Answer 1:
Ethics define socially acceptable behaviors. Ethics in turn are based on cultural mores: the fixed moral attitudes or customs of a particular group. Some ethical standards are universal. For example, murder, theft, assault, and arson are actions that deviate from ethical and legal codes throughout the world.In one sentence, law sets the minimum standard of human behavior while ethics sets maximum standard of human behavior. Law prescribes remedies and punishments for the violation of the standards it sets while ethics expects an ideal set of behavior of individuals concerned. Moral and ethical values can be instrumental in guiding the law making.
Answer 2:
Information security professionals help maintain security via the establishment and enforcement of policies. Thus, for a policy to become enforceable, it must meet the following five criteria:
● Dissemination (distribution)—The organization must be able to demonstrate that the relevant policy has been made readily available for review by the employee. Common dissemination techniques include hard copy and electronic distribution.
● Review (reading)—The organization must be able to demonstrate that it disseminated the document in an intelligible form, including versions for illiterate, non-English reading, and reading-impaired employees. Common techniques include recordings of the policy in English and alternate languages.
● Comprehension (understanding)—The organization must be able to demonstrate that the employee understood the requirements and content of the policy. Common techniques include quizzes and other assessments.
● Compliance (agreement)—The organization must be able to demonstrate that the employee agreed to comply with the policy through act or affirmation. Common techniques include logon banners, which require a specific action (mouse click or keystroke) to acknowledge agreement, or a signed document clearly indicating the employee has read, understood, and agreed to comply with the policy.
● Uniform enforcement—The organization must be able to demonstrate that the policy has been uniformly enforced, regardless of employee status or assignment.
Answer 3:
Within an organization, information security professionals help maintain security via the establishment and enforcement of policies. These policies—guidelines that describe acceptable and unacceptable employee behaviors in the workplace—function as organizational laws, complete with penalties, judicial practices, and sanctions to require compliance. Because these policies function as laws, they must be crafted and implemented with the same care to ensure that they are complete, appropriate, and fairly applied to everyone in the workplace. The difference between a policy and a law, however, is that ignorance of a policy is an acceptable defense.
Answer 4:
Management must make the policies basis for all information security , planning , design and deployment. Policies direct how issues are addressed and hoew technologies are used. Information security is primarily a mamnagement problem not a technical one, quality security programs begins and ends with policy.
Policy Management
1. Describe ethics, which are based on cultural mores and express the fixed moral attitudes or...
what discuss can you make about medicalization and chronic disease and illness? Adult Lealth Nursing Ethics mie B. Butts OBJECTIVES After reading this chapter, the reader should be able to do the following: 1. Explore the concept of medicalization as it relates to the societal shift away from physician predominance of the 1970s. 2. Differentiate among the following terms: compliance, noncompliance, adherence, nonadherence, and concordance. 3. Examine cultural views with regard to self-determination, decision making, and American healthcare professionals' values...