Preview

Ethical and Legal Dilemma in It

Best Essays
Open Document
Open Document
4365 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethical and Legal Dilemma in It
Ethical and Legal Dilemma in IT
Nanette E. Armstrong
Capella University

TS5536 Ethical and Legal Considerations in Information Technology

17 March 2012

Ethical and Legal Dilemma in IT Based on the definition of cyberethics as given by Tavani, “the study of moral, legal, and social issues involving cybertechnology” (2010, pg. 3), law is usually/always a part of cyberethics to one degree or another. Being right or wrong based on society’s value builds the fundamentals of ethics. Moral principles make up ethics. Values are maintained based on the law, which in turn encourages us to uphold the laws based on those principles. There are at times when something may be unethical but may still uphold the law and the values are not being taken into account. Values impact the way in which we live and conduct ourselves. Values impact corporate culture indirectly. “If something is illegal and determined to be so, it will probably not be done but if it is unethical but legal, values will only impact the corporate culture enough to keep it away from breaking certain laws” (Ricci, 2008, Para. 3). When one breaks a law, usually set by a governing body, there is a punishment of sort, but when one does something unethically it is not always followed by legal implications. Depending on the unethical act that has been committed is where law would come into play. “Violations of the Law is reinforced by the police and carried out through the court system” (Battle, 2010, Para. 2). When laws are broken there is usually a fine set to pay for the act, however when a person is unethical or violates an ethical code the law is not always involved, therefore, there may or may not be any consequences to the violation. We live in an information technology world. How we act effects our everyday living ethically and morally. Our children, as well as a good portion of the parents in today’s society, attend school or deal with a school in some way, as a parent of a student



References: Alchian, A. A. (2008). Property rights. Retrieved from http://www.econlib.org/library/Enc/PropertyRights.html Ballard, S Battle, M. (2010, May 15). Ethics and the law. Retrieved from http://www.brainmass.com/student/library/solution.php?sgr_id=2720480 Brauer-Rieke, A Dempsey, J. X. (2010, September 22). The electronic communications privacy act: Promoting security and protecting privacy in the digital age. Retrieved from https://www.cdt.org/files/pdfs/20100922_jxd_testimony_ecpa.pdf Frameworks Institute of Education Sciences (IES). (2008, December). Family educational rights and privacy act (ferpa) final rule 34 cfr part 99. Retrieved from http://www2.ed.gov/policy/gen/guid/fpco/pdf/ht12-17-08-att.pdf Madison, J National Institute of Standards and Technology (NIST). (2008, March 4). 'federal information security management act of 2002 '. Retrieved from http://csrc.nist.gov/drivers/documents/FISMA-final.pdf National Institute of Standards and Technology (NIST) Ricci, M. (2008, July 21). Values, ethics and law. Retrieved from http://www.brainmass.com/student/library/solution.php?goal=1&sgr_id=2720481 Richardson, E U.S. Department of Education. (2005 , February 17). Protection of pupil rights amendment (ppra). Retrieved from http://www2.ed.gov/policy/gen/guid/fpco/ppra/index.html U.S United House of Representatives. (2001, June 12). Fighting cyber crime. Retrieved from http://commdocs.house.gov/committees/judiciary/hju72616.000/hju72616_1.HTM

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The Electronic Communications Privacy Act, an extension of the Federal Wiretap Statute, was endorsed in 1986 (Justice Information Sharing, 2010). This was a necessary implementation with how technology was diversifying ways to communicate and share information. In order to oversee and safeguard technological advancements such as email, cordless and cell phone communications, and electronically stored data the federal government had to amend and sometimes put into operation new policies. These policies, like the Electronic Communications Privacy Act, minimize many ethical issues that came along with the development of these advancements.…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The Federal Acquisition Regulation (FAR), issued by the Department of Defense, guides the content of military contracts. Federal government organizations other than the military and intelligence agencies must follow the Federal Information Security Management Act of 2002. Federal Information Processing Standards (FIPS) 200, "Minimum Security Requirements for Federal Information and Information Systems," defines the minimum security requirements that information systems must meet. While the military does not have to follow FISMA, they do enact the security policies contained in the act. The military also implements the security controls found in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems; and NIST SP 800-53, Recommended Security Controls for Federal Information Systems and Organizations. NIST SP 800-53, Appendix F, contains the Security Control Catalog. There is currently no specific law directing the information security policy content for defense contractors. However, Congress is proposing to make the policies in FISMA and the security controls in NIST SP 800-53 applicable to contractors that are awarded military contracts. Information Assurance Implementation, DoD Instruction 8500.2, states the computer network security controls required to be implemented in military computer networks (Enclosure 4, Attachments 1 thru 5). The other references noted in this paper give broad…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Whitman, M. E. (2011). Readings and Cases in Information Security: Law and Ethics. New York, NY: Cengage Learning.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    In 2004 the case of Deal v. Hamilton County Board of Education was coming to a close after reaching the United States Court of Appeals for the Sixth Circuit in Ohio. Within this essay, detailed examination of this case, along with issues that developed the case, disagreement points, parties involved, and final outcome will be explored. This case was initiated in 1999 and reached the U.S. Court of Appeals for the Sixth Circuit in 2004. The Individuals with Disabilities Act has given parents and caregivers to student’s unparalleled rights regarding their student’s education. This case clearly outlines the difference in the interpretation of these laws and regulations between schools, parents, and even the various levels of courts. The primary issues that brought this case to court were the need for clear interpretation of a Free and Appropriate Education, as well as the school meeting the regulations that were outlined in IDEA (Osborne & Russo, 2007). The final outcome of this case gave more than a decision; in this case not only were the student and parents affected but the school as well. This case identifies the judicial process as well as individual interpretation of the laws regarding educating students with special needs.…

    • 1677 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    As an IT professional it is part of our job to ensure the wellbeing of others through what is created, as well as abiding by the law simultaneously. Several ideas need to be considered when acting morally and ethically, such as following a certain standard (Code of ethics), and morality, based on some sort of ideology of personal beliefs. A case study will be examined to compare what is morally and ethically correct, as opposed to what really happens in the real world because of uncontrolled variables like resources, power, and knowledge. All of which can either cause harm, or good, based on the intentions of the professional.…

    • 786 Words
    • 4 Pages
    Better Essays
  • Better Essays

    References: Rothstein L Johnson S F 2010 Special Education LawRothstein, L., & Johnson, S. F. (2010). Special Education Law (4th ed.). Thousand Oaks, CA: SAGE Publications, Inc.…

    • 1594 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Gasser, Urs. "Recoding Privacy Law: Reflections On The Future Relationship Among Law, Technology, And Privacy." Harvard Law Review 130.2 (2016): 61-70. Academic Search Premier. Web. 5 Feb. 2017.…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The purpose of the Family Educational Rights and Privacy Act (FERPA) is to protect the privacy of information concerning individual students by placing certain restrictions on the disclosure of non-directory information contained in a student’s university records. I understand that I have the right not to consent to the release of my educational records and I have the right to receive a copy of such record upon request.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Children the age of 18 or who in which attend a post secondary school are considered adults and their parents are not promised to be consulted of the actions and well being of their children. Children too young to understand real life matters are given the responsibility to fend for themselves and face the fact that the university they are attending cannot contact their parents to concern them of lack of participation in their academic studies, nor their mental health related issues. This action occurs due to the FERPA, which stands for the Family Educational Rights and Privacy Act of 1974. Stating that universities and colleges cannot contact parents with the issues previously stated. Only with a laborious process of parents supplying…

    • 550 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Arguments Against FERPA

    • 2980 Words
    • 12 Pages

    Privacy plays a major role in every aspect of life from professional to personal. Our lives should not be displayed for everyone to see unless we give the say so. Schools and other educational institutions promote this right to students through the federal law of Family Educational Rights and Privacy Act, FERPA. But FERPA is not always the best avenue to follow when the law is continuously being altered. According to the political blog Crazy Crawfish, “Congress has amended FERPA a total of nine times in the nearly 28 years since its enactment” (“FERPA Does Not Protect Student Privacy”). As a result, the school board of an Alabama school received a collection of hate from parents after passing a policy that correlated with President Obama’s changes to FERPA in December of 2011. According to the article, “the policy supposedly protects student privacy while it also allows the collection, data-mining and sharing of private, non-academic information on students without parental permission” (“Alabama School Board Passes Policy”).…

    • 2980 Words
    • 12 Pages
    Best Essays
  • Powerful Essays

    Explain state and federal laws, rules, and regulations as they pertain to special education. (APTS 9.2)…

    • 1083 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    FERPA

    • 260 Words
    • 1 Page

    The Family Education Rights and Privacy Act, Is a federal law that pertains to the release of and assess to educational records. It applies to all schools K- 12 that receive funds under an applicable program of the U.S Department of Education.…

    • 260 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Week 7 : Ethical, Social, Political, and Security Issues for 21st Century Companies - Homework…

    • 916 Words
    • 4 Pages
    Good Essays