Chapter 4 Flashcards
What are the six Epolicies?
- Ethical Computer Use Policy
- Information Privacy Policy
- Acceptable Use Policy
- Email Privacy Policy
- Social Media Policy
- Workplace Monitoring Policy
What is information ethics?
govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies).
What is the ethical computer use policy?
- It contains general principles to guide computer use behavior.
- It ensures all users are informed of the rules and, by agreeing to use the system on that basis, consent to abide by the rules
What is the information privacy policy?
- It contains general principles regarding information privacy.
- The unethical use of information typically occurs “unintentionally” when it is used for new purposes.
What is the acceptable use policy?
It requires a user to agree to follow it to be provided access to corporate email, information systems, and the internet.
What is nonrepudiation?
A contractual stipulation to ensure that Ebusiness participants do not deny their online actions.
What is the email privacy policy?
Details the extent to which email messages may be read by others.
What is spam?
Unsolicited email
What is the anti-spam policy?
Simply states that email users will not send unsolicited emails (or spam)
What is the social media policy?
Outlines the corporate guidelines or principles governing employee online communications.
What is information technology monitoring?
Tracks people’s activities such measures as number of keystrokes, error rate, and number of transactions processed.
What is the employee monitoring policy?
Explicitly state how, when, and where the company monitors its employees.
What is the first line of defense?
People:
Information security policies: identify the rules required to maintain information security
Information security plan: details how an organization will implement the information security policies
What is the second line of defense?
Technology
What is phishing?
A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent email.