StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Legal Issues in Information Security - Essay Example

Cite this document
Summary
The paper "Legal Issues in Information Security" is a delightful example of an essay on information technology. Information technology is being used to commit fraud in both private and public organizations. It is for this reason that the government has set up laws allowing employers to monitor their employees’ use of information technology to ensure no illegality or fraud is being committed…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Legal Issues in Information Security
Read Text Preview

Extract of sample "Legal Issues in Information Security"

The paper "Legal Issues in Information Security" is a delightful example of an essay on information technology. Information technology is being used to commit fraud in both private and public organizations. It is for this reason that the government has set up laws allowing employers to monitor their employees’ use of information technology to ensure no illegality or fraud is being committed (Grama, 2010). This is a good cause as it will prevent industrial fraud from happening or industrial espionage which has been a common occurrence (Beers, 2011).

This law, however, breaches the ethics of the employees in most cases. The employers have been reported to be monitoring private conversations and even private emails which have nothing to do with work at all. This is a breach of the privacy laws of the employee even though the employer has to monitor them. Employees in most cases have been fired from their work not because they committed any fraud to the organization but because of the private emails and conversations, the employer came across (Media Law Resource Center, 2010).
The privacy of people is protected through various national and international laws including even the Declaration of Human Rights by the United Nations. This right to privacy should be applicable at all times as its violation amounts to a breach of ethical conduct (Reynolds, 2014). Even though there are laws about monitoring, it should not violate the privacy of individuals. The employers should not abuse the law to snoop on the private affairs of their employees. They should only apply the law of monitoring when a particular employee is under suspicion of committing fraud and not every time without any reason at all (Stanton and Stam, 2006).  Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Legal Issues in Information Security Essay Example | Topics and Well Written Essays - 250 words, n.d.)
Legal Issues in Information Security Essay Example | Topics and Well Written Essays - 250 words. https://studentshare.org/information-technology/1886396-law-compliance-investigations-ethical-issues
(Legal Issues in Information Security Essay Example | Topics and Well Written Essays - 250 Words)
Legal Issues in Information Security Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1886396-law-compliance-investigations-ethical-issues.
“Legal Issues in Information Security Essay Example | Topics and Well Written Essays - 250 Words”. https://studentshare.org/information-technology/1886396-law-compliance-investigations-ethical-issues.
  • Cited: 0 times

CHECK THESE SAMPLES OF Legal Issues in Information Security

Systems and Procedures of Information Policy Issue

The resources are basically developed in concern to the new focus over domestic security.... In order to have all the matters under responsive security periphery the government leaders and responsible managers think of all kinds of policies that can guide for an appropriate collection of information for the management and necessary accessibility on all kinds of balanced inevitable conflicts.... Under "stewardship" principle there is the room for conservative consequences that concentrate over integrity, quality, security, reliability and the process of authentic documenting and maintaining of relevant public record....
12 Pages (3000 words) Assignment

Security Breaches in UCLA

… Historical AnalysisDefinition of termsWhen we talk about information security breaches, we look at various important aspects and factors that can amount to a security breach.... In the analysis of information security breaches we have to define these Historical AnalysisDefinition of termsWhen we talk about information security breaches, we look at various important aspects and factors that can amount to a security breach.... In the analysis of information security breaches we have to define these terms:Threat: This is the means by which a given computer system attack can occur....
18 Pages (4500 words) Assignment

Information Security Contemporary Issues

The aim of this project is to look at contemporary issues in information security with the purpose of discussing threats and developments that have been witnessed in information security.... The aim of this project is to look at contemporary issues in information security with the purpose of discussing threats and developments that have been witnessed in information security.... … The paper "information security Contemporary Issues" is a wonderful example of a literature review on information technology....
7 Pages (1750 words) Literature review

E-Commerce Legal Issues

… The paper "E-Commerce legal issues " is an outstanding example of a law essay.... The paper "E-Commerce legal issues " is an outstanding example of a law essay.... This research is going to assess some of the major areas and aspects of e-commerce in the context of legal issues.... In this scenario, I will outline some of the major aspects and areas regarding the legal issues at e-commerce platforms and arrangements.... The fast speed of e-commerce expansion and development has normally left the legal system trying to continue as well as gasping for breath....
6 Pages (1500 words) Essay

What Type of Debentures Are Available in Australia

The corporate may use security interest over 1.... The corporate may use security interest over property that it owns so as to secure the repayment of the loan.... efine a debenture as defined in section 9 of the Corporations ActA debenture of a body corporate means a legal obligation that requires the body corporate to repay money lent to it by investors.... efine a debenture as defined in section 9 of the Corporations ActA debenture of a body corporate means a legal obligation that requires the body corporate to repay money lent to it by investors....
12 Pages (3000 words) Essay

Information Security Management System

… The paper "information security Management System" is a great example of management coursework.... The paper "information security Management System" is a great example of management coursework.... According to a study conducted in 2014, information security issues have become daily phenomena around the world (Yeh 481).... However, information is susceptible to distortion and theft and the security of valuable information is a major aspect of information systems management....
15 Pages (3750 words) Coursework

Australian Exchange Security

… The paper "Australian Exchange security" is a wonderful example of a term paper on macro and microeconomics.... This paper's purpose is to examine, consider, compare and contrast, and critically analyze laws governing insider trading within the context of the Australian exchange security and Australian Securities and investment commission as a stock market regulators and exchanges in Australia.... The paper "Australian Exchange security" is a wonderful example of a term paper on macro and microeconomics....
73 Pages (18250 words) Term Paper

Security Issues in E-Commerce

… The paper "Security issues in E-Commerce" is a great example of E-Commerce coursework.... The paper "Security issues in E-Commerce" is a great example of E-Commerce coursework.... Security issues in e-commerce Introduction E-commerce is the exchange of goods or services over electronic mechanisms such as the net and in some cases, other sets of connections associated with computers.... To respond to this tendency, the problems of internet security in online trading and consumer websites have to be frequently assessed....
9 Pages (2250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us