Ethics and Privacy in Information
Autor: Brittney Ann Carter • January 27, 2017 • Essay • 398 Words (2 Pages) • 844 Views
Ethics and Privacy in Information
November 28, 2016
BIS 221
Patrick Deely
Ethics and Privacy in Information
Preventing current information security issues that exist in a company from occurring by all businesses who take pride in protecting their confidential data and the information is imperative. As the years go by, technology continues to progress in development forcing organizations to provide money, resources, and time to secure the company’s date and information. All businesses should choose to exercise ethical behavior while utilizing computer systems by investing in antivirus software and using other resources that are created to stop unauthorized access to data.
In this week's collaborative learning activity, our team discussed the steps and criteria needed to find the proper brand and model of software and hardware for a school with old software and hardware. In the learning activity, the team discussed the ways to ensure the security and privacy for the new computers. The last discussion topic was to explain why our choices could benefit the students and teachers of the school.
The following steps and criteria needed to select a software and hardware are:
- Create a list of needs and wants of software and hardware.
- Determine what the rationale for who, how, when and why the individuals would use the computers.
- What type of customer support comes with the software and hardware?
- Choose a brand and model with large base users.
- Pick a brand and model with solid track records.
- Create and stick to a budget.
- Will the brand and model of software and hardware improve the quality of work for the teachers and students after purchasing?
To ensure security and privacy for the new computers identify and prioritize employee and student confidential information. Do this by organizing names, social security numbers, addresses, phone numbers, and employee account information. By placing access controls with two primary functions, like authentication and authorization, in the computer systems, teachers and other school employees would be authorized and limited to certain information.
The team also determined why these choices are beneficial to the school, teachers, and students. The reason is that the criteria and steps have been used personally. By experience, the provided choices are practical and will be very beneficial to the entire school. Each team member thought what would happen if we had to upgrade computers for a school by asking what would the school need versus what would they want.
...