The Ethical Use of Information Technology.Docx

Submitted by: Submitted by

Views: 92

Words: 1026

Pages: 5

Category: Science and Technology

Date Submitted: 01/17/2015 08:05 AM

Report This Essay

The Ethical issues that relate to the use of Information Technology

By Trenton Winfield

The word “ethics” is defined by Merriam-Webster as rules of behavior based on ideas about what is morally good and bad. When put into relationship with using information technology it means handling computer hardware, software, electronics, semiconductors, internet, and computer service with care and not using the information for personal gain. The ethical issues as they relate to the use of information technology, according to Richard O. Mason of GDRC, are privacy, control, accuracy and security. Each plays a part in the trust we give to people in charge of this information

Privacy can be defined as an individual condition of life characterized by exclusion from publicity (Neetling, 1996, p. 36). Enormous amounts of information are collected on people and is used for different purposes like, tax collection and demographics. Advances in technology have significantly changed what can be gathered and used. These advances produce the chance for wider access to information. At the same time, making it easier for more people to access a person's private information. Companies usually have operational policies and procedures to address the proper handling of personal data, but they have to be followed and enforced. If not properly safeguarded, the data that businesses collect on their employees, can result in adverse consequences for the employees. Authorized personnel maintain and access information such as background data, social security number and account numbers. Databases that keep track of this data are protected, but at some point in time, data must leave out of those systems to be used. Organizations regularly share this data with one another and merge databases containing all sorts of information. Fortunately, people can leave out information electronically by use of security measures like, passwords.

Procedures or policies that provides a reasonable guarantee that the...