100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
C841 Legal Issues in Information Security Task 2 $18.49   Add to cart

Exam (elaborations)

C841 Legal Issues in Information Security Task 2

3 reviews
 1463 views  8 purchases
  • Course
  • C841 Legal Issues in Information Security Task 2
  • Institution
  • University Of South Africa

Western Governors University C841 Legal Issues in Information Security Task 2  A1: Discussion of Ethical Guidelines or Standards: In regards to the TechFite case study, there are a number of relevant information security moral principles. First, all sensitive or proprietary information encou...

[Show more]

Preview 2 out of 7  pages

  • October 23, 2021
  • 7
  • 2021/2022
  • Exam (elaborations)
  • Questions & answers
  • University of South Africa
  • C841 Legal Issues in Information Security Task 2

3  reviews

review-writer-avatar

By: sebastiangreen • 2 year ago

Not a full document.

review-writer-avatar

By: devonmcmasters • 2 year ago

review-writer-avatar

By: spinnerjn • 2 year ago

reply-writer-avatar

By: Tutor23 • 2 year ago

Thank you

avatar-seller
Tutor23
C841 Legal Issues in Information Security Task 2 Page 1
Western Governors University
C841 Legal Issues in Information Security Task 2
A1: Discussion of Ethical Guidelines or Standards: In regards to the TechFite case study, there are a number of relevant information security moral principles. First, all sensitive or proprietary information encountered on the job should be treated with respect and kept private. Second, professional responsibilities are to be discharged with integrity and diligence in accordance with all applicable laws. In addition, the professional reputations of coworkers, employers, and customers should not be intentionally slandered or brought into question. Moreover, all work should be conducted in a manner consistent with information security best practices. Finally, employees should not engage in any activities that may constitute a conflict of interest. A1a: Justification of Standards or Guidelines: All of these tenets can be found in the ethics policies of prominent organizations throughout the IT community. For example, the Information Systems Security Association International (ISSA) Code of Ethics echoes the sentiment that data privacy must be maintained (ISSA Code of Ethics, 2016). It also emphasizes the importance of industry best practices and prohibits relationships that could be construed as a conflict of interest (ISSA Code of Ethics, 2016). The International Information Systems Security Certification Consortium (ISC)² addresses professional responsibilities, stating that individuals should “act honorably, honestly, justly, responsibly, and legally” ((ISC)² Code of Ethics, 1996). The American Society for
Industrial Security (ASIS) speaks to the issue of professional reputations, declaring that personnel must not “maliciously injure the professional reputation or practice of This study source was downloaded by 100000829011123 from CourseHero.com on 10-19-2021 20:08:27 GMT -05:00
https://www.coursehero.com/file/35430640/C841-Legal-Issues-in-Information-Security-Task-2docx/This study resource was
shared via CourseHero.com C841 Legal Issues in Information Security Task 2 Page 2
colleagues, clients, or employees” (ASIS Certification Code of Professional Responsibility, 2018). A2: Description of Unethical Behaviors: There were a number of individuals and groups within TechFite whose behavior was unethical. The head of the Applications Division, Carl Jaspers, failed to safeguard sensitive data, encouraged immoral surveillance techniques and had a relationship with IT Security Analyst Nadia Johnson that represented a clear conflict of interest. This relationship was a quid pro quo arrangement where Mr. Jaspers gave Ms. Johnson gifts and positive reviews in exchange for not reporting the division’s violations (Jackson, n.d., p. 2). Nadia Johnson accepted these bribes and subsequently produced false reports that claimed there was no unusual activity within the division (Jackson, n.d., p. 2). The Business Intelligence (BI) Unit within the Applications Division accessed other divisions without authorization, viewed private information without permission, mishandled customer data and performed penetration tests without obtaining consent (Jackson, n.d., p. 3). Specifically, BI Unit employees Sarah Miller, Jack Hudson, and Megan Rogers performed vulnerability scans of rival company’s networks. In addition, Mr. Hudson “coordinates efforts by third parties to gather intelligence through surveilling and through mining companies’ trash” (Jackson, n.d., p. 3). Furthermore, the Marketing/Sales Unit did not perform proper separation of duties and the Financial Unit neglected to audit their payment records. A3: Factors: The most obvious issue is the lack of an established Code of Ethics at TechFite. Employers often make the mistake of assuming their staff understand what conduct is considered acceptable and will abide by these precepts without instruction. While in a perfect world this would be true, in reality this is not the case. A formal policy must be This study source was downloaded by 100000829011123 from CourseHero.com on 10-19-2021 20:08:27 GMT -05:00
https://www.coursehero.com/file/35430640/C841-Legal-Issues-in-Information-Security-Task-2docx/This study resource was
shared via CourseHero.com

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Tutor23. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $18.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76800 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$18.49  8x  sold
  • (3)
  Add to cart