Explain Ethical Issues Related To Using Social Media

Superior Essays
Write a computer use policy.
1. Explain ethical computing
PC morals is set of good rule that control the utilization of PCs (Christensson, 2006). Some regular issues of PC morals incorporate licensed innovation rights, (for example, copyrighted electronic substance), protection concerns, and how PCs influence society (Christensson, 2006). It’s unethical to access someone’s personal information on a computer (Christensson, 2006). As the universe of PCs advances, PC morals keeps on making moral benchmarks that address new issues raised by new advances (Christensson, 2006).
2. Explain plagiarism and copyright infringement.
As indicated by the Merriam-Webster online lexicon, to "plagiarize" means: to take and go off (the thoughts or expressions
…show more content…
Sharing an Internet connection
a. Penalties
5. Explain ethical issues related to using social media.
In May 2012, Maryland became the first state to enforce a law that prohibits employers from asking current and potential employees information regarding their social media accounts (Evans, Martin and Poatsy, 2014). Employers are also prohibited from asking potential employees information regarding their gender, race, religion, age and sexual orientation, but some of this information can be found on profiles (Evans, Martin and Poatsy, 2014).
a. Give a specific example where an employee was terminated due to actions on social media.
In Maryland, a corrections officer was terminated and wanted to get his job back (Evans, Martin and Poatsy, 2014). During his interview, he was asked for his Facebook password. The employer then logged into his account to see if he was connected to any gangs (Evans, Martin and Poatsy,
…show more content…
A dominant part of supervisors screen their workers (1993). They are inspired by potential lawsuits and the expanding part that electronic confirmation plays in claims and government organization examinations (1993).
a. Keylogging
Keystroke checking tell a business what number of keystrokes every hour every worker is performing (1993). It likewise may advise representatives on the off chance that they are above or beneath the standard number of keystrokes anticipated (1993).
b. Reading emails
Messages are thought to be company property if they are sent utilizing the organization 's PC framework (n.d.). Supervisors for the most part have the privilege to screen and view representative email, insofar as they have a legitimate business reason for doing as such (n.d.). Numerous businesses now have email frameworks that duplicate all email messages as they go through the framework to check for efficiency, unlawful utilize, and different issues (n.d.). Messages are much of the time being utilized as confirmation amid trial to demonstrate representative unfortunate behavior or wrongdoing

Related Documents

  • Improved Essays

    In this case we are faced with an employee caught in the crossfire or an employee setting boundaries to protect employees, students and other involved, but also violates those same groups right to privacy. Under most circumstances, those employed by the city, state or federal government are subjected to limited privacy. Organization are often uncertain were to draw the line between protecting the company’s assets and employees while providing a safe and secure work and school environment. In this case we discuss an employer who installs a surveillance camera to solve the problem of continuous theft of student’s personal good.…

    • 612 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The world has registered huge technological intricacies concerning about social media. There are no contentions that the thrilling defect elevated to an extent that created the ethical issues governing social media. With increased usage of the social media for purposes other than personal affections, the question of privacy and confidentiality has been much highlighted by experts. Whereas the social media gives individuals the platform to publish and or share whatever they have in mind, there are expectations of limitations as to the extent to which personal information could be shared within these platforms.…

    • 284 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Record360 Privacy Policy

    • 1061 Words
    • 5 Pages

    Record360, Inc. Notice of Privacy Policy At Record360, we value your privacy and we are committed to respecting your privacy rights. We pledge to handle your personal information fairly and legally at all times. Record360 is also dedicated to being transparent about what personal information we collect and how we use it. This policy describes how we handle and use personal information; what personal information we collect; how we collect personal information; how we ensure your privacy is maintained; and your legal rights relating to your personal information.…

    • 1061 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Bans are getting made on social media to prevent people from using technology from work to use for personal or non-business use (Lyncheski, 2010). The pros involve the rights of the employees while on social media. This is the case when a company didn’t allow their employees to discuss wages or employment to a third party. A national board then fined the company because this is unlawful (Horowitz, 2014). Social Media in the Workplace: Effects on Employees…

    • 743 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    HIPPA Analysis

    • 209 Words
    • 1 Pages

    The healthcare industry has benefited from social networking; it is an inexpensive tool used to attract the community, recruit staff, advertise events and request donations. HIPPA regulation is a key reason; we must get permission from people to display photos of events, staff, and clients. At my place of employment, all new hires sign a release or declination form for the use of their photos. This is also included in the admission package for the residents; our proactive approach has prevented HIPPA violations. Staffs are also educated personal photos or patients and social media sharing of work-related activities are an offense and could end in termination.…

    • 209 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Public or private? Most individuals are asked this question before posting a status update or photo on social media networks. The small question may seem monotonous or insignificant, but with 52% of employers using social media in employment screening processes, individuals should consider being more careful about what they choose to post (Reinsch, et. al. 154). This controversial topic has been in place with the conjunction of current social media networks and Title VII of the 1964 Civil Rights Act that acknowledges discrimination of race, color, religion, sex, or national origin.…

    • 1021 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    There are multiple resources outlining the theory of plagiarism. In general, plagiarism consists of using another’s work or thoughts without providing the proper citation or credit for that work. While this definition may appear to be simple, the activities considered to be acts of plagiarism cover a much broader…

    • 50 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    In recent years as Information Technology continues to boom, background checks has been the norm in employment processes; employers are also able to monitor the working performance and many other aspects of workplace activities of their employees'. While there’re many claims by numerous institutions to be a gainful process (in other word increase productivity), there’re conflicting social ethics in association as most employees may not welcome such monitoring. Employees’ claims this type of surveillance is an infringement of their civil liberties and does violates of their privacy rights however; currently many types of electronic monitoring are allowed under the “The Electronic Communications Privacy Act of 1986 if employee consent has been obtained” (Barry 444). Currently, almost every institution require background checks and at the same time considerable number of employers routinely monitors the activities of their employees and infarct they’re inspired by burden over litigation due robust role video evidence plays in lawsuits and also aiding law enforcement agencies…

    • 1584 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Two Plagiarism Policies’ Comparison Acquiring acknowledge and creating your own thoughts is a complex process that most students face in college or university. Nowadays, in North America, plagiarism is a serious topic in academic life. Why?…

    • 1342 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Kick The Habit Essay

    • 768 Words
    • 4 Pages

    Kick The Habit If you place “privacy” on one side of the balance, and “security” on the other side, will they be equal? Or would one kick the beam? Would you like to have all your personal information laid out for the eyes of an officer for the sake of yours and others’ security? How would you feel if you enter a job interview knowing that the interviewer has a complete background check about you in his files? “Privacy” is defined as one’s right to keep personal information private.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    To Watch, or Not To Watch Enrique R. Garza ECPI University Employee surveillance is quite similar to spying on a permeant basis, and it is widely viewed as an infringement of constitutional rights of employees. If they do not wish to face an ugly lawsuit, organizations need to be more sensitive towards this issue. Technology makes it possible for employers to monitor any aspects of employees. Including telephones, computers, email and voice mail, and when employees are trolling online. Nearly everything one does on the office computer can be monitored.…

    • 524 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    1. Introduction According to Wikipedia, plagiarism is the “wrongful appropriation” and “stealing and publication” of another author’s “language, thoughts, ideas, or expressions”, and the representation of them as one’s own original work. Plagiarism itself is not a crime, but can constitutes copyright infringement. The idea remains problematic with unclear rules.…

    • 648 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Essay On Cyberspace

    • 935 Words
    • 4 Pages

    Computers and technology at large have change the lives of many people in the world both positively and negatively. Computers have unveiled many things which have greatly influenced our lives. This has made many teachers and students to adopt their use in classrooms. However, the use of computers in our classrooms have been characterized by over reliance on them. Cyber space have also played key roles in our lives.…

    • 935 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Cyberspace Ethical Issues

    • 1093 Words
    • 5 Pages

    Cyberspace use is spreading rapidly into our daily life, directly affecting the people's behavior and ideas. Cyberspace or the Internet existence definitely offers wider options of retrieving and collecting information. It surely can be beneficial to the society, but know they can poisonous. Although it may sound all interesting online, there are still drawbacks on the other side of the virtual world. The society may not aware of how the cyberspace is actually impacting our life in both positive and negative ways, unless until you have been the victim of cybercrime.…

    • 1093 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Linked to every single human being that uses technology, the biggest, most controversial feature of technology is privacy. With the advancement of the Internet, day to day activities and tedious tasks can be completed in no time. But the cost of using technology comes before our eyes when our personal information is at risk. Each action that we perform on the Internet is being monitored and recorded. With the push of a button, anyone can access an individual’s information on the Internet without permission.…

    • 830 Words
    • 4 Pages
    Improved Essays