Preview

A Case Study: Ivory Homes

Good Essays
Open Document
Open Document
553 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
A Case Study: Ivory Homes
I intern for Ivory Homes in their IT department, and we are faced with ethical decisions constantly. On a regular basis I am asking for passwords and administrative permissions. As part of the IT team I have access to files, computers, and our networks. At Ivory Homes we do not have an official ethics code of conduct for the IT department. I am however, in the process of drafting an official code of conduct that that will guide the actions of the IT department. This will instruct IT employees on what they do with sensitive information they receive, such as passwords and documents.
IT administrators and employees are held to a very high standard and it is absolutely critical they stand up for what is right and ethical. IT employees are constantly exposed to sensitive data and information. One important standard or good practice IT professionals should follow and abide by is; “Least Privilege” and “Need to Know.” “Least Privilege” is defines as; IT employees should be granted the minimum amount of access
…show more content…
Having employees tell us their password is not illegal, but it is something that both my boss and I are passionate about, and we want to limit the times we receive employee password information. The ideal situation we want to instigate is that employees would never have to give us access to their passwords, we should have them enter their credentials for us once, and then we access their computer and programs. This goes along with the practice of “Least Privilege” we should only have employees give us their passwords and credentials when it is absolutely necessary. My supervisor and I have discussed ways around this because neither of us feel good about getting passwords and credentials from employees on a regular basis, but it is difficult because that is the unwritten standard at my company, and has been for

You May Also Find These Documents Helpful

  • Good Essays

    This code of ethics does not provide a model for ethical decision making, but does mention it in the guidelines. It states to “Refuse to participate in or conceal unethical practices or procedures and report such practices.” Under this heading, it includes that all health information management professionals should act professional and ethical at all times, while being knowledgeable about policies and taking adequate measures to discourage unethical co-workers. While it does not provide a guideline for ethical decision making, it does include what is considered unethical, such as participating in, condoning, or being associated with dishonesty, fraud, abuse or deception, with a list of…

    • 703 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    As with any other system, all data needs to be kept secure. Employee confidentiality is of paramount importance, particularly in a system that hold and utilizes potentially sensitive personal employee information. Moreover, seemingly innocuous information such as standards and procedures within the company also need to be kept secure. Any secure, sensitive, or proprietary information should be encrypted and password…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    information might be granted. In order for security policies to be effective, they must be…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    Imagine University of Phoenix’s IT department has hired you. Your first task is to make sure the department is following the most important information security practices.…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Nt2580 Final Project

    • 1848 Words
    • 6 Pages

    Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. |…

    • 1848 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Bus/660 Week 1

    • 434 Words
    • 2 Pages

    As a supervisor I must insure that my workers are aware of and follow all guidelines concerning information that they obtain. There was an incident years ago where one worker overheard another worker discussing a male client’s medical information. The worker who overheard the information warned her niece to seek medical tests without revealing where she had heard the information. Using information she had obtained at work she broke an ethical rule, and the repercussion was termination of her employment. Information which used incorrectly or improperly can create major problems, such as ruining a person’s characters, misleading clients, incorrect accounts, loss of business income, and legal ramifications. In order for a manager to be a responsible end-user they should stay up-to-date on all confidentiality policy and assure that their workers are trained and experienced on the confidentiality of…

    • 434 Words
    • 2 Pages
    Good Essays
  • Good Essays

    According to Trevino and Nelson (2007), “Managers care about ethics in part because they face the thorny problem of how to prevent and manage unethical behavior in their ranks.” Unethical behaviors, such as posting information about the safety of the company on a personal blog and ultimately hacking into someone else’s personal computer and…

    • 741 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Est1 Task 1

    • 1477 Words
    • 6 Pages

    Encourage other employees to embrace code of ethics and report any knowledge of others not adhering to code of ethics. ( Any information provided to management will remain confidential , retaliation toward informant is prohibited)…

    • 1477 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    w2 bis221 memo

    • 486 Words
    • 3 Pages

    Ethics refers to what is morally good or bad, the division of right and wrong. The increase in ethical issues rises as information technology advances. What is unethical is not necessarily illegal. Therefore, congress is forced to set guidelines protecting consumer’s privacy, accuracy of information, the ownership and value of such information and who has access to it. The Electronic Funds Transfer Act of 1978 and the Health Information Portability and Protection Act of 2006 are just two examples of these types of acts.…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Data protection: employees must know their personal data cannot be divulged to a third party and it has to be relevant and not exaggerated.…

    • 2459 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Identify barriers to communication Demonstrate how to reduce barriers to communication in different ways Demonstrate ways to check that communication has been understood Identify sources of information and support or services to enable more effective communication…

    • 452 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    As the work progress grows the need for slave also grows and increases the need for slaves. There has been many slaves imported from west africa to work on the plantations. This kind of importation is very known as the “Black Ivory”. The slave owners are in need of more slaves to work there plantation. About ¼ of white's own slaves or belong to slave-owning families.…

    • 242 Words
    • 1 Page
    Satisfactory Essays