Code of Ethics and Security Threats Assessment

Code of Ethics and Security Threats Assessment

Code of Ethics and Security Threats Assessment

Introduction

A cloud service is nothing but a resource that is offered at the internet. This code of ethics and security threats assessment provides the various codes and legislations practiced by the organizations are to maintain the code and ensure that the ethics and the codes are followed by the workers. Thereby, these laws are applied at the given 3 case scenarios.

Code of Ethics and Security Threats Assessment

Identify any current legislations or standards as well as Australian Computer Society Codes of Practice

The US National Institute of Standards and Technology (NIST)- The definition of the cloud computing is given in the US National Institute of Standards and Technology which states that a cloud computing is a “a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”(DEPARTMENT OF FINANCE AND DEREGULATIO, 2011).Various copyright owners use services of cloud computing to bring the materials that are copyright to the end users. In scenario 1, the DJ has thereby got access to the music from the net which is valid under the National Institute of Standards and Technology.

Identify the relevance of this legislation/code to the organizations goals

Relevant code and conduct

How it helps  in achieving the  organizational outcomes

Australian Computer Society Code of Professional Conduct

The main objectives of this code to "to advance professional excellence in information technology" and "to promote the development of Australian information and communications technology resources"

(Australian Computer Society, 2014)

Discuss any ethical considerations and the strategies you would take to ensure workers are following the code of practice documented by your organization

There are various reasons why the code of ethics should be practiced in the organizations. The codes document the standards according to which the organizations are held to responsible for the conduct of its members. The contents of the code in my organization shall be user friendly so as to maximize its utilization. We shall make a very substantial code so that it is more specific and definite. The basis of the code is the summary of the set of policies and this has to be presented primarily, subsequent to extended inspirational or authoritarian statements that will constitute the code. Again these are subsequent to the commentary which elucidates all the statements in return (William Gellermann, 1990).

Discuss any privacy issues and strategies you would follow to ensure the privacy policy of your organisation was being upheld

The Privacy Legal Agreements (PLAs) intends to be utilized for the Cloud Services Agreements in order to portray the stage of the protection of the privacy which shall be maintained by the cloud service provider (CSP). The Service Level Agreements (SLAs) are usually utilized to offer metrics and other information’s based on the performance of the services. The Privacy Legal Agreements shall address the information based on the privacy and the practices on protecting the personal data (Cloud Security alliance, 2013).Hence, my organization shall make these contracts for the provisos of the cloud services. In scenario 2, the data is a personal data of the organization and shall be meant to be kept confidential so as to retain the trust and maintain the privacy of the client.

Get more information ICT 331 Ethics Assignment

Document and implement inclusions to your policy/code that may be necessary to ensure the issue is resolved and reflected in new work practices

In scenario 3, as per the privacy policy, the customer data is provided just for utilization of the services. The policy of the organization can be modified by making a new privacy policy whereby the organization can allow to utilize the data of the customers for the creating a building advertisement products.

Conclusion

This report analyzes briefly about the legislations, codes and the Australian Computer Society codes of practice. The relevant legislations, and codes and its assistance in achieving the goal of the organization have been enumerated. The ethical considerations and the strategies to make sure that the workers are following the same have been well documented in the organization.

References

  • Australian Computer Society . (2014, March 12). About Us. Retrieved April 22, 2015, from www.acs.org.au: http://www.acs.org.au/home?action=show&conID=aboutacs
  • Cloud Security allaince. (2013, February ). Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union. Retrieved April 22, 2015, from https://downloads.cloudsecurityalliance.org/initiatives/pla/Privacy_Level_Agreement_Outline.pdf
  • Department of Finance and Deregulatio. (2011). Opportunities and applicability for use by the Australian Government . Cloud Computing Strategic Directions Paper , 10.
  • William Gellermann, M. S. (1990). Values and Ethics in Organization and Human Systems Development: Responding to Dilemmas in Professional Life. San Fransisco: Jossey-Bass.

OZ Assignment Help is leadingassignment writing service provider in australia. Get best assignment help form OZ expert team on all type of subject.