BI+Security+&+Ethics


 * Business Information Security & Ethics **
 * Copyright and Fair Use **


 * Four factors of fair use: @https://owl.english.purdue.edu/owl/resource/731/1/
 * Purpose
 * Nature
 * The amount used
 * Market effect
 * More information and tutorials - @http://libguides.mit.edu/usingimages

**Activity** - Fair Use Interactive


 * ePolicies **

The six e-policies organizations should implement to protect themselves are:
 * 1) ethical computer use
 * 2) information privacy
 * 3) acceptable use
 * 4) email privacy
 * 5) social media
 * 6) <span style="font-family: Tahoma,Geneva,sans-serif; font-size: 15.6px;">workplace monitoring

<span style="font-family: Tahoma,Geneva,sans-serif; font-size: 14.3px;">(Baltzan, P. (2011). Information Systems. New York: McGraw Hill.)


 * <span style="background-color: transparent; font-family: Tahoma; font-size: 16px; vertical-align: baseline;">The following guide may be useful to you as you prepare your Technology Management Policy: **
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 15.6px;">@http://searchcio.techtarget.com/video/Develop-a-device-agnostic-mobile-device-strategy **

Back