CCS0087 Module 1
CCS0087 Module 1
CCS0087 Module 1
Module 1
Module 1A
IT Worker Relationships That Must Be
Managed
Intended Learning Outcomes
– Specialized knowledge
• Programmers
• Systems analysts
• Software engineers
• Database administrators
• Network administrators
Are IT Workers Professionals?
Legal perspective
– IT workers are not recognized as professionals because they are not licensed by
the state or federal government.
– IT workers are not liable for malpractice because they do not meet the legal
definition of a professional.
Professional Relationships That Must
Be Managed
- IT professionals have many different relationships with:
-IT workers must set an example and enforce policies regarding the ethical use of
IT.
-The Business Software Alliance (BSA) is a trade group that represents the
world’s largest software and hardware manufacturers.
Its mission is to stop the unauthorized copying of software produced by its
members.
Relationships Between IT
Professionals and Employers
Trade secret
Whistle-blowing
-Problems can also arise during a project if IT workers find themselves unable to
provide full and accurate reporting of the project’s status.
-Such a situation has the potential to undermine the objectivity of an IT worker due
to a conflict of interest—a conflict between the IT worker’s (or the IT firm’s) self-
interest and the client’s interests/
Relationships Between IT
Professionals and Clients
Fraud
-Crime of obtaining goods, services, or property through deception or trickery.
Misrepresentation
-is the misstatement or incomplete statement of a material fact.
-the other party to enter into a contract, that party may have the legal right to cancel
the contract or seek reimbursement for damages.
Breach of contract
-one party fails to meet the terms of a contract.
Relationships Between IT
Professionals and Suppliers
Develop good relationships with suppliers
Bribery
– Providing money, property, or favors to someone in business or government to
obtain a business advantage.
Relationships Between IT
Professionals and Suppliers
Distinguishing between bribes and gifts
IT professionals’ duty
• From the statistics, it is clear that there is a need to improve communication in the
workplace.
•Oral communication
•Listening
•Written communication
•Public speaking
•Adaptability
Effective Professional Communication
How do you improve communication?
•Ask for feedback : If you carry out a presentation, ask yourself how you think you
could improve next time.
•Learn from others : If you look up to someone who has good communication skills,
watch what they do and learn from them.
-IT workers of all types can improve their profession’s reputation for professionalism
by
(1) subscribing to a professional code of ethics,
-A professional code of ethics states the principles and core values that are
essential to the work of a particular occupational group.
• lists rules and principles by which members of the organization are expected to
abide.
Professional Codes of Ethics
IT professional organizations
-On the other hand, because certification is no substitute for experience and
doesn’t guarantee that a person will perform well on the job.
-IT employees are motivated to learn new skills, and certification provides a
structured way of doing so.
Certification
-Vendor Certifications
IT Professional Malpractice
Intended Learning Outcomes
•Duty of care refers to the obligation to protect people against any unreasonable
harm or risk
•The courts decide whether parties owe a duty of care by applying a reasonable
person standard to evaluate how an objective, careful, and conscientious person
would have acted in the same circumstances.
IT Professional Malpractice
•A breach of the duty of care is the failure to act as a reasonable person would
act.
•Professionals who breach the duty of care are liable for injuries that their
negligence causes.
•For example, a CPA who fails to use reasonable care, knowledge, skill, and
judgment when auditing a client’s books is liable for accounting malpractice.
Common Ethical Issues for IT Users
-Software piracy
•A common violation occurs when employees copy software from their work
computers for use at home.
•applications from the Google Play store without paying for them, and then use the
software or sell it to others.
Common Ethical Issues for IT Users
•The software piracy rate for that same game from Apple’s App store is closer to
60 percent.
•Some employees use their computers to surf popular websites that have nothing
to do with their jobs, participate in chat rooms, view pornographic sites, and play
computer games.
•A survey by the Fawcett Society found that one in five men admit to viewing porn
at work, while a separate study found that 30 percent of mobile workers are viewing
porn on their web-enabled phones.
•An IT user who shares this information with an unauthorized party, even
inadvertently, has violated someone’s privacy or created the potential that company
information could fall into the hands of competitors.
Common Ethical Issues for IT Users
-Inappropriate Sharing of Information
•An IT user who shares this information with an unauthorized party, even
inadvertently, has violated someone’s privacy or created the potential that company
information could fall into the hands of competitors.
Ethical Practices of IT Users
•The growing use of IT has increased the potential for new ethical issues and
problems; thus, many organizations have recognized the need to develop policies
that protect against abuses.
•Company IT managers must provide clear rules that govern the use of home
computers and associated software.
•The goal should be to ensure that employees have legal copies of all the software
they need to be effective, regardless of whether they work in an office, on the road,
or at home.
Ethical Practices of IT Users
-Defining an Acceptable Use Policy
•An acceptable use policy (AUP) is a document that stipulates restrictions and
practices that a user must agree to in order to use organizational computing and
network resources.
1. Purpose of the AUP—Why is the policy needed and what are its goals?
2. Scope—Who and what is covered under the AUP?
3. Policy—How are both acceptable use and unacceptable use defined; what are
some examples of each?
4. Compliance—Who is responsible for monitoring compliance and how will
compliance will be measured?
5. Sanctions—What actions will be taken against an individual who violates the
policy?
Ethical Practices of IT Users
•Members of the legal, human resources, and information security groups are
involved in creating the AUP.
•It is the organization’s information security group that is responsible for monitoring
compliance to the AUP.
•Organizations must implement systems and procedures that limit data access to
just those employees who need it.
•For example, sales managers may have total access to sales and promotion
databases through a company network, but their access should be limited to
products for which they are responsible.
Ethical Practices of IT Users
-Installing and Maintaining a Corporate Firewall
Kizza, J.M (2017).Ethical and Social Issues in the Information Age 6th ed: Springer.
.
References
Whitmant, M. Mattord, H. (2017). Principles of Information Security 6th Edition:
Cengage Learning. Social impact.(2020) Retrieved
from https://www.encyclopedia.com/computing/news-wires-white-papers-and-
books/social-impact