ShyenneDebar_Assignment 10

docx

School

Purdue Global University *

*We aren’t endorsed by this school

Course

190

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

11

Uploaded by BaronOkapi3490

Report
<Name> Purdue U <Date> Unit 10: Brightspace Assignment – Computer Use Policy
Unit 10: Brightspace Assignment – Computer Use Policy 1 Purpose: In this assignment, you will write an expository report to outline a computer use policy. Consider the following fictional scenario below described in a memo, a form of communication you will typically encounter in your future employment: Memo To: Technology Advisor From: Legal Re: Computer Use Policy Due to many changes in the corporate structure and global growth and because we have instituted a new “bring your own device” policy, it is very important that we create a computer use policy for all employees to sign. This will alert them to potential ethical issues that may arise due to the use of the company technology. Areas to include to ensure our entire workforce is represented: 1. Creativity and innovation 2. Diverse knowledge 3. The ability to compete 4. Enterprise skills 5. Ethical concerns The policy needs to reflect your knowledge of the values of and technology use by different cultures. Please research several Computer Use Policies online. You may use them as guides in the development of our policy; however, it is very important that you do not duplicate or copy any policy to avoid copyright infringement claims against the company. Research Technical Writing to see some more examples and best practices in writing professional and legal policies. Assignment Instructions: Write a computer use policy that addresses the following topics: 1. Your explanation of ethical computing 2. Your explanation of plagiarism and copyright infringement. a. What is the difference between the two? b. How do you know if you are plagiarizing or violating copyright? c. Research plagiarism and find an example of plagiarism that was in the news. d. Explain copyleft. e. Summarize ethical concerns and describe how different cultures may view these topics. 3. Your explanation of software piracy. a. What are the penalties? b. Summarize ethical concerns and describe how different cultures may view this topic.
Unit 10: Brightspace Assignment – Computer Use Policy 2 4. Your explanation of ethical issues related to using social media. a. Give a specific example in which an employee was terminated due to actions on social media. 5. Your explanation of an employer’s legal right to review employee activities using their technology in each of the following ways listed below. Remember an employer’s goal is to maintain a secure network and to protect company assets and information. For each method below, give specific examples in which the law has been upheld or applied: a. Keylogging b. Reading emails c. Monitoring Internet usage/sites visited When answering these questions, please write 3 to 4 sentences on each topic . Give examples and supporting details where appropriate. Use a minimum of 2 sources other than your book. Ensure you include a title and a reference page. Remember to cite your sources using APA 7.0 citation style. TEMPLATE BELOW
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Unit 10: Brightspace Assignment – Computer Use Policy 3 123ABC Computer Use Policy Purpose: To explain, discuss, and outline computer technology concepts such as ethics, plagiarism, copyright infringement, copyleft, software piracy, shared internet, and ethics with regards to social media, and the legal rights contained herein by the 123ABC Corporation. For the purposes of this document, “company” will be used in lieu of the 123ABC Corporation, and “You” will be used in lieu of an employee of the 123ABC Corporation. SECTION I I. Ethical Computing: Computing ethics are the moral principles and procedures that help govern how to consume technology at home, school, and work. For each of these locations there are different values and practices you use without damaging the beliefs of anyone. The core issues of there are internet privacy and publication of copyrighted materials. With regards to the company policy, you are expected to : The most common issues that arise when it comes to computer ethics are personal communications and social media. While many employees may avoid using their personal email at work, many will allow friends and family to contact them on their work email. Inappropriate communication is probably less of a worry than social media. People tend to lose track of time when browsing sites like Facebook and Twitter. This can waste company resources, as well as infringing on productivity and deadlines. The best policy is to encourage employees to focus on their job duties during business hours.
Unit 10: Brightspace Assignment – Computer Use Policy 4 SECTION II II. Plagiarism and Copyright Infringement: Copyright and Plagiarism can be categorized as using as the misuse of someone else’s work. While most confused these two concepts, they are distinctly different and can get you in a lot of trouble if you not being careful. With regards to this policy, I understand and acknowledge the following: II.A. Plagiarism and copyright infringement are distinct from each other in the following way: Plagiarism is the act of using or taking a small piece of someone else’s work and claiming it as their own without proper credit to the original artist. Copyright is when you take an entire piece of work and credit the author. However, because they used the entire piece without permission it is infringing on the authors copyright law. II.B. Plagiarizing / Violating a Copyright: Plagiarism can be tricky to detect so it is important you mark and properly cite all work you have looked at and used in your writing. Copyright is something that is constantly monitored, while some slip through the cracks most people who use certain media in a piece of work can get their work removed completely. II.C. Example in national news article: An NBC news reporter admitted to plagiarizing part of 11 different articles in her time working for them. An editor’s note was placed on the articles and all traces of plagiarism was remove. The reporter herself was fired and no longer works for NBC. II.D. Copyleft: Copyleft is the reverse of Copyright, Copyleft is when a program or piece of work is free to use. However, all modified and extended versions are required to be free as well. II.E. Summary of ethical concerns and describe how different cultures may view these topics: Even though there is over 700 million people from different countries who use the internet to work and surf the web. Some countries do not allow any form of connection to the internet and keeps their contact with technology very minimal.
Unit 10: Brightspace Assignment – Computer Use Policy 5 With regards to the company policy, you are expected to : Understand what copyright laws protect. Copyright laws are often confused with trademarks, patents, and licenses. Although these are all forms of IP, copyrights are perhaps the easiest to obtain and to violate—either intentionally or unintentionally. Familiarizing yourself with the U.S. Copyright Act of 1970 and the Berne Convention regulations is a good start. If it's not your original work, don't use it. We're all probably familiar with the saying, "If it's not yours, don't touch it." Copyright laws adhere to the same philosophy: the golden rule is to obtain the express permission from the owner, creator, or holder of the copyrighted material. Unless you're the creator of the work, you're not allowed to use it. This is true even when there is no copyright symbol associated with a work.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Unit 10: Brightspace Assignment – Computer Use Policy 6 SECTION III III. Software Piracy : Software piracy is the illegal copying, installation, use, distribution, or sale of software in any way other than that is expressed in the license agreement. The software industry is facing huge financial losses due to the piracy of software. Piracy of software is performed by end-users as well as by the dealers. With regards to the company policy, you are expected to : The dynamic and demanding context of software engineering requires a code that is adaptable and relevant to new situations as they occur. However, even in this generality, the Code provides support for software engineers and managers of software engineers who need to take positive action in a specific case by documenting the ethical stance of the profession. The Code provides an ethical foundation to which individuals within teams and the team can appeal. III.A. What are the penalties? In the United States, the maximum civil penalty is $150,000 per infringement in a lawsuit for a copyright violation. This means that for every single program or work that was illegally copied and/or distributed, the infringer could have to pay $150,000. As you can imagine, a civil suit may cost a violator millions of dollars. III.B. Summarize ethical concerns and describe how different cultures may view this topic. The US has the lowest percentage of piracy compared to other countries. Most people from other countries don’t even understand that it is wrong and see no issue with it. Other countries also operate differently when handling laws, so they usually receive no punishment at all.
Unit 10: Brightspace Assignment – Computer Use Policy 7 SECTION IV IV. Ethical issues related to using social media: Identity theft is one from many examples of ethical issues in social networking. It is a form of technique used by criminals to impersonate someone's identity with intention to pursue or commit for crime. The victim will be held responsible for the consequences of fraud or action done the impersonators. IV A. Example in national news article where employee was terminated: A woman in Denver was getting ready to start her new job in the tech industry. She decided to make a TikTok about her new salary that received 168,000 views. Her boss found out about her videos, and she was swiftly fired. With regards to the company policy, you are expected to : Employees should avoid linking themselves with their companies. In other words, they should not list their companies in their social media profile or post information that can link themselves to their companies. This does not completely take away the connection but at the very least, it makes it difficult for netizens to connect the unflattering actions of employees to the businesses where they are employed.
Unit 10: Brightspace Assignment – Computer Use Policy 8 SECTION V V. Employer’s legal rights to review your activities using their technology: According to ECPA, if an employer provides a computer, it is company property, and generally, an employer is allowed to monitor all activities employees carry out on it. This includes but is not limited to stored documents/files, downloads, internet usage, and active/idle time. V A. Example in national news article related to an employer’s right to keylogging: On May 24, 2021, Pelton was interviewed by FBI agents at his home regarding his use of the devices. According to court records, Pelton told agents that he did not know what keyloggers were nor their function. Pelton also denied researching keyloggers and stated that he did not remember purchasing or receiving the devices. Court documents state that these claims were false, and Pelton made them know that they were false. V B. Example in national news article related to an employer’s right to reading emails: Many employers adopt written policies stating that work emails are not private and require employees to sign a form acknowledging their understanding of this situation. Even without this extra step, however, courts have found in favor of the employer's right to monitor use of their own email systems. V C. Example in national news article related to an employer’s right to monitoring Internet use and sites visited: In our first study, we surveyed more than 100 employees across the U.S., some of whom were subject to monitoring at work and some of whom were not. We found that monitored employees were substantially more likely to take unapproved breaks, disregard instructions, damage workplace property, steal office equipment, and purposefully work at a slow pace, among other rule-breaking behaviors.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Unit 10: Brightspace Assignment – Computer Use Policy 9 With regards to the company policy, you are expected to : Our vision is to be the leading provider of [insert product or service here]. To achieve our vision, we must exceed the expectations of our customers in everything we do. This requires every member of our team to be committed to always providing outstanding customer service. The following standards have been developed to ensure that we consistently deliver the high level of customer service that our customers expect and deserve: We will always: • be polite, professional, and courteous • be responsive to customer inquiries and requests • handle customer complaints promptly and effectively • continuously strive to improve our level of service We will never: • keep customers waiting unnecessarily • fail to follow up on promised actions • speak negatively about other employees or the company in front of customers • engage in any form of dishonest or illegal activity Thank you for adhering to these standards and helping us provide an exceptional level of service to our customers. If you have any questions or concerns, please do not hesitate to speak with your manager. Thank you.
Unit 10: Brightspace Assignment – Computer Use Policy 10 References https://www.techopedia.com/definition/5499/computer-ethics https://copyrightalliance.org/differences-copyright-infringement-plagiarism/ https://www.foxnews.com/media/nbc-news-admits-plagiarism-multiple-articles-digital-reporter https://rcvest.southernct.edu/understanding-computer-ethics-globalization/ https://www.hindawi.com/journals/sp/2020/6647819/ https://www.acrwebsite.org/volumes/11811 https://cariblogger.com/ethical-issues-in-social-networking/#:~:text=Identity%20theft%20is %20one%20from,or%20action%20done%20the%20impersonators . https://www.usatoday.com/story/money/2022/07/15/tiktok-firing-job-employment- law/7782788001/ https://www.nolo.com/legal-encyclopedia/can-employer-read-email-personal-account.html https://www.justice.gov/usao-ndoh/pr/former-public-utility-employee-pleads-guilty-installing- keylogger-devices-work https://www.currentware.com/blog/should-you-use-keyloggers-on-employee-computers/ https://hbr.org/2022/06/monitoring-employees-makes-them-more-likely-to-break-rules https://www.legalzoom.com/articles/how-to-avoid-copyright-infringement https://backboneamerica.com/computer-ethics-in-the-workplace/ https://www.daytranslations.com/blog/social-media-ethics/ https://www.liveagent.com/templates/customer-service-policy-templates/