SlideShare a Scribd company logo
1 of 6
Ethical Stance a company should have in the IT Department.
Robert DeSimone
What ethics are involved in IT?
IT stands for information technology
Security
Surveillance / Privacy
Intellectual Property
Security
Protection of hardware, software, computers from unauthorized
access.
Example: Sending office emails through a firewall protected
email account is inconvenient, Sending office emails through a
personal emails are not. Therefore if you need to reach
someone urgently from home you should use your personal
email.
IT security is meant to protect its employees and the company.
Surveillance / Privacy
Trojan Virus
Track and record employees in order to access their ability to
work for a company.
Sharing this information with others.
Example: If apple creates the iPhone, they should be able to
perform statistical analysis on the customers who use it. Apple
created the iPhone, therefore take statistical analysis on the
customers who use it.
Intellectual Property
What your mind creates should be yours.
Patents, Copyrights, Trademarks
Is an idea created on a companies device the employees or the
company?
If a company owns a computer, it owns everything inside that
computer is owned by the company. An employee writes an
idea of his in a company computer, the computer is owned by
the company. Therefore the company has rights to that idea. (if
not patented)
Conclusion
IT support is becoming a larger and larger part of companies.
It is meant to protect the company and its employees, but more
the company than the employees.
Is this an ethical form of security for your company?
Sources
"Introduction to Social and Ethical Computing." Texts in
Computer Science Ethical And Social Issues In The Information
Age (n.d.): 1-18. Web.
Points: 210
Assignment 1: Digital Computer Crime
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Explain the four (4) major categories of computer crimes, and
provide at least one (1) example for each.
Weight: 15%
Did not submit or incompletely explained the four (4) major
categories of computer crimes; did not submit or incompletely
provided at least one (1) example for each.
Insufficiently explained the four (4) major categories of
computer crimes; insufficiently provided at least one (1)
example for each.
Partially explained the four (4) major categories of computer
crimes; partially provided at least one (1) example for each.
Satisfactorily explained the four (4) major categories of
computer crimes; satisfactorily provided at least one (1)
example for each.
Thoroughly explained the four (4) major categories of computer
crimes; thoroughly provided at least one (1) example for each.
2. Explain the most common forms of digital crime.
Weight: 15%
Did not submit or incompletely explained the most common
forms of digital crime.
Insufficiently explained the most common forms of digital
crime.
Partially explained the most common forms of digital crime.
Satisfactorily explained the most common forms of digital
crime.
Thoroughly explained the most common forms of digital crime.
3. Determine the category of computer crimes or cyber terrorism
that presents the greatest overall threat at the present time.
Provide a rationale to support your response.
Weight: 25%
Did not submit or incompletely determined the category of
computer crimes or cyber terrorism that presents the greatest
overall threat at the present time. Did not submit or
incompletely provided a rationale to support your response.
Insufficiently determined the category of computer crimes or
cyber terrorism that presents the greatest overall threat at the
present time. Insufficiently provided a rationale to support your
response.
Partially determined the category of computer crimes or cyber
terrorism that presents the greatest overall threat at the present
time. Partially provided a rationale to support your response.
Satisfactorily determined the category of computer crimes or
cyber terrorism that presents the greatest overall threat at the
present time. Satisfactorily provided a rationale to support your
response.
Thoroughly determined the category of computer crimes or
cyber terrorism that presents the greatest overall threat at the
present time. Thoroughly provided a rationale to support your
response.
4. Summarize the roles and responses that the U.S. government,
court systems, and law enforcement agencies in combatting
computer crime. Next, suggest one (1) additional way—i.e., one
not discussed in the textbook—that the law enforcement
agencies can better counteract computer crime.
Weight: 30%
Did not submit or incompletely summarized the roles and
responses that the U.S. government, court systems, and law
enforcement agencies in combatting computer crime. Did not
submit or incompletely suggested one (1) additional way—i.e.,
one not discussed in the textbook—that the law enforcement
agencies can better counteract computer crime.
Insufficiently summarized the roles and responses that the U.S.
government, court systems, and law enforcement agencies in
combatting computer crime. Insufficiently suggested one (1)
additional way—i.e., one not discussed in the textbook—that
the law enforcement agencies can better counteract computer
crime.
Partially summarized the roles and responses that the U.S.
government, court systems, and law enforcement agencies in
combatting computer crime. Partially suggested one (1)
additional way—i.e., one not discussed in the textbook—that
the law enforcement agencies can better counteract computer
crime.
Satisfactorily summarized the roles and responses that the U.S.
government, court systems, and law enforcement agencies in
combatting computer crime. Satisfactorily suggested one (1)
additional way—i.e., one not discussed in the textbook—that
the law enforcement agencies can better counteract computer
crime.
Thoroughly summarized the roles and responses that the U.S.
government, court systems, and law enforcement agencies in
combatting computer crime. Thoroughly suggested one (1)
additional way—i.e., one not discussed in the textbook—that
the law enforcement agencies can better counteract computer
crime.
5. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
6. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 8 errors present
7-8 errors present
5-6 errors present
3-4 errors present
0-2 errors present

More Related Content

Similar to Ethical Stance a company should have in the IT Department. Rob.docx

Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Assignment 4 The Future of Digital Crimes and Digital Terrorism.docx
Assignment 4 The Future of Digital Crimes and Digital Terrorism.docxAssignment 4 The Future of Digital Crimes and Digital Terrorism.docx
Assignment 4 The Future of Digital Crimes and Digital Terrorism.docxluearsome
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxsmile790243
 
Hackers in the national cyber security
Hackers in the national cyber securityHackers in the national cyber security
Hackers in the national cyber securityCsaba Krasznay
 
Please read the case Kedas  SAP Implementation. You will submit.docx
Please read the case Kedas  SAP Implementation. You will submit.docxPlease read the case Kedas  SAP Implementation. You will submit.docx
Please read the case Kedas  SAP Implementation. You will submit.docxmattjtoni51554
 
Vintage Fashion Essay
Vintage Fashion EssayVintage Fashion Essay
Vintage Fashion EssayMartha Bush
 
Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 
Image Result For Anchor Chart Writing
Image Result For Anchor Chart WritingImage Result For Anchor Chart Writing
Image Result For Anchor Chart WritingLisa Netkowicz
 
Political Science Essay Help Political Science 1020E St
Political Science Essay Help Political Science 1020E StPolitical Science Essay Help Political Science 1020E St
Political Science Essay Help Political Science 1020E StDarlene Tourigny
 
Electoral College Votes Explained What Are The Pros And Cons
Electoral College Votes Explained What Are The Pros And ConsElectoral College Votes Explained What Are The Pros And Cons
Electoral College Votes Explained What Are The Pros And ConsLori Mathers
 
Word Essay Professional Writin. Online assignment writing service.
Word Essay Professional Writin. Online assignment writing service.Word Essay Professional Writin. Online assignment writing service.
Word Essay Professional Writin. Online assignment writing service.Debra Perea
 
Assignment 2 Criminal Defenses and Criminal Punishments Due Week .docx
Assignment 2 Criminal Defenses and Criminal Punishments Due Week .docxAssignment 2 Criminal Defenses and Criminal Punishments Due Week .docx
Assignment 2 Criminal Defenses and Criminal Punishments Due Week .docxchandaronald
 
Essay On Varsha Ritu In Hindi Download
Essay On Varsha Ritu In Hindi DownloadEssay On Varsha Ritu In Hindi Download
Essay On Varsha Ritu In Hindi DownloadEllen Blackburn
 
Essay On Graham Bell In Marathi
Essay On Graham Bell In MarathiEssay On Graham Bell In Marathi
Essay On Graham Bell In MarathiSarah Camacho
 
Forensic Science Informatics P3 M3 D3
Forensic Science Informatics P3 M3 D3Forensic Science Informatics P3 M3 D3
Forensic Science Informatics P3 M3 D3Steve Bishop
 

Similar to Ethical Stance a company should have in the IT Department. Rob.docx (18)

Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Assignment 4 The Future of Digital Crimes and Digital Terrorism.docx
Assignment 4 The Future of Digital Crimes and Digital Terrorism.docxAssignment 4 The Future of Digital Crimes and Digital Terrorism.docx
Assignment 4 The Future of Digital Crimes and Digital Terrorism.docx
 
Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
 
Hackers in the national cyber security
Hackers in the national cyber securityHackers in the national cyber security
Hackers in the national cyber security
 
Please read the case Kedas  SAP Implementation. You will submit.docx
Please read the case Kedas  SAP Implementation. You will submit.docxPlease read the case Kedas  SAP Implementation. You will submit.docx
Please read the case Kedas  SAP Implementation. You will submit.docx
 
Vintage Fashion Essay
Vintage Fashion EssayVintage Fashion Essay
Vintage Fashion Essay
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Image Result For Anchor Chart Writing
Image Result For Anchor Chart WritingImage Result For Anchor Chart Writing
Image Result For Anchor Chart Writing
 
Political Science Essay Help Political Science 1020E St
Political Science Essay Help Political Science 1020E StPolitical Science Essay Help Political Science 1020E St
Political Science Essay Help Political Science 1020E St
 
Electoral College Votes Explained What Are The Pros And Cons
Electoral College Votes Explained What Are The Pros And ConsElectoral College Votes Explained What Are The Pros And Cons
Electoral College Votes Explained What Are The Pros And Cons
 
Word Essay Professional Writin. Online assignment writing service.
Word Essay Professional Writin. Online assignment writing service.Word Essay Professional Writin. Online assignment writing service.
Word Essay Professional Writin. Online assignment writing service.
 
Assignment 2 Criminal Defenses and Criminal Punishments Due Week .docx
Assignment 2 Criminal Defenses and Criminal Punishments Due Week .docxAssignment 2 Criminal Defenses and Criminal Punishments Due Week .docx
Assignment 2 Criminal Defenses and Criminal Punishments Due Week .docx
 
Essay On Varsha Ritu In Hindi Download
Essay On Varsha Ritu In Hindi DownloadEssay On Varsha Ritu In Hindi Download
Essay On Varsha Ritu In Hindi Download
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Essay On Graham Bell In Marathi
Essay On Graham Bell In MarathiEssay On Graham Bell In Marathi
Essay On Graham Bell In Marathi
 
Forensic Science Informatics P3 M3 D3
Forensic Science Informatics P3 M3 D3Forensic Science Informatics P3 M3 D3
Forensic Science Informatics P3 M3 D3
 

More from SANSKAR20

The Assignment (3–5 pages)Complete a leadership development plan .docx
The Assignment (3–5 pages)Complete a leadership development plan .docxThe Assignment (3–5 pages)Complete a leadership development plan .docx
The Assignment (3–5 pages)Complete a leadership development plan .docxSANSKAR20
 
The assignment consist of a Case Study.  I have attached the Case St.docx
The assignment consist of a Case Study.  I have attached the Case St.docxThe assignment consist of a Case Study.  I have attached the Case St.docx
The assignment consist of a Case Study.  I have attached the Case St.docxSANSKAR20
 
The annotated bibliography will present an introduction and five ref.docx
The annotated bibliography will present an introduction and five ref.docxThe annotated bibliography will present an introduction and five ref.docx
The annotated bibliography will present an introduction and five ref.docxSANSKAR20
 
The artist Georges Seurat is one of the worlds most fascinating art.docx
The artist Georges Seurat is one of the worlds most fascinating art.docxThe artist Georges Seurat is one of the worlds most fascinating art.docx
The artist Georges Seurat is one of the worlds most fascinating art.docxSANSKAR20
 
The Assignment (2–3 pages including a budget worksheet)Explain th.docx
The Assignment (2–3 pages including a budget worksheet)Explain th.docxThe Assignment (2–3 pages including a budget worksheet)Explain th.docx
The Assignment (2–3 pages including a budget worksheet)Explain th.docxSANSKAR20
 
The assigment is to Research and find me resources on  Portland Sta.docx
The assigment is to Research and find me resources on  Portland Sta.docxThe assigment is to Research and find me resources on  Portland Sta.docx
The assigment is to Research and find me resources on  Portland Sta.docxSANSKAR20
 
the article.httpwww.nytimes.com20120930opinionsundaythe-m.docx
the article.httpwww.nytimes.com20120930opinionsundaythe-m.docxthe article.httpwww.nytimes.com20120930opinionsundaythe-m.docx
the article.httpwww.nytimes.com20120930opinionsundaythe-m.docxSANSKAR20
 
The Arts and Royalty; Philosophers Debate Politics Please respond .docx
The Arts and Royalty; Philosophers Debate Politics Please respond .docxThe Arts and Royalty; Philosophers Debate Politics Please respond .docx
The Arts and Royalty; Philosophers Debate Politics Please respond .docxSANSKAR20
 
The assassination of Archduke Franz Ferdinand was the immediate caus.docx
The assassination of Archduke Franz Ferdinand was the immediate caus.docxThe assassination of Archduke Franz Ferdinand was the immediate caus.docx
The assassination of Archduke Franz Ferdinand was the immediate caus.docxSANSKAR20
 
The article Fostering Second Language Development in Young Children.docx
The article Fostering Second Language Development in Young Children.docxThe article Fostering Second Language Development in Young Children.docx
The article Fostering Second Language Development in Young Children.docxSANSKAR20
 
The Article Critique is required to be a minimum of two pages to a m.docx
The Article Critique is required to be a minimum of two pages to a m.docxThe Article Critique is required to be a minimum of two pages to a m.docx
The Article Critique is required to be a minimum of two pages to a m.docxSANSKAR20
 
The Apple Computer Company is one of the most innovative technology .docx
The Apple Computer Company is one of the most innovative technology .docxThe Apple Computer Company is one of the most innovative technology .docx
The Apple Computer Company is one of the most innovative technology .docxSANSKAR20
 
The artist Georges Seurat is one of the worlds most fascinating art.docx
The artist Georges Seurat is one of the worlds most fascinating art.docxThe artist Georges Seurat is one of the worlds most fascinating art.docx
The artist Georges Seurat is one of the worlds most fascinating art.docxSANSKAR20
 
The Article Attached A Bretton Woods for InnovationBy St.docx
The Article Attached A Bretton Woods for InnovationBy St.docxThe Article Attached A Bretton Woods for InnovationBy St.docx
The Article Attached A Bretton Woods for InnovationBy St.docxSANSKAR20
 
The analysis must includeExecutive summaryHistory and evolution.docx
The analysis must includeExecutive summaryHistory and evolution.docxThe analysis must includeExecutive summaryHistory and evolution.docx
The analysis must includeExecutive summaryHistory and evolution.docxSANSKAR20
 
The annotated bibliography for your course is now due. The annotated.docx
The annotated bibliography for your course is now due. The annotated.docxThe annotated bibliography for your course is now due. The annotated.docx
The annotated bibliography for your course is now due. The annotated.docxSANSKAR20
 
The Americans With Disabilities Act (ADA) was designed to protect wo.docx
The Americans With Disabilities Act (ADA) was designed to protect wo.docxThe Americans With Disabilities Act (ADA) was designed to protect wo.docx
The Americans With Disabilities Act (ADA) was designed to protect wo.docxSANSKAR20
 
The air they have of person who never knew how it felt to stand in .docx
The air they have of person who never knew how it felt to stand in .docxThe air they have of person who never knew how it felt to stand in .docx
The air they have of person who never knew how it felt to stand in .docxSANSKAR20
 
The agreement is for the tutor to write a Microsoft word doc of a .docx
The agreement is for the tutor to write a Microsoft word doc of a .docxThe agreement is for the tutor to write a Microsoft word doc of a .docx
The agreement is for the tutor to write a Microsoft word doc of a .docxSANSKAR20
 
The abstract is a 150-250 word summary of your Research Paper, and i.docx
The abstract is a 150-250 word summary of your Research Paper, and i.docxThe abstract is a 150-250 word summary of your Research Paper, and i.docx
The abstract is a 150-250 word summary of your Research Paper, and i.docxSANSKAR20
 

More from SANSKAR20 (20)

The Assignment (3–5 pages)Complete a leadership development plan .docx
The Assignment (3–5 pages)Complete a leadership development plan .docxThe Assignment (3–5 pages)Complete a leadership development plan .docx
The Assignment (3–5 pages)Complete a leadership development plan .docx
 
The assignment consist of a Case Study.  I have attached the Case St.docx
The assignment consist of a Case Study.  I have attached the Case St.docxThe assignment consist of a Case Study.  I have attached the Case St.docx
The assignment consist of a Case Study.  I have attached the Case St.docx
 
The annotated bibliography will present an introduction and five ref.docx
The annotated bibliography will present an introduction and five ref.docxThe annotated bibliography will present an introduction and five ref.docx
The annotated bibliography will present an introduction and five ref.docx
 
The artist Georges Seurat is one of the worlds most fascinating art.docx
The artist Georges Seurat is one of the worlds most fascinating art.docxThe artist Georges Seurat is one of the worlds most fascinating art.docx
The artist Georges Seurat is one of the worlds most fascinating art.docx
 
The Assignment (2–3 pages including a budget worksheet)Explain th.docx
The Assignment (2–3 pages including a budget worksheet)Explain th.docxThe Assignment (2–3 pages including a budget worksheet)Explain th.docx
The Assignment (2–3 pages including a budget worksheet)Explain th.docx
 
The assigment is to Research and find me resources on  Portland Sta.docx
The assigment is to Research and find me resources on  Portland Sta.docxThe assigment is to Research and find me resources on  Portland Sta.docx
The assigment is to Research and find me resources on  Portland Sta.docx
 
the article.httpwww.nytimes.com20120930opinionsundaythe-m.docx
the article.httpwww.nytimes.com20120930opinionsundaythe-m.docxthe article.httpwww.nytimes.com20120930opinionsundaythe-m.docx
the article.httpwww.nytimes.com20120930opinionsundaythe-m.docx
 
The Arts and Royalty; Philosophers Debate Politics Please respond .docx
The Arts and Royalty; Philosophers Debate Politics Please respond .docxThe Arts and Royalty; Philosophers Debate Politics Please respond .docx
The Arts and Royalty; Philosophers Debate Politics Please respond .docx
 
The assassination of Archduke Franz Ferdinand was the immediate caus.docx
The assassination of Archduke Franz Ferdinand was the immediate caus.docxThe assassination of Archduke Franz Ferdinand was the immediate caus.docx
The assassination of Archduke Franz Ferdinand was the immediate caus.docx
 
The article Fostering Second Language Development in Young Children.docx
The article Fostering Second Language Development in Young Children.docxThe article Fostering Second Language Development in Young Children.docx
The article Fostering Second Language Development in Young Children.docx
 
The Article Critique is required to be a minimum of two pages to a m.docx
The Article Critique is required to be a minimum of two pages to a m.docxThe Article Critique is required to be a minimum of two pages to a m.docx
The Article Critique is required to be a minimum of two pages to a m.docx
 
The Apple Computer Company is one of the most innovative technology .docx
The Apple Computer Company is one of the most innovative technology .docxThe Apple Computer Company is one of the most innovative technology .docx
The Apple Computer Company is one of the most innovative technology .docx
 
The artist Georges Seurat is one of the worlds most fascinating art.docx
The artist Georges Seurat is one of the worlds most fascinating art.docxThe artist Georges Seurat is one of the worlds most fascinating art.docx
The artist Georges Seurat is one of the worlds most fascinating art.docx
 
The Article Attached A Bretton Woods for InnovationBy St.docx
The Article Attached A Bretton Woods for InnovationBy St.docxThe Article Attached A Bretton Woods for InnovationBy St.docx
The Article Attached A Bretton Woods for InnovationBy St.docx
 
The analysis must includeExecutive summaryHistory and evolution.docx
The analysis must includeExecutive summaryHistory and evolution.docxThe analysis must includeExecutive summaryHistory and evolution.docx
The analysis must includeExecutive summaryHistory and evolution.docx
 
The annotated bibliography for your course is now due. The annotated.docx
The annotated bibliography for your course is now due. The annotated.docxThe annotated bibliography for your course is now due. The annotated.docx
The annotated bibliography for your course is now due. The annotated.docx
 
The Americans With Disabilities Act (ADA) was designed to protect wo.docx
The Americans With Disabilities Act (ADA) was designed to protect wo.docxThe Americans With Disabilities Act (ADA) was designed to protect wo.docx
The Americans With Disabilities Act (ADA) was designed to protect wo.docx
 
The air they have of person who never knew how it felt to stand in .docx
The air they have of person who never knew how it felt to stand in .docxThe air they have of person who never knew how it felt to stand in .docx
The air they have of person who never knew how it felt to stand in .docx
 
The agreement is for the tutor to write a Microsoft word doc of a .docx
The agreement is for the tutor to write a Microsoft word doc of a .docxThe agreement is for the tutor to write a Microsoft word doc of a .docx
The agreement is for the tutor to write a Microsoft word doc of a .docx
 
The abstract is a 150-250 word summary of your Research Paper, and i.docx
The abstract is a 150-250 word summary of your Research Paper, and i.docxThe abstract is a 150-250 word summary of your Research Paper, and i.docx
The abstract is a 150-250 word summary of your Research Paper, and i.docx
 

Recently uploaded

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 

Recently uploaded (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Ethical Stance a company should have in the IT Department. Rob.docx

  • 1. Ethical Stance a company should have in the IT Department. Robert DeSimone What ethics are involved in IT? IT stands for information technology Security Surveillance / Privacy Intellectual Property Security Protection of hardware, software, computers from unauthorized access. Example: Sending office emails through a firewall protected email account is inconvenient, Sending office emails through a personal emails are not. Therefore if you need to reach someone urgently from home you should use your personal email. IT security is meant to protect its employees and the company. Surveillance / Privacy Trojan Virus Track and record employees in order to access their ability to
  • 2. work for a company. Sharing this information with others. Example: If apple creates the iPhone, they should be able to perform statistical analysis on the customers who use it. Apple created the iPhone, therefore take statistical analysis on the customers who use it. Intellectual Property What your mind creates should be yours. Patents, Copyrights, Trademarks Is an idea created on a companies device the employees or the company? If a company owns a computer, it owns everything inside that computer is owned by the company. An employee writes an idea of his in a company computer, the computer is owned by the company. Therefore the company has rights to that idea. (if not patented) Conclusion IT support is becoming a larger and larger part of companies. It is meant to protect the company and its employees, but more the company than the employees. Is this an ethical form of security for your company? Sources
  • 3. "Introduction to Social and Ethical Computing." Texts in Computer Science Ethical And Social Issues In The Information Age (n.d.): 1-18. Web. Points: 210 Assignment 1: Digital Computer Crime Criteria Unacceptable Below 60% F Meets Minimum Expectations 60-69% D Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Explain the four (4) major categories of computer crimes, and provide at least one (1) example for each. Weight: 15% Did not submit or incompletely explained the four (4) major categories of computer crimes; did not submit or incompletely provided at least one (1) example for each. Insufficiently explained the four (4) major categories of computer crimes; insufficiently provided at least one (1) example for each. Partially explained the four (4) major categories of computer crimes; partially provided at least one (1) example for each. Satisfactorily explained the four (4) major categories of computer crimes; satisfactorily provided at least one (1)
  • 4. example for each. Thoroughly explained the four (4) major categories of computer crimes; thoroughly provided at least one (1) example for each. 2. Explain the most common forms of digital crime. Weight: 15% Did not submit or incompletely explained the most common forms of digital crime. Insufficiently explained the most common forms of digital crime. Partially explained the most common forms of digital crime. Satisfactorily explained the most common forms of digital crime. Thoroughly explained the most common forms of digital crime. 3. Determine the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Provide a rationale to support your response. Weight: 25% Did not submit or incompletely determined the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Did not submit or incompletely provided a rationale to support your response. Insufficiently determined the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Insufficiently provided a rationale to support your response. Partially determined the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Partially provided a rationale to support your response. Satisfactorily determined the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Satisfactorily provided a rationale to support your response. Thoroughly determined the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Thoroughly provided a rationale to support your response.
  • 5. 4. Summarize the roles and responses that the U.S. government, court systems, and law enforcement agencies in combatting computer crime. Next, suggest one (1) additional way—i.e., one not discussed in the textbook—that the law enforcement agencies can better counteract computer crime. Weight: 30% Did not submit or incompletely summarized the roles and responses that the U.S. government, court systems, and law enforcement agencies in combatting computer crime. Did not submit or incompletely suggested one (1) additional way—i.e., one not discussed in the textbook—that the law enforcement agencies can better counteract computer crime. Insufficiently summarized the roles and responses that the U.S. government, court systems, and law enforcement agencies in combatting computer crime. Insufficiently suggested one (1) additional way—i.e., one not discussed in the textbook—that the law enforcement agencies can better counteract computer crime. Partially summarized the roles and responses that the U.S. government, court systems, and law enforcement agencies in combatting computer crime. Partially suggested one (1) additional way—i.e., one not discussed in the textbook—that the law enforcement agencies can better counteract computer crime. Satisfactorily summarized the roles and responses that the U.S. government, court systems, and law enforcement agencies in combatting computer crime. Satisfactorily suggested one (1) additional way—i.e., one not discussed in the textbook—that the law enforcement agencies can better counteract computer crime. Thoroughly summarized the roles and responses that the U.S. government, court systems, and law enforcement agencies in combatting computer crime. Thoroughly suggested one (1) additional way—i.e., one not discussed in the textbook—that the law enforcement agencies can better counteract computer crime.
  • 6. 5. 3 references Weight: 5% No references provided Does not meet the required number of references; all references poor quality choices. Does not meet the required number of references; some references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 6. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 8 errors present 7-8 errors present 5-6 errors present 3-4 errors present 0-2 errors present