Textbook Notes (363,473)
Canada (158,372)
York University (12,359)
ADMS 2511 (123)
all (6)
Chapter 3

Chapter 3.docx

3 Pages
Unlock Document

York University
Administrative Studies
ADMS 2511

Chapter 3  Ethical problems are arising about the appropriate use of customer information, personal privacy, and the protection of intellectual property - Privacy issues: involve collecting, storing, and disseminating information about individuals - Accuracy issues: authenticity, integrity, and accuracy of information - Property issues: the ownership and value of information - Accessibility issues: revolve around who should have access to information or pay for it  Two rules show why it is difficult in some cases to determine and enforce privacy regulations - The right of privacy is not absolute. Privacy must be balanced against the need of society - The Public’s right to know supersedes 接替 the individual’s right to privacy  Electronic surveillance - Monitored by Employers, the government, and other institutions - Organization also use software to block connection to inappropriate websites, a practice called URL filtering - discouraging employee wasting time  Privacy Codes and Policies are an organization’s guidelines for protecting the privacy of customers, clients, and employees.  The Opt-Out model of informed consent permit the company to collects personal information until the customer specifically request that the data not be collected  The Opt-In model of informed consent, in which a business prohibited from collecting any personal information unless the customer specific authorize it  The Platform for Privacy Preferences (P3P)  Personal Information Protection and Electronic Documents Act (PIPEDA) Jan 1, 2004  Privacy Policy Guidelines: - Data Collection - Data Accuracy - Data Confidentiality  Threat to Information Security - Complex, interconnected, interdependent, wirelessly networked business environment - Government legislation, dictates that many types of information must be protected by law - Modern computers and storage devices continue to become smaller, faster, cheaper, and more portable, with greater storage capacity - Computer skills necessary to be a hacker are decreasing - International organized crime is taking over cyber-crime 网络犯罪 - Downstream liability, which occurs in the following manner - Increased employee use of unmanaged devices, which are devices outside the control of an organization’s IT depa
More Less

Related notes for ADMS 2511

Log In


Don't have an account?

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.