Top-Rated Free Essay
Preview

Ethical Issues in Banking Intranets

Satisfactory Essays
253 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethical Issues in Banking Intranets
Security of Organizational Intranets in the Banking Section
Version 1.0 * Introduction * Ethical Issues * Restricted access of information for employees in the organization’s intranet
(From employee’s point of view, they may lose the faith in the organization, untrustworthy etc.)
(From organization’s point of view, it is important to hide information such as personal sensitive information; confidential information due to some employees may gain advantages using such information) * Hacking into an intranet letting the management know about the lack of security of the organizations intranet.
(Can apply the deontological and consequential theories) * Monitoring of employee activities in the intranet

* Social Issues * Unauthorized access to personal information of customers and employees, confidential information may lead to activities such as blackmailing, random demands, kidnappings etc. * Employees accessing confidential information may arise issues related to whistle blowing (it may be good and bad) (Dual-used dilemma) * Accessing financial information in the banking sector may lead to national security issues. * Confidential information can be used to competitive advantage over other organizations

* Legal Issues * Different laws such as data protection act and computer misuse act can be explained
(Because it involves personal and sensitive information of both employees and customers) * Invasion of privacy of employees in the workplace

* Professional Issues * Accessing social networks and other malicious sites (waste of organizational resources and it may lead to security vulnerabilities) Good and bad * Accessibility of the intranet to people with disabilities * BCS code of conduct
(Avoid conflict of interest, do not disclose confidential information, avoid negligent action or inaction etc)

* Conclusion

You May Also Find These Documents Helpful

  • Good Essays

    This incident Challenger present us a case study in organizational communication, ethics and culture as it promotes or discourages necessary communication and the ethics of whistle blowing.…

    • 427 Words
    • 2 Pages
    Good Essays
  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    The nature of this event describes an internal breach of security in order to access and manipulate sensitive data. This internal breach was caught by the auditor, but the communications from the auditor to those who’s data was breached was intercepted.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Case Study 1

    • 449 Words
    • 2 Pages

    3. According on CMA Standards of Ethical: Mitigate actual conflicts of interest, regularly communicate with business associates to avoid apparent conflicts of interest. Advise all parties of any potential conflicts. Communicate information fairly and objectively. Disclose all relevant information that could reasonably be expected to influence an intended user's understanding of the reports, analyses, or recommendations. Disclose delays or deficiencies in information, timeliness, processing, or internal controls in conformance with organization policy and/or applicable law.…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    information security intrusion to the entire organization, and not just that particular computer, for the…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    The main piece of legislation is the Data Protection Act 1998. This covers the medical, social, credit information and the local authority. There are eight principles. The data must be:…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Memo 2

    • 561 Words
    • 2 Pages

    Any potential conflicts of interest, mostly in the relationship between the company and the employees;…

    • 561 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 4 P6

    • 757 Words
    • 4 Pages

    To make sure that information is managed appropriately, a number of policies and procedures have to be put in place, concerning security of information.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Spamming coworkers Accessing prohibited websites Purposely circumventing security policies Sending files with sensitive data outside the organization.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. A user made unauthorized use of network resources by attacking network entities. You are potentially sabotaged by an employee or employer.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ERR task B

    • 933 Words
    • 3 Pages

    Data protection: never give out personal information about colleagues or service users to unauthorised people or organisations. Never disclose commercial information about company’s activities to unauthorised people or organisations. Keep all data secure and use my own log in and not share passwords. Any papers, CD’s, portable USB devices should be locked away whenever possible, cabinets and draws that contain sensitive…

    • 933 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    In my role as a support worker I may encounter a situation where the matter of confidentiality has to be weighed up against the welfare of the individual in question. In these instances confidentiality has to be broken to meet my obligations and duty of care in reporting to the correct and relevant authorities e.g. safeguarding; this has the potential for tension but for the greater good, must be adhered…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Diploma Level 3 Hsc 38

    • 299 Words
    • 2 Pages

    Personal data shall be processed in accordance with the rights of data subjects under this act.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 001 Outcome 1 3 4

    • 265 Words
    • 1 Page

    4.3) Describe situations where information normally considered to be confidential might need to be passed on.…

    • 265 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    one of the most important and common one is the Data Protection Act 1998 – this law states each individuals personal details are to be kept securely locked away, this law also protects the services users freedom rights, the DPA advise that all service users have a right to privacy and everyone else would need to seek services’ permission to obtain personal records…

    • 762 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Identify barriers to communication Demonstrate how to reduce barriers to communication in different ways Demonstrate ways to check that communication has been understood Identify sources of information and support or services to enable more effective communication…

    • 452 Words
    • 2 Pages
    Satisfactory Essays