Ethical Behavior and Code of Conduct for IT Professionals
With the rapid technological advance, new threats to sensitive information continue to emerge. To be able to protect sensitive information has therefore been one of the most intriguing issues in the Information Technology profession. While technical and technological measures are important, the ethical behavior and code of conduct of the IT professionals play a key role in preventing unauthorized access to customer and organizational information (Aşuroğlu & Gemci, 2016).
Today, governments, individuals, and organizations share sensitive information using information technology. The increased use of these technologies has prompted the IT professionals to adhere to certain codes of ethics designed to ensure that customer and company information is protected. Information security is concerned with protecting, ensuring confidentiality, and availability of information whenever required. To successfully protect this information, sociological, legal, operational, and ethical measures must be considered.
The growth and development of an organization are determined by its people, technology, and processes. The individuals trusted by the company to handle sensitive information are responsible for ensuring the security of such details. In this case, such professionals are expected to have moral and ethical conduct in their work. Information security is concerned with the protection of data against leaks and unauthorized access. IT professionals are therefore required to use and properly dispose of the acquired information.
Notable. Information technology is determined by the actions of those responsible for handling information. IT professionals are required to use appropriate passwords and ensure that such details are protected from unauthorized parties. On the other hand, IT professionals are responsible for ensuring that the information obtained from customers is used for the intended purpose. It is also important to notify the owners of information concerning the intended use of their data to acquire consent and authorization. Finally, proper training is required to ensure that professionals are well equipped with the right knowledge essential for ensuring that customer and organizational information is protected from hackers and intruders.
Reference
Aşuroğlu, T., & Gemci, C (2016) Role of Ethics in Information Security.