Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Ethical issues and risks: Privacy Security Fraud Intellectual property Unsolicit

ID: 460747 • Letter: E

Question

Ethical issues and risks: Privacy

Security Fraud

Intellectual property

Unsolicited e-mail

Trustfulness

Targeting children

False advertising

Pornography

Product warranty

Cyber terrorism

List the sorts of policies and guidelines a firm would need to follow in undertaking their initiative or opportunity, and very briefly describe how these policies and guidelines address the possible ethical issues and risks you have identified above. Be sure your list of policies and guidelines address corporate ethical behaviour for employees, board members, stakeholders, suppliers, and users. Explain the reasons for your choices

Explanation / Answer

Privacy: It refers to the security if information of each and every stakeholders and other beneficiaries of the organisation. It can be of personal, official and other social information.

Intellectual property: This refers to patent and originality of process system.The company should not use any un authorised non patent techniques or process for their products.

Unsolicited e-mail: This refers to un official and spam mails that can leads to security threat of information and collapsing of systems through virus activities. So super users and other IT teams only must have certain privileges for creating mail id and other high level information security passwords.:

Targeting children: To be on safer side children security has to be given prime importance. Trafficking kind of activities has to be taken at most care and precautionary steps.

False advertising: This may results in giving false messages and will propagate wrong ideas and fake commitments.

Pornography: Strict action must be taken against view or spreading, sharing or taking videos related to pornography using office systems.

Warranty of product: Authorised software has to be used to prevent piracy ad warranty products has to be purchased for recovery and usage benefits.

Cyber terrorism. Like information security cyber terrorism also should be monitored by closely observing type of mails and information sharing from the company systems by the officials.

All this list of policies are equally important to incorporate in office principles.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote