LearnSmart CH 4.1


The legal protection afforded an expression of an idea, such as a song, book, or video game.

Intellectual property

Intangible creative work that is embodied in physical form and includes copyrights, trademarks and patents.


An exclusive right to make, use, and sell an invention and is granted by a government to the inventor.


The principles and standards that guide our behavior toward other people


The right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.
Trust among companies, partners, and suppliers is the support structure of ebusiness and ______ is one of its main


Privacy is related to this, which is the assurance that messages and information remain available only to those authorized to view them.

Information ethics

Govern the ethical and moral issues arising from the development and use of information technologies as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies)

Pirated software

The unauthorized use, duplication, distribution, or sale of copyrighted software.

Counterfeit software

Software that is manufactured to look like the real thing and sold as such

Digital rights management

A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

Types of ethically Questionable or Unacceptable Information Technology use

1. Individuals copy, use and distribute software
2. Employees search organizational databases for sensitive corporate and personal information
3. Organizations collect, buy, and use information without checking the validity or accuracy of the information.


This refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

Child Online Protection Act (COPA)

An act that was passed to protect minors from accessing inappropriate material on the internet.

Ethical guidelines for Information Management

1. Information Secrecy
2. Information Governance
3. Information Management
4. Information Compliance
5. Information Property


Policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
These should (at a minimum) be implemented if an organization's employees use computers at work

Types of Epolicies

1. Ethical Computer Use policy
2. Information privacy policy
3. Acceptable use policy
4. Email privacy policy
5. Social media policy
6. Workplace monitoring policy


Includes threats, negative remarks, or defamatory comments transmitted through the Internet or posted on the website.
Unethical computer use


An act or object that poses a danger to assets


The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs fo the advertiser.
Unethical computer use.

Competitive click-fraud

A computer crime in which a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking the advertiser's link.

Ethical computer use policy

One essential step in creating an ethical corporate culture is this. It contains general principles to guide computer user behavior.
For example, it might explicity state that users should refrain from playing computer games during working hours.

Bring your own device (BYOD)

Part of an ethical computer use policy can contain this. It allows employees to use their personal mobile devices and computers to access enterprise data and applications. They offer 4 basic options
1. Unlimited access for personal devices
2. Access only

Information privacy policy

An organization that wants to protect its information should develop this. It contains general principles regarding information privacy.
Eg. Visa created Innovant to handle all of its information systems.

Fair information practices

A general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy. Different organizations and countries have their own terms for these concerns.

Acceptable use policy (AUP)

Requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.


A contractual stipulation to ensure that ebusiness participants do not deny their online actions.
One of these clauses is typically contained in an acceptable use policy.

Internet use policy

A management policy focusing solely on Internet use. It contains the general principles to guide the proper use of the Internet. Because of the large amounts of computing resources that Internet users can expend, it is essential for such use to be legitim


The electronic defacing of an existing website


It is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

Website name stealing

The theft of a website's name that occurs when someone, posing as a sit's administrator, changes the ownership of the domain name assigned to the website to another website owner.

Internet censorship

Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens

Email privacy policy

This details the extent to which email messages may be read by others.

Mail bomb

This sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning.


Unsolicited email. It plagues employees at all levels within an organization.

Anti-spam policy

This states that email users will not send unsolicited emails (or spam). It is difficult to write ____________ policies, laws, or software because there is no such thing as a universal litmus test for spam.

Opt out

A user can ______ of receiving emails by choosing to deny permission to incoming emails.

Opt in

A user can ______ to receive emails by choosing to allow permissions to incoming emails.


An anti-spamming approach by which the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

Social media policy

Companies can protect themselves by implementing a _____________. It outlines the corporate guidelines or principles governing employee online communications.

Social media monitoring

The process of monitoring and responding to what is being said about a company, individual, product or brand.

Social media manager

Social media monitoring typically falls to this person. It is a person within the organization who is trusted to monitor, contribute, filter and guide the social media presence of a company, individual, product, or brand.

Physical security

This is tangible protection such as alarms, guards, fireproof doors, fences, and vaults.

Workplace MIS monitoring

This tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

Employee monitoring policy