PowerPoint Presentation Module 4 Personal, Legal, Ethical, and Organizational Issues Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or...

1 answer below »
Please see attached instructions and notes.
Referencing not needed for for this project.


PowerPoint Presentation Module 4 Personal, Legal, Ethical, and Organizational Issues Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Learning Objectives (1 of 2) Discuss information privacy and methods for improving the privacy of information Explain the general data protection regulation (GDPR) Explain the privacy issues of e-mail and data collection in a business setting Examine ethical issues and censorship of information technology Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Learning Objectives (2 of 2) Discuss the principles of intellectual property and issues related to the infringement of intellectual property Examine the impact of information technology on society: the digital divide, telecommuting, and health issues Describe green computing and the ways it can improve the quality of the environment Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Privacy Issues (1 of 7) Employers search social networking sites for background information on applicants Monitoring systems are adopted by employers to check employee performance Healthcare organizations, financial institutions, legal firms, and online-ordering firms gather personal data and enter it in databases Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Privacy Issues (2 of 7) Information about every aspect of people’s lives is stored on various databases Many practices of government agencies, credit agencies, and marketing companies using databases would represent an invasion of privacy Several federal laws regulate the collection and use of information on people and corporations Narrow in scope and contain loopholes Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Privacy Issues (3 of 7) Important concepts regarding the Web and network privacy Acceptable use policy Set of rules specifying legal and ethical use of a system and consequences of noncompliance Accountability Issues involving both the user’s and the organization’s responsibilities and liabilities Nonrepudiation Method for binding all the parties to a contract Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Privacy Issues (4 of 7) Guidelines to minimize invasion of privacy Conduct business only with Web sites with privacy policies that are easy to find, read, and understand Limit access to personal information to those who have authorization Ensure data’s reliability and take precautions to prevent misuse of the data Make sure data collection has a stated purpose Discard personal data when no longer needed for stated purpose Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Privacy Issues (5 of 7) Guidelines to minimize invasion of privacy (continued) Prevent personal information from being disclosed without consent or used for undisclosed purposes Use verification procedures to ensure data accuracy Ensure records kept on an individual are accurate and up to date Users should be able to review and correct their records Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Privacy Issues (6 of 7) Guidelines to minimize invasion of privacy (continued) Record-keeping systems that store personal data should not be kept a secret Take all necessary measures to prevent unauthorized access to data and misuse of data Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Privacy Issues (7 of 7) Federal data protection laws Health Insurance Portability and Accountability Act (HIPAA) Fair and Accurate Credit Transaction Act (FACTA) Children’s Online Privacy Protection Act (COPPA) Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. General Data Protection Regulation (GDPR) (1 of 3) Covers a series of laws in order to protect European Union (EU) citizens’ personal data Genetic data Racial or ethnic origin Religious beliefs Goal is more consistent protection of consumer and personal data across EU nations Applies to each member state of the European Union Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. General Data Protection Regulation (GDPR) (2 of 3) Key components: User consent Data must be anonymized Notification of data breaches Safe transfer of data across borders At certain companies, appointment of a GDPR compliance officer Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. General Data Protection Regulation (GDPR) (3 of 3) Business benefits: Consumer confidence Better data security Reduced maintenance by retiring noncompliant software Better alignment with evolving technology Better decision making from effective use of customer information Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. E-mail Spam: unsolicited “junk” e-mail sent for advertising purposes Sent in bulk using automated mailing software Spammers sell their address lists Ease of access Individuals should assume that others have access to their messages Any e-mails sent on company-owned computers are the property of an organization Company has right to access Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Data Collection on the Web (1 of 3) Number of online shoppers is increasing rapidly because of convenience, array of choices, and lower prices But some avoid online purchases because of concerns about hackers Concern that personal information will be sold to telemarketing firms Information users provide on the Web can be combined with other information and technologies to produce new information Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Data Collection on the Web (2 of 3) Cookies: small text files with unique ID tags that are embedded in a Web browser and saved on the user’s hard drive Help Web sites customize pages for users Considered an invasion of privacy when users’ information is used without prior consent Installing a cookie manager helps users disable cookies Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Bidgoli, MIS, 10th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Data Collection on the Web (3 of 3) Log files record a user’s actions on a Web site Generated by Web server software Can
Answered Same DaySep 27, 2021

Answer To: PowerPoint Presentation Module 4 Personal, Legal, Ethical, and Organizational Issues Bidgoli, MIS,...

Abhinaba answered on Sep 28 2021
143 Votes
TELECOMMUNICATION POLICIES         2
TELECOMMUNICATION POLICIES         2
TELECOMMUNICATION POLICIES
Part B
1. Telec
ommunication policies might be attractive to the employees of a particular company but it is more important for the company to initiate more beneficial telecommunication policies for the employees. It is the responsibility of the company to initiate observatory policies for telecommuting. Many companies can attract new employees with their telecommunication but there are a lot of companies that do not require a telecommunicating process to set in the company. Some exceptional companies do not have proper policies of telecommunication but their reputation did not ever restrict to hire eligible top employees. But with the changes in the recent scenario, the companies need to hire better policies to track the activities of the employees as most of the employees are quarantined. That is why the companies need to upgrade their telecommunication policies for better understanding and to make problems that are arising due to the digital divide.
2. Many job functions...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here