Delivery in day(s): 4
Code of Ethics and Security Threats Assessment
A cloud service is nothing but a resource that is offered at the internet. This code of ethics and security threats assessment provides the various codes and legislations practiced by the organizations are to maintain the code and ensure that the ethics and the codes are followed by the workers. Thereby, these laws are applied at the given 3 case scenarios.
Identify any current legislations or standards as well as Australian Computer Society Codes of Practice
The US National Institute of Standards and Technology (NIST)- The definition of the cloud computing is given in the US National Institute of Standards and Technology which states that a cloud computing is a “a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”(DEPARTMENT OF FINANCE AND DEREGULATIO, 2011).Various copyright owners use services of cloud computing to bring the materials that are copyright to the end users. In scenario 1, the DJ has thereby got access to the music from the net which is valid under the National Institute of Standards and Technology.
Identify the relevance of this legislation/code to the organizations goals
Relevant code and conduct
How it helps in achieving the organizational outcomes
Australian Computer Society Code of Professional Conduct
The main objectives of this code to "to advance professional excellence in information technology" and "to promote the development of Australian information and communications technology resources"
(Australian Computer Society, 2014)
Discuss any ethical considerations and the strategies you would take to ensure workers are following the code of practice documented by your organization
There are various reasons why the code of ethics should be practiced in the organizations. The codes document the standards according to which the organizations are held to responsible for the conduct of its members. The contents of the code in my organization shall be user friendly so as to maximize its utilization. We shall make a very substantial code so that it is more specific and definite. The basis of the code is the summary of the set of policies and this has to be presented primarily, subsequent to extended inspirational or authoritarian statements that will constitute the code. Again these are subsequent to the commentary which elucidates all the statements in return (William Gellermann, 1990).
The Privacy Legal Agreements (PLAs) intends to be utilized for the Cloud Services Agreements in order to portray the stage of the protection of the privacy which shall be maintained by the cloud service provider (CSP). The Service Level Agreements (SLAs) are usually utilized to offer metrics and other information’s based on the performance of the services. The Privacy Legal Agreements shall address the information based on the privacy and the practices on protecting the personal data (Cloud Security alliance, 2013).Hence, my organization shall make these contracts for the provisos of the cloud services. In scenario 2, the data is a personal data of the organization and shall be meant to be kept confidential so as to retain the trust and maintain the privacy of the client.
Document and implement inclusions to your policy/code that may be necessary to ensure the issue is resolved and reflected in new work practices
This report analyzes briefly about the legislations, codes and the Australian Computer Society codes of practice. The relevant legislations, and codes and its assistance in achieving the goal of the organization have been enumerated. The ethical considerations and the strategies to make sure that the workers are following the same have been well documented in the organization.
- Australian Computer Society . (2014, March 12). About Us. Retrieved April 22, 2015, from www.acs.org.au: http://www.acs.org.au/home?action=show&conID=aboutacs
- Cloud Security allaince. (2013, February ). Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union. Retrieved April 22, 2015, from https://downloads.cloudsecurityalliance.org/initiatives/pla/Privacy_Level_Agreement_Outline.pdf
- Department of Finance and Deregulatio. (2011). Opportunities and applicability for use by the Australian Government . Cloud Computing Strategic Directions Paper , 10.
- William Gellermann, M. S. (1990). Values and Ethics in Organization and Human Systems Development: Responding to Dilemmas in Professional Life. San Fransisco: Jossey-Bass.
OZ Assignment Help is leadingassignment writing service provider in australia. Get best assignment help form OZ expert team on all type of subject.