Description
Write an organizational policy (or personal policy, if not in the job force) to correct the IT-related ethical issue that you described in Paper B1, where you mapped key organizational or personal issues and identified how these digital ethical issues were affected by relevant laws, regulations, and policies. Please incorporate the instructor’s feedback from the instructor’s evaluation of Paper B1, as appropriate and then use the Paper B1 matrix you produced as a supporting document.
The following elements must be addressed:
Look at other policies to see how they are written. While the following site: http://www.sans.org/security-resources/policies/computer.php, provides credible examples of templates for policies, an Internet search may provide other templates, however there is no need to copy a template for this assignment, as the template should only be utilized to provide guidance regarding the following headings.
Your policy should include appropriate information for the following major headings:
- Overview of the policy
- Purpose of the policy
- Scope (roles and responsibilities of stakeholders)
- Policy Points to follow - (Note: you should be aware that a policy only describes "what,"the staff of an organization will do, while a procedure describes "how," the staff of an organization will accomplish a required action. As a result, this section should only discuss the specific measures, needs, or changes to behavior within the organization in terms of policy points, i.e., what they must do to conform to the policy. Any procedures that are needed to assist in doing the “what,” are usually included by reference later in the policy – procedures should not be included in the policy points).
- Sanctions/enforcement of policy
Prepare a 2-3 page, double-spaced paper with your Organizational or Personal Policy (if not in the job force).
This assignment requires a minimum of three external references. Indicate appropriate APA source citations for all sources you use.
In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Hey again! Please find attached, in case you need edits, feel free to let me know.
Running Head: CYBERSTALKING
1
Stalking of Individuals Using Social Networking Sites
Name:
Institution:
2
CYBERSTALKING
Stakeholders
Confidentiality
Respect for persons
Beneficence
They have a duty to respect
They have the duty to Has the duty to ensure
the privacy of information
1. the stalker
respect the human their actions are meant
and actions of other social
rights of other users.
for good.
network users.
Duty to ensure users are
made aware that they are Duty to ensure the
content creators (Goldman, rights of users are
Duty to ensure its
2.
the
social 2007) and The site should preserved
and
actions brings good to
networking site
also conform to laws that maintained
in
its
all people to all people.
ensure the confidentiality of actions
(Gan
and
the information and actions Jenkins, 2015).
of users is preserved.
Duty to ensure their
Law enforcement agents
Law
enforcement
actions don’t go against
3.law enforcement must ensure their actions human rights of users of agents’ actions should
don’t infringe the privacy of
bring good to all
social networking sites
users of the networking site.
people.
(Paullet, 2009).
Users of social networking sites come in with different intentions. However, these
different opinions make tend to make nonmalicious users find it hard to post their personal
information on these sites. This is because this information might find its hands to strangers, in
this case, the stalkers. These strangers might then use this personal information to causing a
felony against the victim. For instance, the stalker might be aiming to harass the victim sexually
he, or she is stalking without the knowledge of the other user. On the side of the social
networking sites, the admins have a role to ensu...