Information security is denying access to system data and also preventing entry of any information to unauthorized individuals. This also means protection from the direct use of information, their modification, disruption and also disclosure of such. As organizations keep sharing their information electrically, it is required that such organizations continue to understand what is expected so as to secure their information technologically. (Mayur S. D., & Thomas, J., 2008). Ethics is the basic guideline that is meant to be followed when there is no clear direction for a particular circumstance. Some of these rules of ethics in security information include respect to matters of privacy and anonymity, taking responsibility, respect to intellectual property, and provision of diligent and professional services to principals and even acting honorably, justly, legitimately and legally (Allen, & Merrill, 2008)
The threat possessed by anyone who wants to protect sensitive data is the ease in which computers and networks can be accessed efficiently, store and retrieve data. In such cases, individual privacy is likely to be at risk. Anonymity and privacy can be useful in concealing information such as those of health, medical record and security. On the other hand, anonymity and privacy can be used to carry out illegal activities such as terrorism and money laundering. However, there are factors that undermine computer privacy and such include data matching and mining, rise of world- wide- web and processing power of computers (Jason, Segolene, & Juan, 2009).
Computer professionals have an obligation to act responsibly. Great power comes with extensive responsibility, and more often than not, their interest will differ forcing them to come into conflict with their fellow employees. Professionals should be able to take responsibility for their own defaults. Therefore, it is advisable such professional be aware of such potential conflicts and avoids them. That is what ethical responsibility is all about. (Jason, Segolene, & Juan, 2009).
Respect for intellectual property is extremely important when it comes to information security. Intellectual property in this case would mean ownership in terms of software and other applications. Whereas some programs and software distributed to the public are available and can easily be obtained in copies, there are still those programs that are not free and organizations that created them use them for investments. (Mayur S. D., & Thomas, J., 2008) Investors complain about losing a substantial amount of money despite this kind of enormous industry. This substantial loss is as a result of criminal piracy. It is therefore essential for professionals to act ethical and respect intellectual property (Mayur & Thomas, 2008).
The certification that is earned by the information system security is viewed as a privilege that must not only be earned but also maintained. This is the reason as to why all personnel of information system security must commit fully towards the support of the code of ethics in information system security. They must guard an
References
Allen C., & Merrill W. (2008) Information privacy compliance in the healthcare industry, 6, 5 – 19.
Jason B., Segolene B., & Juan R. (2009). Reaching escape velocity: A practiced approach to information security management system implementation. 32, 49 – 57.
Mayur, S. D., & Thomas, J. (2008). Managing electronic information: an ethics perspective, 4, 20 – 27.