1. An information security manager routinely monitored the Web surfing among her company’s employees. She discovered that many employees were visiting the “sinful six” Web sites. (Note: The sinful six are Web sites with material related to pornography, gambling, hate, illegal activities, tastelessness, and violence). She then prepared a list of the employees and their surfing histories and gave the list to management. Some managers punished their employees. Some employees, in turn, objected to the monitoring, claiming that they should have a right to privacy.

 

a.   Is monitoring of Web surfing by managers ethical? (It is legal.)  Support your answer.

 

 

b.   Is employee Web surfing on the “sinful six” ethical?  Support your answer

  1. Is the security manager’s submission of the list of abusers to management ethical? Why or why not?

 

 

  1. Is punishing the abuses ethical?  Why or why not? If yes, then what types of punishment are acceptable?

 

 

  1. What should the company do in order to rectify the situation?

 

 

2. Access the Computer Ethics Institute’s Web site at www.cpsr.org/issues/ethics/cei. The site offers the “Ten Commandments of Computer Ethics.” Study these 10 rules, and decide if any others should be added.

 

 

3. Access the Association for Computing Machinery’s code of ethics for its members (see www.acm.org/constitution/code.html). Discuss the major points of this code. Is this code complete? Why or why not? Support your answer.

 

4. Access www.eightmaps.com.  Is the use of data on this Web site illegal?  Unethical?  Support your answer.

 

5. The Electronic Frontier Foundation (www.eff.org) has a mission of protecting rights and promoting freedom in the “electronic frontier.”  Review the organization’s suggestions about how to protect your online privacy, and summarize what you can do to protect yourself.

 

6. Access your university’s guidelines for ethical computer and Internet use.  Are there limitations as to the types of Web sites that you can visit and the types of material you can view?  Are you allowed to change the programs on the lab computers?  Are you allowed to download software from the lab computers for your personal use?  Are there rules governing the personal use of computers and e-mail?

 

 

7. Access http://www.albion.com/netiquette/corerules.html.  What do you think of this code of ethics?  Should it be expanded?  Is it too general? 

 

 

8. Access www.cookiecentral.com and www.epubliceye.com.  Do these sites provide information that helps you protect your privacy?  If so, then explain how.

 

 

9.  Do you believe that your university should be allowed to monitor e-mail sent and received on university computers?  Why or why not?  Support your answer.