Premium Essay

Privacy and Ethics Assignment

In:

Submitted By omarpkpk2003
Words 624
Pages 3
ANSWER 1:
Sharing the contents of another person’s email without their permission 1) Limits on use of personal information 2) Limits on disclosure of personal information
As it is clear from the acts that it is a clear violation of personal information. Suppose if a company leak their clients email address and other companies start sending spam without their consent, it is company responsibility and can be prosecute for this act.

Going through someone’s personal network directory.
1) Access to records containing personal information
2) Information relating to records kept by record-keeper

If you have high clearance and can access to your colleagues details, it is not allowed to do it without their consent or it will be consider as Disclosure of confidential personal information without consent.

ANSWER 2:
Normally anyone can call, will get weekly invasion of privacy. Example: People selling unwanted things like soap and vacations, or people selling harmful things like ant viruses that collect your data.
When on DNC register, a much smaller amount of people can call, which helps protect privacy. Also, the people calling may be much more preferable to the person that is being called. Example: Charities collecting for a good cause or surveys that help improve the government.
Even though the DNC could be improved further by restricting all unsolicited calls, it is still an improvement over being exposed to all callers.
ANSWER 3:
Yes doing such an action falls beyond IT and work ethics, company pays money per licence, and that license is only for the use of staff working in that organization. Also Software Company developed that software so they can make money by selling those software applications, if they have been given out for free or sold on fewer prices then company have been selling, that means Software Company is losing money.

Similar Documents

Free Essay

Itinfo Security Law and Ethics Course Syllabus

...business on the Internet, privacy laws, taxation, protection of intellectual property, electronic privacy, wiretapping, and cyber-squatting. In addition, students examine ethical issues, forensics, and evidence of cyber-crime. (No Prerequisite) |   | | Terminal Course Objectives | DeVry University course content is constructed from curriculum guides developed for each course that are in alignment with specific Terminal Course Objectives (TCOs). The TCOs define the learning objectives that the student will be required to comprehend and demonstrate by course completion. The TCOs that will be covered in detail each week can be found in the Objectives section for that particular week. Whenever possible, a reference will be made from a particular assignment or discussion back to the TCO that it emphasizes. A | Given the importance of Law, Investigation, and Ethics in Computer Security, develop an understanding of the operation of the American legal system, including how the interpretation of statutes, judicial precedents, and legal reasoning affect information security. | B | Given the global nature of the Internet, evaluate how doing business on the Internet may subject you and your company to the laws, regulatory agencies, and judicial systems of multiple states and/or foreign countries. | C | Given that the Internet is owned by no one, consider how information security is affected by governmental regulation, specifically, privacy laws, taxation, assignment of Internet addresses...

Words: 891 - Pages: 4

Premium Essay

Code of Etthics

...Code of Ethics Code of Ethics Assignment In accordance to the Code of Ethics group assignment, the selected situation discussed is scenario one, the “high profile” patient. The patient is famous and constantly overseen for their activities. As this patient’s nurse, we have been approached by People magazine and asked to serve as an informer. The magazine is offering a substantial amount of money for the patient’s information. However, using the ANA Code of Ethics, we have identified Provision Three as the best ethical approach to the scenario. Part Two Ethics is an integral part to the foundation of nursing. Historically, nursing care is vital for the welfare of the sick, injured, vulnerable, and for social justice. This concern is embodied in the provision of nursing care to individuals and the community. Nursing encompasses the prevention of illness and the alleviation of suffering. Nurses provide the protection, promotion, and restoration of health in the care of individuals, families, groups, and communities. Individuals who become nurses are expected not only to adhere to the ideals and moral norms of the profession, but also to embrace the part of what defines a nurse. The Code of Ethics for Nurses developed by the American Nurses Association explicitly states the primary goals, values, and obligations of the profession. Part Three According to the American Nurses Association’s Guide to the Code of Ethics for Nurses Interpretation and Application, Provision Three...

Words: 1309 - Pages: 6

Premium Essay

Mgt 434 Week 5 Team Assignment Employee Handbook Assignment

...In this work MGT 434 Week 5 Team Assignment Employee Handbook Assignment you can find the review on following aspects: Employee Handbook Legal Consideration Addressing Performance Issues Ethical Considerations Access to Personnel Files Protection of Practice and Patient Information Identification Visitors/Meetings Monitoring: - Mail/E-Mail - Telephone/Voicemail - Internet Employment Practices Pre-Employment Physical and Drug Screen Pre-Employment Background Checks Conclusion References Business - Management Learning Team Assignment: Employee Handbook Assignment Prepare a 1,500-to 2,050-word document in which you create a representation of actual sections  ( privacy, employee testing, ethics and performance evaluation s)  of an employee handbook (private sector). Note. The handbook must be original student content and work. In addition to describing the company to which the employee handbook applies, also address the issues of privacy, employee testing, ethics and performance evaluation s in the global workplace. This assignment must include , but is not limited to, the following questions in drafting your handbook sections: What privacy rights issues must be addressed? What must the company’s position be in response to privacy rights issues? How do your privacy protections limit the company’s liability? How do your privacy protections enhance employee motivation and productivity...

Words: 316 - Pages: 2

Free Essay

Essay

...IFSM 304 – Ethics in the Information Age Learning Portfolio Assignment Descriptions Here are the detailed Assignment Requirements and Summary (Reflection Paper) that comprise activities for a Learning Portfolio for IFSM 304. These activities, along with class discussion and any other assignments your professor may require will enable you to achieve the course objectives and demonstrate knowledge of key concepts and apply this understanding to real-world digital ethics topics and situations. Understand that your work will comprise a Learning Portfolio for the course and these assignments are linked! You will be faced with work that advances with a progression from a general basic framework for decision making to more specific analysis and critical thinking about more complex ethical issues. Current Events 5% Conference Posting of articles on IT-related Ethical Global issues (multi-national corporation) The purpose of this assignment is to analyze a current event article on global ethical issues from a multi-national corporation perspective. This assignment is designed to increase your knowledge from a corporate viewpoint and enable you to analyze ethical issues from a current GLOBAL situation or event. This will also enhance your research and writing skills and your critical-thinking abilities. Select a current topic (2010 source or later) and find an appropriate article on the topic. Provide the persistent URL (one that anyone can click on to read the...

Words: 3771 - Pages: 16

Premium Essay

Ethical Issue of It in Organizations

...This assignment gives you an opportunity to analyze a key IT-related organizational (or personal, if not in the job force) ethical issue, subject to relevant laws, regulations, and policies. Both of the following sites provide sources and an excellent backdrop for issues relating to privacy protection and the law. See EPIC Report – at: http://epic.org/reports/ See List on left: HOT POLICY ISSUES and/or: https://www.eff.org/issues/privacy [see list at right on this page] This includes sub-topics discussing information privacy, privacy laws, applications and court rulings (case law is usually an extension of the basic law based on the facts from specific cases and real-world court decisions), and key privacy and anonymity issues. While the sites provide many interesting topics, be sure to focus on our class IT topics. Use the template below and the list of suggested workforce privacy topics from one of the sites above to produce a matrix to map a key organizational ethical (or personal, if not in the job force) issue and how this issue is affected by laws, regulations, and policies. Use the list of normative ethics below to help you complete the matrix. Choose any three (only three) of the following list of twelve (12) principles of normative ethics described below. Prepare the Ethical Issue matrix and include the following explanation (200 words) —double-space your narrative—below the matrix: Why I chose the dilemma; Why I chose the three...

Words: 333 - Pages: 2

Premium Essay

Mark1012

...Assignment B Zoe Suet Yee Wan, Jason Lau, Yaoyu Su OutThere Pty Ltd Z3416862 Zoe Suet Yee Wan Z3416733 Jason Lau Z3353653 Yaoyu Su Tutorial: Friday 9-11am Tutor: Jason Simpson Date Submitted: 12/10/2012 Word Count (excluding appendix and overview) : 3113 Word Count for Overview: 301 1 Assignment B Zoe Suet Yee Wan, Jason Lau, Yaoyu Su Executive Summary This following report focuses on providing recommendations and appropriate suggestions to OutThere Pty Ltd regarding the success for FillUp and QuickStop brands. Although FillUp has been growing steadily for the past five years, constant evaluation of efficiency and productivity is necessary for its continual success. On the other hand, standalone QuickStop shops has not been as successful as compared to FillUp as most newly established stores are located in remote areas which may be a contributing factor as to why new tools and strategies are essential to sustain profitability in the long run. Regarding the Chief Information Officer’s priorities to improve purchasing power and distribution efficiency, store layout and product mix, detect fraudulent activities and offer personalised promotion, different types of Business Intelligence Tools will be recommended specifically with the aim to achieve these priorities. 2 Assignment B Zoe Suet Yee Wan, Jason Lau, Yaoyu Su Table of Contents Executive Summary ...........................................................................................

Words: 4553 - Pages: 19

Premium Essay

Electronic Surveillance of Employees

...Electronic Surveillance of Employees Jorge Munoz Strayer University Week Three Assignment # 1 Law- Ethics and Corporate Governance Professor Eric Baime July 17 of 2011 Assignment #1 – Electronic Surveillance of Employees View the video: “Electronic Surveillance of Employees” by clicking on the link in the course shell. There is also a link that will allow you to print the script of the video. Write a four to five (4-5) page report that answers the following:  1.      Explain where an employee can reasonably expect to have privacy in the workplace. Reasonable expectation of privacy in the workplace can be addressed from many ways especially in this new age of technology where the use of Internet, e-mails, voicemails, etc., it has extended to every single aspect on the modern organizations. Employers have found ways to supervise the good doing of its employees monitoring virtually every digital trail leaving employees’ privacy rights in a limbo that is not completely clear under the law or even under the company policies. However, employees expect to have some privacy in the workplace during lunch and break times, restrooms or personal lockers without the eyes of security cameras, but this is not a rule. Electronic monitoring has become a commonplace and it is considered normal and employers have alleged that they have a legitimate purpose to do it especially after September 11 for obvious security reasons.. “The ECPA allows employers to listen...

Words: 1115 - Pages: 5

Premium Essay

Legal 500 Paper

...Assignment 1: Employment-At-Will Doctrine Due Week 3 and worth 200 points As a manager and supervisor of an accounting department, discuss the following issues related to the employment-at-will doctrine and liability of an employer based on actions and responses to the employee’s behavior and actions. Jennifer, a recent graduate, has recently been hired by your accounting firm out of college. Upon being hired, she engages in a number of different behaviors that need your attention. * For each category of behavior, describe what steps you would take to address the situation. Write a four to five (4-5) page paper in which you: 1. Describe what steps you would take to address the following scenario involving skills, competence, and abilities: I have been observant of the behavior and work ethic of your new employee Jennifer. She is a recent college graduate and she has been unable to learn basic computer applications that are vital to her everyday job functions. I am aware that you offered Jennifer training opportunities and well as supported her to perform better but that still has not assisted her. The next steps that need to take place in order for Jennifer to be productive are to counsel her on the work assignments she has and advise her that her performance is inadequate. Explain the reasons why her work is inadequate. Specifically state what she is doing and what is unacceptable about the work she is providing. Explain to Jennifer what is expected...

Words: 1054 - Pages: 5

Premium Essay

Ethics Report

...1 ACCT2162 Ethics and Accountability COCA COLA and PEPSI Student name: Pham Thuy Vy Vy Ta lam Han Tieu Thien Tam Assignment: Ethics and Accountability ACCT2162 1|Page 2 ACCT2162 Ethics and Accountability RMIT International University Vietnam Bachelor of Commerce Program ASSIGNMENT COVER PAGE Your assessment will not be accepted unless all fields below are completed Subject Code: ACCT2162 Subject Name: Ethics and accountability Location where you study: RMIT Vietnam- SGS campus Title of Assignment: Group assignment File(s) Submitted: Cocacola_Pepsi Pham Thuy Vy Vy Student name: Tieu Thien Tam Ta Lam Han Student Number: S3325175 S3324340 S3275812 Learning Facilitator in charge: Samia Ibrahimo Assignment due date: 18th April 2013 18th April 2013 Date of Submission: Number of pages including this one: (Please number your pages like this: 13 page 1 of 7, etc.) 2200 words (exclude references, table of content and Word Count: reference) (Main Content) 2|Page 3 ACCT2162 Ethics and Accountability Contents INTRODUCTION....................................................................................................................................... 4 COMPARE AND CONTRAST POLICIES, PROCESSES AND GUIDELINES ......................................................... 5 a) Health and Safe Work Environment: .....................................................................

Words: 3086 - Pages: 13

Premium Essay

The Differences Between Ethics and Law

...THE DIFFERENCES BETWEEN ETHICS AND LAW DEFINITION OF ETHICS In general, ethics is a moral philosophy where a person makes a specific moral choice and sticks to it. On the other hand, ethics in computing means moral guidelines to refer to when using the computer and computer networks. This includes the Internet. DEFINITION OF LAW Law is a legal system comprising of rules and principles that govern the affairs of a community and controlled by a political authority. Law differs from one country to another. In the era of technology, computer law is needed to clarify goods or actions that fall under the computer law. Computer law refers to all areas in law that requires an understanding of computer technology such as hardware, software and Internet. Examples of laws of computing in Malaysia include the Malaysian Communication and Multimedia Act, the Computer Crime Act 1997 and the Telemedicine Act 1997. WHY DO WE NEED ETHICS & LAW IN COMPUTING? Ethics and law are needed i computing to: • • • Respect Ownership Respect Privacy & Confidentiality Respect Property Respect Ownership We must respect ownership by not stealing other people’s work either by duplicating or distributing it. Duplicating and distributing copies of audio tapes, video tapes and computer programs without permission and authorisation from the individual or company that created the program are immoral and illegal. Respect Privacy & Confidentiality We should respect other people's privacy and confidentiality by refraining...

Words: 552 - Pages: 3

Premium Essay

Leg 500 Assignment 1

...Assignment # 1- Electronic Surveillance of Employees Ww gg Law, Ethics, and Corporate Governance Professor Lynette Collins April 19, 2011 Electronic Surveillance of Employees 1. Explain where an employee can reasonably expect to have privacy in the workplace. Privacy has become extremely important part of American culture. Lately, work place privacy has brought unwanted and costly litigations. To protect the company from those kinds of litigations, organizations are monitoring employee communications carefully. Although according to courts the private organizations have rights to monitor employee communications. In order to this `` Employee surveillance and email monitoring in the workplace present a number of sometimes conflicting issues regarding an employer’s need to protect its property and itself against liability and an employee’s right to privacy``(Adams, Scheuing & Feeley, 2000). Martin and Freeman (2003) also examined key arguments for and against employee monitoring, productivity, security, liability, privacy, and creativity. Privacy may be invaded in four ways. The first is unreasonable intrusion upon a person’s seclusion. Appropriation occurs when the use of a person’s name or likeness is used for economic benefit. Third is public disclosure of private facts. Finally, false light Most cases concerning invasion of privacy by employers involve intrusion upon seclusion’s is publicly characterizing or placing a person in a false light (Chieh and...

Words: 885 - Pages: 4

Premium Essay

Security Issues

...|[pic] |Syllabus | | |College of Information Systems & Technology | | |CMGT/582 | | |Security & Ethics | Copyright © 2010, 2009 by University of Phoenix. All rights reserved. Course Description The ethical issues examined in the course include information privacy, accessibility, and ownership from an organizational perspective. Information laws, regulations, and compliance requirements are examined in this course as well as the considerations for creating a safe digital environment within the organization. Policies Faculty and students or learners will be held responsible for understanding and adhering to all policies contained within this syllabus and the following two additional documents: University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies...

Words: 2637 - Pages: 11

Premium Essay

Ethical Theories in Information Technology

...Abstract This assignment will define and discuss the ethical theory of Kantianism. Kantian ethics is based on abiding by moral laws that are universal for everyone. It allows us to rationalize our decisions based on our duty to do what is right. This assignment will also discuss how Kantianism represents my personal principles. Kantianism provides moral laws that provide a sense of equality for all people. There are also several arguments that are against Kantianism and will dispute the theory. But the overall goal of Kantianism is to ensure that every person is treated with respect. In addition, this assignment will discuss and defend my position on a contemporary IT issue using a practical ethical theory. Unit 1 Assignment 1 Ethical Theory-Kantian The ethical theory that I have chosen that best represents my personal principles is Kantianism. This theory was named after the German philosopher Immanuel Kant. According to Quinn, “Kant believed that people’s actions ought to be guided by moral laws, and that these moral laws were universal” (Quinn, 2013, para. 2). The universal law is the belief that everyone tries to do the right thing and be a rational person and therefore rational decisions can be applied to everyone in the world. Kantianism does not consider the consequences of the ethical issues to be important, rather it is based on what should be done or doing the right thing regardless of the consequences. Kant’s decision is based on the theory that nothing is...

Words: 1571 - Pages: 7

Premium Essay

Week 7

...ASSESSMENT COVER SHEET |Student’s name |(Surname) |(Given names) | | |JIANG |Yifan | |Student’s I.D. number |26094207 | |Unit name |Business ethics in global environment |Unit code |MGF 5020 | |Title of assignment |Task 1---Week 7 | |Name of tutor | | |Tutorial day /time | | |Presentation date | | All work must be submitted by the due date. If an extension of work is required, please complete and submit a Special Consideration application (in-semester assessment task) form to your examiner/lecturer/tutor...

Words: 1156 - Pages: 5

Premium Essay

Code of Ethics

...This is what I am expected to do. Assignment 2: Ethics Review In this assignment, you will explore professional counseling ethical codes. You will examine multiple codes of ethics to assist in practicing CMHC in an ethical manner. You will also familiarize yourself with the sections of the codes that govern your responsibilities as a counseling student. Tasks: * Compare and contrast the ACA's, the AMHCA's, and the NBCC's codes of ethics. * Describe your responsibilities as a student as per the ACA's and the AMHCA's codes of ethics. Your final product will be a 3- to 5-page Microsoft Word document written in APA format, utilizing at least three scholarly sources. Your paper should be written in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation. This is the grading rubric Assignment Components | Proficient | Max Points | | | | Compare and contrast the American Counseling Association (ACA), American Mental Health Counseling Association (AMHCA), and National Board for Certified Counselors (NBCC) codes of ethics. | Thoughtful and insightful understanding of the parallels and variations between the ACA, AMHCA, and NBCC codes of ethics is reflected. Accurate analysis and synthesis of the ethical codes reflects an appropriate connection between the three codes. | ...

Words: 1441 - Pages: 6