0% found this document useful (0 votes)
140 views15 pages

Ethics and Privacy

This document discusses ethics, privacy, and information security. It defines ethics and its fundamental tenets. There are four categories of ethical issues related to information technology: privacy, accuracy, property, and accessibility. Privacy involves collecting, storing, and disseminating personal information. The document also discusses protecting privacy and potential threats to privacy in electronic surveillance, personal databases on the internet, and information in bulletin boards and blogs.

Uploaded by

Mohamed Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
140 views15 pages

Ethics and Privacy

This document discusses ethics, privacy, and information security. It defines ethics and its fundamental tenets. There are four categories of ethical issues related to information technology: privacy, accuracy, property, and accessibility. Privacy involves collecting, storing, and disseminating personal information. The document also discusses protecting privacy and potential threats to privacy in electronic surveillance, personal databases on the internet, and information in bulletin boards and blogs.

Uploaded by

Mohamed Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Management

Information Systems

Kismayo University
Tutor: Eng Good Date: 30 / 05 / 2021
Group Names
Chapter 3

Ethics, Privacy and Information


Security
Learning Objectives

3.1 Ethical Issues


3.1 Define ethics and explain its three fundamental tenets and the
four categories of ethical issues related to information technology.
3.2 Privacy
3.2 Discuss at least one potential threat to the privacy of the data
stored in each of three places that store personal data.
3.1 Ethical Issues
• Ethics. A branch of philosophy that deals with what
is considered to be right and wrong.
• A Code of Ethics is a collection of principles that
are intended to guide decision making by members
of an organization.
The Four Categories of Ethical Issues

• Privacy Issues involves collecting, storing and disseminating


information about individuals.
• Accuracy Issues involves the authenticity, fidelity and
accuracy of information that is collected and processed.
• Property Issues involves the ownership and value of
information.
• Accessibility Issues revolve around who should have access to
information and whether they should have to pay for this
access.
Fundamental tenets

Fundamental tenets of ethics include:


• Responsibility means that you accept the consequences of
your decisions and actions.
• Accountability refers to determining who is responsible for
actions that were taken.
• Liability is a legal concept that gives individuals the right
to recover the damages done to them by other individuals,
organizations, or systems.
Ethics and Information Technology

• All employees have a responsibility to encourage ethical uses of


information and information technology. Many of the business
decisions you will face at work will have an ethical dimension.
• Consider the following decisions that you might have to make:
• Should organizations monitor employees’ Web surfing and email?
• Should organizations sell customer information to other companies?
• Should organizations audit employees’ computers for unauthorized
software or illegally downloaded music or video files?
Privacy

• In general, privacy is the right to be left alone and to be free of


unreasonable personal intrusions.
• Information privacy is the right to determine when, and to what extent,
information.
• about you can be gathered or communicated to others. Privacy rights
apply to individuals, groups, and institutions. The right to privacy is
recognized today in all Canadian provinces, the U.S. states, and by both
federal governments, either by statute or in common law. Most countries
around the world also have privacy rights laws or regulations.
Benefits of information privacy

• The following list of benefits of high-quality information


privacy is from a business perspective:
• To protect the organization’s public image or brand images.
• To maintain or enhance trust and promote continued
consumer confidence in the organization and promote
goodwill.
• To achieve a competitive advantage in the marketplace by
maintaining high quality, accurate customer information.
Protecting Privacy

• Privacy. The right to be left alone and to be free of unreasonable


personal intrusions.
• Two rules have been followed fairly closely in past court decision
in many countries:
 The right of privacy is not absolutes. Privacy must be balanced
against the needs of society
 The public’s right to know is superior to the individual’s right of
privacy.
Cont…

• Electronic Surveillance. The tracking of people‘s activities,


online or offline, with the aid of computers.
• Personal Information in Databases. Information about
individuals is being kept in many databases: banks, utilities
co., govt. agencies, …etc.; the most visible locations are credit-
reporting agencies.
Cont…

• Information on Internet Bulletin Boards and Newsgroups.


Electronic discussions such as chat rooms and these other
sites appear on the Internet, within corporate intranets, and on
blogs.
• A blog (Weblog) is an informal, personal journal that is
frequently updated and intended for general public reading.
Cont…
• Privacy Codes and Policies. An organization’s
guidelines with respect to protecting the privacy of
customers, clients, and employees.
• International Aspects of Privacy. Privacy issues
that international organizations and governments
face when information spans countries and
jurisdictions.
THANK
YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy