Assignment 2: Final Project—Privacy Guidelines Continuing with the scenario from Week 4, you now need to develop guidelines relating to privacy in the workplace and workplace monitoring. Consider how

Ace your studies with our custom writing services! We've got your back for top grades and timely submissions, so you can say goodbye to the stress. Trust us to get you there!


Order a Similar Paper Order a Different Paper

Assignment 2: Final Project—Privacy Guidelines

Continuing with the scenario from Week 4, you now need to develop guidelines relating to privacy in the workplace and workplace monitoring. Consider how the organization will track compliance with the policies and what must be disclosed to employees for this to be acceptable practice.

Develop guidelines for professional responsibilities in the organization related to identifying and resolving ethical issues in IT.  This should include consequences of violation of the established policies, an appeals process, and a contact person within the organization for any questions regarding this.  You should identify that there will be no discrimination based upon reporting ethical violations and where employees can report these anonymously.

As you complete this final deliverable, remember to incorporate the feedback provided by your classmates in Week 3 and facilitator for your deliverable.

Summarize (in either the submission text box or a separate document) what you have learned since starting this assignment and provide an outline of changes you have made to your document since your first topical outline in Week 1.

Assignment 2: Final Project—Privacy Guidelines Continuing with the scenario from Week 4, you now need to develop guidelines relating to privacy in the workplace and workplace monitoring. Consider how
Internet Usage Jessica Arroyo South University 08/09/2021 A software license is a document that provides legally binding guidelines for the use and distribution of software. Software licenses typically provide end users with the right to one or more copies of the software without violating copyrights (Swinyard, et.al 1990). The license also defines the responsibilities of the parties entering into the license agreement and may impose restrictions on how the software can be used. Software licensing terms and conditions usually include fair use of the software, the limitations of liability, warranties and disclaimers and protections if the software or its use infringes on the intellectual property rights of others(Swinyard, et.al 1990). Software licenses typically are either proprietary, free or open source, the distinguishing feature being the terms under which users may redistribute or copy the software for future development or use. Shareware is commercial software that is distributed free to users, eventually either requiring or encouraging users to pay for the continued support of the software (Swinyard, et.al 1990). You might see shareware in formats that paywall advanced features or offer the full package for a limited time. Some software might even be fully functional and backed solely by voluntary donations. It was first introduced in the early 1980s, with its popularity rising in the 1990s as personal computing moved into the mainstream in both offices and homes (Swinyard, et.al 1990). The format allows software developers to get their products into the hands of potential users for a test run, in hopes that they decide to purchase the fully functional version of the program. Shareware is also popular with gamers, as it gives them a chance to try a new game on a limited basis before purchasing the full version (Nehemiah, et.al 2021). Like other types of software, shareware is not necessarily a bad thing to avoid at all costs. Many shareware products are legitimate. But even legitimate products can have weaknesses. Copyright law are perhaps those laws which are breached the most by individual on a daily basis (Nehemiah, et.al 2021). This is because one might not know be informed about this law or because not much is done to enforce this law. Also, some countries of the world have no Copyright laws. Software Piracy is a breach of a copyright law as one copies data contained on the medium on to another medium without the consent of the owner of the Software (Nehemiah, et.al 2021). When one buys a software, one buys not the software content and therefore it isn’t one’s property. Instead, one buys the license to use the software with accordance to the licensing agreement. Many people these days are guilty of being “software pirates”. “Software piracy is the unauthorized copying or distribution of copyrighted software. This can be done by copying, downloading, sharing, selling, or installing multiple copies onto personal or work computers.” (Business Software Alliance) ( Nehemiah, et.al 2021). They justify their actions by claiming they are stealing from the huge corporate companies that are out there making money off of us and do not care about their customers. This way of thinking overlooks the real fact those very actions are the ones hurting customers and those who follow the rules. The process of software piracy is simple, one would usually purchase a single license copy to use a company’s product on a computer. However, it is also a huge source for illegal activities such as software piracy. Everyday there are websites and hosts that are being shut down due to having illegal copies of software available from them for downloading. Something else to be taken into account is: the rate at which the internet continues to grow (Thelwall, et.al 2016). This being said, it allows for people to quickly get their hands on something in a matter of minutes. Back when the internet was a lot slower, people were less likely to download illegal copies of software being the fact that the file sixes are humongous and would have taken forever to download on dial up rather than five to 10 minutes on DSL, as stated on the Adobe website ‘Adobe Creative Suite 6 Master Collection’ file size 7 Gigabytes (GB). Potential pirates would have rather just gone out and purchased a legit copy they knew would work and was backed up by the company’s legitimacy(Thelwall, ET.AL 2016). Now with the speed increase, people can download cracked and hacked copies of software, and should one source not work, they can access plenty more until they find a working copy. References: Thelwall, M., & Kousha, K. (2016). Academic Software Downloads from Google Code: Useful Usage Indicators?. Information Research: An International Electronic Journal, 21(1), n1. Nehemiah, K. P., & Adinyira, E. (2021). Effects of scheduling software usage on project schedule management processes: A study of some selected construction projects in Accra (Doctoral dissertation). Swinyard, W. R., Rinne, H., & Kau, A. K. (1990). The morality of software piracy: A cross-cultural analysis. Journal of Business Ethics, 9(8), 655-664.
Assignment 2: Final Project—Privacy Guidelines Continuing with the scenario from Week 4, you now need to develop guidelines relating to privacy in the workplace and workplace monitoring. Consider how
Final Project: Internet Usage Guidelines Jessica Arroyo South University ITS1103- Ethics and Information Technology 08/02/2021 Table of Contents Part 1: Adding Document Content 3 Objective 3 Rules and Guidelines for Internal and External corporate Communication for Ajax Digital Information 3 Part 2: Plan Implementation and Training 5 Introduction 5 References 8 Part 1: Adding Document Content Objective The main objective of this report is to point out rules and guidelines for external and internal corporate communications for Ajax Digital Information. The company is a combination of techniques for web development by the use of numerous internet technologies to come up with one and massive web application. When Ajax is involved, internet claims can recover and send info from a nonconcurrent worker deprived of interfering with the conduct and show of the current page. By dissociating the information trade coat from the show layer, Ajax allows site pages and net applications to alter content progressively without reloading the whole page. Therefore, the need to guide how to assess items from the net and communicate them over the net and rules for the defense against a computer program and other malware procedures in Ajax Digital. Rules and Guidelines for Internal and External corporate Communication for Ajax Digital Information The first opinion is that there should always be a security polity before using any network before anything else. When assessing computers in this institution, it is always known that it must always be for the company’s benefit. At some point is when it is for other personal gains, then we refer to it as computer abuse (Mwagwabi et al., 2021). It may be a general classification of exercises wherein a PC is utilized to illicitly or inappropriately cause damage to another person or their property. Fraud, hacking, cyberbullying, and in any event, using a work PC for personal issues are generally instances of PC misuse. Guidelines must prevent network usage and computer abuse from being minimized and eventually eliminated in Ajax Digital Information. It is of great significance that all the institution employees understand that they are moral with their belongings and need to use them appropriately and respectfully. Ajax Digital Information cannot bear activities and remarks that would be considered oppressive, bugging, undermining, indecent, deprecatory, chauvinist, and bigot. It incorporates yet isn’t restricted to statements and activities shared when utilizing Ajax’s web and other innovations. Representatives are required to utilize organization gave web and different gadgets as an asset for finishing their appointed obligations and supporting the destinations of Ajax organization. The institution does not require employees to constantly use the internet on exceptionally not services needed by the institution or duties assigned (Thompson et al., 2021). However, some cases may be permitted if; employees utilize the web if it is not against the institution’s guidelines. Suppose the personal use of employees fails to cause negative impacts on the Ajax company or rather when they are not utilizing the institution’s resources to perform their services outside the projects and tasks allocated by Ajax company. There are rules like reinforcing hacking, data theft, and piracy policies to offer protection against malware and viruses. Therefore, the need for procedures that will safeguard employees in the institute. Thus, the following are rules and activities that Ajax company has considered illegal; introducing programming on organization PCs without the approval of an organization IT agent, illegally downloading programming, movies, and music, presenting malignant programming onto the organization. Also, performing different activities put the association’s security in danger and endeavoring to sidestep the organization’s web channel to get to impeded material. Part 2: Plan Implementation and Training Introduction For the rules and rules to be followed effectively, they must be implemented and adequately trained to create awareness. For the rules and procedures to be effective in Ajax company, it must be a systematic process. It is just a plan to implement the training of my approaches to the institution with a time frame of one month, to be precise. The faster the implementation, the more influential the company is likely to work. In essence, I will highlight how I will implement my guidelines within one month. The early phase in fostering a training program is to survey and recognize wants. Worker fixing requirements may today be set up in the individual turn of events, HR, or association’s vital plans. Since I’m constructing the preparation program without any preparation, I would have to survey which regions to zero in. Later on, the practice needs evaluations will differentiate any hoops in the current preparing determinations and extended ranges of skills. These holes should be turned, focused on, and investigated into the organization’s preparation goals (Kipkirui et al., 2021). An ultimate aim is to overwhelm any present and required execution issues by developing a preparation program. At an employee level, the preparation should organize with the spaces of progress, which can be completely recognized. The following phase is to make a whole activity plan incorporating materials, content, educational program, and learning speculations. With the goal for them to handle and get to know the new rules and rules for Ajax, then, at that point, they need a compelling arrangement. Preparing and assets transportation techniques must likewise be definite. While developing the program, the members’ and training’ educative styles must again be considered. Many organizations lead their drives and gather criticism to make variations a long time before forwarding the program vast. The implementation stage is the room where the training program springs up. The organization needs to select whether making will be taken indoors or remotely planned. Program implementation should consider worker pledge and knowledge KPI aims, just as placing the reservation of formulating exercises and any associated assets. The preparation database is then formally led, developed, and dispatched. During training, member growth needs to be checked to pledge that the program is robust. As stated in the last fragment, the training program needs to be consistently checked. Finally, the entire program should be assessed to choose whether it was operative and reached preparing targets. Criticism needs to be found from all associates to determine educator and program adequacy and ability or information safeguarding. Dissecting this input nearby a worker implementation review will license the connotation to distinguish any inadequacies in the database. The training activity or program idea can be adapted if assumptions or targets are not being reached. Conclusion To sum up, for this part, this was a plan implementation and training for the guidelines within the Ajax Digital Information. With a detailed summary of the performance of strategies for the rules and policies within the company. The section has highlighted how I will implement my guidelines with a time frame of one month. References Kipkirui, J. R. (2021). Employees’ perception of management practices on strategic plan implementation in Public Technical Vocational Education and Training Institutions in Kenya (Doctoral dissertation, Moi University). Mwagwabi, F., & Jiow, J. H. (2021). Compliance with security guidelines in teenagers. Australasian Journal of Information Systems, 25. Thompson, R. M., Hall, J., Morrison, C., Palmer, N. R., & Roberts, D. L. (2021). Ethics and governance for internet‐based conservation science research. Conservation Biology.
Assignment 2: Final Project—Privacy Guidelines Continuing with the scenario from Week 4, you now need to develop guidelines relating to privacy in the workplace and workplace monitoring. Consider how
Computer Usage and Security Guidelines Computer Usage and Security Guidelines Jessica Arroyo South University ITS1103-Ethics and Information Technology 07/26/2021 TABLE OF CONTENTS Guidelines for prevention and control of computer abuse………………………………………………………2 Guidelines for computer and network usage………………………………………………………..2-3 Use and prevention of the spread of malware ……………………………………………………………….3-4 Government laws and regulations on Business Operation……………………………………………………3-4 Employees rights and organization’s responsibilities concerning government laws and regulations………………4-5 References………………………………………………………6 Guidelines for prevention and control of computer abuse Computers within the organization are supposed to be used for the benefit of the organization. When the employee uses it for personal benefit, they will be abusing the computer. To spell out the potential consequences of misuse, the company should input a security policy. The security policy should include procedures to prevent and detect abuse and guidelines for conducting employee investigations. The company should make sure the policy limit access to and spreading of personal data about it employees. The policy should spell out the consequences of misusing company resources. The company should investigate anomalous activities by collecting reams of log data from the internet-facing servers. The organization should implement enterprise resource planning (ERP) to manage its business processes. Because the processes run continuously, ERP produces a massive log of operations. Once they get the log files, they are left with the often-difficult task of sorting through them for suspicious activity. Companies using Microsoft’s Active Directory service can use group policies to lock down desktops across their enterprise. The organization can change each of internet Explorer’s zones to enforce the use of the organization’s content filtering internet representative. In addition, make certain access rights to network folders are put in on a strict need-only basis. Guidelines for computer and network usage Accompanying that privilege is an obligation on the part of employees to understand and abide by the responsibilities and regulations that govern the organization. This guidelines reflect the general ethical principles of the company and indicate the duties ingrained in the organization. Employees are responsible for correct and sufficient use of the tools each computer system provides for maintaining the security of stored information. Computer and network access accounts are assigned to individual users for their exclusive use and should not be shared with others. The company should secure its funds by using an obscure account password and should change the password frequently. The employee should understand the level of protection each computer system applies to files and boost that protection. Computing and networking resources should be used only following the recommendation indicated within. Examples of inappropriate and unsatisfactory use of computer and network resources include Harassment of other employees, destruction of equipment belonging to the company, and use of computers and network facilities in ways that hinder the computing activities of other employees. Violation of the policies described preceding for the benefit of computing resources should be dealt with seriously. Network performance management should determine the device that uses the most bandwidth, which will make employees fear visiting personal websites. On the other hand, can use network restriction to reduce network access usage. If one user takes over the bandwidth, Network performance management will detect it and alert the network operator team. An employee should not connect personal devices to the company network. Use and prevention of spread malware Installing anti-virus software is one the most important ways to protect against malware. Anti-virus software will protect your device from malicious software that poses a warning to the system. It scans the computer to detect and clean the malware and provides an automatic update to enhance protection against viruses. In addition, anti-virus software ensures that your software is regularly updated to stop viruses from gaining access to your computer. Buying apps from reliable sources reduces the chance of your device being infected with malware. You are avoiding clicking on suspicious links or download attachments from unknown sources. Phishing scams trick people into opening links that may appear to come from a legitimate business. The use of a firewall is another way of protecting your device from malware. A firewall prevents hostile attacks by blocking all unofficial access to or from the private computer network. It’s essential to back up regularly to ensure that you can still recover all your valuable data and files if the device is affected by malware. Government laws and regulations on business operations Government regulation on marketing and advertising ensures every business has complied with the truth in advertising laws regulated. The government set business regulation to protect employees’ rights, protect the environment, and hold the corporation accountable for the amount of power they have in business. This regulation affects business either positively or negatively; some are protected while may harm others. Nevertheless, all companies are held to the same standards of agreement and adhere to rules and regulations, and statutes to safeguard safety, fairness, and a competitive business environment. Government regulations have expanded significantly over past years, promoting business complaints that interventions hinder growth and efficiency. Some interventions help private sectors by providing clear guidelines, loans, and advice to the business. This regulation can increase the power of dominant and abusive firms if the policymakers are not careful when creating the new rules. Employees’ rights and organizations’ responsibilities about government law and regulations Employees have rights and responsibilities toward their employers, even if they work part-time or don’t have a written contract with their employers. The employee should be responsible for doing the work they hired them to do and be careful and severe. They should avoid putting themselves or others to endangerment by following the employer’s instructions. Employees have the right to receive equal pay for equal work. Employees should not be harassed or discriminated against because of race, religion, gender, or genetic information. Organizations must give their employees a place to work, make sure they have access to it, and pay them the salary and benefits they agreed to. REFERENCES Rouse, M. (2010). Green Computing definition. TechTarget. com. Cisco, A. S. A. 5500 Series Next-Generation Firewalls. Cisco. com. Kokemuller, N. (2015). Transformational leadership vs. situational leadership. Chron. com. Design, D. A. Special Session on Collaborative Networking Infrastructure.
Assignment 2: Final Project—Privacy Guidelines Continuing with the scenario from Week 4, you now need to develop guidelines relating to privacy in the workplace and workplace monitoring. Consider how
Running Head: DEVELOPING ORGANIZATION GUIDELINES 0 Developing Organization Guidelines for Ethics and IT Rationale Jessica Arroyo South University Ethics and Information Technology 07/19/2021 Contents Purpose statement and project scope 3 Guideline for the prevention of computer abuse and network usage. 3 Guideline for accessing content from the internet and prevention of viruses and other forms of malware. 4 Guideline for the usage of licensed software and shareware as well as prevention of software privacy. 5 Guidelines relating to privacy in the workplace, workplace monitoring, and professional responsibility. 6 References 6 Purpose statement and project scope Ajax Digital Information is an organization that has given its 25 employees some privileges of using the internet for internal and external communication, access to e-mail services, and internet research. It has been noted that employees are abusing their privilege by accessing or researching other information that is not related to the company. In this project, I will develop some guidelines and strategies that will be implemented in order to address this situation appropriately. Guideline for the prevention of computer abuse and network usage. Computers within the organization are supposed to be used for the benefit of the company. When an employee is using it for personal benefit, he or she will be abusing the computer. In other words, computers should only serve the intended purpose. Common computer abuse involves copying and distributing copyrighted software, films and music. Employees have been downloading music, television shows, watching YouTube videos and computer games using the company’s computers as well as network (Stocker et al., 2020). This abuse has rocketed network usage in the company, thus making the company go at a huge loss. Some of the guidelines that I have developed that will minimize computer abuse is that employees should not use the company’s computers to access personal websites such as Facebook and other platforms. Any person that accesses such platforms should be terminated from the company. Secondly, employees should not clear the cache. In this case, an audit has to be conducted in order to determine the websites that have been visited. This will make employees fear visiting personal websites. On the other hand, network restriction can be used to reduce access network usage. Some of the guidelines include identifying bandwidth hogs. Network performance management (NPM) will be able to determine device that uses the most bandwidth. If one user monopolizes the bandwidth, Network performance management will be able to detect it and alert the network operator team. Also, employees should not connect personal devices to the company’s network. Guideline for accessing content from the internet and prevention of viruses and other forms of malware. Internet is full of information but employees should only access information that is relevant to the company and that can be used to enhance the company’s production. This can be assured by restricting the search engines; that is, Google Chrome and Firefox. This will restrict employees to search for information that is not related to the organization. Computer virus is one of the major problems that many organizations have been facing. Therefore, in order to prevent viruses, computers should always be updated. All operating software on computers should be updated regularly in order to enhance features and also include security patches that will seal loopholes that can be used by hackers to access the information contained in the system (Gonçalves et al., 2020). Secondly, employees should not use internet explorers. Currently, we are living in an exciting time whereby there are many search engines such as Chrome, Opera, and Firefox that are much safe than internet explorers. Using these explores will minimize the chances of a computer being infected with viruses. Thirdly, anti-virus software should be installed on all computers. Those are software that are used to detect viruses in a computer and also determine whether applications that have been downloaded have viruses or not. Some antivirus that can be used includes Bitdefender, Norton, and McAfee. Lastly, internet users should always avoid using suspicious websites. Currently, there are trillions of web pages, and we spend most of our time browsing the internet, shopping, researching as well as communicating and it involves visiting websites. The internet user must be able to determine suspicious web pages that can infect the computer. Guideline for the usage of licensed software and shareware as well as prevention of software privacy. In most cases, licensed software is legit, and therefore the company should always use such software because there are no chances of them being affected by viruses or any other form of malware. Also, the company should first try shareware on general information; that is, information that doesn’t require much protection, before using it for confidential information. On the other hand, some of the measures that can be used to protect software are by installing strong firewalls, such as a strong password. A strong password denies access to an unauthorized person (Huang & Bin, 2017). Secondly, passwords should be changed regularly because are people who might have mastered to password. In order to avoid such instances, the company should develop security applications that will offer biometric access. This is the best form of securing software in a system. Guidelines relating to privacy in the workplace, workplace monitoring, and professional responsibility. Privacy is one of the fundamental things in every organization or company. In order to ensure privacy in the company, every computer must be accessed by an authorized person and every program or information should be stored in secured files or cloud. Information should be stored in clouds such as Google Drive and blockchain. Professionals within the organization must stick in their profession, for instance, network performance managers must always ensure that there are no devices connected to the company’s network to avoid excess network usage. References Huang, F., & Bin, L. I. U. (2017). Software defect prevention based on human error theories. Chinese Journal of Aeronautics, 30(3), 1054-1070. Gonçalves, J. N., Rodrigues, H. S., & Monteiro, M. T. T. (2020). Preventing computer virus prevalence using epidemiological modeling and optimal control. Stocker, V., Smaragdakis, G., & Lehr, W. (2020). The state of network neutrality regulation. ACM SIGCOMM Computer Communication Review, 50(1), 45-59.

Writerbay.net

Looking for top-notch essay writing services? We've got you covered! Connect with our writing experts today. Placing your order is easy, taking less than 5 minutes. Click below to get started.


Order a Similar Paper Order a Different Paper