Wednesday, May 6, 2020

Ethical Issues for IT Security Personnel - MyAssignmenthelp.com

Question: Discuss about theEthical Issues for IT Security Personnelfor Data and Information. Answer: Introduction Most of the IT professionals are facing the ethical issues involve with privacy. The issues rise when one person read the private email of the network users. Key loggers are placed on the machine to capture everything that is displayed into the computer or laptop screen. In this way, the data and information from one computer is stolen and it is shared with others. Identification of the Ethical Issues The two ethical issues are privacy and manipulation of the data. Privacy is an ethical issue where the data and information of one person is being stolen and unauthorized use by other. All people should have equal need for privacy [5]. Each of the individuals should keep their own data private and password protected. When an employee get access to other employees emails, then reading someone emails could embarrass that person or even the unauthorized person may be fired from its job [9]. The other ethical issues are manipulation of the data to get higher fees. Technologies and settings are configured to make the network of the client more secured. It occurs when one fails to escalate the issues into the system [6]. It becomes an ethical issue when one does not inform the company about testing failure that subject to data manipulation. Data manipulation is also done when the speed of network is slow. Then it becomes difficult to handle and control the data. Analyzing the Ethical Issues The employees can or cannot read the private email of the network users when messages are sent at the work. It is dependent on the situation [4]. The files are included emails which are automatically saved to the browser of the cache. A company may have the right to monitor everything that an employee does with the computer equipments. A network administrator has the right to access the data on the system on the network. The administrator can able to access encrypted data if they have access to the recovery agent account. When one employee reads email, then there is required to disclose the policy to them [2]. There should be a policy manual of the company that discloses what an employee can do and what cannot. Most of the employees relay on the emails to communicate with each other. Only an authorized person can access the data and information in the emails. A strict company policy can lessen the loss of important data. Monitoring of employee emails are part of their job. In the workplace, it is required to block the pornography sites so that it creates a hostile working environment. In this case, the network administrator can access the employees computer during working hours to access those unauthorized sites [7]. Therefore, they can investigate if any of the employees are doing such work and they can take strict actions against the employee. Placement of key loggers on the machines such as computer and laptop is not a good thing as it can capture everything the user types in their machine [4]. As the employees machine contain some personal and important information, therefore no one has the right to access it in such a way [1]. Screen capture program is not to be used and if it is used in anyones machine, then the user should be informed about it. Monitoring and accessing of anyones data without permission is a legal issue and the unauthorized person should be punished because of it. Evaluation of the Issues and Justification When an employee complains that other employee access to their data and information from the computer, then it is termed as invasion of privacy. It refers to a situation when an employee feels that an employer violated their rights to privacy by disclosing the information gained from the source [8]. An employee has no right to read the private email of the system clients when messages are sent at the work. The outcome of this case is dependent on the state where it occurs. It is different from state to state depends on the applicable invasion of the privacy laws [3]. Situation of key loggers on the machines, for example, PC and portable devices are not something to be a good thing for as it can catch everything the client sorts in their machine. As the machine of the employee contains some individual and imperative data, along these lines nobody has the privilege to get to it in such a way. The program such as screen capture is not to be utilized and on the off chance that it is utilized as a part of anybody ought to machine, then the client to be informed about it. Checking and getting to of anybody's information without consent is a lawful issue and the unapproved individual ought to be rebuffed as a result of it [9]. When an employee provide with a written policy advising that the email messages are monitored, only then an employee has right to monitor, read as well as review the email messages. Therefore, without the permission of the employee, his or her data will not be read and reviewed. It is possible that an employee has access to machines and internet as a part of job. The misuse of internet at the workplace is a big issue in terms of employee discipline [2]. The network administrator can access to the machine, can monitor the website that an employee visit and review the amount of time that spend at that particular sites [6]. If any unethical activities are o bserved then strict actions should be taken. Conclusion It is concluded that when one representative peruses email, then there is required to uncover the strategy to them. There ought to be an arrangement manual of the organization that uncovers what an employee can do and what cannot. The vast majority of the employees transfer on the messages to speak with each other. Therefore, an employee can take strict action against the employer those has read his or her email messages or any private information. References [1]E. Park, "Ethical Issues in Cyborg Technology: Diversity and Inclusion",NanoEthics, vol. 8, no. 3, pp. 303-306, 2014. [2]A. Jha and I. Bose, "A Framework for Addressing Data Privacy Issues in E-Governance Projects",Journal of Information Privacy and Security, vol. 9, no. 3, pp. 18-33, 2013. [3]I. Topalli, "The Right to Privacy of Personal Information and Private Life (Privacy): The Issues Nowadays",Mediterranean Journal of Social Sciences, 2013. [4]K. Kant Hiran, R. Doshi and R. Rathi, "Security Privacy issues of Cloud Grid Computing Networks",International Journal on Computational Science Applications, vol. 4, no. 1, pp. 83-91, 2014. [5]Cho Gi Young, "Direction of Reforms in Electronic Communications Privacy Law with regards to latest major issues",Journal of Criminal Law, vol. 26, no. 4, pp. 105-138, 2014. [6]K. Durkesh and M. Thresphine, "Security Issues and Privacy in Cloud Computing",IOSR Journal of Computer Engineering, vol. 16, no. 4, pp. 39-56, 2014. [7]D. Herrmann, "Privacy issues in the Domain Name System and techniques for self-defense",it - Information Technology, vol. 57, no. 6, 2015. [8]A. Shrivastava, "Cyber Security: Issues and Privacy",Communications on Applied Electronics, vol. 3, no. 4, pp. 12-16, 2015. [9]"Ethical issues for IT security professionals", Computerworld, 2017. [Online]. Available: https://www.computerworld.com/article/2557944/security0/ethical-issues-for-it-security-pr. [Accessed: 11- May- 2017].

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.