Mobile Computing

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

METROPOLITAN INTERNATIONAL

UNIVERSITY

NAME : EREMU THOMAS


REGNO : 17B/BIT/110/UMC
COURSE UNIT : SOCIAL AND PROFESSIONAL ISSUES IN COMPUTING
YEAR : THREE SEMESTER TWO
LECTURER : MR: TUMWINEE GEORGE

Question

Codes of conduct in information Technology


Dedication

1.

A code of conduct. Defines how a company’s employees should act on a day-to-day basis.
It reflects the organization’s daily operations, core values and overall company culture. As a
result, every code of conduct is unique to the organization it represents. Yet many companies
struggle with how to write a great code of conduct and, as a result, their codes fall short.

A number of codes of conduct or codes of practice are applicable to members of computing


professions

All members of British computer society agree to abide by the BCS code of conduct and to
observe the provisions of the BCS code of Good practice.

The BCS code of conduct specifies out the professional standard required by BCS as a
condition of membership. This applies to students, and affiliates and also non members who
offer their expertise as part of BCS professional advise register.

The BCS code of good practice. it is intended to help BCS members personally by providing
a frame work of guidance into which their particular needs can be fitted

This codes covers the following area

 Maintain your technical competence


 Adhere to the regulations
 Act professionally as a specialist
 Use appropriate methods and tools
 Manage your workload efficiently
 Participate maturely
 Respect the interests of your customers
 Promote good practice within the organisation
 Represent the profession to the public.
 .

Software engineering code of Ethics and professional practice which acts as a professional
standard for teaching and practicing software engineering

Software engineers shall adhere to the following eight principles


Aknowledgement

Public-software engineers shall act consistently with the public interest

Client and employer- software engineers shall act in a manner that is in the best interests of
their client and employer, consistent with the public interest

Product –software engineers shall ensure that their products and related modifications meet
the highest professional standard possible.

Judgement – software engineers shall maintain integrity and independence in their


professional judgement.

Maintenance-Software engineering managers and leaders shall subscribe and promote an


ethical approach to the management of software development and maintenance

Profession- software engineers shall advance the integrity and reputation of the profession
consistent with the public interest.

Colleagues-software engineers shall be fair to and supportive of the colleagues. Several other
codes of conduct include

A code of professional conduct

Everyone granted access to Metropolitan information Data must abide by the ICT code of
conduct.

Violation of one or more of the rules in this code of conduct may result in the user being
denied access to MIU Data for a period determined by or on behalf of the Board. This period
will be no longer than one year. The period may be extended in the event of repeated
violations.

Keep your access codes confidential

Access codes are strictly for personal use, and may not be lent out to others.

System administrators are not allowed to ask you for your access codes under any
circumstances.
Abstract

Lending out access codes to third parties is prohibited. MID data’s parent network, prohibits
the use of its network by third parties.

There is no need to lend out your access code to fellow students or colleagues: they have
been issued their own access codes.

Regularly choose strong passwords

For example, choose a password made up of the first letters of a sentence you find easy to
remember, and change one or two letters into characters. ‘I hardly ever eat cabbage anymore'
would then become Ihe!ca. Keep in mind that specially designed software can be used to find
out your password by means of password guessing if you choose anything obvious. Your
username and password must always be different.

Rather save data on the server than on your pc

Saving your data on the server will limit damage to your files in the event of a major incident:
backups are made of all files you save on the server, which is more effectively protected
against viruses and other threats than your own computer.

Take precautions to prevent computer hacking

Activate a password-protected screensaver on your computer.

If possible, use a firewall on your pc at home, and regularly install updates of your operating
system.

Do not install or activate unnecessary software applications.

Never engage in hacking, cracking, spoofing, defacing, cross-site scripting, portscans,


sniffing and denial of service attacks.
Index

Do not violate any law, including copyright law

MIUemployees and/or students may not use University Data to engage in activities that are in
violation of any law.

MIU employees have a relationship with the MIU subject to employment law, and may be
subject to additional rules on the basis of their collective labour agreement.

Do not distribute offensive material

In spite of freedom of expression, there are limits to what is deemed acceptable. Make sure to
observe proper conduct. Try to keep in mind the old adage ‘do unto others as you would have
them do unto you'.

Do not use illegal or undesirable software

This includes software for which the required licensing fees have not been paid and software
that disrupts normal operation of the computer and/or University network. Software
applications such as BitTorrent are not illegal, but the consequences of their use almost
always are.

Do not distribute computer viruses and the like

The term computer viruses should also be taken to include worms and Trojans etc. Be careful
when opening attachments and programmes found on the Internet.

Do not send unsolicited emails

Do not participate in ‘chain mails', no matter how valuable their message may seem. Peace on
earth won't be achieved by bombarding others with e-mail messages.

You may not send out anonymous e-mails or e-mails with an incorrect sender address (spam).

Do not use your University data connection for commercial purposes

In the case of abuse, users may be denied access to ICT services, including. Employees found
guilty of abuse may be subject to dismissal
Index 1

Here are Codes of conduct being practiced by companies include

The Google Code of Conduct

 Is readily available online. Alphabet, Google’s parent company, has published the code of
conduct under the investor relations section of its website for current and future stakeholders
to review. Google emphasizes the values it maintains and outlines a variety of important
factors throughout the code of conduct. The document clearly states who must adhere to the
standards set forth and how misconduct will be addressed.

The code underscores the importance of speaking up and taking action against wrongdoing
while complementing the scope of Google’s operations and culture. For example, one section
of the code of conduct is dedicated to the company’s “Dog Policy” which the company

PepsiCo’s Global Code of Conduct

 Is an extensive document that covers a variety of topics including responsibilities of


individual employees, respect in the workplace and responsibilities of the company to its
shareholders. As a massive global entity, PepsiCo has ensured that its code of conduct is easy
to understand (in several languages) and very clear in its expectations for employees.

As with any strong code of conduct, PepsiCo’s code has rooted its expectations in the core
values of the organization. The company has also dedicated an entire section of the code to
explaining how the code will be administered. This includes information on investigations
related to misconduct and disciplinary actions the company may take. PepsiCo’s code of
conduct also encourages employees to report bribery, violence or other misconduct by
contacting the company’s hotline.

Face book’s Code of Conduct

 Is published on the company’s investor relations website and available for download as a
PDF. Though it does not contain images or visuals, the code is simple, straightforward and
easy to understand. It covers important topics including conflicts of interest, harassment,
confidentiality and protection of user data.
Index 2

Face book also highlights that employees can report violations anonymously to sources that
they feel comfortable speaking to, including their managers, the HR department, or the Legal
Department. The code of conduct also includes links to the company’s whistleblower and
complaint policy.

Microsoft’s Standards of Business Conduct 

have been drafted around one central theme: trust. The company emphasizes that trust is an
important aspect of its operations, including with customers, governments, fellow employees,
investors and representatives. The code of conduct also offers a process to help employees
make difficult decisions that reflect Microsoft’s values and standards.

Microsoft provides its employees with a visually appealing and easy-to-read document that
is reflective of the organization’s values..

Nokia’s Code of Conduct 

Is a detailed and thorough document. It highlights key policies that all employees should be
familiar with. Each section of the code of conduct also provides employees with a clear
understanding of what their responsibilities are and red flags that may arise in different
situations.

This easy-to-understand document is focused on helping employees make the best choices
based on the company’s values. The company has also provided a clear description of
reporting processes, retaliation policies and corrective action policies.
References

Jon B. & Trey M.(2014).Business Continuity and Disaster Recovery: Trends,


Considerations, & Leading Practices. Los Angeles.

Marnewick. C & Labuschagne L. (2016). A SECURITY FRAMEWORK FOR AN


ERP SYSTEM..Academy for Information Technology, University of Johannesburg

UNESCO. (2005). Ethics and Morality.. Prentice Hall..

Realms of Value (Cambridge, Mass.University Press, 1954), pp. 3, 107, 109. See


selections in Frankena and Granrose, Chap. VI.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy