Preview

Legal, Ethical and Operational Issues Essay Example

Powerful Essays
Open Document
Open Document
3892 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Legal, Ethical and Operational Issues Essay Example
P5 Explain the legal and ethical issues in relation to the use of business information

Definition: Ethics concern an individual's moral judgments about right and wrong.
Explanation: Business information belongs to the business owner and any kind of use of the business related information should be used as per the company policy. There are legal consequences in breaking the rules (code of conduct & code of practice).
Staff member needs to use his/her ethical judgement to decide what is right or wrong.
Scenario – Update of Staff Handbook on ethical and legal issues in relation to the use of business information.
Illegal, inappropriate or unacceptable use of school equipment or communication systems may result in disciplinary action and in serious cases could lead to an employee's dismissal. This list is not exhaustive and includes;

● creating, sending or forwarding any message that would reasonably be considered inappropriate or unacceptable. (E.g. anything non related to school)
● Committing or implying commitment to any contractual arrangements
● Accessing, publication or circulation of illegal, offensive, unacceptable, inappropriate or non-work related material
● Any illegal activities
● posting confidential information about the school and/or other employees, children or parents
● gambling or gaming
● unauthorised use of school facilities (or employee's personal IT equipment), for personal use during employee's working time

Employees receiving inappropriate communication or material or who are unsure about whether something he/she proposes to do might breach this policy should seek advice from their Head teacher.
The school has the right to monitor e-mails, phone-calls, internet activity or document production, principally in order to avoid offensive or nuisance material and to protect systems from viruses, but also to ensure proper and effective use of systems. Communication systems may be accessed when the school suspects that the

You May Also Find These Documents Helpful

  • Good Essays

    All companies store a lot of information, but if you store the wrong information that isn’t up to date or is not correct there is no use of it. So when storing information you should be cautious that it is proof read. You keep…

    • 777 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Bristol School Case Study

    • 1068 Words
    • 5 Pages

    As stated in Tinker v. Des Moines, “...[i]t could not be justified by a showing that the students’ activities would materially and substantially disrupt the work and discipline of the school”(Tinker v. Des Moines School District). This case justifies how important it is that the court repeatedly emphasizes the need to guarantee the absolute authority of the States and of the school officials, persistent with fundamental constitutional safeguards, to determine and control the conduct in the schools. Additionally, as expressed in the Bristol Student Handbook, “Access to the School District’s Technology is provided as a privilege and as an educational tool. In order to continue enjoying access to the Technology, each student must take responsibility for appropriate and lawful use of this privilege. Students are responsible for their behavior with the Technology just as they are in a classroom, school hallway or other School District property” (Upper Arlington Schools Students’ Handbook…

    • 1068 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The company’s computer network, including its connection to the Internet, is to be used for business-related purposes. Any unauthorized use of the Internet is strictly prohibited. Unauthorized use includes, but is not limited to, connecting, posting, or downloading pornographic material; engaging in computer “hacking” and other related…

    • 696 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Tda 2.8 1.1

    • 1256 Words
    • 6 Pages

    • they have read, understood and signed the school Staff Acceptable Use Policy / Agreement…

    • 1256 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Computer Misuse Act 1990 it is a law that does not allow certain activities when using computers, this include: hacking into other people's systems, misusing software or helping a person to gain access to protected files on someone's else's computer.…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    TDA 2.5 5.1

    • 325 Words
    • 2 Pages

    Marianne could have checked her employment contract, the school intranet site,or personnel manual for the policy, she should then have contacted the school in writing setting out the details of the grievance and ask for a copy of the policy, but this initial letter would generate the grievance procedures to start.…

    • 325 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server. The security officer at Richman has asked you to research and to define “the acceptable use of Richman assets regarding Internet and e-mail access,” including the actions that are prohibited. The employees must be restricted from using the Internet at work for personal use, other than to occasionally check Web-based personal e-mail accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall Richman security policy.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    IT policies and procedures in any organization provides a framework for appropriate and inappropriate use of computing and information resources (Winniford, et al, 2012). More specifically, the organization would have in writing that using a computer system without proper authorization granted through Briargrove’s Administration would have adverse actions on their…

    • 1283 Words
    • 6 Pages
    Better Essays
  • Good Essays

    As many schools are using technology to help encourage their students to learn within their modern century of electronics by providing computers and devices, there are some schools who allows their students to bring their own device/technology to be able to utilize the information provided in the school as well as in their household. As there is an Acceptable Use Policy (AUP) in placed that standards are similar to each other school district within the United States, it is important for the student and parent to understand what is not tolerated when having access to bring their own device/technology to school.…

    • 332 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Within a school setting, all information which concerns pupils must be treated confidentially, as stated in the Data Protection Act 1998 any information must be stored as stated in the act. All staff who work in a school need to be aware that they may see and hear things which are confidential. In the position of trust as a teaching assistant, all members of staff within the school must abide to the guidelines.…

    • 810 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Our school has an ICT policy that gives guidelines for all when working with ICT in the classroom or ICT suite. All adults in the school have to sign a form to say that when using ICT equipment in school we will not access any inappropriate content and will only use the resources in school for educational purposes. All ICT problems should be reported to the relevant ICT team and if we cannot resolve it ourselves then we have an additional specialist who comes in once a week to look at issues that we cannot resolve in house.…

    • 3165 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Abstract An information technology Acceptable Use Policy (AUP) creates an understanding of what is acceptable and not acceptable between users of a system and the system owner. The AUP provides the details of criteria to establish the same rules for everyone. The AUP also serves as documentation, which the user signs, to justify that the user know the rules that they are to follow and the consequences in not following the rules.…

    • 2122 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Everyday individuals are faced with issues associated with ethical dilemmas. Ethical dilemmas involve an individual’s behavior toward a moral standard, which may have been established from previous generations and passed along. In upholding the standards taught individual may be forced to take a particular action involving a decision when a behavior is considered non-ethical is when an ethical dilemma occurs. It can become difficult at times in making the correct decisions or solutions to the situation, which is why a code of ethics is established in the workplace. The code of ethics in the workplace was established to assist with the process of a company analyzing the behavioral practices within the company procedures. Code of ethics in the workplace is used in defining, requiring, encouraging, and engaging employees in the direction of the correct behavior. The purpose is to correct the unethical behavior and avoid serious consequences such as lawsuits.…

    • 1314 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Lua Paper

    • 2331 Words
    • 14 Pages

    Complete any outstanding work for this subject using non-college computers should their access to the network be revoked for any reason by any teacher in any subject/location.…

    • 2331 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Request Letter

    • 269 Words
    • 2 Pages

    Action taken by the school regarding the report of a parent to the Central Office such as:…

    • 269 Words
    • 2 Pages
    Satisfactory Essays