SlideShare a Scribd company logo
Summary of Ethics and Information Security (one page)
Solution
Ethics and Information Security
here Ethics is nothing the principles and standards that guide our behavior towards other people
secondly Intellectual property is creative work in physical form
Copyright is nothing but the legal protection afforded an expression of an idea, such as song,
video game, and sometypes of proprietary documents
Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted
software
Counterfeit software is a software that is manufactured to look like the real thing and sold as
such
here Privacy include
1. Right to be left alone
2. Control your own personal possessions
3. Not to be observedwithout your consent
Epolicies are policies and procedures that address the ethical use of computers and internet usage
in thebusiness environment
and CIO Magazine’s Size Principles for Ethical Information Management
finally Information is a valuable corporate assets and should be managed as such, like cash,
facilities, orany other corporate asset2.
The CIO is steward of corporate information and is responsible for managing it over its life
cycle-from its generation to its appropriate destruction3.
The CIO is responsible for controlling access to and use of information, as determined
bygovernmental regulation and corporate policy4.
The CIO is responsible for preventing the inappropriate destruction of information5.
The CIO is responsible for bringing technological knowledge to the development of
informationmanagement practices and policies6.
The CIO should partner with executive peers to
develop and execute the organization’s
information management policies
Ethical computer use policy
contains general principles to guide computer user behavior. Example : theethical computer use
policy might explicitly state that users should refrain from playing computer gamesduring
working hours
Information privacy policy
contains general principles regarding information privacy
Acceptable use policy (AUP)
is a policy that a user must agree to follow in order to be provided accessto a network or to the
internet.
Nonrepudiation is nothing but a contractual stipulation to ensure that ebusiness participants do
not deny their onlineactions

More Related Content

Similar to Summary of Ethics and Information Security (one page)Solution.pdf

Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
sajida zafar
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
Ppt IT Infrastructure.ppt
Ppt IT Infrastructure.pptPpt IT Infrastructure.ppt
Ppt IT Infrastructure.ppt
23017156038
 
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...
Editor IJCATR
 
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docxRunning head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
jeanettehully
 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.ppt
ssuseraaf866
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Ethical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of ITEthical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of IT
Dr. Rosemarie Sibbaluca-Guirre
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
Aglaia Connect
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
AmanuelZewdie4
 
12 security policies
12 security policies12 security policies
12 security policies
Saqib Raza
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacysalehnia
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
AnkitTripathi159
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
Engr Razaque
 

Similar to Summary of Ethics and Information Security (one page)Solution.pdf (20)

Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Ppt IT Infrastructure.ppt
Ppt IT Infrastructure.pptPpt IT Infrastructure.ppt
Ppt IT Infrastructure.ppt
 
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...
 
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docxRunning head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.ppt
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Chap05
Chap05Chap05
Chap05
 
Ethical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of ITEthical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of IT
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
12 security policies
12 security policies12 security policies
12 security policies
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
 
Review questions
Review questionsReview questions
Review questions
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 

More from arjuncollection

In the negative feedback control system of the papillary light refle.pdf
In the negative feedback control system of the papillary light refle.pdfIn the negative feedback control system of the papillary light refle.pdf
In the negative feedback control system of the papillary light refle.pdf
arjuncollection
 
images of a Hindu deity such as Shiva, Vishnu, Kali, Ganesh, or any .pdf
images of a Hindu deity such as Shiva, Vishnu, Kali, Ganesh, or any .pdfimages of a Hindu deity such as Shiva, Vishnu, Kali, Ganesh, or any .pdf
images of a Hindu deity such as Shiva, Vishnu, Kali, Ganesh, or any .pdf
arjuncollection
 
Identify each of the enzymes involved in DNA replication and whether.pdf
Identify each of the enzymes involved in DNA replication and whether.pdfIdentify each of the enzymes involved in DNA replication and whether.pdf
Identify each of the enzymes involved in DNA replication and whether.pdf
arjuncollection
 
How and what do sea stars eatSolutionSea Star eat clams, oyste.pdf
How and what do sea stars eatSolutionSea Star eat clams, oyste.pdfHow and what do sea stars eatSolutionSea Star eat clams, oyste.pdf
How and what do sea stars eatSolutionSea Star eat clams, oyste.pdf
arjuncollection
 
Estimate the time needed for the Point in Polyhedron test for a poly.pdf
Estimate the time needed for the Point in Polyhedron test for a poly.pdfEstimate the time needed for the Point in Polyhedron test for a poly.pdf
Estimate the time needed for the Point in Polyhedron test for a poly.pdf
arjuncollection
 
Discuss the binary representation of Char strings. What makes th.pdf
Discuss the binary representation of Char strings. What makes th.pdfDiscuss the binary representation of Char strings. What makes th.pdf
Discuss the binary representation of Char strings. What makes th.pdf
arjuncollection
 
Describe a possible difference in the DNA content of chromosome 1.pdf
Describe a possible difference in the DNA content of chromosome 1.pdfDescribe a possible difference in the DNA content of chromosome 1.pdf
Describe a possible difference in the DNA content of chromosome 1.pdf
arjuncollection
 
Consider the following function. Find the inverse function State the.pdf
Consider the following function.  Find the inverse function State the.pdfConsider the following function.  Find the inverse function State the.pdf
Consider the following function. Find the inverse function State the.pdf
arjuncollection
 
Compare and contrast the ideas that led to the Bohr model of the ato.pdf
Compare and contrast the ideas that led to the Bohr model of the ato.pdfCompare and contrast the ideas that led to the Bohr model of the ato.pdf
Compare and contrast the ideas that led to the Bohr model of the ato.pdf
arjuncollection
 
Blackboard Learn Realtor Rite Aid Citizens Bank peoples CPOBIE UI.pdf
Blackboard Learn Realtor Rite Aid Citizens Bank peoples CPOBIE UI.pdfBlackboard Learn Realtor Rite Aid Citizens Bank peoples CPOBIE UI.pdf
Blackboard Learn Realtor Rite Aid Citizens Bank peoples CPOBIE UI.pdf
arjuncollection
 
According to the Shannon-Hartley theorem, the capacity of a communic.pdf
According to the Shannon-Hartley theorem, the capacity of a communic.pdfAccording to the Shannon-Hartley theorem, the capacity of a communic.pdf
According to the Shannon-Hartley theorem, the capacity of a communic.pdf
arjuncollection
 
A fellow student, one that is not as careful as you, finds the follow.pdf
A fellow student, one that is not as careful as you, finds the follow.pdfA fellow student, one that is not as careful as you, finds the follow.pdf
A fellow student, one that is not as careful as you, finds the follow.pdf
arjuncollection
 
2. There are special proteins (called transporters) that are able to.pdf
2. There are special proteins (called transporters) that are able to.pdf2. There are special proteins (called transporters) that are able to.pdf
2. There are special proteins (called transporters) that are able to.pdf
arjuncollection
 
A bacterium that has flagella arranged as a tuft at one end of the b.pdf
A bacterium that has flagella arranged as a tuft at one end of the b.pdfA bacterium that has flagella arranged as a tuft at one end of the b.pdf
A bacterium that has flagella arranged as a tuft at one end of the b.pdf
arjuncollection
 
11. Recessive epistasis is described by all of the following EXCEPT.pdf
11. Recessive epistasis is described by all of the following EXCEPT.pdf11. Recessive epistasis is described by all of the following EXCEPT.pdf
11. Recessive epistasis is described by all of the following EXCEPT.pdf
arjuncollection
 
Write complete VHDL codes for the following schematic. Solution.pdf
Write complete VHDL codes for the following schematic.  Solution.pdfWrite complete VHDL codes for the following schematic.  Solution.pdf
Write complete VHDL codes for the following schematic. Solution.pdf
arjuncollection
 
Why do carrier-mediated processes become saturated (choose the best .pdf
Why do carrier-mediated processes become saturated (choose the best .pdfWhy do carrier-mediated processes become saturated (choose the best .pdf
Why do carrier-mediated processes become saturated (choose the best .pdf
arjuncollection
 
Why is it that linked lists are better when it comes to needing freq.pdf
Why is it that linked lists are better when it comes to needing freq.pdfWhy is it that linked lists are better when it comes to needing freq.pdf
Why is it that linked lists are better when it comes to needing freq.pdf
arjuncollection
 
Which of the following isare characteristic of the parasympathetic .pdf
Which of the following isare characteristic of the parasympathetic .pdfWhich of the following isare characteristic of the parasympathetic .pdf
Which of the following isare characteristic of the parasympathetic .pdf
arjuncollection
 
What statistic is often interpreted as providing an estimate of the .pdf
What statistic is often interpreted as providing an estimate of the .pdfWhat statistic is often interpreted as providing an estimate of the .pdf
What statistic is often interpreted as providing an estimate of the .pdf
arjuncollection
 

More from arjuncollection (20)

In the negative feedback control system of the papillary light refle.pdf
In the negative feedback control system of the papillary light refle.pdfIn the negative feedback control system of the papillary light refle.pdf
In the negative feedback control system of the papillary light refle.pdf
 
images of a Hindu deity such as Shiva, Vishnu, Kali, Ganesh, or any .pdf
images of a Hindu deity such as Shiva, Vishnu, Kali, Ganesh, or any .pdfimages of a Hindu deity such as Shiva, Vishnu, Kali, Ganesh, or any .pdf
images of a Hindu deity such as Shiva, Vishnu, Kali, Ganesh, or any .pdf
 
Identify each of the enzymes involved in DNA replication and whether.pdf
Identify each of the enzymes involved in DNA replication and whether.pdfIdentify each of the enzymes involved in DNA replication and whether.pdf
Identify each of the enzymes involved in DNA replication and whether.pdf
 
How and what do sea stars eatSolutionSea Star eat clams, oyste.pdf
How and what do sea stars eatSolutionSea Star eat clams, oyste.pdfHow and what do sea stars eatSolutionSea Star eat clams, oyste.pdf
How and what do sea stars eatSolutionSea Star eat clams, oyste.pdf
 
Estimate the time needed for the Point in Polyhedron test for a poly.pdf
Estimate the time needed for the Point in Polyhedron test for a poly.pdfEstimate the time needed for the Point in Polyhedron test for a poly.pdf
Estimate the time needed for the Point in Polyhedron test for a poly.pdf
 
Discuss the binary representation of Char strings. What makes th.pdf
Discuss the binary representation of Char strings. What makes th.pdfDiscuss the binary representation of Char strings. What makes th.pdf
Discuss the binary representation of Char strings. What makes th.pdf
 
Describe a possible difference in the DNA content of chromosome 1.pdf
Describe a possible difference in the DNA content of chromosome 1.pdfDescribe a possible difference in the DNA content of chromosome 1.pdf
Describe a possible difference in the DNA content of chromosome 1.pdf
 
Consider the following function. Find the inverse function State the.pdf
Consider the following function.  Find the inverse function State the.pdfConsider the following function.  Find the inverse function State the.pdf
Consider the following function. Find the inverse function State the.pdf
 
Compare and contrast the ideas that led to the Bohr model of the ato.pdf
Compare and contrast the ideas that led to the Bohr model of the ato.pdfCompare and contrast the ideas that led to the Bohr model of the ato.pdf
Compare and contrast the ideas that led to the Bohr model of the ato.pdf
 
Blackboard Learn Realtor Rite Aid Citizens Bank peoples CPOBIE UI.pdf
Blackboard Learn Realtor Rite Aid Citizens Bank peoples CPOBIE UI.pdfBlackboard Learn Realtor Rite Aid Citizens Bank peoples CPOBIE UI.pdf
Blackboard Learn Realtor Rite Aid Citizens Bank peoples CPOBIE UI.pdf
 
According to the Shannon-Hartley theorem, the capacity of a communic.pdf
According to the Shannon-Hartley theorem, the capacity of a communic.pdfAccording to the Shannon-Hartley theorem, the capacity of a communic.pdf
According to the Shannon-Hartley theorem, the capacity of a communic.pdf
 
A fellow student, one that is not as careful as you, finds the follow.pdf
A fellow student, one that is not as careful as you, finds the follow.pdfA fellow student, one that is not as careful as you, finds the follow.pdf
A fellow student, one that is not as careful as you, finds the follow.pdf
 
2. There are special proteins (called transporters) that are able to.pdf
2. There are special proteins (called transporters) that are able to.pdf2. There are special proteins (called transporters) that are able to.pdf
2. There are special proteins (called transporters) that are able to.pdf
 
A bacterium that has flagella arranged as a tuft at one end of the b.pdf
A bacterium that has flagella arranged as a tuft at one end of the b.pdfA bacterium that has flagella arranged as a tuft at one end of the b.pdf
A bacterium that has flagella arranged as a tuft at one end of the b.pdf
 
11. Recessive epistasis is described by all of the following EXCEPT.pdf
11. Recessive epistasis is described by all of the following EXCEPT.pdf11. Recessive epistasis is described by all of the following EXCEPT.pdf
11. Recessive epistasis is described by all of the following EXCEPT.pdf
 
Write complete VHDL codes for the following schematic. Solution.pdf
Write complete VHDL codes for the following schematic.  Solution.pdfWrite complete VHDL codes for the following schematic.  Solution.pdf
Write complete VHDL codes for the following schematic. Solution.pdf
 
Why do carrier-mediated processes become saturated (choose the best .pdf
Why do carrier-mediated processes become saturated (choose the best .pdfWhy do carrier-mediated processes become saturated (choose the best .pdf
Why do carrier-mediated processes become saturated (choose the best .pdf
 
Why is it that linked lists are better when it comes to needing freq.pdf
Why is it that linked lists are better when it comes to needing freq.pdfWhy is it that linked lists are better when it comes to needing freq.pdf
Why is it that linked lists are better when it comes to needing freq.pdf
 
Which of the following isare characteristic of the parasympathetic .pdf
Which of the following isare characteristic of the parasympathetic .pdfWhich of the following isare characteristic of the parasympathetic .pdf
Which of the following isare characteristic of the parasympathetic .pdf
 
What statistic is often interpreted as providing an estimate of the .pdf
What statistic is often interpreted as providing an estimate of the .pdfWhat statistic is often interpreted as providing an estimate of the .pdf
What statistic is often interpreted as providing an estimate of the .pdf
 

Recently uploaded

Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 

Recently uploaded (20)

Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 

Summary of Ethics and Information Security (one page)Solution.pdf

  • 1. Summary of Ethics and Information Security (one page) Solution Ethics and Information Security here Ethics is nothing the principles and standards that guide our behavior towards other people secondly Intellectual property is creative work in physical form Copyright is nothing but the legal protection afforded an expression of an idea, such as song, video game, and sometypes of proprietary documents Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software Counterfeit software is a software that is manufactured to look like the real thing and sold as such here Privacy include 1. Right to be left alone 2. Control your own personal possessions 3. Not to be observedwithout your consent Epolicies are policies and procedures that address the ethical use of computers and internet usage in thebusiness environment and CIO Magazine’s Size Principles for Ethical Information Management finally Information is a valuable corporate assets and should be managed as such, like cash, facilities, orany other corporate asset2. The CIO is steward of corporate information and is responsible for managing it over its life cycle-from its generation to its appropriate destruction3. The CIO is responsible for controlling access to and use of information, as determined bygovernmental regulation and corporate policy4. The CIO is responsible for preventing the inappropriate destruction of information5.
  • 2. The CIO is responsible for bringing technological knowledge to the development of informationmanagement practices and policies6. The CIO should partner with executive peers to develop and execute the organization’s information management policies Ethical computer use policy contains general principles to guide computer user behavior. Example : theethical computer use policy might explicitly state that users should refrain from playing computer gamesduring working hours Information privacy policy contains general principles regarding information privacy Acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided accessto a network or to the internet. Nonrepudiation is nothing but a contractual stipulation to ensure that ebusiness participants do not deny their onlineactions