Generalizing Ethics in an Information-based Society - Page 2
Have the management, and the systems administrators, make a list of concerns they have with the way the system is being abused, and how they would like this problem prevented. The administrators can directly address some restrictions - such as password length and obscurity - through the use of utilities such as "anal." Other issues, such as surfing for porn, must be dealt with in a less informal manner.
|"It should be realized that the majority of people, when confronted with an infraction of the code of ethics, would generally mend their ways rather than suffer the consequences."|
It should be realized that the majority of people, when confronted with an infraction of the code of ethics, would generally mend their ways rather than suffer the consequences. In truth, the majority of infractions of the code will most likely be inadvertent ... which brings us to the next point: implementation.
The writer must remember at all times that they are dealing with a wide spectrum of people that each have their own unique upbringing and thus their own unique view of what is right and wrong. The widest spectrum of values must be addressed, while the guidance and control the Code sets out to accomplish must be maintained.
In next week's installment ( How Does the Code of Ethics Relate to Security? ) I will expand upon writing a Code of Ethics document, and how it relates to security with, thrown in for good measure, some knowledge gained the hard way from the more difficult situations that can arise.
SecurityPortal is the world's foremost on-line resource and services provider for companies and individuals concerned about protecting their information systems and networks.
The Focal Point for Security on the Net (tm)