Developing Organizational Guidelines for Ethics and IT

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

Summary

Ajax Digital Information (ADI) is a novel business entity in the consulting field, and it faces various market and organizational challenges daily. Recently, its IT management tracked down employees abuse of computing privileges. An internal investigation revealed that a significant portion of these unethical and potentially malicious activities are related to the companys file storage server and access routes to it, namely the intranet and Internet Information Server. ADI management considers this their mistake as they did not timely develop, establish and provide employees with at least a basic set of organizational guidelines related to the operation of IT and professional ethics. This paper presents a collection of professional, ethical standards to provide high standards of practice and ethical behavior in both physical and digital workplaces and define acceptable and unacceptable behaviors for our workers (Reynolds, 2019, p. 57). Areas covered include computer use, intranet, email services, malware, licensed and free software, and workplace digital privacy.

Computer and Intranet/Companys Network Usage

Since the major problem is unidentified employees abuse of computing privileges, it is necessary to provide fundamental guidelines about the safe use of desktop and mobile computers.

Acceptable Practices

All workers and managers are advised to develop a complex access password for all their workplace devices that includes a variety of alphabetic, numeric, and graphic characters to prevent computer hacking and abuse.

Employees should report to the system administrator and security managers about their colleagues atypical and odd activity on the intranet.

Prohibited Practices

Leaving the workplace devices enabled is unsafe for ADIs private and organizational data.

ADI workers should not write down passwords from their computers, laptops, and mobile devices used for work or containing organizational information on paper or other tangible objects.

Online Content, Proper Email Usage, and Malware

It is possible that unethical use of the companys digital elements was committed by ADI accounts hacked through phishing or other cybercriminal tricks involving employees emails.

Acceptable Practices

The strong password rule for computers also applies to ADI employees work email.

If an ADI employee has a hunch or is sure that the operating system of their workplace computer has or is damaged by a virus, they should contact the IT department.

Prohibited Practices

ADI employees should avoid clicking on online links that a firewall or browser the IT department provides identifies as malicious.

One should not click on links given in email messages from unknown and unverified online users and those not connected to the organization or respond to these from computing devices containing the companys information.

ADI workers are also strongly discouraged from connecting personal portable storage devices to company computers to avoid malware infiltrating its intranet and other networks.

Licensed Software, Shareware, and Software Piracy

The abuse of the intranet and data from company files could also be caused by ADI employees incorrect use of the software.

Acceptable Practices

ADIs management and work team should only use licensed software and shareware approved by its IT department.

Any non-standard or abnormal functioning of the approved licensed and free software integrated into the ADI network must be reported to its IT department.

Prohibited Practices

ADI employees are highly discouraged from installing any software on the hardware used within the company.

ADI workers should avoid using pirated software for work-related and personal computing devices as it contains malware and data leaking programs.

Employees Privacy, Workplace Monitoring, and Professional Responsibilities

Well-identified ethical rules preclude further unintentional and deliberate abuse of ADIs software and networks.

Acceptable Practices

ADI employers should do workplace monitoring for safety reasons, not productivity ones.

Those professionals dealing with ethical dilemmas in IT should prioritize the privacy and safety of the individual.

Prohibited Practices

Any activity aimed at involuntary collecting personal data, such as shoulder surfing, should be considered ethically and professionally wrong.

Reference

Reynolds, G. W. (2019). Ethics in information technology (6th ed.). Cengage.

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now