ipl-logo

Debra Shinder: Ethical Issues For IT Security Personnel

820 Words4 Pages

Ethical issues for IT security personnel (Question-4)

Introduction
Ethics refers to some rules and guidelines. Every domain has their domain-related ethics, considering Information Technology(IT) which follows the IT related ethics. These ethics are the guiding principles to face some critical ethical contests. Emerging and existing Information Technology in the market is facing challenges related to security, privacy and cost concerns. These challenges can be resolved by following the IT ethics.
Ethical Issues
The most common ethical issues in Information Technology are privacy, ownership, control, …show more content…

You try to explain this to the client, but he/she is adamant. Should you go ahead and configure the network in a less secure manner? Should you ‘eat’ the cost and install the extra security measures at no cost to the client? Should you refuse to do the job? “
Firstly, applying the compliance and all the core values mentioned earlier. Compliance is meeting the requirements of the client or not. In the given issue, the client did not mention any requirement for the additional security. Security is the prime ethic to be considered where it promotes good and reduces harm. The responsibility in my role is to explain the threats included and explaining the measures against the security threats. Explaining the client for the need to protect the sensitive data. Trying to make the client understand that individual trust and reputation are based on the security of the network. Considering all the above I’ll try to convince the client to implement the measures recommended because the clients trust and reputation are to be preserved. If not convinced ,approaching other solution within the given cost but retaining the security at the most important. This is my perspective in resolving the issue ethically. At any point, I will not install the extra security measures at no cost or in a less secured manner rather I would propose another model in configuring the network in a secured manner but reliable cost so that client can accept

Open Document