Management Of Information Security
6th Edition
ISBN: 9781337671545
Author: WHITMAN
Publisher: Cengage
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 8, Problem 1EDM
Program Plan Intro
Code of ethics:
- The “ethics” word comes from the Greek term “duty”.
- The code of ethics means all the responsibilities that professional must respect when carrying out their work.
- It also contains the core value of the work and the behavior which should be adopted.
Example:
Professional and confidentiality secrecy are responsibilities contained in the code of ethics and conduct in numerous professions like accountants, lawyers, doctors and journalists.
Intent of the code of ethics:
- The intent of the code of ethics established by a professional order as a way to safeguard public and the status of the professionals.
- The employee who breach their code of ethics suffer disciplinary actions that can range from a warning or rebuke to dismissal or ejection from their professional order.
Privacy policy:
- A privacy policy denotes a statement that discloses some or all ways an organization would gather, use, disclose and manage data of customers as well as clients.
- It fulfills a legal requirement for protecting privacy of customers as well as clients.
- Personal information denotes anything that could be used to identify an individual.
- It represents a generalized treatment that tends to be more specific and detailed.
- The exact content of certain privacy policy will depend upon applicable law and need to address requirements across all boundaries.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What precisely do we mean when we say that the standards need to be wide and consistent
when we talk about them?
Charlie looked across his desk at Kelvin, who was absorbed in the sheaf of handwritten notes from the meeting. Charlie had asked Kelvin to come his office to discuss the change control meeting that had occurred earlier that day. “So what do you think?” he asked.“I think I was blindsided by a bus!” Kelvin replied. “I thought I had considered all the possible effects of the change in my project plan. I tried to explain this, but everyone acted as if I had threatened their jobs.” “In a way you did,” Charlie stated. “Some people believe that change is the enemy.” “But these changes are important.” “I agree,” Charlie said. “But successful change usually occurs in small steps. What’s your top priority?” “All the items on this list are top priorities,” Kelvin said. “I haven ’t even gotten to the second tier. ” “So what should you do to accomplish these top priorities?” Charlie asked.“I guess I should reprioritize within my top tier, but what then?”“The next step is to build support before the…
Sally works as a junior analyst for a medium-sized IT consulting firm. Her manager, Bob, has asked her to draft a response to an RFP from a large company that is seeking IT consulting services in connection with a new accounting system. As Sally worked on the RFP, she noticed a specific question about her firm’s recent experience on this type of system. To the best of her knowledge, the firm has only worked on one other accounting project in the last three years. When Bob saw Sally’s draft response, he was upset about the way she answered the question. “You don’t have to be quite that candid,” he said. “Even though we only had one formal project, we do have several people who worked on accounting systems before they came here.” “Yes,” Sally replied, “But that isn’t what the question is asking.” As he left her office, Bob’s final comment was, “If we want that job, we’ll have to come up with a better answer.” Thinking about it, Sally isn’t comfortable with anything but a straight answer.…
Chapter 8 Solutions
Management Of Information Security
Ch. 8 - Prob. 1RQCh. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5RQCh. 8 - Prob. 6RQCh. 8 - Prob. 7RQCh. 8 - Prob. 8RQCh. 8 - Prob. 9RQCh. 8 - Prob. 10RQ
Ch. 8 - Prob. 11RQCh. 8 - Prob. 12RQCh. 8 - Prob. 13RQCh. 8 - Prob. 14RQCh. 8 - Prob. 15RQCh. 8 - Prob. 16RQCh. 8 - Prob. 17RQCh. 8 - Prob. 18RQCh. 8 - Prob. 19RQCh. 8 - Prob. 20RQCh. 8 - Prob. 1ECh. 8 - Prob. 2ECh. 8 - Prob. 3ECh. 8 - Prob. 4ECh. 8 - Prob. 5ECh. 8 - Prob. 1DQCh. 8 - Prob. 2DQCh. 8 - Prob. 3DQCh. 8 - Prob. 4DQCh. 8 - Prob. 1EDM
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Do you know what the SDLC is or are you familiar with it? the names of each of their several phases?arrow_forwardLet's pretend you've been tapped to lead a JAD meeting. If you were in charge of a JAD session, make a list of 10 rules that all attendees have to follow.arrow_forwardDo you know what SDLC is or are you acquainted with it? What are the names of their various phases?arrow_forward
- Please provide a more in-depth response. Many thanks The firm will no longer provide support for your present LIS system, thus you will need to choose a new one. The right system for your lab depends on a number of factors. (Remember that you still need to provide testing on the present system even while you make this change.) Do you handle everything in one fell swoop, and if so, why and how?arrow_forwardLet's say you've been asked to act as the JAD session's facilitator. If you were in charge of a JAD session, what ten guidelines would you establish for the attendees to follow?arrow_forwardDo you have any experience with SDLC, or are you at least aware of what it is? The names of the several stages they go through?arrow_forward
- What are some of the opinions that you have about the usage of electronic mail? Which steps need to be carried out before an email may be sent from A to B? Make a note in your mind of the amount of understanding you now possess. What precisely does it mean to discriminate between things, and why is it so very crucially necessary to do so? Take into consideration the quantity of detailed information that was included into each of the models (or different degrees of abstraction).arrow_forwardI'm interested in hearing your perspectives on the topic of email. How many checks need to be made before email may be forwarded from point A to point B? Take notice of how much you understand right now. What does it mean to make distinctions, and why is it so crucial to do so? Take into account how much nuance was included into various models (or abstraction levels).arrow_forwardWhat are their similarities and what are their differences? Are there any connections between them?arrow_forward
- Answer Q1(a) and Q1(b) based on Figure Q1. Your team received a system request by the Principal of Tuition Center located at Malacca. The management ask to improve their current management system. In the first week, your team comes to the place to see the staffs' routine works using the current system. They sit at the receptionist counter, monitor the staffs and students there. In the meantime, they also make copies all the forms they use like subjects' registration form, fees payment form and exam marking form. They notice a list of pass years exam results was display in glasses notice bord. On the following weeks, they organize a meeting to collect all requirements. FIGURE Q1 (a) Based on the Figure Q1, analyze THREE (3) types of requirements gathering. (b) Interview is the best technique to elicitation the requirements for this case. State FOUR (4) suitable users to be selected as the interviewees.arrow_forwardIs it important to have a formal SDLC? What are the alternatives? How formal should it be?arrow_forwardHow do you go about selecting the ready-made software that will be used? Which sorts of criteria need to be used as standards?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning