LSTD517 Law Ethics and Cybersecurity- Information Technology Structure
Scenario
Figure 1
Prompt
Specifically, the following critical elements must be addressed:
Risk Analysis Paper
2. Identify specific cyberlaws and ethics regulations that pertain to the organization and its computing operations in the scenario.
4. Cyberlaw noncompliance
i. Identify instances of cyberlaw noncompliance, being sure to cite the specific regulation(s) being violated.
ii. Assess the impact of the noncompliance on IT and computing within the organization.
Answers
Introduction
Technology is growing rapidly at lightning speed. With the increase in good and useful aspects of technology, it also brings several numbers of risks and challenges. Cyber law is termed to describe the legal issues regarding these risks. In this report we are going to discuss about the information technology structure of the organization and the risks related to it. Identifying specific cyber laws and ethics pertaining the organization. And finally comparing and contrasting codes of ethics from different organizations.
1. Description of Information Technology Structure of ABC Healthcare
As in the scenario we can see, a startup company ‘ABC Healthcare’ has an employee count of about 50 people. The data server of the organization network server contains the records of the company including patient’s health records, personal identification data, billing in the health centre, company finances and other forms. The Company’s existing authorities are: A Chief Information Officer (CIO), An IT network Security Officer, A Network Administrator and Employees. In addition to this, the employees of the organization also follow their responsibility with some hierarchy such as Network Administration reports directly to the CIO. Future planning of the organization is to hire a well experienced Desktop Technician and a website developer/programmer for better and proper implementation of the network security of the selected organization.
2. Identification of Cyber Laws and Ethics Regulations related to the Organization
The law that deals with the area of internet relationship of technical and electronic elements that includes hardware, software and information systems (IS) is called the Cyber Law (Eichensehr, 2014). This is also known as Internet Law. One of the most important Cyber Laws is Amendment of IT Act 2000. Criminal Provision Section 66: Under IT Act, 2008 all the act s referred under section 43, also covers Sec 66 in case of “dishonesty” or “fraudulently” and also under the section 66(A) also known as “Cyber Stalking”.
Ethics the field of moral philosophy involves systematizing, defending and recommending concepts the correct behavior. The ethical issues involving the management and development of information technology are many and they are increasingly complicated by the power of individual and infrastructure (Dewey, 2016). The national health systems and global public health are also benefited by this system (Coteanu, 2017). The growth of health internet globally has led to some new forms of risks. Cybercrimes like exploitation of data and using health data of individual or groups. ABC Healthcare follows several ethics such as the rights, responsibilities and concern of health care consumers, the legal and ethical issues regarding society, patients and health care professionals sinking with the change of the world, the impact of rising cost on the laws and ethics of health in delivery.
3. Ethics Violation in the Organization
i. Classification of Unethical Behavior:As there are several authorized people in the organization hence obeying the rules and regulation is a must in such workplaces. If there are any reorganization of illegal or unethical behavior in the organization the victim (individual or group) must report the event since it might have an adverse effect on the health, safety or welfare of others within the healthcare agency (Executive & Assessment, 2015). Follow Code of Ethics for their respective job description. Examples of unethical behavior in an organization: Suppose a doctor is doing his private medical practice and his certificate are not original, it has been fraud from an unauthorized medical school.4. Cyber law non compliance
i. Identifying instances of Cyber Law non-compliance: Failure to comply in the organization can result in civil and criminal penalties. Here in the given organization the Non-Compliance are detected as violating the HIPAA and HITECH rules (Frumkin, 2016). Proper training in use of new technologies are somewhat violated (Faden et al., 2013). Lower maintenance may cost in the reputation of the organization resulting in customer loss.5. Use-of-Technology Policies
i. Comparing and contrasting the use-of-technology policies:
SANS Institute Acceptable Use |
Policy ISSA Acceptable use |
Protect the reports to be theft, data loss or unauthorized party to interact |
Perform laws, highest ethical principles |
Access, Use and share information up to the authorized extent |
Maintain Security, responsibilities with honesty |
Network maintenance follows Infosec Audit Policy |
Maintain reputation of the company |
Devices accessing internet comply with minimum access policy |
|
Emails, passwords, employee database are kept protected |
|
6. Research on Codes of Ethics
i. Comparing and contrasting IT-specific codes:
SANS Institute of IT code of ethics |
ISSA code of Ethics |
Respecting the privacy of co-workers, examine information data, files, records etc. |
Performing professional duties, information security at best practice and standards. |
Maintain confidentiality, equality, justice and respect. |
Discharging professional responsibilities and not intentionally hurting colleagues |
Conclusion
To conclude this report, the risk management of the given organization ‘ABC Healthcare cannot be compromised, hence usage of policies is much required. The network system of the administration can be maximized by use of IT ethical codes that can be accepted by the organization at any time. Securing the information of its employee and patients, who are investing their trust on this organization. SANS policies and Codes are acceptable. The main purpose is to understand the Cyber Laws and Ethics related to the organization in addition to the acceptable use of technology policies.
References
Coronado, A. J., & Wong, T. L. (2014). Healthcare cybersecurity risk management: Keys to an effective plan. Biomedical instrumentation & technology, 48(s1), 26-30.
Coteanu, C. (2017). Cyber consumer law and unfair trading practices. Routledge.
Dewey, J. (2016). Ethics. Read Books Ltd.
Eichensehr, K. E. (2014). The cyber-law of nations. Geo. LJ, 103, 317.
Executive, A., & Assessment, E. I. (2015). Acceptable Use of E-Communications and Devices Policy. Policy, 1, 1.
Faden, R. R., Kass, N. E., Goodman, S. N., Pronovost, P., Tunis, S., & Beauchamp, T. L. (2013). An ethics framework for a learning health care system: a departure from traditional research ethics and clinical ethics. Hastings Center Report, 43(s1).
Frumkin, H. (Ed.). (2016). Environmental health: from global to local. John Wiley & Sons.
Miller, R. (2017). Developing a Security Program for Private Business (Doctoral dissertation).
Parsons, P. J. (2016). Ethics in public relations: A guide to best practice. Kogan Page Publishers.
Schenker, Y., Arnold, R. M., & London, A. J. (2014). The ethics of advertising for health care services. The American Journal of Bioethics, 14(3), 34-43.
Buy LSTD517 Law Ethics and Cybersecurity- Information Technology Structure Answers Online
Talk to our expert to get the help with LSTD517 Law Ethics and Cybersecurity- Information Technology Structure Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.