Principles of Information Systems (MindTap Course List)
Principles of Information Systems (MindTap Course List)
13th Edition
ISBN: 9781305971776
Author: Ralph Stair, George Reynolds
Publisher: Cengage Learning
bartleby

Concept explainers

Question
Book Icon
Chapter 14, Problem 1WE
Program Plan Intro

Code of ethics:

  • The “ethics” word comes from the Greek term “duty”. The code of ethics means all the responsibilities that professional must respect when carrying out their work.
  • It also contains the core value of the work and the behavior which should be adopted.

Example:

Professional and confidentiality secrecy are responsibilities contained in the code of ethics and conduct in numerous professions like accountants, lawyers, doctors and journalists.

Intent of the code of ethics:

  • The intent of the code of ethics established by a professional order as a way to safeguard the public and the status of the professionals.
  • The employee who breach their code of ethics suffer disciplinary actions that can range from a warning or rebuke to dismissal or ejection from their professional order.

Privacy policy:

  • A privacy policy denotes a statement that discloses some or all ways an organization would gather, use, disclose, and manage data of customers as well as clients.
  • It fulfills a legal requirement for protecting privacy of customers as well as clients.
  • Personal information denotes anything that could be used to identify an individual.
  • It represents a generalized treatment that tends to be more specific and detailed.
  • The exact content of certain privacy policy will depend upon applicable law and need to address requirements across all boundaries.

Blurred answer
Students have asked these similar questions
Look into Edward Snowden, a former CIA employee and US government contractor who stole and released secret material from the National Security Agency without prior approval in 2013. Your findings should be summarized in around 100-200 words. Do you think he is a traitor, patriot, or anything else? Why?
The CISO approaches the interns who seem to be breaking various security standards, who express their displeasure. According to the organization, they don't encrypt their workstations, download unlicensed music, connect personal devices to corporate computers, spend too much time on social media, and download pornographic content on workplace systems. The CISO recommends that you create a security document (Rules of Behavior) that has at least 15 rules limiting what employees may and may not do when connected to the corporate network.
Cybersecurity discussion  In 2013, Edward Snowden was hired by the NSA after previous employment with the CIA as a systems administrator. In early June of 2013 he revealed thousands of classified NSA documents to journalists Glenn Greenwald, Laura Poitras, Barton Gellman, and Ewen MacAskill about government surveillance programs. By June 21, 2013, the United States Department of Justice unsealed charges against Edward Snowden of two counts of violating the Espionage Act of 1917 and theft of government property, which identified the leak of state secrets as an act of treason. Snowden has become a subject of controversy, both ethically and legally being seen as a traitor, a hero, a whistleblower, a dissident, and patriot. Data Security and Privacy in the Age of Surveillance (Links to an external site.) Edward Snowden: Patriot or Traitor? (Links to an external site.) Edward Snowden is Both A Patriot and A Traitor (Links to an external site.) Using the above short video and articles…

Chapter 14 Solutions

Principles of Information Systems (MindTap Course List)

Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,