Summary of Ethics and Information Security (one page) Solution Ethics and Information Security here Ethics is nothing the principles and standards that guide our behavior towards other people secondly Intellectual property is creative work in physical form Copyright is nothing but the legal protection afforded an expression of an idea, such as song, video game, and sometypes of proprietary documents Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software Counterfeit software is a software that is manufactured to look like the real thing and sold as such here Privacy include 1. Right to be left alone 2. Control your own personal possessions 3. Not to be observedwithout your consent Epolicies are policies and procedures that address the ethical use of computers and internet usage in thebusiness environment and CIO Magazine’s Size Principles for Ethical Information Management finally Information is a valuable corporate assets and should be managed as such, like cash, facilities, orany other corporate asset2. The CIO is steward of corporate information and is responsible for managing it over its life cycle-from its generation to its appropriate destruction3. The CIO is responsible for controlling access to and use of information, as determined bygovernmental regulation and corporate policy4. The CIO is responsible for preventing the inappropriate destruction of information5. The CIO is responsible for bringing technological knowledge to the development of informationmanagement practices and policies6. The CIO should partner with executive peers to develop and execute the organization’s information management policies Ethical computer use policy contains general principles to guide computer user behavior. Example : theethical computer use policy might explicitly state that users should refrain from playing computer gamesduring working hours Information privacy policy contains general principles regarding information privacy Acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided accessto a network or to the internet. Nonrepudiation is nothing but a contractual stipulation to ensure that ebusiness participants do not deny their onlineactions.