Legal and Ethical Issues in IT

Legal and Ethical Issues in IT

Unit 6 [ IT590: Legal and Ethical Issues in IT ] Unit 6 Assignment : Evaluating Ethics Review the process for evaluating ethics scenarios in Baase on pages 411 – 412 and carefully re ad the analysis of the following scenarios in the book . The n perform an analysis on one of the following:

1. You are the IT administrator for your company. One of the employees discovers a loophole in the security whereby the employees may access the personne l records of other employees in the company. Personnel records include names, addresses, social security numbers, disciplinary actions, annual reviews, and salary information. You are working on a time sensitive project and do not fix the problem for two w eeks. As you are fixing the problem, you note that several employees have accessed personnel records using the loophole.

2. You are a programmer for a popular social media provider. The terms of service for this provider states that data posted on the network ing site may be used for “testing, research, and/or data analysis….” The company has requested that you develop an algorithm that allows the company to filter posts to a person’s page based upon the mood that is conveyed. For instance, a person’s feed can be programmed to show only positive posts, or only negative posts. This algorithm will then be used for a study being conducted by a local university without acquiring additional consent from the social media users other than the “terms of service” they ag ree to upon signing up for the service.

3. You are the CIO of a large national auto retailer. As a part of your service, you offer auto loans through your dealerships. This requires your company to collect and store personally identifiable information on your customers. Additionally, you store customer bank account and credit card information so that customers can use automatic payment options for their loans. Recently, your company has been hacked and a significant number of client accounts have been breached . The CEO is demanding that the IT group handle this privately rather than reporting the breach for fear that publicizing the information will have a negative effect on quarterly earnings.

Your case study analysis should be a minimum of 1500 words, written in an appropriate format. References and in – text citations should be in APA format.

"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.


Discount Code: CIPD30



Click ORDER NOW..

order custom paper