In: Computer Science
Ethical and Legal Issues in Information System Security
Ethical Issues: It's a type of situation or problem that requires a person or organization to choose an alternative between right (ethical) and wrong (unethical).
Some of the major Ethical Issues :
1. Privacy : These vulnerabilities involved data being lost, damaged or altered -a threat to availability, confidentiality, and integrity.
2. Accuracy: Majority of individuals, private companies often give incorrect information to governments, banks, insurance agents and etc.
3.Property: One to the greatest issue is the protection of the Intellectual property of someone or an organization. For example, people consider that music and graphic art on a Web site belong to everyone—even if, without a doubt, someone created the work.
4.Accessibility: It professional often face ethical issues which involve privacy being violated. An organization often have access to the employee user account to ensure that organizations relevant information isn't divulged to the competitor.
Legal Issues: These are the issues that are secured by the government under some written law which means if violated by someone or by an organization, it will be considered as a punishable offense.
Some of the major Legal Issues :
1. Rapid Development of Technology: As new computer programs and applications are being built every day more invasions to information systems are a growing concern, Majority time It professionals aren't aware of the exposure of their system to threats and vulnerabilities.
2.Lack of Computing Knowledge: Many legal professionals do not have adequate information about technologies and how people use computers to pose a threat to an information system. Despite the knowledge legal officials have in the legal system it is often troublesome when they lack basic computing knowledge.
3. Legal Zone: There are often conflicts about
where to do the trial of such crimes which hinder information
security. Many cases have been reported that usually the intruder A
is based on other country and hacking systems in other location B
or sometimes the intruder A is using the system based on Location B
and hacks into the system of C.