1. Ten Point Code of Ethics - Information Technology
Point One Follow the steps necessary to prevent unauthorized access to user identifications, passwords or any information that may be used to access information systems, user accounts, or information pertaining to stakeholders. ... You will take the necessary steps to ensure that information systems cannot be accessed by unauthorized users. ... Point Two Limit access to information contained in or obtained from the systems to authorized persons. As an IT professional you will take precautions necessary to limit access to information contained in information technology systems to authorized pe...
- Word Count: 1011
- Approx Pages: 4
- Grade Level: Undergraduate