LP9.1 Assignment: Privacy Issues This assignment will assess the competency 9. E
ID: 385410 • Letter: L
Question
LP9.1 Assignment: Privacy Issues This assignment will assess the competency 9. Explore ethical issues in the field of IS. Knowledge and skills leading to mastery of this competency: Directions: With today’s computers, the right to privacy is an especially challenging problem. Corporate privacy and the privacy of individuals is a major concern of the Federal Government. Write a 2-3 page paper to address congressional bills that deal with privacy issues in relation to information technology. Examine each of the pieces of legislation and give an example situation for each. Discuss what individuals can do to protect their privacy. This assignment needs to have the following: • A cover page (includes student's name, date, class title, and assignment title) • Paper needs to be 2-3 pages (minimum 2 full pages), 12 point font, double spaced, and writing is grammatically correct • A reference page (If you are referencing information from a textbook or other source, then an APA formatted citation and reference page is necessary)
Explanation / Answer
Regardless of where you work in today’s technological world, odds are you work on a computer or have access to a computer. Because of the widespread use of these machines, the risk of employees using them unethically is always present, whether intentional or unintentional. This could be due to lack of knowledge about the appropriate use of computers in the workplace, or a blatant disregard for policy. It is essential for the security of the business and its data that computer ethics are adhered to in the workplace. “Computer ethics refers to the ways in which ethical traditions and norms are tested, applied, stretched, negotiated, and broken in the realm of computer technology ("Computer Ethics - Computer Ethics In The Workplace, Privacy, Computer Ethics As Education - Ethical, Information, Technology, and Data," n.d.).”
If a business allows the use of company computers by employees, they will most likely have a computer and internet use policy that employees must sign when they are hired. Not having employees sign such a policy invites misuse of the company’s property by not safeguarding against it. When a company does have employees sign off on a computer and internet use policy, they have documentation to back up any consequences imposed on employees who violate the policy. Inappropriate use of business computers can compromise company data, prevent business as usual, and even draw harassment claims from coworkers ("Employees & Ethics With Computers | Everyday Life - Global Post," n.d.).
One of the areas with the highest probability for unethical behavior is with personal internet usage. The internet these days can be used for just about anything; social networking, shopping, blogging, checking personal email, accessing prohibited sites, completing schoolwork, such as pornographic sites, listening to music, watching videos, and even watching TV and movies. Even though employees know it is unacceptable to do these things while on the clock at work, many will still attempt to do so. Accessing the wrong site is not only unethical when you know that it is not allowed in the workplace, it can also open the door to viruses that can damage the company systems.
Another big area is with correctly utilizing company email. Many employees will use their company email for personal use, but this is not the only way email can be compromised. Sending secure information through non-secure channels is another big no-no at most companies. My company, for instance, deals with payroll, so we often have to send communications including social security numbers. Our policy explicitly states that any correspondence containing sensitive information must be sent securely. Sending items securely takes extra steps, which some employees will skip just to save time, even though they are aware of the policy on secure email. Another thing that employees have a habit of doing is sending email forwards, such as jokes, chain letter type emails, and videos out to both their coworkers and external contacts, which is against most email policies. This is a big one that can lead to harassment claims from co-workers. The legal definition of harassment in the workplace is any employee singled out because of race, color, creed, ancestry, national origin, age, disability, sex, arrest or conviction record, marital status, sexual orientation or military services and/or content relating directly to any of these protected characteristics ("Harassment," n.d.). All it takes is one employee to take offense at the content of one of these emails, and it has the potential to open up a legal issue with not only the offending employee, but the business, as well.
To protect the security of systems and data, businesses require log in and passwords for all employees with computer access, the access rights of which differ depending on the employee’s position and duties in the company. This is necessary for abiding by separation of duties regulations in many industries. Most policies include a provision stating that these credentials are not to be shared under any circumstances. However, there are those who will give each other their credentials to allow another employee to do something that they do not have access to do.
The first step in controlling possible unethical acts with regards to the company’s computer systems is by expressly communicating the expectations to their employees. This is usually done through policies that are issued to and signed off on by the employees when they are hired on with the company. In most cases, these policies are written by the human resources and/or legal departments. This helps to ensure that all bases are covered on the company’s behalf and their employee’s rights are not violated within the terminology. Another way to ensure that employees are aware of the company’s expectations of them when using computer systems, to help them to understand the policies, and give them a chance to have their questions answered is by holding training sessions that cover these items. Many companies utilize programs that monitor computer use by employees. Such programs can automatically block employees from navigating to certain websites, flag possible inappropriate emails and send a message to the employee letting them know the message was flagged and blocked, and some programs can even record all computer use from the time an employee logs on until the time they log out of the computer.
References
Computer Ethics - Computer Ethics In The Workplace, Privacy, Computer Ethics As Education - Ethical, Information, Technology, and Data. (n.d.).
Employees & Ethics With Computers | Everyday Life - Global Post. (n.d.).
Reynolds, G. (2014). Ethics in Information Technology (4th ed.). Cengage Learning.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.