Preview

Information Technology Ten Point Code of Ethics

Good Essays
Open Document
Open Document
1251 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Technology Ten Point Code of Ethics
Ten Point Code of Ethics for Information Technology Professionals By James Malveaux, Jr.

1. Has IT professionals use every precaution to prevent given out any access to passwords, personnel identifications or other sensitive information to can be used in the database systems. The importance of this is to keep sensitive information for getting out to the world. There is a lot of hacker software that can penetrate a company’s network and get into the database that contains sensitive material. The one thing to prevent any of this from happening is to get a good network security system that can pretty much block off any intrusion to the firewall. But it is everyone’s job to prevent their passwords from getting out. Don’t write down your password anywhere that can be visible for anyone to see. Plus when you come up with a password make sure it something that it is not easy to crack. There are many network systems that require you to use certain number of characters to prevent passwords from being compromised. These are just some of the ways that you can prevent unauthorized access to passwords and the benefits of having a secure network system.
2. Has IT professionals we are responsible for the use of computer equipment in inventory. This is very important because every company trusts us to not tamper or steal any computer equipment. The best way to keep an accurate count of equipment is by making up an excel spreadsheet that will contain serial numbers, model numbers etc. All computers should have bar codes so that you can scan the item and add it to the database automatically. Whenever an IT equipment is lost or stolen you can look at your database to determine which equipment it is. Plus if you keep spare equipment in a locked room make sure there is a log to where

You May Also Find These Documents Helpful

  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    As with any other system, all data needs to be kept secure. Employee confidentiality is of paramount importance, particularly in a system that hold and utilizes potentially sensitive personal employee information. Moreover, seemingly innocuous information such as standards and procedures within the company also need to be kept secure. Any secure, sensitive, or proprietary information should be encrypted and password…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BA L2 Unit 14

    • 449 Words
    • 2 Pages

    1.4 Confidential business information should be properly secured. If it isn't, data can potentially be misused. For instance, making sure the files you are using have a password put in place to…

    • 449 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Passwords – for example sharing passwords, insecure passwords, storing username and passwords in public web browsers. This makes your security level low giving easy access to hacker and viruses.…

    • 914 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Task B 307

    • 338 Words
    • 1 Page

    To ensure security you would have you computer network encrypted, and multiple passwords for computers you should never use the same password they should always be different, when using filing cupboards you would should have locks on them and different locks with different keys for each cupboard..…

    • 338 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Unit 4 P6

    • 757 Words
    • 4 Pages

    Companies increase security by providing log in and password verification system for each of their employees that need to access their data.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Better Essays

    My sister owns a small clothing store. During a conversation at a family dinner, she mentioned her frustration with having to manually track and reorder high demand items. She would like an automated system but has a very small budget. To accomplish I propose an inventory management technology. Inventory management technology is a mix of hardware and software designed to add reliability to inventory accounting, reduce incidents of theft and facilitate inventory audits. Individual inventory items or batches of items could be equipped with RFID tags that identify the item type, cost, price, shipment number, date of shipment and virtually any other useful information. Software inventory management solutions replace pen-and-paper systems, reducing the time required to account for inventory additions and subtractions (2002-2006, Kenneth Hamlett). Due to the low availability of funds, I will buy only one laptop, wireless router, barcode scanner, barcode printer, printer and the internet service. For startup we will begin with the use of the inflow inventory system from Archon Systems. The software will help my sister to take orders and deduct out of the inventory with one click. This software will also generate reports one of which will show the demand for a given product. We will also setup the laptop with wireless internet access which will enable her to conduct sales and do inventory with the same equipment using a wireless barcode scanner. We will add or upgrade the system in future as soon she is financially capable.…

    • 1231 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Ljb Annual Report Sample

    • 1189 Words
    • 5 Pages

    Employees being hired should go through a background check and drug testing to verify that any issues have been addressed and resolved. While this will ensure a higher quality of individuals, an internal control to password protect each individual user will hold accountability for computing activities.…

    • 1189 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Companies like Google are straying away from the once popular Virtual Reality, in favor of what they are calling “Augmented Reality”, or AR. According to Merriam-Webster, AR is “an enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed through a device (as a smartphone camera); also: the technology used to create augmented reality.” (Merriam-Webster, n.d.) In order to “augment” our realities, these technologies are recording, storing, altering, and displaying information in real time. The information they use can be anything, but with products like Google Glass, wearable technology can now modify what and how we see objects, people, or data, in real time.…

    • 874 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A Case Study: Ivory Homes

    • 553 Words
    • 3 Pages

    IT administrators and employees are held to a very high standard and it is absolutely critical they stand up for what is right and ethical. IT employees are constantly exposed to sensitive data and information. One important standard or good practice IT professionals should follow and abide by is; “Least Privilege” and “Need to Know.” “Least Privilege” is defines as; IT employees should be granted the minimum amount of access…

    • 553 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Souryal, Sam S. (2007). Ethics in Criminal Justice: In search of the Truth (4th ed.). Cincinnati,…

    • 1753 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    * Computers, cell phones, chat rooms, instant messaging, blogs, wikis…. Daily there are multiple means and options to post information for the global community to see. It is the responsibility of the user to utilize these powerful tools to benefit this global community.…

    • 1105 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Managers know approximately how many cases of a particular product the store is supposed to receive when a delivery truck arrives, but the stores lack technology for scanning the cases or verifying the item count inside the cases. Merchandise losses from theft or other mishaps have been rising and now represent over 3 percent of total sales. What decisions have to be made before investing in an information system…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Computer Engineering Ethics

    • 4012 Words
    • 17 Pages

    At the end of this class the course participant should be able to:  Identify some contributors to social and professional issues and relate their achievements to the knowledge area  Contrast between ethical and legal issues  Contrast between a patent, a trademark, and a copyright  Identify some ways of credentialing a person to practice computer engineering  Describe issues that contrast risk issues with safety issues  Identify some issues in computer engineering that address privacy  Describe whistle blowing and the conflicts between ethics and practice that may result from doing so  Describe how computer engineering uses or benefits from social and professional issues. 2.2 Reasons for Studying Social and Professional Issues…

    • 4012 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    The new information technology possibilities can reflect on the jointed relationship between ethical, social and political. The three components as described in the required readings as the “ripple effect model” in other words when one level impacts the influences follow towards the rest of the levels. For example, the new information technology has yet to properly develop and function with the original laws and rules. Ethical issues refer to an individual's morals of right and wrong on how the dilemma was confronted. Following the ethical issues is the social issues basically how society's expectations and political issues the responsibility deciding whether…

    • 835 Words
    • 4 Pages
    Good Essays