SlideShare ist ein Scribd-Unternehmen logo
1 von 9
ISTE Standard TL-VI<br />Legal and Ethical Use of Technologies<br />SJU Internship<br />Denise Wright<br />Business ethics is a form of applied ethics. Business ethics deals with ethical rules and principles within a business or commercial context, the various moral or ethical problems that can arise in a business setting, and any special ethical duties or obligations that apply to persons who are engaged in commerce, including workers and managers, customers and suppliers, and the larger group of people who have some interest in the business.<br />In the increasingly conscience-focused marketplaces of the twenty-first century, the demand for more ethical business processes and actions is increasing. Many colleges and universities and most business schools are now offering courses in business ethics. Many articles and books and textbooks on the topic are being written and published, and many businesses and corporations now have ethics panel’s, codes of ethics, ethics review boards, and other attempts to foster and uphold higher or better ethics awareness and practices. Simultaneously, pressure is increasingly being applied on business and industry to improve their ethics. This is done through attempts at persuasion as well as through new public initiatives and laws (New World Encyclopedia)<br />Below is a list of current United States Codes and Laws pertaining to technology<br />The U.S. Copyright Act (Cornell Legal Information Institute) <br />Computer Fraud and Abuse Act of 1986 - (Cornell Legal Information Institute) <br />Electronic Communications Privacy Act of 1986 (Cornell Legal Information Institute) <br />Unlawful access to stored communications (Cornell Legal Information Institute) <br />The Privacy Protection Act of 1980 - 42 USC Sec. 2000aa (Cornell Legal Information Institute) <br />Establishing and Maintaining Ethical Standards of Behavior <br />Business owners have great influence in determining the ethical philosophies of their business enterprises. Employees often follow the lead of the owner in executing their duties and attending to their responsibilities, so it is incumbent on the owner to establish a work environment that embraces moral standards of behavior. A business owner or manager who wishes to establish an ethical mind set in his or her company can help the cause by being proactive.<br />Lockheed Martin has standards and codes to guide employees in many areas. The attached document is a copy of the corporations Setting the standard pdf document. <br />Lockheed Martin established policies and procedures for computer use many years ago. These documents have been revised and updated over the years as internet use evolved. We currently have an intranet and access to the internet. Our policies are stringent and all computers that access our servers are or can be monitored. Employees are reminded monthly of the policies on ethical and legal use of computers. We follow federal law and corporate policy of computer use. Employees have been disciplined up to and including dismissal if policies and or procedures are violated.<br />The following is an outline of Lockheed Martin’s policy on computing and information resources this information is not the complete document but a snapshot of pertinent information.<br />Computing and Information Resources<br />1.0 Policy<br />Lockheed Martin considers its computing and information resources (including computers, e-mail system, Internet and intranet access and software) to be corporate assets having strategic value. As such, these resources require innovative management and appropriate controls. <br />2.0 Information Systems and Services<br />2.1 The Chief Information Officer will establish and maintain an architecture that provides for the secure and efficient transmittal, reception, storage, and disposition of the Corporation's business information. The Chief Information Officer will work with corporate, business area, and business unit management to develop an annual Information Technology Strategic Plan (ITSP) that defines the strategic objectives underpinning the architecture, and an Information Technology Architecture Framework (ITAF) that governs the arrangement, interaction, and interdependence of the elements of Lockheed Martin's information systems. <br />2.2 The Chief Information Officer will establish the following corporate councils to participate in developing, communicating, recommending changes to, and as appropriate overseeing the implementation of, the ITSP, ITAF, policies, and procedures. <br />Corporate CouncilsPrimary ResponsibilitiesEnterprise Architecture BoardDetermine and recommend enterprise information technology strategies for the approval of the CIO. Provide technical leadership in identifying, evaluating, recommending technology strategies, architectures, standards and products through the Information Architecture Board (IAB). Lockheed Martin Information Protection Council Establish and oversee the implementation of uniform measures for protecting Lockheed Martin's computing and information resources. Management of Electronic Information CouncilReview information technology matters affecting the corporate interest and recommend the formulation of policies, procedures, or other direction as appropriate.<br />2.3 The Chief Information Officer, through Enterprise Information Systems, will provide information systems and services within the context of the ITSP, ITAF, policies, and procedures, including, but not limited to:<br />standard software and hardware products <br />implementation of security measures including physical safeguards; access authentication, authorization, monitoring, logging and administration; data encryption; virus/malicious code prevention/detection; data back-up; and disaster recovery planning <br />management of Sensitive Information in electronic form, as required by CPS-710, Protection of Sensitive Information <br />management of electronic records in accordance with CPS-527, Records Management <br />telephone, voice mail, video-conferencing, electronic mail, World Wide Web, and other information transmittal services <br />applications development, hosting, and maintenance <br />data center services <br />procurement and contracting services <br />technical consulting and business process re-engineering services <br />training related to these systems and services. <br />2.4 Management will define systems and services requirements, and provide planning and other data necessary to enable the Chief Information Officer and Enterprise Information Systems to define and execute their responsibilities. <br />3.0 Licensed Software<br />Lockheed Martin recognizes the strategic value of the computing and information resources of others. The Corporation will abide by and enforce compliance with all software licenses for rights to use such assets. <br />4.0 Proper Use of Computing and Information Resources<br />4.1 Lockheed Martin's computing and information resources are Lockheed Martin property or are licensed to the Corporation for its use. lt;br />4.2 Protection and transmission of information on computing and information resources is governed by CPS-710. Additionally, the Corporation specifically prohibits use of computing and information resources in ways that are disruptive, abusive, obscene, or degrading or offensive to others, including the transmission of sexually explicit messages, images or cartoons; ethnic slurs; racial comments; or anything that could be construed as harassment or showing disrespect for others, defaming or slandering others, or otherwise harming another person or business. Employees shall not access the Internet to log onto web sites that contain any such material. <br />4.3 Employees and other authorized users of Lockheed Martin's computing and information resources have no expectation of privacy with regard to use of those resources. In order to enforce these policies, the Corporation reserves the right to monitor any and all use of computing and information resources at any time for any reason, including but not limited to: retrieving, reading, and printing any and all e-mail messages and any other computer files, as well as unfettered monitoring and documenting of all Internet use and intranet traffic. E-mail messages and other uses of computing and information resources are not confidential to the user, even though users of those resources have user IDs, passwords, or other private access codes to log on to the computer or to access networks, files or accounts. User IDs, passwords, or private access codes issued by the Corporation or otherwise used in connection with computing and information resources are not issued to protect the users' privacy, but rather to protect the Corporation's information and assets.<br />The following is Lockheed Martin’s policy on publishing information on Lockheed Martin's Internet web sites.<br />Internet Web Governance<br />1.0 PURPOSE <br />This document defines the requirements for publishing information on Lockheed Martin's Internet web sites.  <br />2.0 GENERAL <br />This procedure implements the requirements of Computing and Information Resources, employees are responsible for compliance with this procedure. <br />Information published on a Lockheed Martin Internet web site is available to anyone with a connection to the World Wide Web, and therefore, shall be considered released to the public. <br />References<br />New World Encyclopedia. Retrieved on March 30, 2010 from  http://www.newworldencyclopedia.org/entry/Business_ethics<br />Setting the standard pdf document http://www.lockheedmartin.com/data/assets/corporate/documents/ethics/setting-the-standard.pdf<br />
Tl vi a
Tl vi a
Tl vi a
Tl vi a
Tl vi a
Tl vi a
Tl vi a
Tl vi a

Weitere Àhnliche Inhalte

Was ist angesagt?

02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
sappingtonkr
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
Prof. Othman Alsalloum
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
ghghghghgh
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
FaHaD .H. NooR
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
university of education,Lahore
 
Review questions
Review questionsReview questions
Review questions
Anura Kumara
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
UMaine
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
manpreet04
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
UMaine
 

Was ist angesagt? (20)

The benefits of technology standards it-toolkits
The benefits of technology standards   it-toolkitsThe benefits of technology standards   it-toolkits
The benefits of technology standards it-toolkits
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Sample IT Policy
Sample IT PolicySample IT Policy
Sample IT Policy
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
Chapter 5 MIS
Chapter 5 MISChapter 5 MIS
Chapter 5 MIS
 
Chapter 4
Chapter 4 Chapter 4
Chapter 4
 
It Policies
It PoliciesIt Policies
It Policies
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
Ethical issues-extra
Ethical issues-extraEthical issues-extra
Ethical issues-extra
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Review questions
Review questionsReview questions
Review questions
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Social & Ethical Issues in Information Systems
Social & Ethical Issues in Information SystemsSocial & Ethical Issues in Information Systems
Social & Ethical Issues in Information Systems
 
Privacy trends 2011
Privacy trends 2011Privacy trends 2011
Privacy trends 2011
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 

Ähnlich wie Tl vi a

Case Study
Case StudyCase Study
Case Study
lneut03
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)
Kathy_67
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
BHANU281672
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
lorainedeserre
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
scobycakau
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
Wesen Tegegne
 
Page 1 of 4 Bullzeye Data Breach Readiness Assessment .docx
Page 1 of 4  Bullzeye Data Breach Readiness Assessment .docxPage 1 of 4  Bullzeye Data Breach Readiness Assessment .docx
Page 1 of 4 Bullzeye Data Breach Readiness Assessment .docx
alfred4lewis58146
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
healdkathaleen
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Vijay Dalmia
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperative
butest
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
skumartarget
 

Ähnlich wie Tl vi a (20)

Case Study
Case StudyCase Study
Case Study
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
 
Importance of ICT in business, mostly photography Presentation.pdf
Importance of ICT in business, mostly photography Presentation.pdfImportance of ICT in business, mostly photography Presentation.pdf
Importance of ICT in business, mostly photography Presentation.pdf
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
Ethics in IT.pptx
Ethics in IT.pptxEthics in IT.pptx
Ethics in IT.pptx
 
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdfWritten-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdf
 
Page 1 of 4 Bullzeye Data Breach Readiness Assessment .docx
Page 1 of 4  Bullzeye Data Breach Readiness Assessment .docxPage 1 of 4  Bullzeye Data Breach Readiness Assessment .docx
Page 1 of 4 Bullzeye Data Breach Readiness Assessment .docx
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
Bizmanualz-Computer-IT-Policies-and-Procedures-Sample.pdf
Bizmanualz-Computer-IT-Policies-and-Procedures-Sample.pdfBizmanualz-Computer-IT-Policies-and-Procedures-Sample.pdf
Bizmanualz-Computer-IT-Policies-and-Procedures-Sample.pdf
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperative
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 

KĂŒrzlich hochgeladen

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Girls In Noida 959961âŠč3876 Independent Escort Service Noida
Call Girls In Noida 959961âŠč3876 Independent Escort Service NoidaCall Girls In Noida 959961âŠč3876 Independent Escort Service Noida
Call Girls In Noida 959961âŠč3876 Independent Escort Service Noida
dlhescort
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Now â˜ŽïžđŸ” 9332606886🔝 Call Girls ❀ Service In Bhilwara Female Escorts Serv...
Call Now â˜ŽïžđŸ” 9332606886🔝 Call Girls ❀ Service In Bhilwara Female Escorts Serv...Call Now â˜ŽïžđŸ” 9332606886🔝 Call Girls ❀ Service In Bhilwara Female Escorts Serv...
Call Now â˜ŽïžđŸ” 9332606886🔝 Call Girls ❀ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Call Girls In DLf Gurgaon ➄99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➄99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➄99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➄99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 

KĂŒrzlich hochgeladen (20)

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls In Noida 959961âŠč3876 Independent Escort Service Noida
Call Girls In Noida 959961âŠč3876 Independent Escort Service NoidaCall Girls In Noida 959961âŠč3876 Independent Escort Service Noida
Call Girls In Noida 959961âŠč3876 Independent Escort Service Noida
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
VVVIP Call Girls In Greater Kailash âžĄïž Delhi âžĄïž 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash âžĄïž Delhi âžĄïž 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash âžĄïž Delhi âžĄïž 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash âžĄïž Delhi âžĄïž 9999965857 🚀 No Advance 24HRS...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Now â˜ŽïžđŸ” 9332606886🔝 Call Girls ❀ Service In Bhilwara Female Escorts Serv...
Call Now â˜ŽïžđŸ” 9332606886🔝 Call Girls ❀ Service In Bhilwara Female Escorts Serv...Call Now â˜ŽïžđŸ” 9332606886🔝 Call Girls ❀ Service In Bhilwara Female Escorts Serv...
Call Now â˜ŽïžđŸ” 9332606886🔝 Call Girls ❀ Service In Bhilwara Female Escorts Serv...
 
Call Girls In DLf Gurgaon ➄99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➄99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➄99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➄99902@11544 ( Best price)100% Genuine Escort In 24...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 

Tl vi a

  • 1. ISTE Standard TL-VI<br />Legal and Ethical Use of Technologies<br />SJU Internship<br />Denise Wright<br />Business ethics is a form of applied ethics. Business ethics deals with ethical rules and principles within a business or commercial context, the various moral or ethical problems that can arise in a business setting, and any special ethical duties or obligations that apply to persons who are engaged in commerce, including workers and managers, customers and suppliers, and the larger group of people who have some interest in the business.<br />In the increasingly conscience-focused marketplaces of the twenty-first century, the demand for more ethical business processes and actions is increasing. Many colleges and universities and most business schools are now offering courses in business ethics. Many articles and books and textbooks on the topic are being written and published, and many businesses and corporations now have ethics panel’s, codes of ethics, ethics review boards, and other attempts to foster and uphold higher or better ethics awareness and practices. Simultaneously, pressure is increasingly being applied on business and industry to improve their ethics. This is done through attempts at persuasion as well as through new public initiatives and laws (New World Encyclopedia)<br />Below is a list of current United States Codes and Laws pertaining to technology<br />The U.S. Copyright Act (Cornell Legal Information Institute) <br />Computer Fraud and Abuse Act of 1986 - (Cornell Legal Information Institute) <br />Electronic Communications Privacy Act of 1986 (Cornell Legal Information Institute) <br />Unlawful access to stored communications (Cornell Legal Information Institute) <br />The Privacy Protection Act of 1980 - 42 USC Sec. 2000aa (Cornell Legal Information Institute) <br />Establishing and Maintaining Ethical Standards of Behavior <br />Business owners have great influence in determining the ethical philosophies of their business enterprises. Employees often follow the lead of the owner in executing their duties and attending to their responsibilities, so it is incumbent on the owner to establish a work environment that embraces moral standards of behavior. A business owner or manager who wishes to establish an ethical mind set in his or her company can help the cause by being proactive.<br />Lockheed Martin has standards and codes to guide employees in many areas. The attached document is a copy of the corporations Setting the standard pdf document. <br />Lockheed Martin established policies and procedures for computer use many years ago. These documents have been revised and updated over the years as internet use evolved. We currently have an intranet and access to the internet. Our policies are stringent and all computers that access our servers are or can be monitored. Employees are reminded monthly of the policies on ethical and legal use of computers. We follow federal law and corporate policy of computer use. Employees have been disciplined up to and including dismissal if policies and or procedures are violated.<br />The following is an outline of Lockheed Martin’s policy on computing and information resources this information is not the complete document but a snapshot of pertinent information.<br />Computing and Information Resources<br />1.0 Policy<br />Lockheed Martin considers its computing and information resources (including computers, e-mail system, Internet and intranet access and software) to be corporate assets having strategic value. As such, these resources require innovative management and appropriate controls. <br />2.0 Information Systems and Services<br />2.1 The Chief Information Officer will establish and maintain an architecture that provides for the secure and efficient transmittal, reception, storage, and disposition of the Corporation's business information. The Chief Information Officer will work with corporate, business area, and business unit management to develop an annual Information Technology Strategic Plan (ITSP) that defines the strategic objectives underpinning the architecture, and an Information Technology Architecture Framework (ITAF) that governs the arrangement, interaction, and interdependence of the elements of Lockheed Martin's information systems. <br />2.2 The Chief Information Officer will establish the following corporate councils to participate in developing, communicating, recommending changes to, and as appropriate overseeing the implementation of, the ITSP, ITAF, policies, and procedures. <br />Corporate CouncilsPrimary ResponsibilitiesEnterprise Architecture BoardDetermine and recommend enterprise information technology strategies for the approval of the CIO. Provide technical leadership in identifying, evaluating, recommending technology strategies, architectures, standards and products through the Information Architecture Board (IAB). Lockheed Martin Information Protection Council Establish and oversee the implementation of uniform measures for protecting Lockheed Martin's computing and information resources. Management of Electronic Information CouncilReview information technology matters affecting the corporate interest and recommend the formulation of policies, procedures, or other direction as appropriate.<br />2.3 The Chief Information Officer, through Enterprise Information Systems, will provide information systems and services within the context of the ITSP, ITAF, policies, and procedures, including, but not limited to:<br />standard software and hardware products <br />implementation of security measures including physical safeguards; access authentication, authorization, monitoring, logging and administration; data encryption; virus/malicious code prevention/detection; data back-up; and disaster recovery planning <br />management of Sensitive Information in electronic form, as required by CPS-710, Protection of Sensitive Information <br />management of electronic records in accordance with CPS-527, Records Management <br />telephone, voice mail, video-conferencing, electronic mail, World Wide Web, and other information transmittal services <br />applications development, hosting, and maintenance <br />data center services <br />procurement and contracting services <br />technical consulting and business process re-engineering services <br />training related to these systems and services. <br />2.4 Management will define systems and services requirements, and provide planning and other data necessary to enable the Chief Information Officer and Enterprise Information Systems to define and execute their responsibilities. <br />3.0 Licensed Software<br />Lockheed Martin recognizes the strategic value of the computing and information resources of others. The Corporation will abide by and enforce compliance with all software licenses for rights to use such assets. <br />4.0 Proper Use of Computing and Information Resources<br />4.1 Lockheed Martin's computing and information resources are Lockheed Martin property or are licensed to the Corporation for its use. lt;br />4.2 Protection and transmission of information on computing and information resources is governed by CPS-710. Additionally, the Corporation specifically prohibits use of computing and information resources in ways that are disruptive, abusive, obscene, or degrading or offensive to others, including the transmission of sexually explicit messages, images or cartoons; ethnic slurs; racial comments; or anything that could be construed as harassment or showing disrespect for others, defaming or slandering others, or otherwise harming another person or business. Employees shall not access the Internet to log onto web sites that contain any such material. <br />4.3 Employees and other authorized users of Lockheed Martin's computing and information resources have no expectation of privacy with regard to use of those resources. In order to enforce these policies, the Corporation reserves the right to monitor any and all use of computing and information resources at any time for any reason, including but not limited to: retrieving, reading, and printing any and all e-mail messages and any other computer files, as well as unfettered monitoring and documenting of all Internet use and intranet traffic. E-mail messages and other uses of computing and information resources are not confidential to the user, even though users of those resources have user IDs, passwords, or other private access codes to log on to the computer or to access networks, files or accounts. User IDs, passwords, or private access codes issued by the Corporation or otherwise used in connection with computing and information resources are not issued to protect the users' privacy, but rather to protect the Corporation's information and assets.<br />The following is Lockheed Martin’s policy on publishing information on Lockheed Martin's Internet web sites.<br />Internet Web Governance<br />1.0 PURPOSE <br />This document defines the requirements for publishing information on Lockheed Martin's Internet web sites. <br />2.0 GENERAL <br />This procedure implements the requirements of Computing and Information Resources, employees are responsible for compliance with this procedure. <br />Information published on a Lockheed Martin Internet web site is available to anyone with a connection to the World Wide Web, and therefore, shall be considered released to the public. <br />References<br />New World Encyclopedia. Retrieved on March 30, 2010 from http://www.newworldencyclopedia.org/entry/Business_ethics<br />Setting the standard pdf document http://www.lockheedmartin.com/data/assets/corporate/documents/ethics/setting-the-standard.pdf<br />