1/34
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Code of conduct (COC)
Set of guidelines outlining the rules, responsibilities and expectations of an org
Used to display expected behaviours from each employee
Code of conduct purpose
Behaviour - rely on it to ensure the behaviour and actions of each employee are up to a certain standard
Company values - clearly state the values of company, makes a public statement of what they stand for
Code of conduct in IT
Work hours
Employee email
Employee internet use
Employee privacy
Employers monitoring internet/computer use
Work hours
Required work hours should be documented (e.g., punctuality, max hours in week)
Work breaks (e.g., work for 8 hrs receive a 30min paid meal break)
Location of working hours (e.g., WFH arrangements)
Employee email use
Employer provides an email system for work purposes (e.g., don’t sign up for non work sites/services)
Should be used for work purposes only (e.g., some may be more lenient - send to friends/family)
Employee internet use
Employer provides internet use for work purposes
How much used by employees for private use will vary (e.g., download large files)
Represent company positively
What internet may and may not be used for stated in COC (e.g,, conduct activities that prevent effective work, download/use of copyright materials)
Employee privacy
Many companies have large amounts of private data that needs to be kept within the company (e.g., customer and employee info)
Everything to do with use of private data will be stated in COC (e.g., don’t store private data on personal devices)
Will relate to Privacy Act
Employer monitoring computer use
Keen to run business as efficiently as possible
Apps, monitoring software and tracking devices allow employers to do so
Impacts employee trust
Monitoring computer use purpose
Work output - if employees are often on internet for non work related activities, they are losing productive work time
Monitor progress - better help, assist them if any issues are identified
How private data is handled
Attendance and productivity if WFH
Internet censorship
Control of what can be accessed, published or viewed on the internet
May be carried out by govs or private orgs
How censorship is done
By controlling internet service providers (ISPs)
Users need to have a connection to the internet
ISPs serve as a gateway to the internet
Can censor areas of the internet or completely pull the plug on the internet if the gov orders them to
Censorship methods by ISPs and orgs
IP address blocking - block IP address of a website
Domain name filtering - block domain name of website
Keyword blocking/packet filtering - scan the URL for keywords and if they are found the address is blocked
Censorship purpose
Controversial topics
Illegal activities
Shut down free speech - to minimise or prohibit free speech
Prevent fake news/misinfo
Censorship negative impacts
Limits free speech and accessible info
Prohibit comms
Censoring info for edu/study purposes
News and current events - not knowing what happens around the world, one POV
Digital tech
Any electronic tool that can generate, store or process data
e.g., PC, smart watch, software, websites, game console
Global market
Market - place (virtually or physically) where goods and services are bought and sold
Global - across the world
Access global markets with digi tech
Online gaming services (local - EB Games) - Steam, PS Store
Online streaming services (local - Blockbuster) - Netflix, Stan, Disney+
E-commerce (local - shopping malls) - Amazon
Music streaming (local - JBHifi) - Spotify, YouTube Music
Impact of digi tech and global markets on:
Productivity
Knowledge
Accessing global markets
Confidentiality of data
Availability of online apps
Level of accessibility
Sensitivity of docs
Who can access the data
Complete access - go to website
Restricted access - log in (tiered levels of access - staff, admin)
Accessibility of data
More valuable the data is, more care needs to be taken to keep it safe - make inaccessible to people
Businesses need to use secure passwords and consider reliable/secure cloud storage services, levels of accessibility to protect data
Sensitive info
Data that can be used against a person/org
Level of harm that can be caused by its exposure
Highly - must be protected from unauthorised access to safeguard the privacy or security of an individual or org (financial records, IP)
Medium - (emails and docs without confidential data)
Low - won't cause harm or issue when made public (public website content)
Confidential - to be secret When we pass on private data to others, we have expectation that it'll be confidential
Sensitive docs shouldn't be accessed by unauthorised parties
People need to consider where they place confidential data due to security risks
- Cloud docs are located on servers of third party companies
- May not be as secure as storing data locally (HDD at home)
Service
What someone provides for you (e.g., internet service provider (ISP))
Service Level Agreement (SLA)
Written agreement between the service provider and the client that defines the quality of service expected from the service provider
SLA purpose
Service provider can cover themselves if something goes wrong - if internet down, possible periods of downtime may occur stated in SLA
Make it clear to both parties what to expect, avoiding unrealistic expectations
Keeps service providers accountable
SLA features
Types of services offered (exclusions)
Availability (length of contract, times available)
Penalties
Who service is between