AU Codes of Conduct & Allowing Government Backdoor Access to Company Technology Essay

User Generated

oevgwbpne803

Writing

ashford university

Description

Part One

Professional Codes of Conduct

Prior to beginning work on this discussion read Chapter 7 from the text, review any relevant information from this week’s lecture and read the following online resources:

There are several professional codes of conducts for IS professionals which are designed to guide their professional behaviors. For this discussion forum, select two Information Systems codes of conduct and address the elements below. Your initial post should be a minimum of 300 words.

  • Describe each conduct code, explaining the emphasis of each.
  • Compare and contrast the conduct codes for similarities and differences.
  • Explain which code you would choose to follow and provide a rationale for your choice.

Guided Response: Review several of your classmates’ posts and respond to at least two of your peers by 11:59 p.m. on Day 7 of the week. You are encouraged to post your required replies early during the week to promote more meaningful interactive discourse in the discussion.

Part Two

Allow Government “Backdoor” Access to Company Technology?

Prior to beginning work on this discussion read the Keys Under the Doormat: Mandating Insecurity by Requiring Government Access to All Data and Communications (Links to an external site.) and review any relevant information from this week’s lecture.

In an effort to fight terrorism, the federal government has sought the assistance and involvement of major Internet and technology companies (e.g., Yahoo, Microsoft, and Apple) to allow “backdoor access” to their technology (especially their encrypted communications technology) so that the government can better monitor communications of suspected terrorists. In theory, this backdoor access would be a non-public method of accessing the technology that only the federal government would be permitted to use at their discretion.

You are the CIO of a developing American technology company with over 500,000 customers. The federal government has contacted the Board of Directors of your company seeking the company’s participation in allowing the federal government backdoor access to your company’s technology for the reasons stated above. The Board seeks your professional advice and opinion on whether the company should freely give the federal government this type of access to your company’s technology. You need to provide guidance to the Board.

In a minimum of 300 words, explain whether technology companies should voluntarily grant the federal government backdoor access to a company’s technology (specifically their encrypted technology), providing legal and ethical rationale(s) for your determination. Support your position with evidence from your readings.




User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

1

Code of Ethics and Government Backdoor Access
Student’s Name:
Institution:

2
Part 1: Codes of ethics
A Code of ethics is a set of ethical values, is meant to provide a set of guiding
principles for employees to follow as well as setting standards in a working environment.
Although they have similar applications and purposes, they are adjusted or created their
areas of usage. This is seen below in the description of AITP's codes of ethics and ACM's
software engineering code of ethics.
The following are the AITP's code of ethics: One has a duty to the management
and hence promoting the comprehension of various data processing methods, procedures,
and techniques using the accorded resources. This code is meant to ensure one respects
authority whiles also yielding their abilities selflessly and using available resources
optimally. One has a duty to the fellow AITP members and hence should deal with
fairness and trustworthiness consistently. This code outlines the standards at which the
members are supposed to uphold when interacting with each other. One has an obligation
to the society and will, therefore, take part in the dissemination of information on the
general turn of events without using any classified information to ones' advantage. This is
meant to enhance the benefits of AITP to society while also limiting the use of
information to acceptable confined.
One has an obligation ...


Anonymous
This is great! Exactly what I wanted.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Content

Related Tags