IFSM Week 6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Codes of Conduct (Professional Associations and Codes of Conduct)

. Less specific, than Employee codes of conduct. In a __________, you might find phrases such as: "I shall perform with honesty and integrity in all my professional relationships." " I shall not use my knowledge and experience in the field to take advantage of others, thereby achieving personal gain." " I shall be willing to share my knowledge and expertise with others and always act in such a way that reflects favorably on my profession."

What Cannot Be Copyrighted?

According to the US Copyright Office, "Copyright does not protect facts, ideas, systems, or methods of operation, although it may protect the way these things are expressed."

The Dangers of Social Networking

An individual can become the victim of data theft or unwittingly download a virus. One of the more significant dangers involves online predators or those who claim to be someone they are not. We will take a look at two such dangers—cyberbullying and cyberstalking.

Ethics

Computer can be used for good or evil and There are well-established standards or guidelines that define the appropriate use of information technology (IT) and all the associated systems that support this technology—computers, networks, and so on. These guidelines form the basis of IT ___________

The Digital Millennium Copyright Act (DMCA) of 1998

Congress was concerned that without limiting the liability of online service providers, the efficiency and growth of the internet as an important technology would be stifled. The Digital Millennium Copyright Act (DMCA) was the legislative product of this controversy. The law specifically sets out expectations and safe harbors for ISPs. Under the DMCA, ISPs are encouraged to provide and improve online services such as network access (thereby allowing their users to transfer files), but if illegal activity is detected, the ISP is obligated to ensure that these illegal transfers or publications of copyrighted materials do not continue. Developing, selling, and owning the tools to carry out the bypass are also illegal under the law.

File Sharing

File sharing is the process of transferring files across a network (often the internet). Although any type of file can be shared, most file sharing revolves around media files: music, movies, and video games. Many different applications can be used to share files, including FTP, Internet Relay Chat (IRC), operating system sharing capabilities, web pages, and peer-to-peer (P2P) applications. computers that use P2P applications to upload or download files can be identified by their IP addresses.

The Benefits of Social Networking

It can provide a source of information to help with a problem. It gives you a voice for your opinions and a place to connect with people who like the same things.

User Access Agreements (Codes of Conduct)

Rules made to establish ethical use of an employer's computers, network, e-mail system, website, databases, and any other forms of IT-related resources. This agreement is often called an acceptable use policy.

What's Special About Digital Media?

Since that case, technology has continued to lower the cost and burden of reproducing copyrighted work, most particularly media files—text, images, and audio and video recordings.

Protecting yourself

There are some elementary steps you can take to keep yourself and the information about you safe. Think about these: Look at your postings through the eyes of employers or potential employers. Do not post anything that might be embarrassing in your current or potential employment situations. Never post private information (phone numbers, addresses). These details can be used to track you down, possibly by someone who wishes to exploit your identification. Control who has access to your postings by adjusting privacy settings. Use strong passwords and change them regularly. Check to see how visible your name or identity is by "Googling" your name.

What Can Be Copyrighted?

These include CDs, DVDs, video games, software, songs, poems, movies, plays, books, databases, label designs, photographs, and websites. literary works musical works dramatic works pantomimes and choreographic works pictorial, graphic, and sculptural works, including fabric designs motion pictures and other audiovisual works sound recordings architectural works

(User Access Agreements) Acceptable Use Policy

Will contain a list of acceptable uses of a workstation, its even better if paired with examples. generally you will find specific sections that deal with security, online etiquette, and valid use or misuse of the organization's resources. Employees should use only the computer systems, network accounts, and computer applications and files that they are authorized to use. Employees may not use another employee's network account or attempt to steal or ascertain another employee's password. Employees are responsible for all computer resources assigned to them, including both hardware and software, and shall not enable or assist unauthorized users to gain access to the company's network by using a computer. Employees must not share their passwords with other employees or nonemployees and must take all reasonable steps to protect their passwords and secure their computer systems against unauthorized use. Employees may not attempt to gain access to protected/restricted portions of the company's network or operating system, including security software and administrative applications, without authorization. Employees must not use the company's computer resources to deploy programs, software, processes, or automated transaction-based commands that are intended to disrupt other computer or network users or damage software or hardware components of a system. Employees are responsible to promptly report any theft, loss, or unauthorized access of the company's network system, or illegal disclosure of any proprietary information.

(IT Ethical Issues) Software Piracy

You are not allowed to lend (or borrow) software, and doing so is a violation of copyright law. In general, US copyright law makes it illegal to distribute or reproduce copyrighted work without the consent of the copyright holder. These laws have a long history in the United States, and they are rooted in the idea that strong intellectual property rights encourage invention and creativity. ____________, a type of software theft, occurs when software is illegally copied, registered, activated, released, or sold.

Copyright

________ refers to a series of rights that are granted to the author of an original work. These rights focus on the reproduction and distribution of the work—specifically, "the right to ____________ __________." _________ owners are essentially given two specific entitlements: the right to exploit their own ____________ work, and the right to stop others from doing so. In the United States, ___________ is automatically granted to the creator of a work. ___________ protection remains in effect for the life of the author plus an additional 70 years. Although individuals and companies concerned about protecting their __________ will often place an explicit __________ notice on the work (e.g., "© 2010, all rights reserved"), this notice is not required for the work to qualify for ____________ protection.

Cyberstalking/ cyberharassment

a pattern of behavior that involves repeated continuous, unwanted communication to an adult. It is the adult version of cyberbullying. In the workplace, it can take place via company websites, blogs, or product reviews. It can escalate to criminal behavior if the stalker's behavior is threatening or invades the privacy of the victim. Under the US federal cyberstalking law, anyone who uses electronic means to repeatedly harass or threaten someone online can be prosecuted. The perpetrator seeks to damage the reputation of the victim by posting false information about the victim on websites. He or she may gather personal information about the victim through the victim's friends, family, and/or coworkers. A technically savvy stalker may attempt to trace the victim's IP address to gather more information about the victim's online presence. Sometime cyberstalkers involve others; they may even claim that the victim is harassing them to encourage others to join in the harassment of the victim. The cyberstalker may try to damage the victim's computer by sending viruses. Purchases or magazine subscriptions (often involving pornography) may be made in the victim's name.

Guidelines

based on policy, but they tend to focus on a specific series of steps in the functional area. normally approved and changed by the department or division most affected by them. This approach puts authority in the hands of knowledgeable staff. Because fewer individuals are involved in the drafting and approval process, can be changed and adapted more quickly than policies. typically much more explicit than policies in defining what's allowed and specifying the penalties for particular violations. policy may state that everyone needs to have a user ID and password to access a desktop computer. __________ may state that the password must contain eight characters with at least two numeric digits and two uppercase letters.

Cyberbullying

defined as actions that use information and communication technologies—the internet, web pages, discussion groups, instant messaging, or text messaging—to support deliberate, repeated, and hostile behavior by an individual or group that is intended to harm another or others. These communications seek to intimidate, control, manipulate, put down, falsely discredit, or humiliate the recipient ("Cyberbullying," 2016).

the Difference Between Policies and Guidelines?

employees are responsible for complying with both policies and guidelines. Both are binding and are enforced, and both concern the organization's operation. The major differences between the two have to do with the authoring body and specificity.

The Employee Code of Conduct (Codes of Conduct)/ Expected Behaviors in an Organization

following the user access agreement is part of ___________ the user access agreement is part of a larger _______. the user access agreement previously discussed would be a specific example of a set of guidelines that might be found in such a document. 1. policies that outline the principles and practices that enable an organization to meet its stated mission or purpose 2. the steps the organization will take in dealing with operational activities and how to respond to requirements to comply with federal and state legislation and regulations 3. procedures that explain how to perform tasks and duties, who is responsible for what tasks, and how the duties are to be accomplished 4. guidelines listing appropriate behaviors (and sanctions for violation of these behaviors) related to a range of topics: harassment, safety, workplace attendance, drug and alcohol use in the workplace, religious exercise, and computer use, for example These policies, steps, procedures and guidelines define the "what and when" for running the organization and also define the organization's expectations of all employees collectively. The "what and when" in the organization means what needs to be done and when it needs to be finished.

code of conduct

outlines the employer's expectation that computers, email, and the internet will be used primarily to conduct the company's business. maintain the security and confidentiality of your user ID and password take care of any property assigned to you use your knowledge of organizational information in a responsible way use the organization's supplies and services for official purposes only be respectful of others' property and privacy rights

Policies

tend to be larger, relatively static documents authored and approved by an organization's governing body, most often its board of directors. are intended to be useful and applicable over time. To that end, they are normally written with some degree of flexibility so that they can be adapted to changing circumstances. Specific penalties and expectations are not usually included in a _____


Ensembles d'études connexes

CTB: Cartilage, Bone, Diffusion and Osmosis

View Set

Chapter 11 Mastery Progress Exam

View Set

Chemistry -- Terms and Definitions

View Set

Chapter 9 multiple choice questions

View Set