Ethical issues and risks: Privacy Security Fraud Intellectual property Unsolicit
ID: 460747 • Letter: E
Question
Ethical issues and risks: Privacy
Security Fraud
Intellectual property
Unsolicited e-mail
Trustfulness
Targeting children
False advertising
Pornography
Product warranty
Cyber terrorism
List the sorts of policies and guidelines a firm would need to follow in undertaking their initiative or opportunity, and very briefly describe how these policies and guidelines address the possible ethical issues and risks you have identified above. Be sure your list of policies and guidelines address corporate ethical behaviour for employees, board members, stakeholders, suppliers, and users. Explain the reasons for your choices
Explanation / Answer
Privacy: It refers to the security if information of each and every stakeholders and other beneficiaries of the organisation. It can be of personal, official and other social information.
Intellectual property: This refers to patent and originality of process system.The company should not use any un authorised non patent techniques or process for their products.
Unsolicited e-mail: This refers to un official and spam mails that can leads to security threat of information and collapsing of systems through virus activities. So super users and other IT teams only must have certain privileges for creating mail id and other high level information security passwords.:
Targeting children: To be on safer side children security has to be given prime importance. Trafficking kind of activities has to be taken at most care and precautionary steps.
False advertising: This may results in giving false messages and will propagate wrong ideas and fake commitments.
Pornography: Strict action must be taken against view or spreading, sharing or taking videos related to pornography using office systems.
Warranty of product: Authorised software has to be used to prevent piracy ad warranty products has to be purchased for recovery and usage benefits.
Cyber terrorism. Like information security cyber terrorism also should be monitored by closely observing type of mails and information sharing from the company systems by the officials.
All this list of policies are equally important to incorporate in office principles.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.