Friday, August 31, 2012

Week 5 Blog Questions


1.Explain the ethical issues surrounding information technology.

Privacy and confidentiality

Privacy:  the right to be left alone when you want to be; to be able to have control over your own personal possessions, and not to be observed without your own consent.

Confidentiality: ‘The assurance that messages and information are available only to those who are authorised to view them.’

2.Describe a situation involving technology that is ethical but illegal.

An example which is ethical but illegal could be if an employee thinks the business or another co-workers is conducting illegal or unethical business transactions and they access confidential information without authority to in an attempt to uncover their co-workers transactions. 


3. Describe and explain one of the computer use policies that a company might employ
The Internet use Policy contains general principles to guide the proper use of the Internet within an organisation. The policy outlines appropriate Internet services and defines the restriction of Internet access as well as ethical computer use. It describes user responsibilities and states the ramifications for violations by employees.

4.What are the 5 main technology security risks?

1.      Human Error
2.      Natural Disasters

3.      Technical Failures
4.      Deliberate Acts
5.      Management Failure

5. Outline one way to reduce each risk.
1.      Human Error - training employees in how to avoid and correct errors 
2.      Natural Disasters - implementation of disaster management plans
3.      Technical Failures - back up information on safe files or locations
4.      Deliberate Acts - firewalls and strong passwords
5.      Management Failure - training, documentation , procedure

6. What is a disaster recovery plan, what strategies might a firm employ?

A Disaster Recovery plan is a process of regaining access to computer systems and data after a disaster has taken place. All firms should have a comprehensive disaster recovery plan that outlines exactly what happens in a disaster . The plan should list things like:
  • communications plan: regular recovery tests and well documented procedures              
  • alternatives sites- off site data kept in date order
  • Business connection                                                        
  • location of backup data: offsite data kept in order

No comments:

Post a Comment