Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Ethical and Legal Assumptions, Capstone Project Example
Hire a Writer for Custom Capstone Project
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Information security planning has many ethical and legal assumptions because it is essential for the information technology professional to ensure that their client remains secure. Since the IT specialist has access to their client’s sensitive documents and information, they must first and foremost protect against security breaches. Security breaches can include a number of activities that range from purposeful to accidental distribution of the private information. Potential situations to be aware of in this situation is that it is unethical to distribute a client’s business information for monetary gain and it is inappropriate to leave the information in easily accessible places as to prevent employees, outsiders, or hackers from gaining access to unauthorized data.
It is important for IT personnel to understand that in a situation of neglect, they cannot be charged for committing a criminal offense. However, they will remain liable for their error. Liability is defined as the “the legal obligation of an entity that extends beyond criminal or contract law” and necessitates financial compensation for wrongs committed. The responsibility for this compensation may fall either to the IT employee or their employer depending upon their incorporation, limited liability status, and whether due care standards are met. Ultimately however, the IT company is responsible for educating its workers about the code of ethics that must be followed throughout their work in addition to providing maximal effort to ensure that these ethics are not breached (Whitman et al., 2009).
A useful way for the IT company to protect against ethical and legal breaches is to provide a well-defined policy to their employees that demonstrate acceptable and unacceptable behaviors in the workplace. Although this is an excellent first step in allowing the employees to understand what is expected from them on top of their regular job functions, the IT company would benefit from ensuring that their employees actually read the document. To do so, the employee should sign the policy stating that they have read the document and be given a test to verify that its contents are understood. Employee actions should then be monitored to determine whether or not they are compliant. Finally, these policies need to be enforced uniformly across employee status or job function.
In order to remain in ethical compliance, an IT professional should always ensure the privacy of their client’s information. Federal laws such as the Health Insurance Portability and Accountability Act Of 1996 (HIPAA) define legal requirements of client privacy protection (Wilson, 2006). Although this specific act pertains specifically to the healthcare setting in the protection of patient information and doctor-patient confidentiality, its principles can be applied to a broad range of situations that the IT professional may encounter. Essentially, all of the client’s private information should have restricted access. Data should be password protected and the IT professional should never leave a computer containing company information without ensuring the password protection screen reappears. Furthermore, company data that it stored on portable devices should be limited because this increases the opportunity for it to be accessed by unauthorized individuals. If the information is stored on a flash drive, it should not only be protected, but it would be useful to de-identify the names of individuals associated with financial or other personal information.
If all of the above principles are followed, it is likely that there will not be any safety and privacy concerns during the IT planning sessions.
References
Whitman ME, Mattord HJ. (2009). Principles of Information Security, 3rd Edition. Cengage Learning, pp. 90 – 113.
Wilson J. (2006). Health Insurance Portability and Accountability Act Privacy rule causes ongoing concerns among clinicians and researchers. Ann Intern Med 145 (4): 313–6.
Stuck with your Capstone Project?
Get in touch with one of our experts for instant help!
Tags:
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee