Summary of Ethics and Information Security (one page)
Solution
Ethics and Information Security
here Ethics is nothing the principles and standards that guide our behavior towards other people
secondly Intellectual property is creative work in physical form
Copyright is nothing but the legal protection afforded an expression of an idea, such as song,
video game, and sometypes of proprietary documents
Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted
software
Counterfeit software is a software that is manufactured to look like the real thing and sold as
such
here Privacy include
1. Right to be left alone
2. Control your own personal possessions
3. Not to be observedwithout your consent
Epolicies are policies and procedures that address the ethical use of computers and internet usage
in thebusiness environment
and CIO Magazine’s Size Principles for Ethical Information Management
finally Information is a valuable corporate assets and should be managed as such, like cash,
facilities, orany other corporate asset2.
The CIO is steward of corporate information and is responsible for managing it over its life
cycle-from its generation to its appropriate destruction3.
The CIO is responsible for controlling access to and use of information, as determined
bygovernmental regulation and corporate policy4.
The CIO is responsible for preventing the inappropriate destruction of information5.
The CIO is responsible for bringing technological knowledge to the development of
informationmanagement practices and policies6.
The CIO should partner with executive peers to
develop and execute the organization’s
information management policies
Ethical computer use policy
contains general principles to guide computer user behavior. Example : theethical computer use
policy might explicitly state that users should refrain from playing computer gamesduring
working hours
Information privacy policy
contains general principles regarding information privacy
Acceptable use policy (AUP)
is a policy that a user must agree to follow in order to be provided accessto a network or to the
internet.
Nonrepudiation is nothing but a contractual stipulation to ensure that ebusiness participants do
not deny their onlineactions

Summary of Ethics and Information Security (one page)Solution.pdf

  • 1.
    Summary of Ethicsand Information Security (one page) Solution Ethics and Information Security here Ethics is nothing the principles and standards that guide our behavior towards other people secondly Intellectual property is creative work in physical form Copyright is nothing but the legal protection afforded an expression of an idea, such as song, video game, and sometypes of proprietary documents Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software Counterfeit software is a software that is manufactured to look like the real thing and sold as such here Privacy include 1. Right to be left alone 2. Control your own personal possessions 3. Not to be observedwithout your consent Epolicies are policies and procedures that address the ethical use of computers and internet usage in thebusiness environment and CIO Magazine’s Size Principles for Ethical Information Management finally Information is a valuable corporate assets and should be managed as such, like cash, facilities, orany other corporate asset2. The CIO is steward of corporate information and is responsible for managing it over its life cycle-from its generation to its appropriate destruction3. The CIO is responsible for controlling access to and use of information, as determined bygovernmental regulation and corporate policy4. The CIO is responsible for preventing the inappropriate destruction of information5.
  • 2.
    The CIO isresponsible for bringing technological knowledge to the development of informationmanagement practices and policies6. The CIO should partner with executive peers to develop and execute the organization’s information management policies Ethical computer use policy contains general principles to guide computer user behavior. Example : theethical computer use policy might explicitly state that users should refrain from playing computer gamesduring working hours Information privacy policy contains general principles regarding information privacy Acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided accessto a network or to the internet. Nonrepudiation is nothing but a contractual stipulation to ensure that ebusiness participants do not deny their onlineactions