Nanette E. Armstrong
Capella University
TS5536 Ethical and Legal Considerations in Information Technology
17 March 2012
Ethical and Legal Dilemma in IT Based on the definition of cyberethics as given by Tavani, “the study of moral, legal, and social issues involving cybertechnology” (2010, pg. 3), law is usually/always a part of cyberethics to one degree or another. Being right or wrong based on society’s value builds the fundamentals of ethics. Moral principles make up ethics. Values are maintained based on the law, which in turn encourages us to uphold the laws based on those principles. There are at times when something may be unethical but may still uphold the law and the values are not being taken into account. Values impact the way in which we live and conduct ourselves. Values impact corporate culture indirectly. “If something is illegal and determined to be so, it will probably not be done but if it is unethical but legal, values will only impact the corporate culture enough to keep it away from breaking certain laws” (Ricci, 2008, Para. 3). When one breaks a law, usually set by a governing body, there is a punishment of sort, but when one does something unethically it is not always followed by legal implications. Depending on the unethical act that has been committed is where law would come into play. “Violations of the Law is reinforced by the police and carried out through the court system” (Battle, 2010, Para. 2). When laws are broken there is usually a fine set to pay for the act, however when a person is unethical or violates an ethical code the law is not always involved, therefore, there may or may not be any consequences to the violation. We live in an information technology world. How we act effects our everyday living ethically and morally. Our children, as well as a good portion of the parents in today’s society, attend school or deal with a school in some way, as a parent of a student
References: Alchian, A. A. (2008). Property rights. Retrieved from http://www.econlib.org/library/Enc/PropertyRights.html Ballard, S Battle, M. (2010, May 15). Ethics and the law. Retrieved from http://www.brainmass.com/student/library/solution.php?sgr_id=2720480 Brauer-Rieke, A Dempsey, J. X. (2010, September 22). The electronic communications privacy act: Promoting security and protecting privacy in the digital age. Retrieved from https://www.cdt.org/files/pdfs/20100922_jxd_testimony_ecpa.pdf Frameworks Institute of Education Sciences (IES). (2008, December). Family educational rights and privacy act (ferpa) final rule 34 cfr part 99. Retrieved from http://www2.ed.gov/policy/gen/guid/fpco/pdf/ht12-17-08-att.pdf Madison, J National Institute of Standards and Technology (NIST). (2008, March 4). 'federal information security management act of 2002 '. Retrieved from http://csrc.nist.gov/drivers/documents/FISMA-final.pdf National Institute of Standards and Technology (NIST) Ricci, M. (2008, July 21). Values, ethics and law. Retrieved from http://www.brainmass.com/student/library/solution.php?goal=1&sgr_id=2720481 Richardson, E U.S. Department of Education. (2005 , February 17). Protection of pupil rights amendment (ppra). Retrieved from http://www2.ed.gov/policy/gen/guid/fpco/ppra/index.html U.S United House of Representatives. (2001, June 12). Fighting cyber crime. Retrieved from http://commdocs.house.gov/committees/judiciary/hju72616.000/hju72616_1.HTM