Create an expository report
May 5, 2024
Purpose: In this assignment, you will write an expository report to outline a computer use policy. Consider the following fictional scenario below described in a memo, a form of communication you will typically encounter in your future employment: Memo To: Technology Advisor From: Legal Re: Computer Use Policy Due to many changes in the corporate structure and global growth and because we have instituted a new “bring your own device” policy, it is very important that we create a computer use policy for all employees to sign. This will alert them to potential ethical issues that may arise due to the use of the company technology. Areas to include to ensure our entire workforce is represented: 1. 2. 3. 4. 5. Creativity and innovation Diverse knowledge The ability to compete Enterprise skills Ethical concerns The policy needs to reflect your knowledge of the values of and technology use by different cultures. Please research several computer use policies online. You may use them as guides in the development of our policy; however, it is very important that you do not duplicate or copy any policy to avoid copyright infringement claims against the company. Assignment Instructions: Write a computer use policy that addresses the following topics: 1. Your explanation of ethical computing 2. Your explanation of plagiarism and copyright infringement. a. What is the difference between the two? b. How do you know if you are plagiarizing or violating copyright? c. Research plagiarism and find an example of plagiarism that was in the news. d. Explain copyleft. e. Summarize ethical concerns and describe how different cultures may view these topics. 3. Your explanation of software piracy. a. What are the penalties? b. Summarize ethical concerns and describe how different cultures may view this topic. 4. Your explanation of ethical issues related to using social media. a. Give a specific example in which an employee was terminated due to actions on social media. 5. Your explanation of an employer’s legal right to review employee activities using their technology in each of the following ways listed below. Remember an employer’s goal is to maintain a secure network and to protect company assets and information. For each method below, give specific examples in which the law has been upheld or applied: a. Keylogging b. Reading emails c. Monitoring Internet usage/sites visited When answering these questions, please write 3 to 4 sentences on each topic. Give examples where appropriate. Use a minimum of 2 sources other than your book. Ensure you include a title and a reference page. Remember to cite your sources using APA citation style. Assignment Requirements: You should follow the conventions of Standard English and compose your report in a double-spaced document using 12 point Times New Roman font. Your writing should be well ordered, logical and unified, as well as original and insightful. Please ensure the assignment allows for a continuous piece of writing that allows for a sustained viewpoint with logical order and organization. You should establish and sustain a clear viewpoint and purpose throughout your document.
Trust your assignments to an essay writing service with the fastest delivery time and fully original content.