What is Ethics?
In my opinion, ethics give people free will to make right choices. People have free will to make choices that are governed with responsibility, accountability, and liability. We have a responsibility to perform in an ethical manner and be accountable for our choices or actions. Regardless of the circumstances and choices we make, there are consequences if we make the wrong choice. The question of whether an action or choice is ethical or not is fundamentally based on whether something is right or wrong. From an ethical standpoint, unethical choices and risky behavior can lead to increased liabilities. The liabilities result in the loss or damage sustained by a company or other party as result of an unethical and sometimes illegal decision. Although we exercise free will on a continuous basis, we are governed by the decisions we make and my belief is that the decisions we make daily do not just affect us. These decisions affect other people, such as family, friends, coworkers, instructors, neighbors, etc. The most prominent example of ethics can be recognized in the field of technology based on the growing amount of rapidly changing legislation and acts that under consideration in order to protect people from unethical practices.
One of the most recent examples of ethics and technology conflicts in the United States are privacy issues and how we cite, distribute and publish intellectual property on the internet. For instance, many corporations and people take advantage of the open access of the internet and the lack of legislation governing the right to post and upload information to the internet. Today, nearly every household in the United States has a computer with int...
... middle of paper ...
...t for illegally profit, the consequences will be unfavorable; therefore, a decision has to be made in order to protect the rights of the original owner and the responsible party must be held responsible for any infractions.
What are the disadvantages of not having the laws in places?
The lack of legislation after a number of major incidents including government security breaches would prove to be devastating. A state of mass chaos and uncertainty would uproot all across the globe and there would not be any need for lawyers, GBI’s, FBI’s, jails, prisons, nor courthouses. Without laws in place, everything we face today would get increasingly worse and lead to a number of violent retaliations. The death toll would increase to astronomical proportions and the glaring need for control and monitoring would become more and more evident as each incident unfolds.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- 1. a) Legal and Ethical In general, Legal behavior are rules that mandate or prohibit certain behavior in society; drawn from ethics. In other words we can say that it is associated with all equipment, processes, procedures, practices, languages, cultures, and other relative concepts in the system of the law. Ethical means moral principal. Ethics are the moral standards you rely on when you make a decision. Some key moral principles that include integrity, moral obligation, individual and corporate responsibility, loyalty, Obeying the law, Keeping Your Promises etc.... [tags: Ethics, Morality, Information security, Privacy]
752 words (2.1 pages)
- Introduction Common criterial for information technology security evaluation, which is called Common Criteria (CC) is an international standard for computer information security which explicitly specify the security needs of computer users. These standards govern different factors related to computer security like the process of information security specification, implementation and evaluation. These criterion act as a guide for all information security experts therefore they should turn to it when they have to make a decision about setting up an IT security system (Denning, 1999), it could be the hardware or the software parts.... [tags: Information security, Computer security, Security]
1446 words (4.1 pages)
- Introduction: Business today retains a variety of problems, a major one of these problems are breaches in information and consequently society has come up with Information security to help secure peoples privacy. In order to understand why we have information security, one has to first apprehend the value of information. Typical information stored by different businesses and individuals will consist of an assortment of hypersensitive information that revolves around their employees, financial status, earnings, plans for the future, personal information etc.... [tags: Information Security]
1469 words (4.2 pages)
- As relates to the Issue of Information Security programs, the Department of Health and Human Sciences has formulated various different policies aimed at governing information handling and security as concerns all the departments’ resources. Common in the list of policies are the Policy on Information and Technology security for Remote Access which was established to ensure the information and technology departments resources are appropriately protected during the authorization of remote accessibility to the automated information and system of the department of human and health services.... [tags: Information security, Security, Confidentiality]
1094 words (3.1 pages)
Cyber Security, Protecting Client 's Private Data And Information Through The Controversial Apple And Fbi
- Overview Millions of people all around the world are using Smartphones, like iPhones, which turns out to be crucial part of our lives. We are using them not only for calling but we also store unbelievably huge amount of personal information. We have there all our contacts, calls and messages and all our pictures that we save and keep in the phones. A t here’s also a calendar on the phone, with all the information about where we have been and where we are planning to go. All this information is private and sensitive and this has to be protected carefully from criminals and hackers.... [tags: Ethics, Morality, Terrorism, Immanuel Kant]
1447 words (4.1 pages)
- ... Disconnect your computer from the Internet when you are not using it. Carefully consider your security settings. Examine all system settings, particularly the security settings, and select options that decrease your risk of data loss or intrusion. Back up your data. Protect your backups. When you make your data backups, make sure they are kept in a safe, secure location. It does no good to secure your PC and leave the backups where anyone might find them. Don’t store sensitive information in portable device without strong encryption Don’t leave your computer / sensitive documents unlocked Don’t discuss anything sensitive in public place.... [tags: practices, society, authorization, think]
809 words (2.3 pages)
- Article 1 Information Technology Ethics IT Professional is a publication (Keith W. Miller 2009), it is such like book publication, it also has copyright problem, plagiarism problem, and many problems like book publication, so, to be the Professionals, they must act like the book authors to solve these problems. In aspects of IT, the side of ethical problems are including advice on how professionals can recognize, analyze, and make judgments on challenging questions about right, wrong, and computing.... [tags: IT Ethics]
733 words (2.1 pages)
- Introduction This paper will present to the Northcentral University Information Technology Supervisor research in the form of a report that will assist with determining the controls required to implement to ensure that data are secure for the university. This paper will summarize the security breaches of the Target Store Corporation over the previous year and make recommendations in the form of information technology security best practices to strengthen the University’s infrastructure. Summarize Major Security Breaches The Target Corporation was exploited in December 2013 and then again in 2015.... [tags: Computer security, Information security]
801 words (2.3 pages)
- Ethics in Information Technology Technology Department Technology is in many ways very beneficial to our society, but in what ways can and/or will this fast growing business be unethical. This article explains the power and information that an IT personnel has in the business world. Most people think of the IT person as someone who comes to fix their computer when they can't figure out their e-mail. But what does an IT person have access to. Every business is different and has different responsibilities required for the IT personnel.... [tags: Technology Ethics]
800 words (2.3 pages)
- Security, Software, and Ethics Introduction Every day, we use computer software to perform everyday tasks. These can range from sending e-mail, balancing your checkbook, web browsing, shopping and much more. Most people don't stop to think about the security of the software that we use on a daily basis. Users are more concerned about getting their work done, and security is little more than an afterthought. Security is a very important and often overlooked aspect of software development. Security is used to authenticate users, manage access to resources, and to ensure that data hasn't been compromised.... [tags: Software Computers Ethics Morals Essays]
4406 words (12.6 pages)