management ethical and business judgment in a broad...

Words: 2655 - Pages: 11

Premium Essay

Security

...Introduction As a future information security professional, it is vital that you understand the scope of an organization’s legal and ethical responsibilities. To minimize liabilities and reduce risks from electronic, physical threats and reduce the losses from legal action, the information security practitioner must understand the current legal environment, stay current as new laws and regulations emerge, and watch for issues that need attention. Law and Ethics in Information Security As individuals we elect to trade some aspects of personal freedom for social order. Laws are rules adopted for determining expected behavior in modern society and are drawn from ethics, which define socially acceptable behaviors. Ethics in turn are based on cultural mores: fixed moral attitudes or customs of a particular group. Some ethics are recognized as universal among cultures. Slides 9 Types of Law Civil law represents a wide variety of laws that are recorded in volumes of legal “code” available for review by the average citizen. Criminal law addresses violations harmful to society and is actively enforced through prosecution by the state. Tort law allows individuals to seek recourse against others in the event of personal, physical, or financial injury. Private law regulates the relationship between the individual and the organization, and encompasses family law, commercial law, and labor law. Public law regulates the structure and administration of government agencies...

Words: 2358 - Pages: 10

Free Essay

Ethical Hacking

...Chapter 1 Ethical Hacking Overview    Describe the role of an ethical hacker Describe what you can do legally as an ethical hacker Describe what you cannot do as an ethical hacker Hands-On Ethical Hacking and Network Defense 2  Ethical hackers  Employed by companies to perform penetration tests  Penetration test  Legal attempt to break into a company’s network to find its weakest link  Tester only reports findings, does not solve problems  Security test  More than an attempt to break in; also includes analyzing company’s security policy and procedures  Tester offers solutions to secure or protect the network Hands-On Ethical Hacking and Network Defense 3  Hackers  Access computer system or network without authorization  Breaks the law; can go to prison  Crackers  Break into systems to steal or destroy data  U.S. Department of Justice calls both hackers  Ethical hacker  Performs most of the same activities but with owner’s permission Hands-On Ethical Hacking and Network Defense 4  Script kiddies or packet monkeys  Young inexperienced hackers  Copy codes and techniques from knowledgeable hackers  Experienced penetration testers write programs or scripts using these languages  Practical Extraction and Report Language (Perl), C, C++, Python, JavaScript, Visual Basic, SQL, and many others  Script  Set of instructions that runs in sequence Hands-On Ethical Hacking...

Words: 1129 - Pages: 5

Premium Essay

Computer Cthics

...------------------------------------------------- Computer Ethics Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society. For example, while it is easy to duplicate copyrighted electronic (or digital) content, computer ethics would suggest that it is wrong to do so without the author's approval. And while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical. As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artificial intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies. Computer Ethics is a part of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.[1] Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into 3 primary influences: ...

Words: 3631 - Pages: 15

Premium Essay

Brooks

...Approach To Making Connections Between Ethical Foundations And The Challenges Presented By Information Technology.............................................. 14 May 2012 1 ProQuest Document 1 of 1 The Development Of A Code Of Ethics: An Online Classroom Approach To Making Connections Between Ethical Foundations And The Challenges Presented By Information Technology .. Author: Brooks, Rochelle. .. Publication info: American Journal of Business Education 3. 10 (Oct 2010): 1-13. .. ProQuest document link .. Abstract: In today's organizations, ethical challenges relate to areas like fraud, right to privacy for consumers, social responsibility, and trade restrictions. For Information Technology (IT) specifically, these can translate to considerations on how technology is used to violate people's privacy, how automation leads to job reductions, or how management information and its corresponding systems are used and abused for personal gain. In the last 25 years, people have seen an overwhelming technology infusion affecting business, education, and society. Virtually all areas of the society have been transformed by the usage of technology. The change is important from an ethical perspective in terms of who Information Technology (IT) workers are today and what their tasks are. Higher education, specifically in business schools, needs to take some responsibility in preparing students for the ethical usage of information technology and the...

Words: 8895 - Pages: 36

Premium Essay

Business Law

...Ethical and Legal Issues Concerning At-will Employment Jasmine Mills Park University Abstract As years pass by, every sphere of life is taking a new dimension; for instance, advancing technology. This has resulted in some ethical issues in workplaces such as cyberloafing, privacy, information technology usage, employee monitoring. Also, legal issues in workplaces such as lawsuits have emerged. Both employers and employees are worried about the ethical consequences resulting from the ethical issues While bosses use surveillance devices to keep track of their workers' activities and output, these workers feel that excessive monitoring is an attack on their confidentiality and privacy. The strategy of checking workers on a timely basis is contributed by the fact that bosses have rights over everything in the “at-will employment environment.” Additionally, this paper provides a proposal for reducing the ethical and legal issues. The paper also encourages organizations to generate and efficiently communicate ethical standards for workers in their companies. It also includes real examples of workers' perceptions as well as an emotional state from the surveys based on ethical and legal issues raised regarding the topic of study. Keywords: At-will employment, employee monitoring, Ethical and legal issues. Introduction At- will means employment can be terminated at any time, for any reason or no reason without facing legal action. Likewise, an employee can quit a job with or...

Words: 2152 - Pages: 9

Free Essay

No Title

...Global Journal of Computer Science and Technology Interdisciplinary Volume 13 Issue 2 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172 & Print ISSN: 0975-4350 Ethical Issues in Computer use: A Study from Islamic Perspective By Abdul Kadar Muhammad Masum International Islamic University, Bangladesh Abstract - Computer users are continuously facing ethical challenges as society adopts new and increasingly complex tools and technologies. These ethical challenges can be managed by Islamic code of life. In this paper, we have studied and tried to identify, how computer affects the ethical issues of the society. In this regards, we have traced some highly related issues to the ethics of computer usage, namely – misuse of time, honesty and integrity, privacy, security, intellectual property right, and computer crime. We have also tried to explain these issues in the light of Qur’an and Hadith. At the end of this paper, we have also suggested some measures that can help in promoting proper use of computer facilities by the Muslim masses without compromising the Islamic principles. Keywords : islamic ethics, computer ethics, privacy, security, computer crime. GJCST-G Classification: K.8.m Ethical Issues in Computer use A Study from Islamic Perspective Strictly as per the compliance and regulations of: © 2013. Abdul Kadar Muhammad Masum. This is a research/review...

Words: 5242 - Pages: 21

Premium Essay

Computer Ethics

...Computer ethics Computer ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. The term "computer ethics" was first coined by Walter Maner in the mid-1970s, but only since the 1990s has it started being integrated into professional development programs in academic settings. The conceptual foundations of computer ethics are investigated by information ethics, a branch of philosophical ethics established by Luciano Floridi. Computer ethics is a very important topic in computer applications. The importance of computer ethics increased through the 1990s. With the growth of the Internet, privacy issues as well as concerns regarding computing technologies such as spyware and web browser cookies have called into question ethical behavior in technology. Identifying issues Identifying ethical issues as they arise, as well as defining how to deal with them, has traditionally been problematic in computer ethics. Some have argued against the idea of computer ethics as a whole. However, Collins and Miller proposed a method of identifying issues in computer ethics in their Paramedic Ethics model. The model is a data-centered view of judging ethical issues, involving the gathering, analysis, negotiation, and judging of data about the issue. In solving problems relating to ethical issues, Davis proposed a unique problem-solving method. In Davis's model, the ethical problem is stated, facts...

Words: 6774 - Pages: 28

Premium Essay

E-Mail and Internet Policy

...E-Mail and Internet Policy Darryn Cooper COM/285 Angie Robert August 24, 2011 E-Mail and Internet Policy The integrity of a business relies on communication, both using internal and external communications. E-mails and the internet are two ways that businesses communicate with shareholders, employees and their customers. In today’s global market, the use of computer guidelines and policies have been implemented to ensure that all employees adhere to those policies. Communication via the internet and use of emails should be carefully considered when using it. This essay will discuss why e-mail and internet policies have been put in place. *1Congress passed the Privacy Act of 1974, as amended, (Privacy Act) to safeguard records of information pertaining to individuals that Federal agencies or components own and maintain. The Department of Defense (DoD) policy regarding e-mail and internet use is very strict. All employees who are employed by the DoD are given a Common Access Card (CAC). The CAC is inserted into the computer and requires that you enter a password. At no time should you leave your CAC in the computer when an individual leaves his or her computer. Ashmore ( 2009), " Many federal laws affect employer regulation of email and internet uses, such as the Federal Wiretap Act; the Electronic Communications Privacy Act; and the Stored Communications Act. In addition, state...

Words: 941 - Pages: 4

Premium Essay

The Development of a Code-of-Ethics: It Challenges

...relevant and effective code of ethics to address the ethical use of and the ethical issues related to the use of Information Technology (IT). The use of IT, like every innovation that has the potential to change lives for good, also has the potential for harm, however IT “seems to create more ethical challenges than other kinds of technology” (Brooks, 2010, p. 2). To be proactive, ethical issues involving IT need to be addressed by educational programs as well as businesses and professional IT organizations. Discussed herein are ethical challenges presented by the four issues of concern identified by technology managers: security, privacy, intellectual property and electronic monitoring of employees (Brooks, 2010, pp. 1, 2). Security In this context, security refers to maintaining the integrity and confidentiality of data by putting protective measures in place to prevent destruction and/or unauthorized use. Security issues involve internal as well as external forces. Hacking is usually thought of as being an external force, but can be an internal force as well. Any act of accessing a computer system and/or information without the authority to do so is considered hacking. Whether the information attained is used for good or evil, is another issue and does not negate that the information was obtained illegally. In today’s global society, computer information can be stored and accessed from anywhere in the world. With the use of the internet and smart personal devices, accessing...

Words: 1691 - Pages: 7