Textbook Notes (363,452)
Canada (158,372)
ITM 100 (123)
Ron Babin (33)
Chapter 9

ITM100 Chapter 9 Information Ethics and Secruity.docx

7 Pages
Unlock Document

Ryerson University
Information Technology Management
ITM 100
Ron Babin

ITM100 Chapter 9 Notes Opening Case: Municipal Freedom of Information and Protection of Privacy Act (MFIPPA) Hamilton protecting citizens information myhamilton.ca portal that was a gateway to community resources, general information and government services that brings diverse community together. Problem: Entering wrong number/word lead to misused/ false info about citizen lead to hacking breaching the system Freedom of Information (FOI) Information Technology Services (ITS) Office of the Privacy Commissioner of Canada (OPC) ^All 3 worked together to make the breach public and to redesign the ultimately reinstate, new functionality with safeguards to prevent unauthorized access of personal information Privacy Impact Assessment (PIA) to identify any potential privacy risk before proceeding with a User Adoption View midterm Nov 12 and 19 Nov 11 and 14 What is privacy? What is not one of the ten guiding principals of PIPEDA Open access Which of the following six principles for ethical info management according to CIO magazine? CIO is responsible for outsiders view and analyze corporate information 9.1 Information Ethics and Information Privacy Privacy – right to be left alone when you want to be, to have control over your own personal possessions and not to be observed without your consent Confidentiality – which is the assurance that messages and information are available only to those who are authorized to view them FIPPA – Ontario law / Free of Information and Protection of Privacy Act (Ontario) Information Ethics – concerns the ethical and moral issues arising from the development and use of information technologies and systems, as well as the creation, collection, duplication, distribution and processing of information itself (with or w/o the aid of computer technologies and IS) ***ethical may not be legal and legal might not be ethical/ different laws in every country Ex of ethically questionable or unacceptable use of IS - Individuals copy, use and distribute software - Employees search organizational databases for sensitive corporate and personal information - Organizations collect, buy and use information w/o checking the validity or accuracy of the information - Individuals create and spread viruses that cause trouble for those using and maintaining information systems - Individuals hack into computer systems to steal proprietary information - Employees destroy or steal proprietary organization information such s schematics, sketches, customer list and reports Technology Related Ethical Issues and Concepts; Intellectual Property Intangible creative work that is embodied in physical form Copyright The legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents Fair dealing In certain situations it is legal to use copyrighted material Pirated software The unauthorized use, duplication, distribution or sale of copyrighted software Counterfeit software Software that is manufactured to look like the real thing and sold as much Reasons Privacy Issues reduce trust for E-Business 1. Loss of personal privacy 2. Internet users are “a lot” more inclined to purchase a product on a Web site that has a privacy policy 3. Effective privacy would convert more Internet users to Internet buyers Information has no ethics Information ethics in the workplace Systems that don’t respect human dignity Employee monitoring Effects  Employee absenteeism – taking care of personal business  Lower job satisfaction – quantity of work is more important than the quality  Psychological resistance Tracking People’s activities – Information technology monitoring – tracking people’s activities by such measures as number of keystrokes, error rate and number of transactions processed Common Monitoring Technologies - Key logger, or key trapper, software – records every mouseclick and keystroke - Hardware key logger – captures keystrokes on keyboard to motherboard - Cookie – information about customers and their web activities - Adware – download a program, ads come along - Spyware (sneakware or stealthware) – hidden/tracks every movement - Web log – info stored on web usually one log for per person - Clickstream – records info about customer during on web. Protecting Digital Content Fair Dealing – long standing feature of Canadian copyright law that permits certain uses of copyright material in ways that do not threaten the interests of copyright owners but which could significant social benefits Access Copyright Information Privacy – concerns the legal right or general expectation of individuals groups or institutions to determine for themselves when and to what extent information about them is communicated to others. *How personal info is collected and shared Europe: (Strong and advanced laws) - Right to know the source of persona data processing and the purposes of such processing - Right to access and or rectify inaccuracies in one’s own personal data - Right to disallow the use of person data United States: Children Online Privacy Protection Act (COPPA) Health Insurance Portability and Accountability Act (HIPAA) Canada: Personal Information Protection and Electronic Document Act (PIPEDA) – is a Federal act that applies to all organizations Personal information covered: Pensions, medical records, tax records, security clearances, student loan applications, military records Exceptions: Journalistic, artistic, or literary use 10 Guiding Principles of PIPEDA for Organizations 1. Accountability 2. Identifying purposes 3. Consent 4. Limiting Collection 5. Limiting Use, Disclosure and Retention 6. Accuracy 7. Safeguards 8. Openness 9. Individual Access 10. Challenging Compliance --- e-policies – are policies and procedures that address the ethical use of computers and Internet use in the business environme
More Less

Related notes for ITM 100

Log In


Don't have an account?

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.