Introduction Information is a valuable corporate asset and important to our business. With regard to the situation that Brawner offers me a large sum of money for the email addresses and phone numbers of all my customers, what should I do? This essay aims to provide my response and dig out the root reasons of my business decision-making from two aspects of information ethics and information security. Information Ethics With the rapid development of information technology nowadays, people pay
Words: 1093 - Pages: 5
Ethics in Information Security The Gramm-Leach-Bliley Act of 1999 (GLBA) The Gramm-Leach-Bliley Act requires financial institutions that offer consumers financial products or services like loans, financial or investment advice, or insurance to explain their information sharing practices to their customers and to safeguard sensitive data. Strengths: * Allow customers to know how confidential information will be treated. Instead of hoping a financial services company will treat their personal
Words: 629 - Pages: 3
Principles of Information Security, Fourth Edition Chapter 3 Legal, Ethical, and Professional Issues in Information Security Learning Objectives • Upon completion of this material, you should be able to: – Describe the functions of and relationships among laws, regulations, and professional organizations in information security – Differentiate between laws and ethics – Identify major national laws that affect the practice of information security – Explain the role of culture as it applies
Words: 2389 - Pages: 10
Chapter 11 Law and Ethics Chapter Overview Chapter 11 covers the topics of law and ethics. In this chapter readers will learn to identify major national and international laws that relate to the practice of information security as well as come to understand the role of culture as it applies to ethics in information security. Chapter Objectives When you complete this chapter, you will be able to: Differentiate between law and ethics Identify major national and international laws that
Words: 4470 - Pages: 18
Introduction As a future information security professional, it is vital that you understand the scope of an organization’s legal and ethical responsibilities. To minimize liabilities and reduce risks from electronic, physical threats and reduce the losses from legal action, the information security practitioner must understand the current legal environment, stay current as new laws and regulations emerge, and watch for issues that need attention. Law and Ethics in Information Security As individuals we
Words: 2358 - Pages: 10
cyber ethics: Sudi, V. (2011, March 25). Safer internet: Cyber Ethics. Retrieved Nov 11, 2013, from http://cyberethics.info/cyethics1/ Marshall University. (2011, Feb 11). Information Security: Cyber Ethics. Retrieved from Nov 11, 2013, from http://www.marshall.edu/infosec/resources/cyber-security-tips-newsletter/cyber-ethics/ Marshall University. (2011, Feb 11). Information Security: Cyber Ethics. Retrieved from Nov 11, 2013, from http://www.marshall.edu/infosec/resources/cyber-security-tips-newsletter/cyber-ethics/
Words: 803 - Pages: 4
The development of a code-of-ethics: IT challenges Geraldetta Lovelace Northcentral University The development of a code-of-ethics: IT challenges The problem to be investigated is the development of a relevant and effective code of ethics to address the ethical use of and the ethical issues related to the use of Information Technology (IT). The use of IT, like every innovation that has the potential to change lives for good, also has the potential for harm, however IT “seems to create more
Words: 1691 - Pages: 7
IT and Information Security Professionals Sandra J. Crossin Information Security Management- MGMT 394 Embry Riddle Aeronautical University Abstract This paper summarizes and evaluates an article addressing the ethical issues involved with being information security personnel. It will attempt to show several areas where ethics can become an issue and stimulate questions regarding activities that are not illegal, but in most cases are not ethical either. The Information Security industry
Words: 581 - Pages: 3
Introduction This manual sets forth the official compliance policies of Edward Jones. All individuals employed by or working at the firm are required to familiarize themselves with the content and review the manual at least annually. While the manual addresses policies of a compliance nature, individuals are expected to conform to the laws, rules and regulations of the industry and their particular jurisdiction regardless of whether they are covered in this manual. Standards of fairness and
Words: 4057 - Pages: 17
INDIVIDUAL ASSIGNMENT 1 By Suman Lectured by Prof. Siva ID No. 012014111647 Jeong Chun Phuoc BUSINESS LAW DLW 5013 A BUSINESS ETHICS CASE STUDY OF : FROM A CLIENT CONFIDENTIALITY PERSPECTIVE 1 BUSINESS LAW DLW 5013 Contents Executive Summary ................................................................................................................................ 3 Company Overview .........................................................................................
Words: 5727 - Pages: 23