SlideShare una empresa de Scribd logo
1 de 9
ISTE Standard TL-VI<br />Legal and Ethical Use of Technologies<br />SJU Internship<br />Denise Wright<br />Business ethics is a form of applied ethics. Business ethics deals with ethical rules and principles within a business or commercial context, the various moral or ethical problems that can arise in a business setting, and any special ethical duties or obligations that apply to persons who are engaged in commerce, including workers and managers, customers and suppliers, and the larger group of people who have some interest in the business.<br />In the increasingly conscience-focused marketplaces of the twenty-first century, the demand for more ethical business processes and actions is increasing. Many colleges and universities and most business schools are now offering courses in business ethics. Many articles and books and textbooks on the topic are being written and published, and many businesses and corporations now have ethics panel’s, codes of ethics, ethics review boards, and other attempts to foster and uphold higher or better ethics awareness and practices. Simultaneously, pressure is increasingly being applied on business and industry to improve their ethics. This is done through attempts at persuasion as well as through new public initiatives and laws (New World Encyclopedia)<br />Below is a list of current United States Codes and Laws pertaining to technology<br />The U.S. Copyright Act (Cornell Legal Information Institute) <br />Computer Fraud and Abuse Act of 1986 - (Cornell Legal Information Institute) <br />Electronic Communications Privacy Act of 1986 (Cornell Legal Information Institute) <br />Unlawful access to stored communications (Cornell Legal Information Institute) <br />The Privacy Protection Act of 1980 - 42 USC Sec. 2000aa (Cornell Legal Information Institute) <br />Establishing and Maintaining Ethical Standards of Behavior <br />Business owners have great influence in determining the ethical philosophies of their business enterprises. Employees often follow the lead of the owner in executing their duties and attending to their responsibilities, so it is incumbent on the owner to establish a work environment that embraces moral standards of behavior. A business owner or manager who wishes to establish an ethical mind set in his or her company can help the cause by being proactive.<br />Lockheed Martin has standards and codes to guide employees in many areas. The attached document is a copy of the corporations Setting the standard pdf document. <br />Lockheed Martin established policies and procedures for computer use many years ago. These documents have been revised and updated over the years as internet use evolved. We currently have an intranet and access to the internet. Our policies are stringent and all computers that access our servers are or can be monitored. Employees are reminded monthly of the policies on ethical and legal use of computers. We follow federal law and corporate policy of computer use. Employees have been disciplined up to and including dismissal if policies and or procedures are violated.<br />The following is an outline of Lockheed Martin’s policy on computing and information resources this information is not the complete document but a snapshot of pertinent information.<br />Computing and Information Resources<br />1.0 Policy<br />Lockheed Martin considers its computing and information resources (including computers, e-mail system, Internet and intranet access and software) to be corporate assets having strategic value. As such, these resources require innovative management and appropriate controls. <br />2.0 Information Systems and Services<br />2.1 The Chief Information Officer will establish and maintain an architecture that provides for the secure and efficient transmittal, reception, storage, and disposition of the Corporation's business information. The Chief Information Officer will work with corporate, business area, and business unit management to develop an annual Information Technology Strategic Plan (ITSP) that defines the strategic objectives underpinning the architecture, and an Information Technology Architecture Framework (ITAF) that governs the arrangement, interaction, and interdependence of the elements of Lockheed Martin's information systems. <br />2.2 The Chief Information Officer will establish the following corporate councils to participate in developing, communicating, recommending changes to, and as appropriate overseeing the implementation of, the ITSP, ITAF, policies, and procedures. <br />Corporate CouncilsPrimary ResponsibilitiesEnterprise Architecture BoardDetermine and recommend enterprise information technology strategies for the approval of the CIO. Provide technical leadership in identifying, evaluating, recommending technology strategies, architectures, standards and products through the Information Architecture Board (IAB). Lockheed Martin Information Protection Council Establish and oversee the implementation of uniform measures for protecting Lockheed Martin's computing and information resources. Management of Electronic Information CouncilReview information technology matters affecting the corporate interest and recommend the formulation of policies, procedures, or other direction as appropriate.<br />2.3 The Chief Information Officer, through Enterprise Information Systems, will provide information systems and services within the context of the ITSP, ITAF, policies, and procedures, including, but not limited to:<br />standard software and hardware products <br />implementation of security measures including physical safeguards; access authentication, authorization, monitoring, logging and administration; data encryption; virus/malicious code prevention/detection; data back-up; and disaster recovery planning <br />management of Sensitive Information in electronic form, as required by CPS-710, Protection of Sensitive Information <br />management of electronic records in accordance with CPS-527, Records Management <br />telephone, voice mail, video-conferencing, electronic mail, World Wide Web, and other information transmittal services <br />applications development, hosting, and maintenance <br />data center services <br />procurement and contracting services <br />technical consulting and business process re-engineering services <br />training related to these systems and services. <br />2.4 Management will define systems and services requirements, and provide planning and other data necessary to enable the Chief Information Officer and Enterprise Information Systems to define and execute their responsibilities. <br />3.0 Licensed Software<br />Lockheed Martin recognizes the strategic value of the computing and information resources of others. The Corporation will abide by and enforce compliance with all software licenses for rights to use such assets. <br />4.0 Proper Use of Computing and Information Resources<br />4.1 Lockheed Martin's computing and information resources are Lockheed Martin property or are licensed to the Corporation for its use. lt;br />4.2 Protection and transmission of information on computing and information resources is governed by CPS-710. Additionally, the Corporation specifically prohibits use of computing and information resources in ways that are disruptive, abusive, obscene, or degrading or offensive to others, including the transmission of sexually explicit messages, images or cartoons; ethnic slurs; racial comments; or anything that could be construed as harassment or showing disrespect for others, defaming or slandering others, or otherwise harming another person or business. Employees shall not access the Internet to log onto web sites that contain any such material. <br />4.3 Employees and other authorized users of Lockheed Martin's computing and information resources have no expectation of privacy with regard to use of those resources. In order to enforce these policies, the Corporation reserves the right to monitor any and all use of computing and information resources at any time for any reason, including but not limited to: retrieving, reading, and printing any and all e-mail messages and any other computer files, as well as unfettered monitoring and documenting of all Internet use and intranet traffic. E-mail messages and other uses of computing and information resources are not confidential to the user, even though users of those resources have user IDs, passwords, or other private access codes to log on to the computer or to access networks, files or accounts. User IDs, passwords, or private access codes issued by the Corporation or otherwise used in connection with computing and information resources are not issued to protect the users' privacy, but rather to protect the Corporation's information and assets.<br />The following is Lockheed Martin’s policy on publishing information on Lockheed Martin's Internet web sites.<br />Internet Web Governance<br />1.0 PURPOSE <br />This document defines the requirements for publishing information on Lockheed Martin's Internet web sites.  <br />2.0 GENERAL <br />This procedure implements the requirements of Computing and Information Resources, employees are responsible for compliance with this procedure. <br />Information published on a Lockheed Martin Internet web site is available to anyone with a connection to the World Wide Web, and therefore, shall be considered released to the public. <br />References<br />New World Encyclopedia. Retrieved on March 30, 2010 from  http://www.newworldencyclopedia.org/entry/Business_ethics<br />Setting the standard pdf document http://www.lockheedmartin.com/data/assets/corporate/documents/ethics/setting-the-standard.pdf<br />
Tl vi a
Tl vi a
Tl vi a
Tl vi a
Tl vi a
Tl vi a
Tl vi a
Tl vi a

Más contenido relacionado

La actualidad más candente

02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
sappingtonkr
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
Prof. Othman Alsalloum
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
FaHaD .H. NooR
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
university of education,Lahore
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
UMaine
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
manpreet04
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
UMaine
 

La actualidad más candente (20)

The benefits of technology standards it-toolkits
The benefits of technology standards   it-toolkitsThe benefits of technology standards   it-toolkits
The benefits of technology standards it-toolkits
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Sample IT Policy
Sample IT PolicySample IT Policy
Sample IT Policy
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
Chapter 5 MIS
Chapter 5 MISChapter 5 MIS
Chapter 5 MIS
 
Chapter 4
Chapter 4 Chapter 4
Chapter 4
 
It Policies
It PoliciesIt Policies
It Policies
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
Ethical issues-extra
Ethical issues-extraEthical issues-extra
Ethical issues-extra
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Review questions
Review questionsReview questions
Review questions
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Social & Ethical Issues in Information Systems
Social & Ethical Issues in Information SystemsSocial & Ethical Issues in Information Systems
Social & Ethical Issues in Information Systems
 
Privacy trends 2011
Privacy trends 2011Privacy trends 2011
Privacy trends 2011
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 

Similar a Tl vi a

Case Study
Case StudyCase Study
Case Study
lneut03
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)
Kathy_67
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
BHANU281672
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
lorainedeserre
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
scobycakau
 
Page 1 of 4 Bullzeye Data Breach Readiness Assessment .docx
Page 1 of 4  Bullzeye Data Breach Readiness Assessment .docxPage 1 of 4  Bullzeye Data Breach Readiness Assessment .docx
Page 1 of 4 Bullzeye Data Breach Readiness Assessment .docx
alfred4lewis58146
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
healdkathaleen
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Vijay Dalmia
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperative
butest
 

Similar a Tl vi a (20)

Case Study
Case StudyCase Study
Case Study
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
 
Importance of ICT in business, mostly photography Presentation.pdf
Importance of ICT in business, mostly photography Presentation.pdfImportance of ICT in business, mostly photography Presentation.pdf
Importance of ICT in business, mostly photography Presentation.pdf
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
Ethics in IT.pptx
Ethics in IT.pptxEthics in IT.pptx
Ethics in IT.pptx
 
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdfWritten-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdf
 
Page 1 of 4 Bullzeye Data Breach Readiness Assessment .docx
Page 1 of 4  Bullzeye Data Breach Readiness Assessment .docxPage 1 of 4  Bullzeye Data Breach Readiness Assessment .docx
Page 1 of 4 Bullzeye Data Breach Readiness Assessment .docx
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
Bizmanualz-Computer-IT-Policies-and-Procedures-Sample.pdf
Bizmanualz-Computer-IT-Policies-and-Procedures-Sample.pdfBizmanualz-Computer-IT-Policies-and-Procedures-Sample.pdf
Bizmanualz-Computer-IT-Policies-and-Procedures-Sample.pdf
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperative
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 

Último

Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Dipal Arora
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 

Último (20)

Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 

Tl vi a

  • 1. ISTE Standard TL-VI<br />Legal and Ethical Use of Technologies<br />SJU Internship<br />Denise Wright<br />Business ethics is a form of applied ethics. Business ethics deals with ethical rules and principles within a business or commercial context, the various moral or ethical problems that can arise in a business setting, and any special ethical duties or obligations that apply to persons who are engaged in commerce, including workers and managers, customers and suppliers, and the larger group of people who have some interest in the business.<br />In the increasingly conscience-focused marketplaces of the twenty-first century, the demand for more ethical business processes and actions is increasing. Many colleges and universities and most business schools are now offering courses in business ethics. Many articles and books and textbooks on the topic are being written and published, and many businesses and corporations now have ethics panel’s, codes of ethics, ethics review boards, and other attempts to foster and uphold higher or better ethics awareness and practices. Simultaneously, pressure is increasingly being applied on business and industry to improve their ethics. This is done through attempts at persuasion as well as through new public initiatives and laws (New World Encyclopedia)<br />Below is a list of current United States Codes and Laws pertaining to technology<br />The U.S. Copyright Act (Cornell Legal Information Institute) <br />Computer Fraud and Abuse Act of 1986 - (Cornell Legal Information Institute) <br />Electronic Communications Privacy Act of 1986 (Cornell Legal Information Institute) <br />Unlawful access to stored communications (Cornell Legal Information Institute) <br />The Privacy Protection Act of 1980 - 42 USC Sec. 2000aa (Cornell Legal Information Institute) <br />Establishing and Maintaining Ethical Standards of Behavior <br />Business owners have great influence in determining the ethical philosophies of their business enterprises. Employees often follow the lead of the owner in executing their duties and attending to their responsibilities, so it is incumbent on the owner to establish a work environment that embraces moral standards of behavior. A business owner or manager who wishes to establish an ethical mind set in his or her company can help the cause by being proactive.<br />Lockheed Martin has standards and codes to guide employees in many areas. The attached document is a copy of the corporations Setting the standard pdf document. <br />Lockheed Martin established policies and procedures for computer use many years ago. These documents have been revised and updated over the years as internet use evolved. We currently have an intranet and access to the internet. Our policies are stringent and all computers that access our servers are or can be monitored. Employees are reminded monthly of the policies on ethical and legal use of computers. We follow federal law and corporate policy of computer use. Employees have been disciplined up to and including dismissal if policies and or procedures are violated.<br />The following is an outline of Lockheed Martin’s policy on computing and information resources this information is not the complete document but a snapshot of pertinent information.<br />Computing and Information Resources<br />1.0 Policy<br />Lockheed Martin considers its computing and information resources (including computers, e-mail system, Internet and intranet access and software) to be corporate assets having strategic value. As such, these resources require innovative management and appropriate controls. <br />2.0 Information Systems and Services<br />2.1 The Chief Information Officer will establish and maintain an architecture that provides for the secure and efficient transmittal, reception, storage, and disposition of the Corporation's business information. The Chief Information Officer will work with corporate, business area, and business unit management to develop an annual Information Technology Strategic Plan (ITSP) that defines the strategic objectives underpinning the architecture, and an Information Technology Architecture Framework (ITAF) that governs the arrangement, interaction, and interdependence of the elements of Lockheed Martin's information systems. <br />2.2 The Chief Information Officer will establish the following corporate councils to participate in developing, communicating, recommending changes to, and as appropriate overseeing the implementation of, the ITSP, ITAF, policies, and procedures. <br />Corporate CouncilsPrimary ResponsibilitiesEnterprise Architecture BoardDetermine and recommend enterprise information technology strategies for the approval of the CIO. Provide technical leadership in identifying, evaluating, recommending technology strategies, architectures, standards and products through the Information Architecture Board (IAB). Lockheed Martin Information Protection Council Establish and oversee the implementation of uniform measures for protecting Lockheed Martin's computing and information resources. Management of Electronic Information CouncilReview information technology matters affecting the corporate interest and recommend the formulation of policies, procedures, or other direction as appropriate.<br />2.3 The Chief Information Officer, through Enterprise Information Systems, will provide information systems and services within the context of the ITSP, ITAF, policies, and procedures, including, but not limited to:<br />standard software and hardware products <br />implementation of security measures including physical safeguards; access authentication, authorization, monitoring, logging and administration; data encryption; virus/malicious code prevention/detection; data back-up; and disaster recovery planning <br />management of Sensitive Information in electronic form, as required by CPS-710, Protection of Sensitive Information <br />management of electronic records in accordance with CPS-527, Records Management <br />telephone, voice mail, video-conferencing, electronic mail, World Wide Web, and other information transmittal services <br />applications development, hosting, and maintenance <br />data center services <br />procurement and contracting services <br />technical consulting and business process re-engineering services <br />training related to these systems and services. <br />2.4 Management will define systems and services requirements, and provide planning and other data necessary to enable the Chief Information Officer and Enterprise Information Systems to define and execute their responsibilities. <br />3.0 Licensed Software<br />Lockheed Martin recognizes the strategic value of the computing and information resources of others. The Corporation will abide by and enforce compliance with all software licenses for rights to use such assets. <br />4.0 Proper Use of Computing and Information Resources<br />4.1 Lockheed Martin's computing and information resources are Lockheed Martin property or are licensed to the Corporation for its use. lt;br />4.2 Protection and transmission of information on computing and information resources is governed by CPS-710. Additionally, the Corporation specifically prohibits use of computing and information resources in ways that are disruptive, abusive, obscene, or degrading or offensive to others, including the transmission of sexually explicit messages, images or cartoons; ethnic slurs; racial comments; or anything that could be construed as harassment or showing disrespect for others, defaming or slandering others, or otherwise harming another person or business. Employees shall not access the Internet to log onto web sites that contain any such material. <br />4.3 Employees and other authorized users of Lockheed Martin's computing and information resources have no expectation of privacy with regard to use of those resources. In order to enforce these policies, the Corporation reserves the right to monitor any and all use of computing and information resources at any time for any reason, including but not limited to: retrieving, reading, and printing any and all e-mail messages and any other computer files, as well as unfettered monitoring and documenting of all Internet use and intranet traffic. E-mail messages and other uses of computing and information resources are not confidential to the user, even though users of those resources have user IDs, passwords, or other private access codes to log on to the computer or to access networks, files or accounts. User IDs, passwords, or private access codes issued by the Corporation or otherwise used in connection with computing and information resources are not issued to protect the users' privacy, but rather to protect the Corporation's information and assets.<br />The following is Lockheed Martin’s policy on publishing information on Lockheed Martin's Internet web sites.<br />Internet Web Governance<br />1.0 PURPOSE <br />This document defines the requirements for publishing information on Lockheed Martin's Internet web sites. <br />2.0 GENERAL <br />This procedure implements the requirements of Computing and Information Resources, employees are responsible for compliance with this procedure. <br />Information published on a Lockheed Martin Internet web site is available to anyone with a connection to the World Wide Web, and therefore, shall be considered released to the public. <br />References<br />New World Encyclopedia. Retrieved on March 30, 2010 from http://www.newworldencyclopedia.org/entry/Business_ethics<br />Setting the standard pdf document http://www.lockheedmartin.com/data/assets/corporate/documents/ethics/setting-the-standard.pdf<br />