An Ethical Assessment of Computer Ethics Using Scenario Approach *
|
|
|
- Pierce Harrington
- 10 years ago
- Views:
Transcription
1 International Journal of Electronic Commerce Studies Vol.1, No.1, pp.25-36, 2010 An Ethical Assessment of Computer Ethics Using Scenario Approach * Maslin Masrom University Teknologi Malaysia, Malaysia [email protected] Zuraini Ismail University Teknologi Malaysia, Malaysia [email protected] Ramlah Hussein International Islamic University Malaysia, Malaysia [email protected] Norshidah Mohamed International Islamic University Malaysia, Malaysia [email protected] ABSTRACT Ethics refers to a set of rules that define right and wrong behavior, used for moral decision making. In this case, computer ethics is one of the major issues in information technology (IT) and information system (IS). The ethical behaviour of IT students and professionals need to be studied in an attempt to reduce many unethical practices such as software piracy, hacking, and software intellectual property violations. This paper attempts to address computer-related scenarios that can be used to examine the computer ethics. The computer-related scenario consists of a short description of an ethical situation whereby the subject of the study such as IT professionals or students, then rate the ethics of the scenario, namely attempt to identify the ethical issues involved. This paper also reviews several measures of computer ethics in different setting. The perceptions of various dimensions of ethical behaviour in IT that are related to the circumstances of the ethical scenario are also presented. Keywords: Computer-related Scenario, Ethical Assessment, Computer Ethics 1. INTRODUCTION Advances of information technology (IT) have given people more power than ever before. Today, most jobs involve using computers, with computer technology having penetrated all areas of education, business, and industry. Nevertheless, IT advancements * An earlier version of the paper has been presented at The Business and Information Conference 2009 (BAI 2009), July 6-8, 2009, Kuala Lumpur, Malaysia.
2 26 International Journal of Electronic Commerce Studies without integrity and ethics are pushing people towards wane (i.e. gradually lose power or importance), and at the same time the chance for unethical use increases. Computer misuse and abuse are expected to continue in the future. These unethical activities will cause harm to many individuals and society. Examples of negative uses of technology include hacking, spam, denial of service attacks, identity theft, and unauthorized duplication of software. Researchers have employed several techniques to assess the ethical use of computers or IT. The most popular technique is called the ethical scenario. Scenarios related to the field of computing were first illustrated by John Parker [1], who conducted a workshop attended by computer scientists, psychologists, sociologists, and lawyers. The workshop s aim was to develop the concepts of unethical practices that prevail in the computer science and technology fields. The results could then be used to develop proper codes of ethics. Several studies have gauged the ethics of computer use using the scenario method [2-6]. According to Ellis and Griffith [6], the scenario method which is borrowed from the ethics case approach, comprises a short description of an ethical situation. An experimental subject will rate the ethics of the scenario using a single scale item with 2-to-7 point responses with endpoints of ethical and unethical. Kreie and Cronan [7] used the scenario method to study gender differences in evaluating ethical dilemmas. Thong and Yap [8] used a single scenario to study ethical decision-making associated with making illegal copies of copyrighted software. Ellis and Griffifth [6] utilized a multidimensional scale ethics measure to seven IT related scenarios developed by Guthrie [9]. The purpose of this study, therefore, is to provide appropriate computer-related scenarios that can be used to examine the computer ethics in the Malaysian context. The structure of this paper is as follows. A review of computer ethics is provided, followed by computer-related scenarios. The ethical circumstances and other measures of computer ethics are then described. The paper closes with a conclusion. 2. COMPUTER ETHICS Computer ethics is defined as ethics regarding use of the computer and IT. Studies on computer ethics have been primarily carried out in the developed countries; there appears to be a lack of studies in developing countries. Today, however, increased use of information technology (IT) has a great impact on people, organizations, and society in both developed and developing countries. Computer ethics is a major issue that emerged with an increase in computer and information technology. It can be defined as a category of professional ethics similar to medical, legal, teaching, and accounting ethics. For computer ethics, however, the primary good is information. According to Langford [10], ethics motivate individuals to think through their attitudes and beliefs and thus decide in advance whether their opinions are appropriate or not. Once this is decided, individuals should then be prepared to fully accept responsibility for their actions and conducts. The full range covered by computer ethics studies can be characterized as: (1) the central core of academic computer ethics research and academic philosophy, and (2) less philosophically-inclined material. Computer ethics is a complex field to address because it is not based on solid rules that can be monitored. Al-A ali [3] argued that the main ethical issues related to IT are associated with hacking, privacy, software piracy and IT personnel work ethics. Further, he asserted that the ethics and IT involve additional issues, including:
3 Maslin Masrom, Zuraini Ismail, Ramlah Hussein and Norshidah Mohamed 27 Computer professionals responsibilities towards their employers and their clients. Proper documentation of software by designers and developers. Proper testing of software by designers and developers. Handing over of systems to clients. Designers and developers leaving a computer project before it is complete. Providing maximum software security of software to clients. Computer professionals honoring the proprietary issues relating to the algorithms, procedures and data. Computer professionals working towards accurate systems with the aim of complete data integrity. Computer professionals involvement in developing systems aimed at unethical ends. Computer ethics is also involved in proactive disclosing the moral properties embedded in computer systems that later lead to ethical issues and dilemmas [11]. Existing moral theory needs to be modified, therefore, the new moral theory developed. Existing moral theory is insufficient in light of new demands generated by new and persistent IT practices. 3. COMPUTER-RELATED SCENARIO In general, an ethical scenario, and sometimes called a case study is a short narrative of events that involve one or more ethical issues. In the current situation, many codes of ethics are either a very general statement that is difficult for employees to translate into individual situations. Also, in some cases employees view ethical statements with a certain denial of responsibility [12]. According to Lorents, Maris, Morgan and Neal [13], acquiring understanding of ethical issues is best accomplished through the use of scenarios. A scenario is a description of a situation and a resulting action [14]. The scenarios must be specific and engage the participant. The intent is that a person (either a student or an employee) reading such a scenario is expected to analyze the participants action and arrive at a judgment concerning their ethical nature [15]. In this paper, the term computer-related scenario is used interchangeably with IT-related scenario. A seven of IT-related scenarios as shown in Table 1, as developed by Guthrie [4] is presented and discussed below. The seven scenarios as listed in Table 1 will be used to test this study s hypotheses related to the ethical circumstances discussed in the next section. A study conducted by Lorents et al. [13] used computer-related scenarios developed by Paradice [16] to examine how perceived motivation affected student ethical evaluations. The computer-related scenarios described unauthorized access to computer systems or using computers to illegally copy or distribute copyrighted materials. Alternative scenarios created the focus on intent. The type of access or copying was identical, but the individual s motivation and how the unauthorized access occurred or illegal copies made varied. The varied motivations included: Intellectual curiosity Malicious use of resources Obtaining resources for personal use Illegal copying to support non-profit activities Obtaining resources for profit Paradice [16] defined three motivations for unethical behavior: obligation, opportunity, and intent. Three scenarios related to opportunity are given in Table 2.
4 28 International Journal of Electronic Commerce Studies Table 1. IT-related Scenario No. Scenario Scale Used 1. A bright graduate student developed a tool that would contact corporate sites, scan their networks, and find flaws in their security system. He made the software available to everyone, including hackers and cyber-criminals, over the Internet. Corporations felt he was assisting criminals. He felt he was providing a tool for network managers to troubleshoot their security systems. 2. A popular Internet service provider offers on-line registration. Any user with a modem can dial the Homelink Network and register for Internet service from their computer. What the users do not know is that as part of registration, Homelink scans their hard drive assessing their system for potential new software marketing opportunities. 3. Ruth likes to play lots of practical jokes. Once she tried to log on to Jim s account, guessing his password was his wife s name. She got directly into his account. She then wrote a program that would flash the message There is no Escape every time the escape key was pressed. Jim found the joke in a few days and was mad. 4. Joe is giving an on-line demonstration in which he uses software that was licensed for 90 days. Prior to giving the seminar, he has noted that the license would expire. Rather than pay the licensing fee, he changes the date on his computer, effectively fooling the software into believing it is at the beginning of the licensing period. 5. Anna needs software to convert TIFF formatted images to GIF format. She found an excellent piece of shareware and has used it once to convert the images. The shareware developer requests that she sent $5 if she likes and uses the software. She has not sent a check to the developer to date. 6. Joan is a programmer at Xcorp, Inc. While working late one night, she notices that her boss has left his computer on. She enters his office to turn of the monitor and finds that he is still connected to his electronic mail. She scans the message briefly noticing whom they are from and what the topics are. One message in particular catches her eye. It is regarding herself in an unflattering way. 7. Jim was recently fired from The Spot, a national discount department store. Jim is a techno-savvy guy who felt he was wrongfully fired. His protest against The Spot was to create a web page called This Spot Unfair and to state his case to the world about The Spot s unfair treatment. Multidimensional (Multiple item ethics scale)
5 Maslin Masrom, Zuraini Ismail, Ramlah Hussein and Norshidah Mohamed 29 Table 2. Scenarios Related to Opportunity No. Situation Scenario Action 1. Opportunity to Obtain Software An employee is given a PC at work but not all of the software needed to do his/her job. The employee copies licensed software from a friend outside of the company to use 2. Opportunity for unauthorized use 3. Opportunity for destructive behavior An employee discovered a way to access all accounts on the company computer system. This flaw in the system security was reported to the appropriate authorities in the company. Many workers who use the computer system in the company do not take the time to log out properly. at work. Until the problem was corrected, the employee continued to browse the system. A systems programmer decided to teach the workers a lesson by locking out those who had violated the log out procedure for 24 hours with a message indicating why they were locked out of their accounts. Lorents et al. [13] then redefined the ethical factors (replacing the original motivations defined by Paradice [16] as: Infringing on software licenses. Using computer technology illicitly (writing and disseminating viruses or causing a system to crash). Misusing corporate resources. An example of the scenario (Lorents et al. s redefined factors) wording with sub-scenarios and response choices is illustrated in Table 3. Details of the seven ethical scenarios Lorents et al. [13] developed are presented in Table 4. The study focuses on a single measure of ethical. Table 3. An Example of Scenario A student suspected and found a loophole in the university computer s security system that allowed him to access other students records. He told the system administrator about the loophole, but continued to access others records until the problem was corrected 2 weeks later. A. The student s action in searching for the loophole was B. The student s action in continuing to access others records for 2 weeks was C. The system administrator s failure to correct the problem sooner was 1) very ethical 2) ethical 3) somewhat ethical 4)questionable 5) somewhat unethical 6) unethical 7) very unethical
6 30 International Journal of Electronic Commerce Studies Table 4. Computer-related Scenarios No. Scenarios Scale Used 1. Loophole in Computer System A. Students searches for loophole. B. Student accesses other student s records. C. System administrator fails to correct problem on a timely basis. 2. Company Manager Using a Competitors Similar Services A. Tries to break security system to cause competitors system to crash. B. Used access to identify customers for sales prospects. 3. Programmer at Bank Makes Change in Code to Eliminate a Fee A. Code is changed back to original as soon as the balance is updated. 4. Population of Bots on Computers Using the Internet A. Causes a website of a company with questionable labor and environmental practices to be unavailable for a few hours. B. Causes infected PCs in companies to calculate Pi to 8 billion decimals when those PCs have idle resources. C. Causes degraded service of an online site for hours, and demand a ransom to remove the bots. 5. Student s use of Software for Educational Use Only A. Uses the software as a volunteer for charitable organizations. B. Uses the software for correspondence and job search activities. C. Uses the software for a for-profit business services company she started. 6. Download of a Music CD by a Famous Artist on a Major Record Label A. Uses the music on personal PC and MP3 player B. Sends copies of music to 3 friends. C. Makes copies of music available to anyone accessing his website. D. Makes copies on CDs and sells them. 7. Purchase of CD Sold by a Local Band A. Makes copies on CD to give to friends. B. Sends copies on CD to anyone requesting the CD. C. Makes copies on CD and sells them. Single-item ethics scale Six additional computer-related scenarios were developed by Ellis and Griffith [6] to examine ethics in various information systems (IS)-related situations. These scenarios are illustrated in Table 5.
7 Maslin Masrom, Zuraini Ismail, Ramlah Hussein and Norshidah Mohamed 31 Table 5. IS-related Ethics Scenarios Scenario 1 Scenario 2 Scenario 3 Scenario 4 Scenario 5 Scenario 6 A programmer developed a tool that would contact corporate sites, scan their networks, and find flaws in their security system. The programmer made the software available to everyone over the Internet. Corporations felt the programmer was assisting hackers and cyber-criminals. The programmer felt that he was providing a tool for network managers to trouble shoot their security systems. A popular Internet Service Provider (ISP) offers online registration. Any user with an Internet connection can access the Hookyouup Network and register for Internet service. What the users do not know is that as part of registration, the ISP scans their hard drive assessing their system for potential new software marketing opportunities. Ruth likes to play practical jokes on friends. Once she tried to log on to Jim s account, guessing his password was his wife s name. Once she has access, she installed a program that would flash the message There is no Escape every time the escape key was pressed. Jim discovered the joke after a few days and was upset. Joe is giving an on-line demonstration in which he uses software that was licensed for a 90-day trial period. Prior to giving the seminar, he noted that the license would expire. Rather than pay the licensing fee, he changes the date on his computer, effectively fooling the software into believing it is at the beginning of the licensing period. Anna needs software to convert TIFF formatted images to GIF format. She found an excellent piece of shareware and has used it once to convert the images. The shareware developer requests that she send $5 if she likes and uses the software. She has not sent a check to the developer to date. Joan is a programmer at XYZ, Inc. While working late one night, she notices that her boss has left his computer on. She enters his office to turn it off and finds that he is still connected to his . She scans the messages briefly, noticing whom they are from and what the topics are. One message catches her eye. It is regarding herself in an unflattering way. 4. ETHICAL CIRCUMSTANCES According to Ellis and Griffith [6], although studies have tried to determine ethical judgment and behavior, the literature concerning computer ethics has still focused on a single measure of ethical. Reidenbach et al. [17] introduced the multidimensional scales for measuring ethics. Reidenbach and Robin [18] and Reidenbach et al. [17] proposed that ethics consists of three theoretical dimensions: Moral equity is comprised of concepts such as fairness and justice. Relativism is comprised of concepts such as cultural and traditional acceptability. Contractualism is comprised of concepts dealing with unwritten contracts and unspoken promises. They stated that measuring ethics using a single-dimensional construct is inadequate. The dimensions and measurement items they proposed are shown in Table 6. Each
8 32 International Journal of Electronic Commerce Studies measurement item was measured using a 7-point Likert scale, where 1 = Strongly Disagree and 7 = Strongly Agree. Table 6. Dimensions and Measurement Items Dimensions Measurement Items 1. Moral Equity Fair / Unfair Just / Unjust Morally right / Not Morally Right Acceptable to My Family / Unacceptable to My Family 2. Relativism Culturally Acceptable / Unacceptable Traditionally Acceptable / Unacceptable 3. Contractualism Violates/ Does Not Violate an Unwritten Contract Violates /Does Not Violate an Unspoken Promise Ellis and Griffith [6] also pointed out that perceptions of various dimensions of ethical behavior in IT are related to the circumstances of the ethical scenario. In this context, ethical circumstances include how explicit the contract (for example, software license contract) is, the extent to which the scenario involves personal privacy; the level of technology; and the perceived seriousness of the outcome. 5. OTHER MEASURE OF COMPUTER ETHICS In this section, we present examples of other measures used to examine computer ethics. Maldacker and Varden [19] explore the issue of privacy and ethical guidelines related to computer use. Their measurement items were designed as opinion statements and participants were asked to provide their level of agreement or disagreement (see Table 7). Typically, in this type of measurement, participants were not asked for a written response of any kind. Peterson [15] identified a number of potential ethical issues regarding the use of company computers. The ethical attitudes of individuals in her study were based on a composite score derived from the various ethical issues presented. The composite score was used because typically an aggregate measure based on multiple items is used for investigations that involve beliefs and attitudes. Some examples used in Peterson s [15] study are as follows: Issues in computer ethics Using company computers for nonprofit activities, such as ing friends and using the internet, as long as it does not interfere with an employee s productivity. Marketing software for personal profit that was developed for a previous employer, assuming no prior written agreement was made regarding ownership of the software. Monitoring subordinates activities on company computers as long as subordinates are aware that they are being monitored. Using company computer equipment for personal profit as long as it is not completed on company time. Reading files belonging to fellow employees. Copying computer software the company has purchased to use at home for personal use.
9 Maslin Masrom, Zuraini Ismail, Ramlah Hussein and Norshidah Mohamed 33 Accessing private computer files of a potential client before an interview in order to be better prepared for the interview. ing potentially offensive jokes to fellow employees as long as they are sent only to employees who will not be offended by the jokes. Marketing software containing minor bugs, without informing customers that the bugs exist. Browsing confidential company computer files to obtain information such as the salaries of fellow employees. Table 7. Measurement Items No. Measurement Items Level of Agreement/Disagreement 1. Personal Ethics Practice It is acceptable to access computer-based information not required to do your job about your organization as long as no harm. 2. Personal Ethics Practice It is acceptable to access computer-based information not required to do your job about fellow employees as long as no harm is done. 3. Personal Ethics Practice It is acceptable for me to access computer-based company information about my confidential personnel records if I couldn t be discovered. 4. Personal Ethics Practice It is acceptable for others in my organization to access computer-based information about my confidential personnel records that is not part of their job without my knowledge. 5. Corporate Guidelines My company has the right to access personal computer-based information (such as ) that I maintain at work. 6. Corporate Guidelines My company has a formal set of guidelines, other than those listed, relating to the ethical use of computers. 5. CONCLUSION SA = Strongly Agree A = Agree U = Unsure D = Disagree SD = Strongly Disagree Using computer-related scenarios that present different ethical situations allows researchers to evaluate responses in a standardized context with a relatively high level of reliability. This paper presents numerous computer-related scenarios that can be used to explore the IT users ethical attitudes, including students or information system or information technology (IS/IT) professionals. This paper also describes ethical circumstances and other measures of computer ethics used in previous studies. In terms of measures, computer ethics researchers can consider two types of measures in the computer-related ethics studies, namely: (1) measure only one dimension (moral equity), or (2) measure more than one dimension or multidimensional (moral equity, relativism
10 34 International Journal of Electronic Commerce Studies and contractualism). For those who favor using the single scale, the single ethical construct is a conservative estimate. Nevertheless, computer ethics researchers still need to identify and develop better measures of ethics among IS/IT professionals and students (i.e. the future IS/IT professionals). ACKNOWLEDGEMENTS This material is based upon work supported by Fundamental Research Grant Scheme (FRGS), Malaysian Ministry of Higher Education under Vote No Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s). REFERENCES [1] D. B. Parker, Ethical conflicts in computer science and technology. Arlington, Virginia:AFFIPS Press, [2] A. G. Namlu and H. F. Odabasi, Unethical computer using behavior scale: a study of reliability and validity on Turkish university students. Computers & Education, 48(2), , [3] C. M. Hanchey and J. Kingsbury, A survey of students ethical attitudes using computer-related scenarios. Proceedings of the Conference on Ethics in the Computer Age, November, 2-6, [4] R. Guthrie, Ethical scenarios, [5] S. Athey, A comparison of experts and high tech students ethical beliefs in computer-related situations. Journal of Business Ethics, 12, , [6] T. S. Ellis and D. Griffifth, The evaluation of IT ethical decision making in marketing. The DATA BASE for Advances in Information Systems, Winter, 32(1), 75-85, [7] J. Kreie and T. P. Cronan, How men and women view ethics. Communications of the ACM, 41 (9), 70-76, [8] J. Y. L. Thong and Yap, C. S. Yap, Testing an ethical decision-making theory: the case of soft lifting. Journal of Management Information, 15(1), , [9] B. W. Lifick, Analyzing ethical scenarios. Proceedings of ETHICOMP95 Conference, March 28-30, De Montfort University, Leicester, UK, [10] D. Langford, Practical computer ethics. London: McGraw-Hill, 148, [11] P. Brey, Disclosive computer ethics. ACM Special Interest Group: Computers and Society, 30(4), 10-16, [12] S. Harrington, The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly, September, 20(3), , [13] A. C. Lorents, J. B. Maris, J.N. Morgan and G.L. Neal, Ethics of computer use: a survey of student attitudes, Proceedings of the Academy of Legal, Ethical and Regulatory Issues, 10(1), 37-41, [14] M. A. Pierce and J. W. Henry, Computer-related judgments of computer professionals and students. ACM SIGCSE Bulletin, 20(1), , [15] D. K. Peterson, Computer ethics: the influence of guidelines and universal moral beliefs. Information Technology & People, 15(4), , 2002.
11 Maslin Masrom, Zuraini Ismail, Ramlah Hussein and Norshidah Mohamed 35 [16] D. B. Paradice, Ethical attitudes of entry-level MIS personal. Information and Management, 18, , [17] R. E., Reidenbach, D. P. Robin, and L. Dawson, An application and extension of a multidimensional ethics scale to select marketing practices and marketing groups. Journal of the Academy of Marketing Science, 19(2), 83-92, [18] R. E. Reidenbach and D. P. Robin, Toward the development of a multidimensional scale for improving evaluations of business ethics. Journal of Business Ethics, 9, , [19] F. Maldacker and S.A. Varden, Privacy and ethics survey among computer professionals [20] R. V. McCarthy, L. Halawi and J. E. Aronson, Information technology ethics: a research framework. Issues in Information Systems, VI (2), 64-69, 2005.
12 36 International Journal of Electronic Commerce Studies
Information Ethics in Malaysia Paperless Hospital
Proceedings of the Postgraduate Annual Research Seminar 2006 314 Information in Malaysia Paperless Hospital Sapiah Binti Sulaiman, Prof. Dr. Rose Alinda Alias Faculty of Computer Science & Information
COB 302 Management Information System (Lesson 8)
COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy
Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common
APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
CODE OF BUSINESS CONDUCT AND ETHICS
Effective: 1 st April 2015 Table of Contents 1. PURPOSE... 3 2. SCOPE... 3 3. OWNERSHIP... 3 4. DEFINITIONS... 3 5. CONFLICTS OF INTEREST... 3 6. CORPORATE OPPORTUNITIES... 4 7. CONFIDENTIALITY AND PRIVACY...
Cablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy
LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology
State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.
Subject: Authoritative Policy: Procedure Number: Distribution: Purpose: Acceptable Use of Information Technology (former Ad Guide 1460.00) Standard Number 1340.00 Information Technology Information Security
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Acceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
INTERNET ACCEPTABLE USE POLICY
INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods
City of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
How To Use A College Computer System Safely
1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.
SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective for all the audits commencing on or after 01 April 2010) CONTENTS
MOLINA HEALTHCARE, INC. CODE OF BUSINESS CONDUCT AND ETHICS
MOLINA HEALTHCARE, INC. CODE OF BUSINESS CONDUCT AND ETHICS The Board of Directors of Molina Healthcare, Inc. has adopted this Code with respect to the business conduct and practices governing the affairs
INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
INTERNATIONAL PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective) CONTENTS Paragraph Introduction... 1 5 Skills and Knowledge... 6 7 Knowledge
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
Appendix A: Rules of Behavior for VA Employees
Appendix A: Rules of Behavior for VA Employees Department of Veterans Affairs (VA) National Rules of Behavior 1 Background a) Section 5723(b)(12) of title 38, United States Code, requires the Assistant
PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (Issued December 2003; revised September 2004 (name change)) PN 1013 (September 04) PN 1013 (December 03) Contents Paragraphs
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE Directive Concerning the Colorado Judicial Department Electronic Communications Usage Policy: Technical, Security, And System Management Concerns This
CUBIC ENERGY, INC. Code of Business Conduct and Ethics
CUBIC ENERGY, INC. Code of Business Conduct and Ethics Introduction Our Company s reputation for honesty and integrity is the sum of the personal reputations of our directors, officers and employees. To
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510
TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME Haya Fetais & Mohammed Shabana Saint Leo University COM- 510 November 23, 2014 Introduction Globalization and technological developments have infiltrated
Ethics in Internet. Joshi AG Centre for Information and Network Security University of Pune
Ethics in Internet Joshi AG Centre for Information and Network Security University of Pune The World Today Communication knows no physical boundaries Interconnected globe humming with electronic transmissions
INFORMATION TECHNOLOGY INTELLECTUAL PROPERTY ETHICS: ISSUES AND ANALYSIS
INFORMATION TECHNOLOGY INTELLECTUAL PROPERTY ETHICS: ISSUES AND ANALYSIS Alan R. Peslak, Ph.D., Penn State University, [email protected] ABSTRACT Unethical information technology behavior is estimated to cost
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
Online Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
BRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications
Page 1 of 5 HTC Communications ACCEPTABLE USE POLICY FOR HIGH SPEED INTERNET SERVICE This Acceptable Use Policy ( AUP ) governs high speed Internet service provided to you by HTC Communications (together
Commonwealth Office of Technology
Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline
------------------- COMPUTER NETWORK AGREEMENT FORM
COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
INFORMATION TECHNOLOGY ETHICS: A RESEARCH FRAMEWORK
INFORMATION TECHNOLOGY ETHICS: A RESEARCH FRAMEWORK Richard V. McCarthy, Quinnipiac University, [email protected] Leila Halawi, Nova Southeastern University, [email protected] Jay E. Aronson,
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
Protecting personally identifiable information: What data is at risk and what you can do about it
Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most
We will pursue our business with honor, fairness, and respect for the individual and. the public at large ever mindful that there
O Business with Integrity O We will pursue our business with honor, fairness, and respect for the individual and the public at large ever mindful that there is no right way to do a wrong thing. Introduction
By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224
COUGAR WIRELESS ACCEPTABLE USE POLICY I. INTRODUCTION Cougar Wireless and its various affiliates and subsidiaries (collectively we, us, our ) are committed to being responsible network citizens. To assist
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
Sibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the
Computer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
Acceptable Use Policy
Acceptable Use Policy Acceptable Use Policy (AUP) ionfish Group, LLC s network and services have been designed to serve its clients, partners, and employees (each individually a User ), and to enhance
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800
PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 ADMINISTRATIVE POLICY NO. 511 IMPLEMENTATION JANUARY 2014 EMPLOYEE ACCEPTABLE USE POLICY
EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
INTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
Using Public Computer Services in Somerset Libraries
Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which
EADS-NA Code of Ethics
Page: 1 of 7 EADS-NA Code of Ethics Introduction The Company demands high ethical standards of conduct from its directors, employees, and agents and will conduct its business with honesty, integrity, and
Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics
Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics Introduction This Code of Business Conduct and Ethics ( Code ) covers a wide range of business practices and procedures. It does not
Information Security Code of Conduct
Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security
How To Use Highland Community College Technology Resources Responsibly
Information Technology Services Acceptable Use Guidelines Updated 2015 provides technology resources to meet the College's purpose, to support our educational and community values, and to support our programs
WESTERN ASSET MORTGAGE CAPITAL CORPORATION CODE OF CONDUCT
WESTERN ASSET MORTGAGE CAPITAL CORPORATION CODE OF CONDUCT I. Introduction This Code of Conduct (the "Code") sets out basic principles to guide the day-today business activities of directors, officers
EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )
EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) Background Due to increased threat of identity theft, fraudulent credit card activity and other instances where cardholder
