SlideShare a Scribd company logo
1 of 45
ETHICAL CODES FOR IT WORKERS AND
IT USERS
OBJECTIVES
2
• As you read this chapter, consider the following
questions:
– What key characteristics distinguish a professional
from other kinds of workers, and is an IT worker
considered a professional?
– What factors are transforming the professional
services industry?
– What relationships must an IT worker manage, and
what key ethical issues can arise in each?
OBJECTIVES
(CONT’D.)
3
– How do codes of ethics, professional organizations,
certification, and licensing affect the ethical behavior
of IT professionals?
– What is meant by compliance, and how does it help
promote the right behaviors and discourage
undesirable ones?
IT
PROFESSIONALS
4
• Profession is a calling that requires:
– Specialized knowledge
– Long and intensive academic preparation
Professionals:
– Require advanced training and experience
– Must exercise discretion and judgment in their work
– Their work cannot be standardized
– Contribute to society, participate in lifelong training,
assist other professionals
– Carry special rights and responsibilities
•
ARE IT WORKERS
PROFESSIONALS?
5
• Partial list of IT specialists
– Programmers
– Systems analysts
– Software engineers
– Database administrators
– Local area network (LAN) administrators
– Chief information officers (CIOs)
ARE IT WORKERS PROFESSIONALS?
(CONT’D.)
6
•
Legal perspective
– IT workers do not meet legal definition of professional
• Not licensed by state or federal government
• Not liable for malpractice
THE CHANGING PROFESSIONAL
SERVICES INDUSTRY
7
IT workers are considered part of the professional
services industry
Seven forces are changing professional services
– Client sophistication (able to drive hard bargains)
– Governance (due to major scandals)
– Connectivity (instant communications)
– Transparency (view work-in-progress in real-time)
– Modularization (able to outsource modules)
– Globalization (worldwide sourcing)
– Commoditization (for low-end services)
•
PROFESSIONAL RELATIONSHIPS THAT
MUST BE MANAGED
8
•
IT workers involved in relationships with:
– Employers
– Clients
– Suppliers
– Other professionals
– IT users
– Society at large
RELATIONSHIPS BETWEEN IT
WORKERS AND EMPLOYERS
9
• IT workers agree on many aspects of work
relationship before workers accept job offer
Other aspects of work relationship defined in
company’s policy and procedure manual or code of
conduct
Some aspects develop over time
As steward of organization’s IT resources, IT
workers must set an example and enforce policies
regarding the ethical use of IT in:
•
•
•
RELATIONSHIPS BETWEEN IT
WORKERS AND EMPLOYERS
10
• Software piracy
– Act of illegally making copies of software or enabling
access to software to which they are not entitled
– Area in which IT workers can be tempted to violate laws
and policies
– The Business Software Alliance (BSA) is a trade group
representing the world’s largest software and hardware
manufacturers; mission is to stop the unauthorized
copying of software
– Thousands of cases prosecuted each year
RELATIONSHIPS BETWEEN
IT WORKERS AND EMPLOYERS
(CONT’D.)
11
RELATIONSHIPS BETWEEN
IT WORKERS AND EMPLOYERS (CONT’D.)
12
• IT workers must set an example and enforce
policies regarding the ethical use of IT in: (cont’d.)
– Trade secrets
• Business information generally unknown to public
• Company takes actions to keep confidential
• Require cost or effort to develop
• Have some degree of uniqueness or novelty
– Whistle-blowing
• Employee attracts attention to a negligent, illegal,
unethical, abusive, or dangerous act that threatens
the public interest
RELATIONSHIPS BETWEEN IT
WORKERS AND CLIENTS
13
• IT worker provides:
– Hardware, software, or services at a certain cost and
within a given time frame
Client provides:
– Compensation
– Access to key contacts
– Work space
Relationship is usually documented in contractual
terms
•
•
RELATIONSHIPS BETWEEN
IT WORKERS AND CLIENTS
(CONT’D.)
14
• Client makes decisions about a project based on
information, alternatives, and recommendations
provided by the IT worker
Client trusts IT worker to act in client’s best interests
IT worker trusts that client will provide relevant
information, listen to and understand what the IT
worker says, ask questions to understand impact of
key decisions, and use the information to make wise
choices
•
•
RELATIONSHIPS BETWEEN
IT WORKERS AND CLIENTS (CONT’D.)
15
• Ethical problems arise if a company recommends its
own products and services to remedy problems they
have detected
– Creates a conflict of interest
Problems arise during a project if IT workers are
unable to provide full and accurate reporting of a
project’s status
– Finger pointing and heated discussions can ensue
•
RELATIONSHIPS BETWEEN
IT WORKERS AND CLIENTS (CONT’D.)
16
• Fraud
– Crime of obtaining goods, services, or property
through deception or trickery
Misrepresentation
– Misstatement or incomplete statement of material fact
– If misrepresentation causes a party to enter into a
contract, that party may have the right to cancel
contract or seek reimbursement for damages
•
RELATIONSHIPS BETWEEN
IT WORKERS AND CLIENTS (CONT’D.)
17
• Breach of contract
– One party fails to meet the terms of a contract
– When there is material breach of contract:
• The non-breaching party may rescind the contract,
seek restitution of any compensation paid to the
breaching party, and be discharged from any
further performance under the contract
IT projects are joint efforts in which vendors and
customers work together
– When there are problems, it is difficult to assign who
is at fault
•
RELATIONSHIPS BETWEEN IT
WORKERS AND SUPPLIERS
18
• Develop good working relationships with suppliers:
– To encourage flow of useful information and ideas to
develop innovative and cost-effective ways of using
the supplier in ways that the IT worker may not have
considered
– By dealing fairly with them
– By not making unreasonable demands
RELATIONSHIPS BETWEEN
IT WORKERS AND SUPPLIERS (CONT’D.)
19
• Bribery
– Providing money, property, or favors to obtain a
business advantage
– U.S. Foreign Corrupt Practices Act (FCPA): crime to
bribe a foreign official, a foreign political party official,
or a candidate for foreign political office
– At what point does a gift become a bribe?
– No gift should be hidden
– Perceptions of donor and recipient can differ
– United Nations Convention Against Corruption is a
global treaty to fight bribery and corruption
RELATIONSHIPS BETWEEN
IT WORKERS AND SUPPLIERS (CONT’D.)
20
RELATIONSHIPS BETWEEN
IT WORKERS AND OTHER
PROFESSIONALS
21
• Professionals feel a degree of loyalty to other
members of their profession
Professionals owe each other adherence to their
profession’s code of conduct
Ethical problems among the IT profession
– Résumé inflation on 30% of U.S. job applications
– Inappropriate sharing of corporate information
• Information might be sold intentionally or shared
informally with those who have no need to know
•
•
RELATIONSHIPS BETWEEN
IT WORKERS AND IT USERS
22
• IT user: person using a hardware or software
product
IT workers’ duties
– Understand users’ needs and capabilities
– Deliver products and services that meet those needs
– Establish environment that supports ethical behavior:
• To discourages software piracy
• To minimize inappropriate use of corporate
computing resources
• To avoid inappropriate sharing of information
•
RELATIONSHIPS BETWEEN IT
WORKERS AND SOCIETY
23
• Society expects members of a profession:
– To provide significant benefits
– To not cause harm through their actions
Actions of an IT worker can affect society
Professional organizations provide codes of ethics
to guide IT workers’ actions
•
•
PROFESSIONAL CODES OF
ETHICS
24
• State the principles and core values that are
essential to the work of an occupational group
Most codes of ethics include:
– What the organization aspires to become
– Rules and principles by which members of the
organization are expected to abide
Many codes also include commitment to continuing
education for those who practice the profession
•
•
PROFESSIONAL CODES OF ETHICS
(CONT’D.)
25
• Following a professional code of ethics can produce
benefits for the individual, the profession, and
society as a whole
– Ethical decision making
– High standards of practice and ethical behavior
– Trust and respect from general public
– Evaluation benchmark for self-assessment
PROFESSIONAL
ORGANIZATIONS
26
•
•
No universal code of ethics for IT professionals
No single, formal organization of IT professionals
has emerged as preeminent
Five of the most prominent organizations include:
– Association for Computing Machinery (ACM)
– Institute of Electrical and Electronics Engineers
Computer Society (IEEE-CS)
– Association of IT Professionals (AITP)
– SysAdmin, Audit, Network, Security (SANS) Institute
•
CERTIFICATION
27
• Indicates that a professional possesses a particular
set of skills, knowledge, or abilities in the opinion of
the certifying organization
Can also apply to products
Generally voluntary
May or may not require adherence to a code of
ethics
Employers view as benchmark of knowledge
Opinions are divided on value of certification
•
•
•
•
•
CERTIFICATION (CONT’D.)
28
• Vendor certifications
– Some certifications substantially improve IT workers’
salaries and career prospects
– Relevant for narrowly defined roles or certain aspects
of broader roles
– Require passing a written exam, or in some cases, a
hands-on lab to demonstrate skills and knowledge
– Can take years to obtain necessary experience
– Training can be expensive
CERTIFICATION (CONT’D.)
29
• Industry association certifications
– Require a higher level of experience and a broader
perspective than vendor certifications
– Must sit for and pass written exam
– May need to pay annual renewal fee, earn continuing
education credits, and/or pass renewal test
– Lag in developing tests that cover new technologies
– Are moving from purely technical content to a broader
mix of technical, business, and behavioral
competencies
GOVERNMENT LICENSING
30
• License is a government-issued permission to
engage in an activity or operate a business
Generally administered at the state level in the
United States
Often requires that recipient pass a test
Some professionals must be licensed – doctors,
lawyers, CPAs, medical and day care providers,
engineers
One goal: protect public safety
•
•
•
•
GOVERNMENT LICENSING
(CONT’D.)
31
• Case for licensing IT workers
– Encourages following highest standards of profession
– Encourages practicing a code of ethics
– Violators would be punished
Without licensing, there are no requirements for
heightened care and no concept of professional
malpractice
•
GOVERNMENT LICENSING
(CONT’D.)
32
• Issues associated with government licensing of IT
workers
– There are few licensing programs for IT professionals
• No universally accepted core body of knowledge
• Unclear who should manage content and
administration of licensing exams
• No administrative body to accredit professional
education programs
• No administrative body to assess and ensure
competence of individual workers
IT PROFESSIONAL MALPRACTICE
33
• Negligence: not doing something that a reasonable
person would do, or doing something that a
reasonable person would not do
Duty of care: obligation to protect people against
any unreasonable harm or risk
– Reasonable person standard
– Reasonable professional standard
Professional malpractice: professionals who breach
the duty of care are liable for injuries that their
negligence causes
•
•
IT USERS
34
• Employees’ ethical use of IT is an area of growing
concern because of increased access to:
– Personal computers
– Corporate information systems and data
– The Internet
COMMON ETHICAL ISSUES FOR IT USERS
35
•
•
Software piracy
Inappropriate use of computing resources
– Erodes productivity and wastes time
– Could lead to lawsuits
Inappropriate sharing of information, including:
– Every organization stores vast amounts of private or
confidential data
• Private data (employees and customers)
• Confidential information (company and operations)
•
SUPPORTING THE ETHICAL PRACTICES
OF IT USERS
36
• Policies that protect against abuses:
– Set forth general rights and responsibilities of users
– Create boundaries of acceptable behavior
– Enable management to punish violators
Policy components include:
– Establishing guidelines for use of company software
– Defining appropriate use of IT resources
– Structuring information systems to protect data and
information
– Installing and maintaining a corporate firewall
•
SUPPORTING THE ETHICAL PRACTICES
OF IT USERS (CONT’D.)
37
38
COMPLIANCE
39
• To be in accordance with established policies,
guidelines, specifications, and legislation
– Sarbanes-Oxley – established requirements for
internal controls
– HIPAA – ensures security and privacy of employee
healthcare data
– Failure to be in conformance can lead to criminal or
civil penalties and also lawsuits
COMPLIANCE
(CONT’D.)
40
• Major challenge to comply with multiple government
and industry regulations that are sometimes in
conflict
To meet this challenge:
– Implement software to track and record compliance
actions
– Hire management consultants for advice and training
– Create Chief Compliance Officer position
•
COMPLIANCE
(CONT’D.)
41
• Audit committee is subset of the board of directors,
with oversight for the following activities:
– Quality and integrity of accounting and reporting
practices and controls
– Compliance with legal and regulatory requirements
– Qualifications, independence, and performance of
organization’s independent auditor
– Performance of company’s internal audit team
COMPLIANCE
(CONT’D.)
42
• Internal audit committee responsibilities:
– Determine that internal systems and controls are
adequate and effective
– Verify existence of company assets and maintain
proper safeguards over their protection
– Measure the organization’s compliance with its own
policies and procedures
– Insure that institutional policies and procedures,
appropriate laws, and good practices are followed
– Evaluate adequacy and reliability of information
available for management decision making
SUMMARY
43
• Professionals
– Require advanced training and experience
– Must exercise discretion and judgment in their work
– Their work cannot be standardized
From a legal standpoint, a professional:
– Has passed the state licensing requirements
– Has earned the right to practice in a state(s)
IT professionals have many different relationships
– Each with its own ethical issues and potential
problems
•
•
SUMMARY (CONT’D.)
44
• Professional code of ethics
– States the principles and core values essential to the
work of an occupational group
– Serves as a guideline for ethical decision making
– Promotes high standards of practice and behavior
– Enhances trust and respect from the general public
– Provides an evaluation benchmark
Licensing and certification of IT professionals
– Would increase the reliability and effectiveness of
information systems
– Raises many issues
•
SUMMARY (CONT’D.)
• IT-related professional organizations have
developed their code of ethics that:
– Outlines what the organization aspires to
become
– Lists rules and principles for members
– Includes a commitment to continuing
education for those who practice the
profession
• Audit committee and internal audit team have a major
role in ensuring that both the IT organization and IT users
are in compliance with guidelines and various legal and
regulatory practices
45
•
•

More Related Content

Similar to Week 4.pptx

20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology Kathirvel Ayyaswamy
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it usersBhanja Kishor Samudra
 
Icaict202 a work and communicate effectively in an
Icaict202 a   work and communicate effectively in anIcaict202 a   work and communicate effectively in an
Icaict202 a work and communicate effectively in anMelanietcastillo
 
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...Business Development Institute
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media Rockstar
 
Chp 04 ethics and proffesions (shared) ----
Chp 04   ethics and proffesions (shared) ----Chp 04   ethics and proffesions (shared) ----
Chp 04 ethics and proffesions (shared) ----YUSRA FERNANDO
 
ethic01.ppt
ethic01.pptethic01.ppt
ethic01.pptAnil Yadav
 
Hr Handbook
Hr HandbookHr Handbook
Hr Handbooktmvivek
 
Chap1_remaining ethics for managementremaining.pptx
Chap1_remaining ethics for managementremaining.pptxChap1_remaining ethics for managementremaining.pptx
Chap1_remaining ethics for managementremaining.pptxDEVKOTA Devi Bhakta
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.pptClaudeDex
 
Social media in the workplace
Social media in the workplace Social media in the workplace
Social media in the workplace AlphaStaff
 
IT1204 - Software Engineering - L4
IT1204 - Software Engineering - L4IT1204 - Software Engineering - L4
IT1204 - Software Engineering - L4BakerTilly US
 
Chp 03 ethics and ethical analysis (shared) -
Chp 03   ethics and ethical analysis (shared) - Chp 03   ethics and ethical analysis (shared) -
Chp 03 ethics and ethical analysis (shared) - YUSRA FERNANDO
 
13824518.ppt
13824518.ppt13824518.ppt
13824518.pptzeinorrahman
 
Requirement engineering in S/W Engineering
Requirement engineering in S/W EngineeringRequirement engineering in S/W Engineering
Requirement engineering in S/W EngineeringMikel Raj
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issuesJagdeepSingh394
 
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...Kevin O'Shea
 

Similar to Week 4.pptx (20)

20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
 
Icaict202 a work and communicate effectively in an
Icaict202 a   work and communicate effectively in anIcaict202 a   work and communicate effectively in an
Icaict202 a work and communicate effectively in an
 
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
ING Presentation - BDI 7/26/11 Social Media Security & Compliance Workshop fo...
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
 
Chp 04 ethics and proffesions (shared) ----
Chp 04   ethics and proffesions (shared) ----Chp 04   ethics and proffesions (shared) ----
Chp 04 ethics and proffesions (shared) ----
 
ethic01.ppt
ethic01.pptethic01.ppt
ethic01.ppt
 
Hr Handbook
Hr HandbookHr Handbook
Hr Handbook
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Chap1_remaining ethics for managementremaining.pptx
Chap1_remaining ethics for managementremaining.pptxChap1_remaining ethics for managementremaining.pptx
Chap1_remaining ethics for managementremaining.pptx
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
 
Social media in the workplace
Social media in the workplace Social media in the workplace
Social media in the workplace
 
01.ppt
01.ppt01.ppt
01.ppt
 
IT1204 - Software Engineering - L4
IT1204 - Software Engineering - L4IT1204 - Software Engineering - L4
IT1204 - Software Engineering - L4
 
Chp 03 ethics and ethical analysis (shared) -
Chp 03   ethics and ethical analysis (shared) - Chp 03   ethics and ethical analysis (shared) -
Chp 03 ethics and ethical analysis (shared) -
 
13824518.ppt
13824518.ppt13824518.ppt
13824518.ppt
 
Requirement engineering in S/W Engineering
Requirement engineering in S/W EngineeringRequirement engineering in S/W Engineering
Requirement engineering in S/W Engineering
 
Management Information System Chapter 03
Management Information System Chapter 03Management Information System Chapter 03
Management Information System Chapter 03
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...
 

More from JohnLagman3

8.-Javascript-report powerpoint presentation
8.-Javascript-report powerpoint presentation8.-Javascript-report powerpoint presentation
8.-Javascript-report powerpoint presentationJohnLagman3
 
7.-Bootstrap-5-report powerpoint presentation
7.-Bootstrap-5-report powerpoint presentation7.-Bootstrap-5-report powerpoint presentation
7.-Bootstrap-5-report powerpoint presentationJohnLagman3
 
1._Introduction_to_HTML5 powerpoint presentation
1._Introduction_to_HTML5 powerpoint presentation1._Introduction_to_HTML5 powerpoint presentation
1._Introduction_to_HTML5 powerpoint presentationJohnLagman3
 
bufferoverflow-151214121251 presentation
bufferoverflow-151214121251 presentationbufferoverflow-151214121251 presentation
bufferoverflow-151214121251 presentationJohnLagman3
 
Variables in MIT App Inventor powerpoint
Variables in MIT App Inventor powerpointVariables in MIT App Inventor powerpoint
Variables in MIT App Inventor powerpointJohnLagman3
 
Web-Development Powerpoint Presentation.
Web-Development Powerpoint Presentation.Web-Development Powerpoint Presentation.
Web-Development Powerpoint Presentation.JohnLagman3
 
History of Android powerpoint presentation
History of Android powerpoint presentationHistory of Android powerpoint presentation
History of Android powerpoint presentationJohnLagman3
 
Mobile Application Development powerpoint
Mobile Application Development powerpointMobile Application Development powerpoint
Mobile Application Development powerpointJohnLagman3
 
Presentation of Hyper Text Markup Language
Presentation of Hyper Text Markup LanguagePresentation of Hyper Text Markup Language
Presentation of Hyper Text Markup LanguageJohnLagman3
 
html-150424090224-conversion-gate0.2.pdf
html-150424090224-conversion-gate0.2.pdfhtml-150424090224-conversion-gate0.2.pdf
html-150424090224-conversion-gate0.2.pdfJohnLagman3
 
Hypertext Mark Up Language Introduction.
Hypertext Mark Up Language Introduction.Hypertext Mark Up Language Introduction.
Hypertext Mark Up Language Introduction.JohnLagman3
 
Multiple_Linear_Regression Presentation.
Multiple_Linear_Regression Presentation.Multiple_Linear_Regression Presentation.
Multiple_Linear_Regression Presentation.JohnLagman3
 
Lesson 4 - Introduction to Filmora.pptx
Lesson 4 - Introduction to Filmora.pptxLesson 4 - Introduction to Filmora.pptx
Lesson 4 - Introduction to Filmora.pptxJohnLagman3
 
1.-Introduction-report.pdf
1.-Introduction-report.pdf1.-Introduction-report.pdf
1.-Introduction-report.pdfJohnLagman3
 
Lesson 1 Animation.pdf
Lesson 1 Animation.pdfLesson 1 Animation.pdf
Lesson 1 Animation.pdfJohnLagman3
 
Lesson 1.pdf
Lesson 1.pdfLesson 1.pdf
Lesson 1.pdfJohnLagman3
 
Confidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptConfidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptJohnLagman3
 
physicalsecurity-150317020111-conversion-gate01.pdf
physicalsecurity-150317020111-conversion-gate01.pdfphysicalsecurity-150317020111-conversion-gate01.pdf
physicalsecurity-150317020111-conversion-gate01.pdfJohnLagman3
 
Introduction to BIOMETRICS Security.pptx
Introduction to BIOMETRICS Security.pptxIntroduction to BIOMETRICS Security.pptx
Introduction to BIOMETRICS Security.pptxJohnLagman3
 
1.-Introduction-report.pptx
1.-Introduction-report.pptx1.-Introduction-report.pptx
1.-Introduction-report.pptxJohnLagman3
 

More from JohnLagman3 (20)

8.-Javascript-report powerpoint presentation
8.-Javascript-report powerpoint presentation8.-Javascript-report powerpoint presentation
8.-Javascript-report powerpoint presentation
 
7.-Bootstrap-5-report powerpoint presentation
7.-Bootstrap-5-report powerpoint presentation7.-Bootstrap-5-report powerpoint presentation
7.-Bootstrap-5-report powerpoint presentation
 
1._Introduction_to_HTML5 powerpoint presentation
1._Introduction_to_HTML5 powerpoint presentation1._Introduction_to_HTML5 powerpoint presentation
1._Introduction_to_HTML5 powerpoint presentation
 
bufferoverflow-151214121251 presentation
bufferoverflow-151214121251 presentationbufferoverflow-151214121251 presentation
bufferoverflow-151214121251 presentation
 
Variables in MIT App Inventor powerpoint
Variables in MIT App Inventor powerpointVariables in MIT App Inventor powerpoint
Variables in MIT App Inventor powerpoint
 
Web-Development Powerpoint Presentation.
Web-Development Powerpoint Presentation.Web-Development Powerpoint Presentation.
Web-Development Powerpoint Presentation.
 
History of Android powerpoint presentation
History of Android powerpoint presentationHistory of Android powerpoint presentation
History of Android powerpoint presentation
 
Mobile Application Development powerpoint
Mobile Application Development powerpointMobile Application Development powerpoint
Mobile Application Development powerpoint
 
Presentation of Hyper Text Markup Language
Presentation of Hyper Text Markup LanguagePresentation of Hyper Text Markup Language
Presentation of Hyper Text Markup Language
 
html-150424090224-conversion-gate0.2.pdf
html-150424090224-conversion-gate0.2.pdfhtml-150424090224-conversion-gate0.2.pdf
html-150424090224-conversion-gate0.2.pdf
 
Hypertext Mark Up Language Introduction.
Hypertext Mark Up Language Introduction.Hypertext Mark Up Language Introduction.
Hypertext Mark Up Language Introduction.
 
Multiple_Linear_Regression Presentation.
Multiple_Linear_Regression Presentation.Multiple_Linear_Regression Presentation.
Multiple_Linear_Regression Presentation.
 
Lesson 4 - Introduction to Filmora.pptx
Lesson 4 - Introduction to Filmora.pptxLesson 4 - Introduction to Filmora.pptx
Lesson 4 - Introduction to Filmora.pptx
 
1.-Introduction-report.pdf
1.-Introduction-report.pdf1.-Introduction-report.pdf
1.-Introduction-report.pdf
 
Lesson 1 Animation.pdf
Lesson 1 Animation.pdfLesson 1 Animation.pdf
Lesson 1 Animation.pdf
 
Lesson 1.pdf
Lesson 1.pdfLesson 1.pdf
Lesson 1.pdf
 
Confidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptConfidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.ppt
 
physicalsecurity-150317020111-conversion-gate01.pdf
physicalsecurity-150317020111-conversion-gate01.pdfphysicalsecurity-150317020111-conversion-gate01.pdf
physicalsecurity-150317020111-conversion-gate01.pdf
 
Introduction to BIOMETRICS Security.pptx
Introduction to BIOMETRICS Security.pptxIntroduction to BIOMETRICS Security.pptx
Introduction to BIOMETRICS Security.pptx
 
1.-Introduction-report.pptx
1.-Introduction-report.pptx1.-Introduction-report.pptx
1.-Introduction-report.pptx
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Week 4.pptx

  • 1. ETHICAL CODES FOR IT WORKERS AND IT USERS
  • 2. OBJECTIVES 2 • As you read this chapter, consider the following questions: – What key characteristics distinguish a professional from other kinds of workers, and is an IT worker considered a professional? – What factors are transforming the professional services industry? – What relationships must an IT worker manage, and what key ethical issues can arise in each?
  • 3. OBJECTIVES (CONT’D.) 3 – How do codes of ethics, professional organizations, certification, and licensing affect the ethical behavior of IT professionals? – What is meant by compliance, and how does it help promote the right behaviors and discourage undesirable ones?
  • 4. IT PROFESSIONALS 4 • Profession is a calling that requires: – Specialized knowledge – Long and intensive academic preparation Professionals: – Require advanced training and experience – Must exercise discretion and judgment in their work – Their work cannot be standardized – Contribute to society, participate in lifelong training, assist other professionals – Carry special rights and responsibilities •
  • 5. ARE IT WORKERS PROFESSIONALS? 5 • Partial list of IT specialists – Programmers – Systems analysts – Software engineers – Database administrators – Local area network (LAN) administrators – Chief information officers (CIOs)
  • 6. ARE IT WORKERS PROFESSIONALS? (CONT’D.) 6 • Legal perspective – IT workers do not meet legal definition of professional • Not licensed by state or federal government • Not liable for malpractice
  • 7. THE CHANGING PROFESSIONAL SERVICES INDUSTRY 7 IT workers are considered part of the professional services industry Seven forces are changing professional services – Client sophistication (able to drive hard bargains) – Governance (due to major scandals) – Connectivity (instant communications) – Transparency (view work-in-progress in real-time) – Modularization (able to outsource modules) – Globalization (worldwide sourcing) – Commoditization (for low-end services) •
  • 8. PROFESSIONAL RELATIONSHIPS THAT MUST BE MANAGED 8 • IT workers involved in relationships with: – Employers – Clients – Suppliers – Other professionals – IT users – Society at large
  • 9. RELATIONSHIPS BETWEEN IT WORKERS AND EMPLOYERS 9 • IT workers agree on many aspects of work relationship before workers accept job offer Other aspects of work relationship defined in company’s policy and procedure manual or code of conduct Some aspects develop over time As steward of organization’s IT resources, IT workers must set an example and enforce policies regarding the ethical use of IT in: • • •
  • 10. RELATIONSHIPS BETWEEN IT WORKERS AND EMPLOYERS 10 • Software piracy – Act of illegally making copies of software or enabling access to software to which they are not entitled – Area in which IT workers can be tempted to violate laws and policies – The Business Software Alliance (BSA) is a trade group representing the world’s largest software and hardware manufacturers; mission is to stop the unauthorized copying of software – Thousands of cases prosecuted each year
  • 11. RELATIONSHIPS BETWEEN IT WORKERS AND EMPLOYERS (CONT’D.) 11
  • 12. RELATIONSHIPS BETWEEN IT WORKERS AND EMPLOYERS (CONT’D.) 12 • IT workers must set an example and enforce policies regarding the ethical use of IT in: (cont’d.) – Trade secrets • Business information generally unknown to public • Company takes actions to keep confidential • Require cost or effort to develop • Have some degree of uniqueness or novelty – Whistle-blowing • Employee attracts attention to a negligent, illegal, unethical, abusive, or dangerous act that threatens the public interest
  • 13. RELATIONSHIPS BETWEEN IT WORKERS AND CLIENTS 13 • IT worker provides: – Hardware, software, or services at a certain cost and within a given time frame Client provides: – Compensation – Access to key contacts – Work space Relationship is usually documented in contractual terms • •
  • 14. RELATIONSHIPS BETWEEN IT WORKERS AND CLIENTS (CONT’D.) 14 • Client makes decisions about a project based on information, alternatives, and recommendations provided by the IT worker Client trusts IT worker to act in client’s best interests IT worker trusts that client will provide relevant information, listen to and understand what the IT worker says, ask questions to understand impact of key decisions, and use the information to make wise choices • •
  • 15. RELATIONSHIPS BETWEEN IT WORKERS AND CLIENTS (CONT’D.) 15 • Ethical problems arise if a company recommends its own products and services to remedy problems they have detected – Creates a conflict of interest Problems arise during a project if IT workers are unable to provide full and accurate reporting of a project’s status – Finger pointing and heated discussions can ensue •
  • 16. RELATIONSHIPS BETWEEN IT WORKERS AND CLIENTS (CONT’D.) 16 • Fraud – Crime of obtaining goods, services, or property through deception or trickery Misrepresentation – Misstatement or incomplete statement of material fact – If misrepresentation causes a party to enter into a contract, that party may have the right to cancel contract or seek reimbursement for damages •
  • 17. RELATIONSHIPS BETWEEN IT WORKERS AND CLIENTS (CONT’D.) 17 • Breach of contract – One party fails to meet the terms of a contract – When there is material breach of contract: • The non-breaching party may rescind the contract, seek restitution of any compensation paid to the breaching party, and be discharged from any further performance under the contract IT projects are joint efforts in which vendors and customers work together – When there are problems, it is difficult to assign who is at fault •
  • 18. RELATIONSHIPS BETWEEN IT WORKERS AND SUPPLIERS 18 • Develop good working relationships with suppliers: – To encourage flow of useful information and ideas to develop innovative and cost-effective ways of using the supplier in ways that the IT worker may not have considered – By dealing fairly with them – By not making unreasonable demands
  • 19. RELATIONSHIPS BETWEEN IT WORKERS AND SUPPLIERS (CONT’D.) 19 • Bribery – Providing money, property, or favors to obtain a business advantage – U.S. Foreign Corrupt Practices Act (FCPA): crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office – At what point does a gift become a bribe? – No gift should be hidden – Perceptions of donor and recipient can differ – United Nations Convention Against Corruption is a global treaty to fight bribery and corruption
  • 20. RELATIONSHIPS BETWEEN IT WORKERS AND SUPPLIERS (CONT’D.) 20
  • 21. RELATIONSHIPS BETWEEN IT WORKERS AND OTHER PROFESSIONALS 21 • Professionals feel a degree of loyalty to other members of their profession Professionals owe each other adherence to their profession’s code of conduct Ethical problems among the IT profession – RĂ©sumĂ© inflation on 30% of U.S. job applications – Inappropriate sharing of corporate information • Information might be sold intentionally or shared informally with those who have no need to know • •
  • 22. RELATIONSHIPS BETWEEN IT WORKERS AND IT USERS 22 • IT user: person using a hardware or software product IT workers’ duties – Understand users’ needs and capabilities – Deliver products and services that meet those needs – Establish environment that supports ethical behavior: • To discourages software piracy • To minimize inappropriate use of corporate computing resources • To avoid inappropriate sharing of information •
  • 23. RELATIONSHIPS BETWEEN IT WORKERS AND SOCIETY 23 • Society expects members of a profession: – To provide significant benefits – To not cause harm through their actions Actions of an IT worker can affect society Professional organizations provide codes of ethics to guide IT workers’ actions • •
  • 24. PROFESSIONAL CODES OF ETHICS 24 • State the principles and core values that are essential to the work of an occupational group Most codes of ethics include: – What the organization aspires to become – Rules and principles by which members of the organization are expected to abide Many codes also include commitment to continuing education for those who practice the profession • •
  • 25. PROFESSIONAL CODES OF ETHICS (CONT’D.) 25 • Following a professional code of ethics can produce benefits for the individual, the profession, and society as a whole – Ethical decision making – High standards of practice and ethical behavior – Trust and respect from general public – Evaluation benchmark for self-assessment
  • 26. PROFESSIONAL ORGANIZATIONS 26 • • No universal code of ethics for IT professionals No single, formal organization of IT professionals has emerged as preeminent Five of the most prominent organizations include: – Association for Computing Machinery (ACM) – Institute of Electrical and Electronics Engineers Computer Society (IEEE-CS) – Association of IT Professionals (AITP) – SysAdmin, Audit, Network, Security (SANS) Institute •
  • 27. CERTIFICATION 27 • Indicates that a professional possesses a particular set of skills, knowledge, or abilities in the opinion of the certifying organization Can also apply to products Generally voluntary May or may not require adherence to a code of ethics Employers view as benchmark of knowledge Opinions are divided on value of certification • • • • •
  • 28. CERTIFICATION (CONT’D.) 28 • Vendor certifications – Some certifications substantially improve IT workers’ salaries and career prospects – Relevant for narrowly defined roles or certain aspects of broader roles – Require passing a written exam, or in some cases, a hands-on lab to demonstrate skills and knowledge – Can take years to obtain necessary experience – Training can be expensive
  • 29. CERTIFICATION (CONT’D.) 29 • Industry association certifications – Require a higher level of experience and a broader perspective than vendor certifications – Must sit for and pass written exam – May need to pay annual renewal fee, earn continuing education credits, and/or pass renewal test – Lag in developing tests that cover new technologies – Are moving from purely technical content to a broader mix of technical, business, and behavioral competencies
  • 30. GOVERNMENT LICENSING 30 • License is a government-issued permission to engage in an activity or operate a business Generally administered at the state level in the United States Often requires that recipient pass a test Some professionals must be licensed – doctors, lawyers, CPAs, medical and day care providers, engineers One goal: protect public safety • • • •
  • 31. GOVERNMENT LICENSING (CONT’D.) 31 • Case for licensing IT workers – Encourages following highest standards of profession – Encourages practicing a code of ethics – Violators would be punished Without licensing, there are no requirements for heightened care and no concept of professional malpractice •
  • 32. GOVERNMENT LICENSING (CONT’D.) 32 • Issues associated with government licensing of IT workers – There are few licensing programs for IT professionals • No universally accepted core body of knowledge • Unclear who should manage content and administration of licensing exams • No administrative body to accredit professional education programs • No administrative body to assess and ensure competence of individual workers
  • 33. IT PROFESSIONAL MALPRACTICE 33 • Negligence: not doing something that a reasonable person would do, or doing something that a reasonable person would not do Duty of care: obligation to protect people against any unreasonable harm or risk – Reasonable person standard – Reasonable professional standard Professional malpractice: professionals who breach the duty of care are liable for injuries that their negligence causes • •
  • 34. IT USERS 34 • Employees’ ethical use of IT is an area of growing concern because of increased access to: – Personal computers – Corporate information systems and data – The Internet
  • 35. COMMON ETHICAL ISSUES FOR IT USERS 35 • • Software piracy Inappropriate use of computing resources – Erodes productivity and wastes time – Could lead to lawsuits Inappropriate sharing of information, including: – Every organization stores vast amounts of private or confidential data • Private data (employees and customers) • Confidential information (company and operations) •
  • 36. SUPPORTING THE ETHICAL PRACTICES OF IT USERS 36 • Policies that protect against abuses: – Set forth general rights and responsibilities of users – Create boundaries of acceptable behavior – Enable management to punish violators Policy components include: – Establishing guidelines for use of company software – Defining appropriate use of IT resources – Structuring information systems to protect data and information – Installing and maintaining a corporate firewall •
  • 37. SUPPORTING THE ETHICAL PRACTICES OF IT USERS (CONT’D.) 37
  • 38. 38
  • 39. COMPLIANCE 39 • To be in accordance with established policies, guidelines, specifications, and legislation – Sarbanes-Oxley – established requirements for internal controls – HIPAA – ensures security and privacy of employee healthcare data – Failure to be in conformance can lead to criminal or civil penalties and also lawsuits
  • 40. COMPLIANCE (CONT’D.) 40 • Major challenge to comply with multiple government and industry regulations that are sometimes in conflict To meet this challenge: – Implement software to track and record compliance actions – Hire management consultants for advice and training – Create Chief Compliance Officer position •
  • 41. COMPLIANCE (CONT’D.) 41 • Audit committee is subset of the board of directors, with oversight for the following activities: – Quality and integrity of accounting and reporting practices and controls – Compliance with legal and regulatory requirements – Qualifications, independence, and performance of organization’s independent auditor – Performance of company’s internal audit team
  • 42. COMPLIANCE (CONT’D.) 42 • Internal audit committee responsibilities: – Determine that internal systems and controls are adequate and effective – Verify existence of company assets and maintain proper safeguards over their protection – Measure the organization’s compliance with its own policies and procedures – Insure that institutional policies and procedures, appropriate laws, and good practices are followed – Evaluate adequacy and reliability of information available for management decision making
  • 43. SUMMARY 43 • Professionals – Require advanced training and experience – Must exercise discretion and judgment in their work – Their work cannot be standardized From a legal standpoint, a professional: – Has passed the state licensing requirements – Has earned the right to practice in a state(s) IT professionals have many different relationships – Each with its own ethical issues and potential problems • •
  • 44. SUMMARY (CONT’D.) 44 • Professional code of ethics – States the principles and core values essential to the work of an occupational group – Serves as a guideline for ethical decision making – Promotes high standards of practice and behavior – Enhances trust and respect from the general public – Provides an evaluation benchmark Licensing and certification of IT professionals – Would increase the reliability and effectiveness of information systems – Raises many issues •
  • 45. SUMMARY (CONT’D.) • IT-related professional organizations have developed their code of ethics that: – Outlines what the organization aspires to become – Lists rules and principles for members – Includes a commitment to continuing education for those who practice the profession • Audit committee and internal audit team have a major role in ensuring that both the IT organization and IT users are in compliance with guidelines and various legal and regulatory practices 45 • •