Wednesday, May 6, 2020

ACS Code of Ethical Business Conduct

Question: Discuss about the ACS Code of Ethical Business Conduct. Answer: Introduction: On March 2017, The 52 GB Dun and Bradstreet database which is comprised of 33.6 million records which are exposed. Troy hunt is the cyber-security researcher who studied the database dilemma. The database is comprised of the personnel information of the employees, such as names, job title, job responsibilities, e-mail addresses, and phone numbers (Suciu, 2017). The aim of this hacking is to target the customers through e-mail addresses or to get confidential information of the organization. From the research, t has been found that no highly sensitive data is exposed. More than 1,000,000 employees information was exposed in the scenario of hacking. The databases are organized for the storing, gathering, and manipulating the data for bringing revolution in the retrieval of the information. The key responsibility is to maintain the confidentiality of the information stored in the database (Silen, 2011). The ethics is defined as the acceptable behaviour of the individual therefore, When the individual behaviour is unacceptable than the doings of the person comes under the category of unethical activities. The issues which are associated with the loss of data are controlling and accessing of confidential information, misusing of data and information, exposure of privacy, legal issues, social issues, accuracy of the data is lost, loss of trust, and others. ACS code of conduct: The responsibility of every individual is to follow code of ethics for the smooth functioning of the organization (Cowie, 2014). The ethical conduct brings the feeling of loyalty, honesty, and impartiality among employees. The table below shows the description of ethical code which helps in improving the positivity in the employees and helps to overcome the situation of ethical dilemma: Particular Description Priorities The priority helps in preserving the flow of information in continuity of computing services. The integrity and security of the information system should be preserved. The conflicts between client and employees should be minimised The connection of communication should be developed between employees Competence The operational and functional need of the client should be fulfilled by providing good quality product and services to them Value of money should be provided Development of standards and rules Acceptance of work responsibility Interest in the activities Honesty The product and services should be suitable to the client Skills and knowledge should not be misinterpreted Unbiased and objective opinions should be raised Realistic estimation of the project control Credit of work should be given Social Implication Health and safety measures should be promoted at the work place Privacy of the people should not be affected Fair treatment of the employees Personal satisfaction, control, and competence should be raised Professional development The knowledge and skills should be upgraded The awareness of relationship with the community Professional development Computing profession The professional opinions of the employees should be raised Dishonesty should be avoided at the work place Enhancing the reputation of the company Implication of ethical issues: Practicing of codes of ethics in the curriculum helps in overcoming the problem of hacking and other ethical issues at work place because the code of ethics built the feeling of honesty, loyalty, impartiality, friendly behaviour among employees which in turn helps in minimising the chaos among the individuals. The principles help in improving the quality of life by contributing the feeling of well-being in human (Tollen, 2016). The individual restrict themselves from harming others which minimised the unethical activities like loss of confidential information, loss of property, unwanted activities in working environment, and others. The ethical codes help in designing and development of social activities in employees. Honesty and trust are the pillars of avoiding chaos at the work place. The feeling of discrimination can be overcome in the individual and raises the feeling of coordination among employees (Shacklett, 2013). The privacy of the individual should not be disturbed at work place. The professional competence helps in developing skills and knowledge of the individual. The privacy and freedom of the individual should not be disturbed because it can affect the performance of the individual. The feeling of harming others can be raised. The security system should be indulged with the confidential database which brings feeling of trust and satisfaction in the employees. Only the necessary private information of the individual should be collected (Warren, 2014). After using the confidential information, it should be destroyed to prevent leakage of information in the future. The security measure should be taken into consideration to preserve the accessibility and manipulation of the information. The purpose of collecting private information should be clear to the employees which help in raising the feeling of trust in the individual. The safeguard system should be accompanied with the confidential database (Reynolds, 2015). The implementation of ethical laws in the curriculum of the individual helps in increasing the productivity of the organization and minimization of conflict at the working place. Tools and technologies should be used to monitor the performance of the employees. The figure below shows the ethical responsibility of the employees at the work place: Conclusion: The step should be taken forward to preserve the right to privacy of the employees at the work place. The security measure should be taken into consideration to preserve the accessibility and manipulation of the information. Honesty and trust are the pillars of avoiding chaos at the work place. The exercising of ethics in the curriculum helps in overcoming the situation of ethical dilemma. The ethical guidelines should be followed to preserve the information of the individual because it helps in building the feeling of loyalty and togetherness in the employees. References: Cowie, R. (2014).Ethical issues in affecting computing (1st ed.). Retrieved from https://people.ict.usc.edu/~gratch/CSCI534/Readings/OHAC-14-Ethics.pdf Reynolds, G. (2015).Ethical in information technology (1st ed.). Retrieved from https://lms.uop.edu.jo/lms/pluginfile.php/5921/block_html/content/material.pdf Shacklett, K. (2013).ACS code of ethical business conduct (1st ed.). Retrieved from https://corpdocs.msci.com/ethics/eth_12962.pdf Silen, M. (2011).Encountering ethical problem and moral distress (1st ed.). Retrieved from https://hj.diva-portal.org/smash/get/diva2:450421/FULLTEXT02.pdf Suciu, M. (2017).Dun and bradstreet marketing database exposed (1st ed.). Retrieved from https://www.technewsworld.com/story/84387.html Tollen, A. (2016).ACM code of ethics and professional conduct (1st ed.). Retrieved from https://www.acm.org/about-acm/acm-code-of-ethics-and-professional-conduct Warren, E. (2014).Legal ethical and professional issues in information security (1st ed.). Retrieved from https://www.cengage.com/resource_uploads/downloads/1111138214_259148.pdf

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.