Preview

Ajax Digital Information Code of Ethics

Better Essays
Open Document
Open Document
1402 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ajax Digital Information Code of Ethics
Ajax Digital Information Code of Ethics
Not sharing name
South University
ITS1103 Ethics & Information Technology
August,13,2013

ADI
Ajax Digital Information
Code of Ethics We at Ajax Digital Information take pride in the professional appearance and actions of our employees. This is why we expect each one of our employees to uphold the highest moral standards while working at our establishment or accessing company data. Ajax Digital Information recognizes the threat of unethical activities to our establishment, and have created as set of mandatory guidelines.
Here at ADI we plan to uphold the highest standards of business by providing professional, quality interactions with our customers and fellow employees.
The following guidelines are expected to be upheld by all staff and employees, without exception:
• Represent the company, professionally
• Provide high quality work
• Respect Fellow employees
• Use all company property appropriately
• Adhere to the highest moral standards and be an honestly, trustworthily, person
1) Guideline: Prevention & control of computer abuse
2) Guideline: Computer and network usage
3) Guideline: Accessing Internet & e-mail
4) Guideline: Preventing and Protecting against Viruses & other forms of Malware.
5) Guideline: Usage of licensed software, shareware, and software piracy
6) Guideline: Work Place Privacy & Monitoring
7) Guideline: Professional Responsibility in Identifying and resolving ethical Issues in IT

Section: 1- Guidelines for Prevention & Control of Computer Abuse
1. ADI Employee passwords are to be kept strictly confidential. Each user is solely responsible for the activity taking place under their I.D
2. Absolutely no company related information should be stored on a portable device.
3. Employees must exit their log-in session upon leaving the work station.
4. If ADI information is cleared for off-site use by management, you are solely responsible for the



References: Morton, H. (October, 2002 10). Somerville college policy on staff use of email and internet. Retrieved from http://www.some.ox.ac.uk/cms/files/policy_on_staff_use_of_email_and_internet_Oct_02.pdf http://cr3ative1.files.wordpress.com/2012/06/code-of-ethics.pdf. (n.d.). Retrieved from http://cr3ative1.files.wordpress.com/2012/06/code-of-ethics.pdf

You May Also Find These Documents Helpful

  • Good Essays

    unit 48 venepuncture

    • 554 Words
    • 3 Pages

    Code of conduct should always be followed making sure the area of work place is always safe and clean for use.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Internet and the Workplace

    • 1937 Words
    • 8 Pages

    However, in addition to using the Internet, especially the World Wide Web and e-mail for work-related purposes, employees are also using the Internet for personal use, whether for sending personal e-mail messages, playing games, downloading pornography, ordering goods online, checking stock prices, or gambling. Accordingly, many issues have come to light involving employee e-mail and Internet use. Employers have to question how much, if any, personal use of the Internet and e-mail to permit in the workplace. Employers are also grappling with the question of whether to monitor Internet use and whether to block access to certain…

    • 1937 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    3220 final review

    • 655 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of what? 9…

    • 655 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Widget Tech Inc. is in need of update the company’s current code of ethics due to growth of the company and the changing workforce. Research has been conducted to revise the current policy and address topics that were previously overlooked. Widget Tech Inc. is a company that stresses both corporate and personal integrity. We not only comply with laws and applicable regulations; but we also strive to conduct our affairs according to the highest ethical standards. Employees are expected to be honest and forthright in dealings with managers, subordinates and with one another, as well as with clients, suppliers, government agencies and their employees, business partners and the general public. Widget Tech employees must maintain the highest level of personal integrity and encourage it in others; they must not lie, cheat, steal or do anything that would bring dishonor upon themselves or the company (SRA International, Inc. 2009).…

    • 1178 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    The user domain contains the employees that will be accessing resources in the network. Users access systems, applications, and data within the rights and privileges defined by the acceptable use policy. The AUP must be followed at all time or the user may be terminated. There are threats ranging from lack of awareness to blackmail and extortion. All employees are responsible for their own actions when using the network. The users will all be expected to read and abide by the acceptable use policy. (Kim & Solomon, 2012)…

    • 539 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    BAT1 Task 1

    • 1871 Words
    • 8 Pages

    c) There should be restrictions on the passwords created by users with regards to complexity, maximum and minimum duration of the password, history of the password etc. Login information should be changed once in three months to keep…

    • 1871 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Code of Counduct

    • 350 Words
    • 2 Pages

    Cisco has provided ways for employee’s to report ethic violations or ask questions regarding ethical dilemmas. They are able to:…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There are a number of guidelines and procedures in place to enable me to do my job not only to the best of my ability but in a professional manner. Whilst at work, there are procedures that need to be followed relating to various aspects of the job including correct procedures to greet visitors, answer the telephone, dealing with incoming and outgoing mail, as other procedures. When answering telephones we must always answer it with ChromaSport football league as they are the league sponsors. When greeting visitors who are there for meetings we must politely welcome them into the office and offer…

    • 1519 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Est Task 2

    • 636 Words
    • 3 Pages

    All employees are expected to hold all federal, state, and local laws in high regard at all times,…

    • 636 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Balancing the legitimate need of employers to monitor the workplace with respect for individual privacy is not difficult. The best course of action is to have a monitoring policy and follow it. Legal experts state that "apathy toward e-mail and Internet policies is the biggest mistake an employer can make." It is recommended that firms have a written policy clearly stating that any right to privacy…

    • 1403 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    The regulations cover legal requirements for: Maintenance of workplace equipment, ventilation and indoor temperatures, lighting, cleanliness and handling of waste materials, workstation and flooring, facilities for staff to rest and eat, drinking water, sanitary conveniences.…

    • 281 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    7 army values

    • 806 Words
    • 4 Pages

    Show concern for and make an effort to check on the safety and well-being of others.…

    • 806 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Acceptable Use Policy

    • 1267 Words
    • 6 Pages

    Siau, K., Nah, F., & Teng, L. (2002). ACCEPTABLE INTERNET USE POLICY. Communications of the ACM, 45(1), 75-79.…

    • 1267 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Employees of Given Company are expected to comply with all applicable local, state, and federal laws and regulations. Violations resulting from employee activities, business or personal, will not be condoned. Employees are expected to conduct all business activities well above the minimum standards required by law. Employees are expected to communicate all situational uncertainty with their direct supervisor and/or human resources director to ensure proper guidance and clarification. When in doubt, one should always waiver on the side of caution and seek advice, rather than make a choice that will leave a lasting impression on the reputation of the individual employee or the company as a whole.…

    • 1310 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Rakesh

    • 1205 Words
    • 6 Pages

    3. You will be bound by the responsibilities under the Information Security Policy of the Company as contained under Annexure – C.…

    • 1205 Words
    • 6 Pages
    Powerful Essays