Write an expository report to outline a computer use policy. Consider the following fictional scenario below described in a memo, a form of communication you will typically encounter in your future employment:
Memo
To: Technology Advisor
From: Legal
Re: Computer Use Policy
Due to many changes in the corporate structure and global growth and because we have instituted a new “bring your own device” policy, it is very important that we create a computer use policy for all employees to sign. This will alert them to potential ethical issues that may arise due to the use of the company technology.
Areas to include to ensure our entire workforce is represented:
- Creativity and innovation
- Diverse knowledge
- The ability to compete
- Enterprise skills
- Ethical concerns
The policy needs to reflect your knowledge of the values of and technology used by different cultures.
Please research several computer use policies online. You may use them as guides in the development of our policy; however, it is very important that you do not duplicate or copy any policy to avoid copyright infringement claims against the company.
Write a computer use policy that addresses the following topics: - Your explanation of ethical computing
- Your explanation of plagiarism and copyright infringement.
a. What is the difference between the two?
b. How do you know if you are plagiarizing or violating copyright?
c. Research plagiarism and find an example of plagiarism that was in the news.
d. Explain copyleft.
e. Summarize ethical concerns and describe how different cultures may view these topics. - Your explanation of software piracy.
a. What are the penalties?
b. Summarize ethical concerns and describe how different cultures may view this topic. - Your explanation of ethical issues related to using social media.
a. Give a specific example in which an employee was terminated due to actions on social media. - Your explanation of an employer’s legal right to review employee activities using their technology in each of the following ways listed below. Remember an employer’s goal is to maintain a secure network and to protect company assets and information.
For each method below, give specific examples in which the law has been upheld or applied:
a. Keylogging
b. Reading emails