Cybersecurity Risk
When technology (emails and internet access) was readily available for most, many companies remained loyal to paper and pen. Beyond the financial cost of embracing this technology, businesses were understandably concerned with compromising the quality of their services and with possible security breaches. Eventually, businesses embraced technology and recognized its power to help individuals and organizations. Technology has brought us a wealth of conveniences, including access to information that was previously inaccessible or difficult to access. The positive aspects of technology are sometimes overshadowed by its misuse, including concerns about privacy, accountability, and trust. The power of technology also revealed the danger of using technology in an unscrupulous manner which could harm those individuals and organizations.
Review these articles:
1)What Companies are Disclosing About Cybersecurity Risk and Oversight
2) Legal Profession, Professional Perspective – Tech Competence From the Courtroom to Cyberspace
3) Overview of Ethics in Tech Practice
A company needs your help developing a plan so that its staff can use technology in an ethical fashion.
Does your intended profession (law, IT, cybersecurity, etc.) have any guidelines or rules that address what is ethical conduct? For example, in the legal profession, attorneys in each state must comply with their state\\\’s Rules of Professional Conduct, the Association of Computer Machinery has the ACM Code of Ethics and Professional Conduct, and the Institute for Electrical and Electronics Engineer has the IEEE Code of Ethics has a Code of Ethics. Explain your understanding of these codes or rules that concern technology and ethics.
In light of the codes or rules that you reviewed, set forth at least three ethical rules with which you would want the company to comply so that its staff is ethical in using technology.
Discuss at least two ethical concerns discussed in the above-listed articles. What would you do to prevent any ethical violations and how would your plan be managed? What could happen if there was a violation of the ethical rules as a result of technological incompetence or deliberate misuse?
Requirements: 300 words
ATTACHMENTS
Answer preview to Cybersecurity Risk
APA
300 WORDS