SlideShare a Scribd company logo
1 of 8
UNDERSTANDING ISSUES
                         Unit 2
RELATING TO THE USE OF   Ethical Issues

         INFORMATION
ETHICAL


Ethical
“Generally accepted type of
 behaviour”
ETHICAL ISSUES

Codes of Conduct
Use of email and internet
Whistle blowing
Information ownership
CODES OF CONDUCT

 All organisations have a code of conduct relating to the use of IT.
 They are guidelines to what is acceptable behaviour within the
  organisation.
 In college we have an Acceptable Use Policy.
 These policies are all very similar in nature with some being
  stricter than others.
EMAIL AND INTERNET

   Email and internet should be used for business purposes only.
   Staff should not send personal email during working hours.
   Staff should not surf the internet for non business purposes.
   Some organisations allow limited personal use during breaks.
WHISTLE BLOWING

 If a person reports a colleague for inappropriate use of the
  internet or email it is called whistle blowing.
 If they fail to inform the employer you are seen to be an
  accomplice.
 Staff who report a colleague are protected by the company Code
  of Practice
 Technical staff who detect inappropriate use are also protected.
INFORMATION OWNERSHIP

 Some organisations have an Information Ownership Policy which
  gives specific responsibility to departments for looking after the
  data they hold.
 Generally those responsible for the information must ensure that
  it is up-to-date and correct, reference any copyright materials
  and provide contact information if required.
 In some cases staff will be asked so sign a Non Disclosure
  Agreement so they are not allowed to pass on information about
  the organisation, its practices and any individuals employed
  there.
YOUR TASK

 Investigate Codes of Conduct such as The Open University –
  Write a report detailing what is held in a code of conduct and
  why there is a need for such a code.

 EXTENSION: Compare the various legal and ethical issues and
  how they affect an organisation. Which are more important and
  why? How do they protect the individuals and the organisation

More Related Content

What's hot

Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its useNoriha Nori
 
ethical issues,social issues
 ethical issues,social issues ethical issues,social issues
ethical issues,social issuesbhavesh lande
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Workplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workWorkplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workShankar Myadharaveni
 
Ethical and social_issues_in_information_system
Ethical and social_issues_in_information_systemEthical and social_issues_in_information_system
Ethical and social_issues_in_information_systemKwame Afreh
 
Email policy training management revised(1a)
Email policy training management revised(1a)Email policy training management revised(1a)
Email policy training management revised(1a)Janette Levey Frisch
 
20110512-1 ARMA Boston Email Policy
20110512-1 ARMA Boston Email Policy20110512-1 ARMA Boston Email Policy
20110512-1 ARMA Boston Email PolicyJesse Wilkins
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical IssuesMISY
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward F. T. Charfauros
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkGary Chambers
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technologyWish Mrt'xa
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsSammer Qader
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2manpreet04
 

What's hot (20)

Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
 
ethical issues,social issues
 ethical issues,social issues ethical issues,social issues
ethical issues,social issues
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Liabilty
LiabiltyLiabilty
Liabilty
 
Workplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workWorkplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_work
 
Ethical and social_issues_in_information_system
Ethical and social_issues_in_information_systemEthical and social_issues_in_information_system
Ethical and social_issues_in_information_system
 
Email policy training management revised(1a)
Email policy training management revised(1a)Email policy training management revised(1a)
Email policy training management revised(1a)
 
20110512-1 ARMA Boston Email Policy
20110512-1 ARMA Boston Email Policy20110512-1 ARMA Boston Email Policy
20110512-1 ARMA Boston Email Policy
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
 
Chapter 9_dp-pertemuan_14
 Chapter 9_dp-pertemuan_14 Chapter 9_dp-pertemuan_14
Chapter 9_dp-pertemuan_14
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at Work
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
 
Case study 7
Case study 7Case study 7
Case study 7
 
Electronic poster
Electronic posterElectronic poster
Electronic poster
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
 

Viewers also liked

Lesson 1
Lesson 1Lesson 1
Lesson 1MrsNunn
 
Lesson 5
Lesson 5Lesson 5
Lesson 5MrsNunn
 
Editing techniques
Editing techniquesEditing techniques
Editing techniquesMrsNunn
 
File formats
File formatsFile formats
File formatsMrsNunn
 
Planning2
Planning2Planning2
Planning2MrsNunn
 
Exam system
Exam systemExam system
Exam systemMrsNunn
 
2 questioning techniques v1
2 questioning techniques v12 questioning techniques v1
2 questioning techniques v1MrsNunn
 
Lesson 6 dfd issues
Lesson 6 dfd issuesLesson 6 dfd issues
Lesson 6 dfd issuesMrsNunn
 
Cambridge technicals in it
Cambridge technicals in itCambridge technicals in it
Cambridge technicals in itMrsNunn
 

Viewers also liked (9)

Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Lesson 5
Lesson 5Lesson 5
Lesson 5
 
Editing techniques
Editing techniquesEditing techniques
Editing techniques
 
File formats
File formatsFile formats
File formats
 
Planning2
Planning2Planning2
Planning2
 
Exam system
Exam systemExam system
Exam system
 
2 questioning techniques v1
2 questioning techniques v12 questioning techniques v1
2 questioning techniques v1
 
Lesson 6 dfd issues
Lesson 6 dfd issuesLesson 6 dfd issues
Lesson 6 dfd issues
 
Cambridge technicals in it
Cambridge technicals in itCambridge technicals in it
Cambridge technicals in it
 

Similar to Lesson 2

Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
AssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxAssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxnormanibarber20063
 
Response 1A code of    conduct is a guide that a company uses.docx
Response 1A code of    conduct is a guide that a company uses.docxResponse 1A code of    conduct is a guide that a company uses.docx
Response 1A code of    conduct is a guide that a company uses.docxcarlstromcurtis
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.3).pptx
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.3).pptxCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.3).pptx
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.3).pptxRogerPrimo2
 
Employee use of social media - chapter 2. Disciplinary Action and Social Media
Employee use of social media - chapter 2. Disciplinary Action and Social MediaEmployee use of social media - chapter 2. Disciplinary Action and Social Media
Employee use of social media - chapter 2. Disciplinary Action and Social MediaNiki Avraam
 
Professional ethics in business
Professional ethics in businessProfessional ethics in business
Professional ethics in businessKongChunLeong1
 
CM 1010, Professional Communication 1 Course Learning.docx
 CM 1010, Professional Communication 1 Course Learning.docx CM 1010, Professional Communication 1 Course Learning.docx
CM 1010, Professional Communication 1 Course Learning.docxShiraPrater50
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesNapier University
 
Bus ethics and tech
Bus ethics and techBus ethics and tech
Bus ethics and techwtidwell
 
Code of Ethics and Code of Communication of an organization
Code of Ethics and Code of Communication of an organizationCode of Ethics and Code of Communication of an organization
Code of Ethics and Code of Communication of an organizationPritam Pandey
 
An Overview of Ethics for IT Professionals
An Overview of Ethics for IT ProfessionalsAn Overview of Ethics for IT Professionals
An Overview of Ethics for IT ProfessionalsMark Jhon Oxillo
 

Similar to Lesson 2 (20)

Ethics in IT.pptx
Ethics in IT.pptxEthics in IT.pptx
Ethics in IT.pptx
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
AssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxAssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docx
 
Chapter 1- Lesson 2 Notes.pdf
Chapter 1- Lesson 2 Notes.pdfChapter 1- Lesson 2 Notes.pdf
Chapter 1- Lesson 2 Notes.pdf
 
Gr 3 ethical implication of it
Gr 3   ethical implication of itGr 3   ethical implication of it
Gr 3 ethical implication of it
 
Response 1A code of    conduct is a guide that a company uses.docx
Response 1A code of    conduct is a guide that a company uses.docxResponse 1A code of    conduct is a guide that a company uses.docx
Response 1A code of    conduct is a guide that a company uses.docx
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.3).pptx
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.3).pptxCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.3).pptx
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.3).pptx
 
Employee use of social media - chapter 2. Disciplinary Action and Social Media
Employee use of social media - chapter 2. Disciplinary Action and Social MediaEmployee use of social media - chapter 2. Disciplinary Action and Social Media
Employee use of social media - chapter 2. Disciplinary Action and Social Media
 
Professional ethics in business
Professional ethics in businessProfessional ethics in business
Professional ethics in business
 
CM 1010, Professional Communication 1 Course Learning.docx
 CM 1010, Professional Communication 1 Course Learning.docx CM 1010, Professional Communication 1 Course Learning.docx
CM 1010, Professional Communication 1 Course Learning.docx
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
Laws and Rules
Laws and RulesLaws and Rules
Laws and Rules
 
Behaviour in org
Behaviour in org Behaviour in org
Behaviour in org
 
13824518.ppt
13824518.ppt13824518.ppt
13824518.ppt
 
Operation noah's ark code of conduct
Operation noah's ark code of conduct Operation noah's ark code of conduct
Operation noah's ark code of conduct
 
Operation noahs ark code of conduct
Operation noahs ark code of conductOperation noahs ark code of conduct
Operation noahs ark code of conduct
 
Operation noahs ark_code_of_conduct_
Operation noahs ark_code_of_conduct_Operation noahs ark_code_of_conduct_
Operation noahs ark_code_of_conduct_
 
Bus ethics and tech
Bus ethics and techBus ethics and tech
Bus ethics and tech
 
Code of Ethics and Code of Communication of an organization
Code of Ethics and Code of Communication of an organizationCode of Ethics and Code of Communication of an organization
Code of Ethics and Code of Communication of an organization
 
An Overview of Ethics for IT Professionals
An Overview of Ethics for IT ProfessionalsAn Overview of Ethics for IT Professionals
An Overview of Ethics for IT Professionals
 

More from MrsNunn

Page Plans
Page PlansPage Plans
Page PlansMrsNunn
 
Delivery formats
Delivery formatsDelivery formats
Delivery formatsMrsNunn
 
Production process
Production processProduction process
Production processMrsNunn
 
Curriculum virtae
Curriculum virtaeCurriculum virtae
Curriculum virtaeMrsNunn
 
Questioningv2
Questioningv2Questioningv2
Questioningv2MrsNunn
 
2 questioning techniques v1
2 questioning techniques v12 questioning techniques v1
2 questioning techniques v1MrsNunn
 
Principles and barriers
Principles and barriersPrinciples and barriers
Principles and barriersMrsNunn
 
P4 showing ideas for the website
P4 showing ideas for the websiteP4 showing ideas for the website
P4 showing ideas for the websiteMrsNunn
 
P4 ideas for a social media site
P4 ideas for a social media siteP4 ideas for a social media site
P4 ideas for a social media siteMrsNunn
 
P1 social media products
P1 social media productsP1 social media products
P1 social media productsMrsNunn
 
P3 commercial uses of social media sites
P3 commercial uses of social media sitesP3 commercial uses of social media sites
P3 commercial uses of social media sitesMrsNunn
 
P2 positive and negative effects
P2 positive and negative effectsP2 positive and negative effects
P2 positive and negative effectsMrsNunn
 
P1 social media products
P1 social media productsP1 social media products
P1 social media productsMrsNunn
 
Lo2 ideas for a new social media products
Lo2 ideas for a new social media productsLo2 ideas for a new social media products
Lo2 ideas for a new social media productsMrsNunn
 
Lo2 ideas for a new social media products
Lo2 ideas for a new social media productsLo2 ideas for a new social media products
Lo2 ideas for a new social media productsMrsNunn
 
P3 commercial uses of social media sites
P3 commercial uses of social media sitesP3 commercial uses of social media sites
P3 commercial uses of social media sitesMrsNunn
 
P3 commercial uses of social media sites
P3 commercial uses of social media sitesP3 commercial uses of social media sites
P3 commercial uses of social media sitesMrsNunn
 
P2 positive and negative effects
P2 positive and negative effectsP2 positive and negative effects
P2 positive and negative effectsMrsNunn
 
P1 social media products
P1 social media productsP1 social media products
P1 social media productsMrsNunn
 

More from MrsNunn (20)

Page Plans
Page PlansPage Plans
Page Plans
 
Delivery formats
Delivery formatsDelivery formats
Delivery formats
 
Production process
Production processProduction process
Production process
 
Sources
SourcesSources
Sources
 
Curriculum virtae
Curriculum virtaeCurriculum virtae
Curriculum virtae
 
Questioningv2
Questioningv2Questioningv2
Questioningv2
 
2 questioning techniques v1
2 questioning techniques v12 questioning techniques v1
2 questioning techniques v1
 
Principles and barriers
Principles and barriersPrinciples and barriers
Principles and barriers
 
P4 showing ideas for the website
P4 showing ideas for the websiteP4 showing ideas for the website
P4 showing ideas for the website
 
P4 ideas for a social media site
P4 ideas for a social media siteP4 ideas for a social media site
P4 ideas for a social media site
 
P1 social media products
P1 social media productsP1 social media products
P1 social media products
 
P3 commercial uses of social media sites
P3 commercial uses of social media sitesP3 commercial uses of social media sites
P3 commercial uses of social media sites
 
P2 positive and negative effects
P2 positive and negative effectsP2 positive and negative effects
P2 positive and negative effects
 
P1 social media products
P1 social media productsP1 social media products
P1 social media products
 
Lo2 ideas for a new social media products
Lo2 ideas for a new social media productsLo2 ideas for a new social media products
Lo2 ideas for a new social media products
 
Lo2 ideas for a new social media products
Lo2 ideas for a new social media productsLo2 ideas for a new social media products
Lo2 ideas for a new social media products
 
P3 commercial uses of social media sites
P3 commercial uses of social media sitesP3 commercial uses of social media sites
P3 commercial uses of social media sites
 
P3 commercial uses of social media sites
P3 commercial uses of social media sitesP3 commercial uses of social media sites
P3 commercial uses of social media sites
 
P2 positive and negative effects
P2 positive and negative effectsP2 positive and negative effects
P2 positive and negative effects
 
P1 social media products
P1 social media productsP1 social media products
P1 social media products
 

Lesson 2

  • 1. UNDERSTANDING ISSUES Unit 2 RELATING TO THE USE OF Ethical Issues INFORMATION
  • 3. ETHICAL ISSUES Codes of Conduct Use of email and internet Whistle blowing Information ownership
  • 4. CODES OF CONDUCT  All organisations have a code of conduct relating to the use of IT.  They are guidelines to what is acceptable behaviour within the organisation.  In college we have an Acceptable Use Policy.  These policies are all very similar in nature with some being stricter than others.
  • 5. EMAIL AND INTERNET  Email and internet should be used for business purposes only.  Staff should not send personal email during working hours.  Staff should not surf the internet for non business purposes.  Some organisations allow limited personal use during breaks.
  • 6. WHISTLE BLOWING  If a person reports a colleague for inappropriate use of the internet or email it is called whistle blowing.  If they fail to inform the employer you are seen to be an accomplice.  Staff who report a colleague are protected by the company Code of Practice  Technical staff who detect inappropriate use are also protected.
  • 7. INFORMATION OWNERSHIP  Some organisations have an Information Ownership Policy which gives specific responsibility to departments for looking after the data they hold.  Generally those responsible for the information must ensure that it is up-to-date and correct, reference any copyright materials and provide contact information if required.  In some cases staff will be asked so sign a Non Disclosure Agreement so they are not allowed to pass on information about the organisation, its practices and any individuals employed there.
  • 8. YOUR TASK  Investigate Codes of Conduct such as The Open University – Write a report detailing what is held in a code of conduct and why there is a need for such a code.  EXTENSION: Compare the various legal and ethical issues and how they affect an organisation. Which are more important and why? How do they protect the individuals and the organisation