1. Explain the ethical issues sounding information technology.
Interesting link: http://www.rogerdarlington.co.uk/Internetethics.html
(accessed 3/4/11)
2. Explain a situation involving technology that is ethical but illegal.
A web designer may be commissioned by a business to design a web page for the enterprise. The web designer decides to research the company and its competitors. The designer finds a page of one of the rival companies. The designer copies the layout and structure of the page. The designer also copies the text of the rival company’s page but manages to turn it into his own words. This action may appear to be ethical however, his acts may be recognised as intellectual theft, which, in turn is against the law. This is an example of a situation which involves technology that is ethical but illegal.
3. Describe and explain one of the computer use policies that a company might employ.
One computer use policy that a company might employ is information security. Information security is a must in all businesses as it is all too easy for a hacker or a criminal to access confidential business data and use it maliciously. A business must implement appropriate procedures such as downloading firewalls, antivirus software etc to stop people from gaining unauthorised access into company files. Data in an organisation may include the details of customers, therefore the company has a duty of care to the customers the ensure the security of their personal information.
4. What are five main technology security risks?
· Human Error
· Natural disasters
· Technical failures
· Deliberate acts
· Management failure
5. Outline one way to reduce each risk.
Human error: offer training programs
Natural disasters: Store important information and data offsite to avoid natural disasters that may occur on company property, constantly back up the systems data and information
Technical failures: constantly upgrade systems and ensure the maintenance of these systems. Ensure that the company has a skilled IT department to manage any IT problems that may occur.
Deliberate acts: maintain computer systems, ensure password changes and monitor employee actions to make sure there is nothing suspicious occurring inside the organisation.
Management failure: Training programs; ensure that all employees are up to date with system changes. Hire only efficient and effective staff.
6. What is a disaster recovery plan, what strategies might a firm employ?
No comments:
Post a Comment