In relation to the new “Bring Your Own Device” policy, we have implemented new strategies that each employee should be aware of. Emphasis will be set upon specific things such as realizing potential ethical issues, knowing what actions are approved and the acceptable use of company technology. Employees are encouraged to review this new policy and acknowledgement is mandatory in the form of your signature.
Computer ethics is known as a set of moral principles that regulate the use of computers. Some related issues regarding computer ethics include intellectual property rights, privacy concerns, and how computers affect society. Employees are obliged to properly follow the standards of ethical computing.
Plagiarism and Copyright
Plagiarism is known as the act of taking someone else’s work or ideas and then passing them off as your own. The difference between plagiarism and copyright infringement is that while plagiarism is claiming someone else’s work, copyright infringement is using someone else’s work without their permission. These concepts are also known as copying, piracy, theft, and stealing. All employees are expected to abide by all federal, state, and local laws. Employees are expected to observe the copyright laws as it applies to music, videos, games, images, texts and other media in the workplace and are strictly prohibited from the use, reproduction, or distribution of copyrighted works unless they have obtained the legal right and permission to do so. A great way to avoid plagiarism is to always cite the sources quoted and list the resources in your work. Not adhering to these expectations could not only result in disciplinary action, but can also result in civil litigation and criminal prosecution. Copyleft is the idea that there has been an arrangement whereby the software or creative work may be freely utilized, modified, and distributed with the understanding that if anything is derived from it, then it shall be bound by the same conditions. Employees shall respect this concept if using this form of work, creation, or software. An example of plagiarism found in the news this year is about the Japanese Olympic Stadium. It is also directly quoted below to demonstrate the proper way of citing a source while also listing it in the resource section.
“The 2020 Olympic Games in Tokyo have already been mired in one plagiarism scandal over the logo chosen for the games, but now another is brewing over the event’s stadium.
In 2012 a design from London-based architect Zaha Hadid was chosen for the new stadium. However, concerns over costs, the building’s appropriateness for the area and, according to Hadid, resentment over a non-Japanese architect being chosen, led to the original design being scrapped and another design competition being held.
That competition was won by Japanese architect Kengo Kuma, who worked in conjunction with construction company Taisei Corp. and design from Azusa Sekkei Co., both of whom were contractors working Hadid’s design.
Between some similarities in design, the overlapping contractors and the quick turnaround for the new design (14 weeks for Kuma’s as opposed to 2 years for Hadid’s) has led many to accuse the new design of being plagiarized.
This has only been furthered by the Japan Sports Council, which, according to Hadid, is withholding final payment for design services until Hadid’s firm agrees to sign away all copyrights in their design, something they have refused to do. Hadid has threatened legal action if it’s necessary.” (Bailey, 2015-2016)
Software piracy is the term used to label the illegal act of copying, using, or distributing software without ownership or obtaining the legal rights. Most software is bought as a one-site license. This means that only one computer is allowed to have that software installed on it at any given time. The illegal act of software piracy is considered when copying a specific software to multiple computers or sharing it with another person without first having multiple licenses and permissions. Employees shall completely evade any form of software piracy. If the employee is found pirating software, both the employee and the company could be held liable under both civil and criminal law. If the owner of the copyright brings a civil action, they could stop you from using the software instantly and could also demand financial damages. Then, the owner may choose between actual damages (the amount that has been lost because of the infringement) or statutory damages (which can be as much as $150,000 for each copy of the software). The government could also criminally prosecute for copyright infringement. If convicted, the guilty party could be fined up to $250,000 and/or sentenced to jail for up to five years.
Sharing Internet Connection
Sharing an internet connection outside of company parameters and expectations should be avoided. When more users are actively present on the network, the bandwidths for each user significantly lowers. For example, if 8 employees were connected to an ADSL connection at 512 kb/s, only 64 kb/s will remain per person. Due to the daily productivity standards that must be met, a stable connection must be consistently available.
Social media is an ever-growing cultural norm of today. Unfortunately, we cannot fully support the excessive attention that social media demands. However, we will allow employees to log into their social media accounts during breaks only. The only exception for this expectation is the marketing team using our company’s social media accounts to fulfill the demands and requirements associated with their given responsibilities. During your personal time, posting company issues, thoughts or images is strictly prohibited. “In fact, 28 percent of employers report that they’ve fired people for using the Internet for non-work-related activity (such as shopping online or checking out Facebook for example) during the workday and 18 percent have dismissed employees because of something they posted on social media, according to Career Builder.” (Rapacon, 2016)
The company owns the rights to all data and files in any network, computer, or other systems used in the company. We own the right to access any data and files sent or received using any company system. We reserve the right to monitor e-mail messages and the content therein. Employees shall be aware that the e-mail messages sent and received using company equipment, network and internet access are not private and are subject to viewing and inspection at any given time. We will actively engage in the ongoing use of monitoring software that shall create and store copies of any files or information associated with any system. Employees waive their rights to confidentiality or disclosure privileges when using the company’s systems.
H. Robert Mays
Bailey, J. (2015-2016, November 27). 5 Biggest Plagiarism Stories of 2016 (So Far). Retrieved from WordPress: https://www.plagiarismtoday.com/2016/01/20/5-biggest-plagiarism-stories-of-2016-so-far
Information on Software Enforcement in the United States. (2016, November 18). Retrieved from BSA The Software Alliance: http://www.bsa.org/anti-piracy/tools-page/software-piracy-and-the-law/?sc_lang=en-US
Rapacon, S. (2016, February 5). How Using Social Media Can Get You Fired. Retrieved from CNBC: http://www.cnbc.com/2016/02/05/how-using-social-media-can-get-you-fired.html
What is software piracy? (2016, November 28). Retrieved from Share Computer Hope: http://www.computerhope.com/jargon/s/softpira.htm