Wednesday, March 3, 2010

1st assignment in finals

OECD Guidelines

Though they are not law in the United States, the privacy guidelines issued by the Organization for Economic Cooperation and Development (OECD) in 1980 are an important part of privacy debates today. The OECD consists of bureaucrats from 29 countries that work to coordinate policies with the aim of fostering international trade. The United States is a member of the OECD and one of the largest funders of its $200 million dollar annual budget. The Secretariat of the OECD is in Paris, France.

The Guidelines involve eight principles, which in different variations are often touted as "fair information practices":

1. Collection Limitation Principle: There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject.
2. Data Quality Principle: Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, compete and kept up-to-date.
3. Purpose Specification Principle: The purposes for which personal data are collected should be specified not later than at the time of collection and the subsequent use limited to the fulfillment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose.
4. Use Limitation Principle: Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with Principle 3 except:
* with the consent of the data subject; or
* by the authority of law.
5. Security Safeguards Principle: Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorized access, destruction, use, modification or disclosure of data.
6. Openness Principle: There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and usual residence of the data controller.
7. Individual Participation Principle: An individual should have the right:
* (a) to obtain from the data controller, or otherwise, confirmation of whether or not the data controller has data relating to him;
* (b) to have communicated to him, data relating to him
o within a reasonable time;
o at a charge, if any, that is not excessive;
o in a reasonable manner; and
o in a form that is readily intelligible to him;
* (c) to be given reasons if a request made under sub-paragraphs (a) and (b) is denied, and to be able to challenge such denial; and
* (d) to challenge data relating to him and, if the challenge is successful, to have the data erased, rectified, completed or amended.
8. Accountability Principle: A data controller should be accountable for complying with measures which give effect to the principles stated above.

Wednesday, January 6, 2010

MIDTERM QUIZ

1. You are the CEO of a three-year-old software manufacturer that has several products and annual revenues in excess of 500 million dollars. You've just received a recommendation from the manager of software development to hire three notorious crackers to probe your software products in an attempt to identify any vulnerabilities. The reasoning is that if anyone can find a vulnerability in your software, they can. This will give your firm a head start on developing parches to fix the problems before anyone can exploit them. You're not sure, and feel uneasy about hiring people with criminal records and connections to unsavory members of the hacker/cracker community. What would you do?

=I will find and hire people that is good in hacking and people who can not share to others the information that he will discover about our software's for safety.If they can find vulnerabilities about our software I will hire people who can fix the software to back the software's guard and help the software hardened to any hackers in the future and before the other hackers exploits.


3. You are the CFO (Chief Finance Officer) of a midsized manufacturing firm. You have heard nothing but positive comments about the new CIO (Chief Information Officer) you hired three months ago. As you observe her outline what needs to be done to improve the firm's computer security, you are impressed with her energy, enthusiasm, and presentation skills. However, your jaw drops when she states that the total cost of computer security improvements will be 300, 000 dollars. This seems like a lot of money for security, given that your firm has no major incident. Several other items in the budget will either have to be dropped or trimmed back to accommodate this project. In addition, the 300, 000 dollars is above your spending authorization and will require approval by the CEO. This will force you to defend the expenditure, and you are not sure how to do this. You wonder if this much spending on security is really required. How can you sort out what really needs to be done with out appearing to be micromanaging or discouraging the new CIO?

=I will invetigate the new CIO because 300,000 dollars is very lot of money for computer security improvements if there something wrong about the new CIO I will fire him but if there's no wrong I will go to CEO to tell that 300,000 dollars is the budget for computer security improvements whats is 300,000 dollars if your computer security is very good.

Wednesday, December 2, 2009

Are I.T Workers Professional or Not? Yes or No?

Yes. I.T are professionals in terms of their skills. I.T are professional because I.T is not far from other courses such as now all the establishment and all the company is using high-technology such us computer and I.T is a branch of engineering that deals with the use of computers and telecommunications to retrieve and store and transmit information that's why I.T is more in demand course than other courses right now. The professional man or woman possesses distinctive qualifications. And, if you have finished your course degree even if it's in I.T. your now professional.

Wednesday, November 18, 2009

1ST ASSIGNMENT(PRELIM)

ETHICAL DECISION MAKING
Opening a business

1. Gather information of what type of business is in demand.
2. Identify stake holders and their positions because their position can help to your business they can help to increase the power of your business and some can make loss if they have different aim.
3. Consider the consequence of your decision because one wrong decision can make your business down.
4. To weigh various guidelines and principle to improve you business and the correct steps to improve you business.
5. You must to develop and evaluate option so you have a good option if your business gone wrong.
6. Review your decision to avoid mistake decision that can make your business bad.
7. Evaluate the result of your decisions to know what is good or bad move to your business


PHILOSOPHICAL THEORY IN ETHICAL DECISION

1.
The virtue ethics approach is important to your clients so they will try your business.
2.Utilitarian approach is important to business to respect the rights of others for example for the clients.
3.Fairness approach is important for clients to know your fair about the business
4.Common-good approach is important to your business you gave benefits to your all constituencies