Premium Essay

Ten Point Code

In:

Submitted By irish642
Words 1028
Pages 5
Final Assignment: Ten Point Code of Ethics

Ten Point Code of Ethics
Introduction:
In the Information Technology field as with many professional fields it is necessary to have a clear code of ethics that ensures the safety of the professional, the organization, and the client. This code of ethics should reflect the standards that are put forth by the profession and the expectations that the profession has for those who work in this field. When developing the code of ethics I reflected on what has been important to me in my career in terms of technology, ethics, and safety in the military and in my current career. I also reflected on what I believe will be important to me when I entered the information technology profession, and what is ethically correct in terms of the profession, the organization for which I work, for the clients, and for all stakeholders. Based on this reflection, the ten point code of ethics below represents what I believe to be important in terms of the information technology profession.
Point One: Follow the steps necessary to prevent unauthorized access to user identifications, passwords or any information that may be used to access information systems, user accounts, or information pertaining to stakeholders.
As an IT professional you will take precautions necessary to prevent unauthorized access to user identifications, accounts and passwords. You will take the necessary steps to ensure that information systems cannot be accessed by unauthorized users. You will ensure that all user accounts and information pertaining to stakeholders is protected and secured against unauthorized users. Point Two: Limit access to information contained in or obtained from the systems to authorized persons.
As an IT professional you will take precautions necessary to limit access to information contained in information technology systems to authorized

Similar Documents

Free Essay

Results on Tables

...Distance | Individual Risk (per year) | | For D5 | For F2 | Total | 100 m | 7.6 × 10-5 | 1.9 × 10-5 | 9.5 × 10-5 | 300 m | 7.6 × 10-5 | 1.9 × 10-5 | 9.5 × 10-5 | 500 m | 7.6 × 10-5 | 1.9 × 10-5 | 9.5 × 10-5 | 1 km | 7.6 × 10-5 | 1.9 × 10-5 | 9.5 × 10-5 | 3 km | 2.4 × 10-5 | 1.9 × 10-5 | 4.3 × 10-5 | 5 km | 2.4 × 10-6 | 6.0 × 10-6 | 8.4 × 10-6 | 10 km | 2.4 × 10-6 | 6.0 × 10-7 | 3.0 × 10-6 | 30 km | 2.4 × 10-6 | 6.0 × 10-7 | 3.0 × 10-6 | Distance | Individual Risk (per year) | | For D5 | For F2 | Total | 100 m | 7.6 × 10-7 | 1.9 × 10-7 | 9.5 × 10-7 | 300 m | 7.6 × 10-7 | 1.9 × 10-7 | 9.5 × 10-7 | 500 m | 7.6 × 10-7 | 1.9 × 10-7 | 9.5 × 10-7 | 1 km | 7.6 × 10-7 | 1.9 × 10-7 | 9.5 × 10-7 | 3 km | 7.6 × 10-7 | 1.9 × 10-7 | 9.5 × 10-7 | 5 km | 2.4 × 10-7 | 6.0 × 10-8 | 3.0 × 10-7 | 10 km | 2.4 × 10-8 | 6.0 × 10-9 | 3.0 × 10-8 | 30 km | 2.4 × 10-8 | 6.0 × 10-9 | 3.0 × 10-8 | Distance | Total Individual Risk (per year) | | Limited Failure, Scenario 1 | Catastrophic Failure, Scenario 1 | Limited Failure, Scenario 2 | Catastrophic Failure, Scenario 2 | 100 m | 9.5 × 10-5 | 9.5 × 10-8 | 9.5 × 10-5 | 9.5 × 10-7 | 300 m | 9.5 × 10-5 | 9.5 × 10-8 | 9.5 × 10-5 | 9.5 × 10-7 | 500 m | 9.5 × 10-5 | 9.5 × 10-8 | 9.5 × 10-5 | 9.5 × 10-7 | 1 km | 9.5 × 10-5 | 9.5 × 10-8 | 9.5 × 10-5 | 9.5 × 10-7 | 3 km | 9.5 × 10-5 | 9.5 × 10-8 | 4.3 × 10-5 | 9.5 × 10-7 | 5 km | 4.3 × 10-5 | 4.3 × 10-8 | 8.4 × 10-6 | 3.0 × 10-7 | 10 km | 8.4 × 10-6 |...

Words: 411 - Pages: 2

Premium Essay

Xacc/280 Week 3 Careers

...occupational prospects in which I had researched. The occupational prospects were: physician, mental health counselor, emergency medical technician, occupational therapist, pharmacist, and school counselor. Down the left side of the matrix list, I listed ten work values I want expressed, and 10 abilities I want to use in my occupation. I gave a weight number to each work value and work ability by using the rank-order system. I then used a code showing whether each of my occupation prospects was very positive (++), positive (+), neutral (0), or negative (-) in relation to each work value or ability listed....

Words: 529 - Pages: 3

Premium Essay

Thesis

...http://web.nlp.gov.ph/nlp/?q=node/645 It is an internationally recognized system whereby code numbers are assigned to books for easy identification and speedy exchange of information among publishers and all segments of the book industry and allied sectors. Specifically, it is a unique and unchangeable code number assigned to one title, one binding or edition of a published work. Benefits of the ISBN • The ISBN is a unique international identifier for monographic publications; assigning a number replaces the handling of long bibliographic descriptive records, thereby saving time and staff costs and reducing copying errors. • Correct use of the ISBN allows different product forms and editions of a book, whether printed or digital, to be clearly differentiated, ensuring that customers receive the version that they require. • The ISBN facilitates compilation and updating of book-trade directories and bibliographic databases, such as catalogues of books-in-print. Information on available books can be found easily. • Ordering and distribution of books is mainly executed by ISBN; this is a fast and efficient method. • The ISBN is machine-readable in the form of a 13-digit EAN-13 bar code. This is fast and avoids mistakes. • The ISBN is required for the running of electronic point-of-sale systems in bookshops. • Many publishing and supply chain systems are based on ISBN • The accumulation of sales data is done by the ISBN. This enables the varying successes of different product...

Words: 371 - Pages: 2

Premium Essay

Cjs/250 Week 1

...Lisa Bryant CJS/250 Check Point Week One: Historical Laws and Security Jenelle Velarde May 7, 2014 When it comes to historical laws and security, I have found that we tend to have the same kind of laws that they did back in time. However they also maybe revised to meet today’s society. We will be talking about six different historical laws which are The Code of Hammurabi, Draco’s Law, and Law of the Twelve Tables, Justinian Code, Magna Carta, and Statute of Westminster. The Law Code of Hammurabi (1750 B.C.) created by King Hammurabi, which was discovered in 1901. Also the quote “an eye for an eye” symbolizes the Hammurabi code. Which consist with the crimes that we have that gets disobeyed such as: slavery, marriage, theft, debts and commerce. Second law that I would like to tell a little about would be Draco’s law. Draco’s Law (621 B.C.) was named by the Greek citizen who they chosen to write the laws for Athens. Which consist of the death penalty, when someone has stolen anything from someone or murder someone Draco’s Law was given. Law of the twelve tables (450 B.C.) includes ten laws, then two more added later on. Law of the twelve tables came from ten men that were from Roman was given the power to write the laws. Which help form public and private laws foundation? Along helping to organize the prosecution where the victims could seek justice on whatever the person on trial done to them. However the law didn’t allow interclass marriages, severe...

Words: 530 - Pages: 3

Premium Essay

Justification Report

...empathic with issues that arise, have the consumers best interest at heart, and more importantly is the company ethically sound about decision making, and do they hold veracity when it comes to the reliability of their company. One could ask what is ethics and conduct? Ethics is depicted as, “rules of behavior that is based on ideas about what is morally good and bad,” (Merriam-Webster, 2014). Conduct is described as, “ a mode or standard of personal behavior especially based on moral principles,” (Merriam-Webster, 2014). Companies hold a Code of Ethics and Conduct to “guide and reference its employees on how the business should be operated. It also clarifies an organization's mission, values and principles, linking them with standards of professional conduct,” (Ethics Resource Center, 2009). Throughout this paper we will observe the Code of Ethics and Conduct of three major companies, AT&T, Verizon, and Sprint Wireless, and compare each code to the determination and drive these companies have behind pleasing their patrons. Key Issues Critical for Success Modern day wireless phones companies have expanded past exclusively manufacturing and selling wireless phone products. AT&T is one major wireless company that has expanded their ventures, and now in addition to selling wireless phone products they sell mobile broadband...

Words: 1925 - Pages: 8

Premium Essay

The Reconstruction Era

...political changes throughout its lifetime. Leaders have come and gone, and all of them have had their own objectives and plans for the future. As history has taken its course, though, almost all of these “revolutionary movements” have come to an end. One such movement was Reconstruction. Reconstruction was a violent period that defined the defeated South’s status in the Union and the meaning of freedom for ex-slaves. Though, like many things in life, it did come to an end, and the resulting outcome has been labeled both a success and a failure. When Reconstruction began in 1865, a broken America had just finished fighting the Civil War . In many respects, Reconstruction was a time period of attempted healing and building. It was the point where America attempted to become a full running country once more. This, though, was not an easy task. The memory of massive death was still in the front of everyone’s mind, hardening into resentment and sometimes even hatred. The south was virtually non-existent politically or economically, and searching desperately for a way into the political scene. Along with these things, now living amongst the population were almost four million former slaves, who had no idea how to make a living on their own. The former slaves had been freed by the 13th amendment in 1865, and in the future became a great concern to many political leaders. Still, it was no secret that something had to be done. So, political leaders appeared on the stage, each holding...

Words: 1195 - Pages: 5

Premium Essay

Legal and Ethical Consideration in Healthcare

...authorized personnel. A2. Information Technology Staff It is the responsibility of Information Technology (IT) staff to educate the clinical staff on ways to diminish security breaches by securing their workstations when they are not being used. Teaching clinical staff the importance of not sharing passwords and securing stations will greatly help security. The IT staff could use a power point to explain the policy to staff along with the disciplinary policy for violation of company policy or the HIPAA Privacy Act. Criminal Liability Montana Code 41-1-402 states that a minor can consent to treatment if it is an emergency situation and the guardian is unavailable. a minor who needs emergency care, including transfusions, without which the minor's health will be jeopardized. If emergency care is rendered, the parent, parents, or legal guardian must be informed as soon as practical except under the circumstances mentioned in this subsection (2). (MLS,2011) Criminal liability could result if they do not follow this code correctly. A...

Words: 1077 - Pages: 5

Free Essay

Ten Billing Steps

...Lisa Collins Instructor: Mrs. Donna Purvis, MBA HLTH245 Principles of Reimbursement Management September 29, 2015 Ten Step Billing Process The ten steps of the medical billing process have been divided into three categories: The visit, the claim and the post claim. Following the billing steps to complete correct claims ensures that providers are paid accurately and timely for services and procedures. The Billing process begins with the preregistration of patients. Collecting personal, basic demographic information, and insurance information and entering that information into the database. All of this personal information can be referred to at any time during the medical billing process. Keeping up to date patient and insurance information makes patient check in more efficient and eliminated potential billing errors. Confirming financial responsibility is the next step in the billing process. Once a patient’s information has been updated in the computer system it is then the medical staffs’ responsibility to determine who will be paying for the services rendered for the appointment. Insurance providers are contacted and benefits are verified as different plans have different levels of coverage. Once the medical staff is aware of what the allowable insurance benefits are, contact with the patient should be made so the patient is aware of their responsibility for out of pocket, non-covered expenses, co-payments, and deductibles. During the appointment, the physician...

Words: 1284 - Pages: 6

Free Essay

Contagious

...dress or changing our personality. Berger allowed his audience to put a name to each category and demonstrated with examples, which made it very clear to understand. I really enjoyed the book because I felt Berger had a great sense of humor. He would link a small quote to each category that really stuck with the reader. I think overall this helped contribute to a better grasp on the information. For the public category, he said, “monkey see, monkey do” which I felt was the perfect description. If people start wearing yellow live strong bracelets, you obviously can’t be the person without one, hence you almost feel obliged to purchase one. What I took away from this book is being able to look at these examples and categories from a business point of view. As a consumer I definitely feel more informed with why things actually do catch on, but as a business student I feel that I now understand how business may be able to use these concepts to increase their efficiency. This book gave me insight on how businesses can use these categories especially in their marketing department because growing up we have only been exposed to the consumer side. One great example I was thinking of while reading this book was Uber, which I feel hits multiple concepts discussed in the text....

Words: 629 - Pages: 3

Premium Essay

Hotel Management Srs

...wide area networks? 7. What is multicasting? 8. What is broadcasting? 9. What is unicasting? 10. What are switching elements? 11. What is routing algorithm? 12. What is blue tooth? 13. What is communication subnet? 14. What are peers? 15. What is a protocol stack? 16. What is topology? 17. What is ring topology? 18. What is star topology? 19. What is bus topology? 20. What is mesh topology? 21. What is tree topology? 22. What is connection-oriented service? 23. What is connection less service? 24. What is a datagram service? 25. What is store and forward network? 26. What is a cell? KNOWLEDGE OF TERMINOLOGY 27. Define broadcast links. 28. Define point-to-point links 29. Define gateway 30. Define Internet work. 31. Define protocol. 32. Define interface. 33. Define bandwidth. KNOWLEDGE OF CLASSIFICATION AND CATEGORY 34. Give the two types of transmission technology. 35. Give the different types of services. 36. Mention the different types of reference models 37. Mention the different layers of OSI reference model. 38. Mention the different layers of TCP/IP reference model. 39. List the three concepts that are central to OSI model. 40. List the critiques of OSI model. 41. List the different types of topologies. 42. Mention the variations in reliable connection-oriented service. 43....

Words: 2997 - Pages: 12

Premium Essay

Eib Handbook

...USAIC Pamphlet 350-6 Training the Expert Infantryman Badge (EIB) Test 31 MARCH 2009 DEPARTMENT OF THE ARMY Headquarters, United States Army Infantry Center Fort Benning, Georgia 31905-5593 USAIC Pamphlet 350-6 TRAINING The Expert Infantryman Badge (EIB) Test TABLE OF CONTENTS PREFACE ............................................................................................................................. iii CHAPTER 1 – INTRODUCTION 1-1. 1-2. 1-3. 1-4. 1-5. 1-6. 1-7. PURPOSE .................................................................................................................................. 1-1 AUTHORITY............................................................................................................................... 1-1 FREQUENCY ............................................................................................................................. 1-1 EXCEPTIONS ............................................................................................................................ 1-2 PROCEDURES .......................................................................................................................... 1-2 SCORECARDS .......................................................................................................................... 1-3 RISK ASSESSMENT ................................................................................................................. 1-3 CHAPTER 2 – ADMINISTRATION AND...

Words: 42999 - Pages: 172

Free Essay

Google'Control Mechanisims

...Google’s Control Mechanisms  Today, Google is the company that reinvented management methods, the way people work, how to organizations and how to manage people. Control mechanisms are used for many purposes in business management. The control mechanism’s job is to control any process to help directing activities of employees toward the achievement of organizational goals. Google took advantage of old way of control mechanisms, and change it to an efficient way that results increase in productivity, and encourage innovation. Google takes advantage of control mechanisms such bureaucratic control system, approaches bureaucratic control, budgetary control, and finally financial control Four Types of control Mechanisms “Bureaucratic control (or formal) control systems are designed to measure progress toward set performance goals and, if necessary, to apply corrective measures to ensure that performance achieves managers’ objectives” (Bateman & Snell, 2009, p. 658). Every organization has goals from making big profit to good customer service that satisfy customers. Google’s setting performance standard is to hire people that are smart and determined, the company favor ability over experience, this policy helped the company to increase its market capital from $153.4billion as October 2009 to $163 billion November 2010. Feedforward Control is one of the three Approaches to Bureaucratic Control. “Feedforward control takes place before...

Words: 1451 - Pages: 6

Premium Essay

The Growing Pains of Reconstruction and Industrialization in the Post-Civil War Era

...OF RECONSTRUCTION AND INDUSTRIALIZATION IN THE POST-CIVIL WAR ERA AUGUST 5, 2012 The Civil War marked a critical time in American history which left behind deep wounds of a divided nation which took years of healing. Although we have come a long way, the infected idealology that existed then still manifest itself in the form of overt and covert racism. One major turning point during the period immediately after the war was termed Reconstruction. In 1865, many Confederate soldiers returned to a devastated South whose farms, factories, railroads, bridges, and entire infrastructure had been destroyed. Immediate rebuilding started with the physical rebuilding progressing quickly. Yet, the rebuilding of southern society proved to be a harder task. Rebel states had to be integrated back into the nation and four million newly freed black slaves had to be integrated into southern society (Schultz, 2012). Reconstruction in the South is considered to be the time period from 1865 to 1877 following the war. In 1863, shortly after issuing the Emancipation Proclamation, Abraham Lincoln issued the Ten Percent Plan. This plan allowed southern states the right to establish a new government if one-tenth of its’ prewar voters took an oath of loyalty and supported the emancipation of the slaves. This was needed to abolish slavery and allow the state back into the union with full privileges. Lincoln was attempting to drain the Confederacy and shorten the war by making this action...

Words: 1288 - Pages: 6

Free Essay

B.Tech (Eee) Syllabus for 2012-13 Admitted

...GITAM UNIVERSTIY (Declared as Deemed to be University U/S 3 of UGC Act, 1956) [pic] REGULATIONS & SYLLABUS Of B.Tech. (Electrical & Electronics & Engineering) (W.e.f 2012-13 admitted batch) Gandhi Nagar Campus, Rushikonda VISAKHAPATNAM – 530 045 Website: www.gitam.edu REGULATIONS (W.e.f. 2012-013 admitted batch) 1. ADMISSIONS 1. Admissions into B.Tech (Electrical & Electronics Engineering) programme of GITAM University are governed by GITAM University admission regulations. 2. ELIGIBILTY CRITERIA 1. A pass in 10+2 or equivalent examination approved by GITAM University with Physics, Chemistry and Mathematics. 2. Admissions into B.Tech will be based on an All India Entrance Test (GAT) conducted by GITAM University and the rule of reservation, wherever applicable. 3. STRUCTURE OF THE B.Tech. PROGRAMME 3.1 The Programme of instruction consists of: i) A general core programme comprising Basic Sciences, Basic Engineering, Humanities & Social Sciences and Mathematics. ii) An engineering core programme imparting to the student the fundamentals of engineering in the branch concerned. iii) An elective programme enabling the students to take up a group of departmental / interdepartmental courses of interest to him/her. In addition, a student has to i)...

Words: 3379 - Pages: 14

Premium Essay

Creation and Contract Management

...C-S has agreed to a one-year contract that is worth $6 million dollars. In the past months Span and C-C’s has had conflict over the differences on the quality and dates received of deliverables. In the past months C-S’s deliveries have been late and the qualities are inadequate with substantial errors. With all of the delays and concerns; C-S is demanding for unfinished code and rescinding of the contract. The CEO at Span has advised that they would like to settle this dispute with C-S amicably. Span does not want to lose the contract; they want to negotiate new terms for the existing contract to resolve the quality and deadline issues. According to the University of Phoenix simulation (2011), Contract Creation and Management the contract states, “neither party may cancel this agreement, in whole or in part, Subsequent to more than 50 percent of the consideration having been tendered by the other.” More than 50% of the deliverables were delivered; C-S violates the contract by asking for the unfinished code and rescinding of the contract. In the month of December Span evaluate and select negotiation points from the contract clauses that pointed out Breach of Contract under ‘Internal Escalation Procedure for Disputes’ ‘Requirements Change’ and ‘Communications and Reporting’. The attorney advises that there had been a breakdown of internal escalation of processes on C-S’s end of the contract clause. It was mention it should force C-S to reconsider its stance. Also, the change...

Words: 1195 - Pages: 5