Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. Identify and discuss three principles that you believe should be included in

ID: 672476 • Letter: 1

Question

1. Identify and discuss three principles that you believe should be included in an ethical computer use policy. Such principles should pertain to both employees and external customers. Justify your selection.

2. Provide and describe an example organization (either from case study literature or your own professional work experience) that is known to embrace a corporate culture of information security. Why is this organization renowned for its cultural cybersecurity awareness?


**In your responses, address and apply the Saint Leo University core values of integrity and respect.

Explanation / Answer

In my point of view i find out three importent ethical principlas:


Trustworthiness:A trusted system is one whose failure may be crack a particular security policy.a system that is relied upon to a specified extent to enforce a specified security policy.


when ever we talking about a customer relationship and employee relations, there is an essential element that must be part of your customer service culture that should be is trust.If business to be successful then there is a chain relation that is customers must trust the company, employees must trust management,management must trust employees.

In a customer point of view trust is of the upmost importance in the customer and employee relationship. If any one from these three mistrusts any of the others, there is no chance for customer loyalty.


From the employees view management must trust employees.Is there confidence in the information or the service about employee they feel for doing work happy. They trust the company is good. They trust that the value is there. They trust the integrity of the company.
Employees findout when your idea of teamwork is having people do exactly what you tell them to do.


transparency:

Transparency is to be especially desirable in position where users that are not particularly technically approach would tend to be confused by seeing to interact directly with programming components.
Transparency is not limited to internal operations. Your customers will appreciate transparency and Transparency is a Teamwork.

The team must follow the follwing two rulesand transparency is a two way comunication.
1. Make it clear that transparency applies to everyone. When you implement it throughout the entire company, it becomes more about teamwork than about a focus on any one separtly.
2. When you find out areas for improvement like suggestions. People quickly tire of this conversations. Immedeatly challenge your team to think creatively about ways to change course. Everyone likes to feel challenged and included in the problem solving.

Just as companies want to know more and more about customer perceptions and behavior, it is reasonable for customers to expect the same of marchents. The reality, however, is that in most organizations there remains a substantial gap between the clarity that stakeholders desire to become advocates and the opacity that is being delivered.


confidentiality:Confidentiality is an Authentication method for user IDs and passwords, that uniquely identify data systems users and control access to data systems resources.And it provides full security for the data which was stored in system.
that sets out a company’s confidentiality policy regarding the privacy and confidentiality of medicament information. Employees routinely have access to proprietary information in the normal course of the work day. This policy is prohibits the employees unauthorized use and dissemination of such medicament information, which includes customer lists, financial information, business plans and models, and information related to a company’s business operations. This agreement is ideal for small businesses or other entities that wish to keep proprietary information employees learn confidential.
is the principle that an institution or individual should not reveal information about their clients to a third party without the consent of the client or a clear legal reason. This concept is commonly provided for in law in most countries.

2)

The cybersecurity awareness is not just knowledge it is also
Security awareness is knowledge combined with attitudes and behaviors that serve to protect our information assets. Being cybersecurity aware means you understand about the bugs and you take the right steps to prevent them.

Work at IBM to create a risk-aware culture where employees are educated about the cybersecurity risk they face and trained to take the right actions to defend against them. Training courses, simulated spoofing exercises, awareness campaigns, videos and a steady stream of awareness messaging and social media conversations are some of the ways we work to keep cybersecurity top of mind among IBMers.When it comes to stronger an organizations security attitude, information security personnel by themselves can only do so much, for they are not the only ones interacting with corporate networks.

The following things to awereness of cyber security:
Passwords: These really are the keys to your country. Have a good password policy in place, teach staff how and why to use it, and do routine checks to make sure that all your employees are on the same page.

Pieces: It is crucial that businesses of every size have a patch update program in place to ensure that all software and systems are updated regularly that emergency fixes can be implemented as need.

Get a baseline in place: While you cannot expect to catch everything, if you know what your norm is, then you have an advantage when something deviates, and you can respond decisively. That’s security in action.

Limit and enforce access: Not everyone needs access to everything, all the time. The fact is, the more exposure your data has, the more at risk it is.

Monitor and Inventory : Know what you have, tag it, track it, and update what gets added or removed to the system. This will help ensure you know what your baseline is for monitoring purposes. Additionally, it will help you reign in control of your organization’s bring your own device culture.