Tl vi a


Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Tl vi a

  1. 1. ISTE Standard TL-VI<br />Legal and Ethical Use of Technologies<br />SJU Internship<br />Denise Wright<br />Business ethics is a form of applied ethics. Business ethics deals with ethical rules and principles within a business or commercial context, the various moral or ethical problems that can arise in a business setting, and any special ethical duties or obligations that apply to persons who are engaged in commerce, including workers and managers, customers and suppliers, and the larger group of people who have some interest in the business.<br />In the increasingly conscience-focused marketplaces of the twenty-first century, the demand for more ethical business processes and actions is increasing. Many colleges and universities and most business schools are now offering courses in business ethics. Many articles and books and textbooks on the topic are being written and published, and many businesses and corporations now have ethics panel’s, codes of ethics, ethics review boards, and other attempts to foster and uphold higher or better ethics awareness and practices. Simultaneously, pressure is increasingly being applied on business and industry to improve their ethics. This is done through attempts at persuasion as well as through new public initiatives and laws (New World Encyclopedia)<br />Below is a list of current United States Codes and Laws pertaining to technology<br />The U.S. Copyright Act (Cornell Legal Information Institute) <br />Computer Fraud and Abuse Act of 1986 - (Cornell Legal Information Institute) <br />Electronic Communications Privacy Act of 1986 (Cornell Legal Information Institute) <br />Unlawful access to stored communications (Cornell Legal Information Institute) <br />The Privacy Protection Act of 1980 - 42 USC Sec. 2000aa (Cornell Legal Information Institute) <br />Establishing and Maintaining Ethical Standards of Behavior <br />Business owners have great influence in determining the ethical philosophies of their business enterprises. Employees often follow the lead of the owner in executing their duties and attending to their responsibilities, so it is incumbent on the owner to establish a work environment that embraces moral standards of behavior. A business owner or manager who wishes to establish an ethical mind set in his or her company can help the cause by being proactive.<br />Lockheed Martin has standards and codes to guide employees in many areas. The attached document is a copy of the corporations Setting the standard pdf document. <br />Lockheed Martin established policies and procedures for computer use many years ago. These documents have been revised and updated over the years as internet use evolved. We currently have an intranet and access to the internet. Our policies are stringent and all computers that access our servers are or can be monitored. Employees are reminded monthly of the policies on ethical and legal use of computers. We follow federal law and corporate policy of computer use. Employees have been disciplined up to and including dismissal if policies and or procedures are violated.<br />The following is an outline of Lockheed Martin’s policy on computing and information resources this information is not the complete document but a snapshot of pertinent information.<br />Computing and Information Resources<br />1.0 Policy<br />Lockheed Martin considers its computing and information resources (including computers, e-mail system, Internet and intranet access and software) to be corporate assets having strategic value. As such, these resources require innovative management and appropriate controls. <br />2.0 Information Systems and Services<br />2.1 The Chief Information Officer will establish and maintain an architecture that provides for the secure and efficient transmittal, reception, storage, and disposition of the Corporation's business information. The Chief Information Officer will work with corporate, business area, and business unit management to develop an annual Information Technology Strategic Plan (ITSP) that defines the strategic objectives underpinning the architecture, and an Information Technology Architecture Framework (ITAF) that governs the arrangement, interaction, and interdependence of the elements of Lockheed Martin's information systems. <br />2.2 The Chief Information Officer will establish the following corporate councils to participate in developing, communicating, recommending changes to, and as appropriate overseeing the implementation of, the ITSP, ITAF, policies, and procedures. <br />Corporate CouncilsPrimary ResponsibilitiesEnterprise Architecture BoardDetermine and recommend enterprise information technology strategies for the approval of the CIO. Provide technical leadership in identifying, evaluating, recommending technology strategies, architectures, standards and products through the Information Architecture Board (IAB). Lockheed Martin Information Protection Council Establish and oversee the implementation of uniform measures for protecting Lockheed Martin's computing and information resources. Management of Electronic Information CouncilReview information technology matters affecting the corporate interest and recommend the formulation of policies, procedures, or other direction as appropriate.<br />2.3 The Chief Information Officer, through Enterprise Information Systems, will provide information systems and services within the context of the ITSP, ITAF, policies, and procedures, including, but not limited to:<br />standard software and hardware products <br />implementation of security measures including physical safeguards; access authentication, authorization, monitoring, logging and administration; data encryption; virus/malicious code prevention/detection; data back-up; and disaster recovery planning <br />management of Sensitive Information in electronic form, as required by CPS-710, Protection of Sensitive Information <br />management of electronic records in accordance with CPS-527, Records Management <br />telephone, voice mail, video-conferencing, electronic mail, World Wide Web, and other information transmittal services <br />applications development, hosting, and maintenance <br />data center services <br />procurement and contracting services <br />technical consulting and business process re-engineering services <br />training related to these systems and services. <br />2.4 Management will define systems and services requirements, and provide planning and other data necessary to enable the Chief Information Officer and Enterprise Information Systems to define and execute their responsibilities. <br />3.0 Licensed Software<br />Lockheed Martin recognizes the strategic value of the computing and information resources of others. The Corporation will abide by and enforce compliance with all software licenses for rights to use such assets. <br />4.0 Proper Use of Computing and Information Resources<br />4.1 Lockheed Martin's computing and information resources are Lockheed Martin property or are licensed to the Corporation for its use. <br />4.2 Protection and transmission of information on computing and information resources is governed by CPS-710. Additionally, the Corporation specifically prohibits use of computing and information resources in ways that are disruptive, abusive, obscene, or degrading or offensive to others, including the transmission of sexually explicit messages, images or cartoons; ethnic slurs; racial comments; or anything that could be construed as harassment or showing disrespect for others, defaming or slandering others, or otherwise harming another person or business. Employees shall not access the Internet to log onto web sites that contain any such material. <br />4.3 Employees and other authorized users of Lockheed Martin's computing and information resources have no expectation of privacy with regard to use of those resources. In order to enforce these policies, the Corporation reserves the right to monitor any and all use of computing and information resources at any time for any reason, including but not limited to: retrieving, reading, and printing any and all e-mail messages and any other computer files, as well as unfettered monitoring and documenting of all Internet use and intranet traffic. E-mail messages and other uses of computing and information resources are not confidential to the user, even though users of those resources have user IDs, passwords, or other private access codes to log on to the computer or to access networks, files or accounts. User IDs, passwords, or private access codes issued by the Corporation or otherwise used in connection with computing and information resources are not issued to protect the users' privacy, but rather to protect the Corporation's information and assets.<br />The following is Lockheed Martin’s policy on publishing information on Lockheed Martin's Internet web sites.<br />Internet Web Governance<br />1.0 PURPOSE <br />This document defines the requirements for publishing information on Lockheed Martin's Internet web sites. <br />2.0 GENERAL <br />This procedure implements the requirements of Computing and Information Resources, employees are responsible for compliance with this procedure. <br />Information published on a Lockheed Martin Internet web site is available to anyone with a connection to the World Wide Web, and therefore, shall be considered released to the public. <br />References<br />New World Encyclopedia. Retrieved on March 30, 2010 from<br />Setting the standard pdf document<br />