TOR Code of cunduct & misuse of computing[1].pptx

JawadHaider36 30 views 29 slides Jul 07, 2024
Slide 1
Slide 1 of 29
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29

About This Presentation

This document include information about TOR (Term of reference), Code of conduct and Missuses of computing.


Slide Content

Group Members: Topics: ASAD ULLAH(20024119-010) Terms Of Reference(TOR) JAWAD HAIDER(20011519-055) Code Of Conduct FAIZA IJAZ(20011519-047 Misuse Of Computing

Asad ullah (20024119-010) TOR(Terms Of Reference)

What is TOR? TOR stands for Terms Of Reference. In professional practices, "terms of reference" (TOR) refer to a document that outlines the scope, objectives, responsibilities, and procedures for a particular project or task . These terms serve as a guide for individuals involved in the project or activity to understand their roles and expectations. T erms of reference document might include:

Continue… Title : This is just the name of what we're talking about. For example, "Terms of Reference for Website Redesign Project." Background : Here we explain why we're doing this project. We might say something like, "Our current website is outdated and hard to use, so we need to make it better.“ Objectives : These are the things we want to achieve by doing this project. For instance, "We want the new website to be easy for customers to navigate and find information quickly."

Continue… Scope : This tells us what's included in the project and what's not. We might say, "We're only redesigning the customer-facing parts of the website, not the internal systems." Stakeholders : These are the people who care about or are affected by the project. It could be customers, employees, or others. Roles and Responsibilities : This part explains who is doing what in the project. For example, "Sara will be in charge of gathering customer feedback, and John will oversee the design process."

Continue… Timeline : This is when things need to happen. We might say, "We want the new website to launch by the end of June." Resources : Here we talk about what we have to work with, like money, people, and tools. Communication : This is about how we talk to each other during the project. We might say, "We'll have a weekly meeting to update everyone on progress."

Continue… Risk Management : This is thinking ahead about what might go wrong and how we'll deal with it. For example, "If the design software crashes, we'll have backup computers ready." Decision-Making Process : This tells us how we'll make choices during the project. We might say, "Major decisions will be made by the project leader after consulting with the team." Monitoring and Evaluation : This is about checking if things are going well and if we're meeting our goals. We might set up surveys or checklists to track progress.

Continue… Approval Process : Finally, this part explains how we make sure everyone agrees with the terms of reference and any changes to it. It might involve getting signatures from key people or having a formal meeting.

Case Study: ABC Company, a medium-sized manufacturing firm, has decided to implement a new quality control system to improve the efficiency and accuracy of its production process. The company's management realizes that in order to successfully implement this system, they need to create clear terms of reference (TOR) to guide the project. Let's look at how they might approach this:

Continue… Title: Terms of Reference for Implementing Quality Control System Background: ABC Company aims to enhance production efficiency through the implementation of a new quality control system. Objectives: Improve product quality, reduce defects, and enhance employee training regarding quality control procedures. Scope: Implementing a comprehensive quality control system covering all stages of the production process. Stakeholders: Management, quality control department, production staff, IT department, external quality consultants.

Roles and Responsibilities: Define responsibilities for each stakeholder group in system implementation and training. Timeline: Project initiation in April, completion of system implementation by July. Resources: Budget allocation for equipment, software, and training programs. Communication: Regular updates via meetings, emails, and progress reports. Risk Management: Identify risks such as resistance from employees and technical challenges during implementation.

Decision-Making Process: Major decisions made by project manager in consultation with stakeholders. Monitoring and Evaluation: Progress will be monitored through attendance records, feedback surveys, and observations of participation and productivity . Approval Process: TOR document approval by senior management before project commencement. Reference: Doe, J. (2024). Implementing Quality Control Systems in Manufacturing Firms: A Case Study Approach. Journal of Business Management, 10(2), 45-56 .

Jawad Haider (20011519-055) Code of conduct

Code of Conduct Code of Conduct is a document that expresses the practices and behavior of a person, required or restricted as a condition for becoming a member of the organization or profession. • The code sets out the actual rules, so it lays down the do's and doesn't s of an employee. The members are responsible for its adherence and held accountable for its violation. • Every organization has its code of conduct issued by the Board of Directors (BOD) that determines the social norms, regulations and responsibilities. • It is in the form of written statement; that contains rules for behavior, which are supposed to be followed by the employees of the company.

British computing society: The BCS code of conduct states that IT professionals should carry out their professional responsibilities with due care and diligence in accordance with the Relevant Authority's requirements whilst exercising your professional judgement at all times. The code comprises four key principles: 1-You make IT for everyone: Working together to address issues in your profession and in wider society, you want everyone to have access to IT. You share what you know, uphold standards and conduct yourself professionally and fairly at all times.

2- Show what you know, learn what you don’t: You have integrity and show competence, but you know you don't know everything, that's why you continuously learn and grow and never take on tasks that you don't have the skills and resources to complete. 3- Respect the organization or individual you work for: You work with due care and diligence, acting in your client or company's best interests at all times. You take personal and collective responsibility for your actions while maintaining discretion and ethical standards. 4- Keep IT real. Keep IT professional: Pass IT on As a BCS member, you're an ambassador for the IT industry and use your voice to help promote it positively to the world. You support your IT colleagues and other members in their growth both personally and professionally.

Microsoft code of conduct: Honor privacy We honor privacy by being transparent about how we handle customer data, including personal data. We want our customers to trust us to protect their privacy and use their data in the ways that they permit us. Don’t make improper payments We are committed to truthful and transparent interactions with customers, and we prohibit any attempt to influence their decisions through improper payments. Corruption can harm our customers in many ways, including sometimes causing them to pay more than they should. Winning and preserving customers’ trust every day is more important than any benefit we might get from doing business improperly.

Compete fairly The way we compete is as important as the result we achieve. Healthy competition and fair business practices put our customers first by giving them access to a variety of products and services at fair prices. Competing fairly ensures that we meet our business objectives with our integrity intact. Reference: Read Our Business Standards | Microsoft Legal

Nestle code of conduct Employees should always be guided by the following basic principles: avoid any conduct that could damage or risk Nestlé or its reputation; act in good faith, legally and honestly; put the Company's interests ahead of personal or other interests. References: The Nestlé business principles model (nestle.com) code_of_business_conduct_en.pdf (nestle.com)

Additional References: Apple’s Supplier Code of Conduct:  https://www.apple.com/supplier-responsibility/ Marriott International’s Code of Business Conduct and Ethics:  https://www.marriott.com/marriott/aboutmarriott.mi Johnson & Johnson’s Credo:  https://www.jnj.com/credo Merck’s Code of Conduct:  https://www.merck.com/about/code-of-conduct/

Faiza Ijaz (20011519-047) Misuse of computing

What is misuse of computer? The misuse of a computer refers to any unauthorized or unethical behavior involving the use of computer technology that violates laws, regulations, or ethical standards.

TYPES OF COMPUTER MISUSE DATA THEFT Let us first introduce “spyware”, a term that is closely related to data theft. “Spyware is loosely defined as malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent.” If spyware is installed and collects information without consent, then it is data theft. For example, stealing credit card details.

IDENTITY THEFT To follow up with data theft, there is another common form of cyber theft these days – Identity theft. This is specific to the stealing online accounts, logging in without permission, and doing all sorts of funky things with it. PIRACY & ILLEGAL SOFTWARE DISTRIBUTION This is yet another different kind of “data theft”, and it is specific to making copies of software applications. If a person paid and owns the software, then it is legal to make backup copies of the software. But if the person distributes copies of the software, then it is illegal and considered “software piracy”.

CYBER FRAUD In the real world, we have conmen. In the digital world, we have cyber fraud that runs rampant. If you have stayed on the Internet long enough, pretty sure you will encounter one of these eventually: Your package is stuck in the custom. Please pay before we release the package. Your account has been compromised. Click on this link, and enter your old password to renew the account. An unauthorized payment has been made to your bank account. Congratulations! You have won the first prize! A police report has been made against you. The software has expired, please update your subscription. Your computer has been infected with a virus, click here to remove it.

UNAUTHORIZED ACCESS & USAGE As it implies, unauthorized access and usage happen when someone: Uses a computer device without permission. This can be by means of “physically in front of the computer” or “remotely through the Internet”. Access an account that belongs to someone else. Access information that is confidential or private. DENIAL OF SERVICE (DOS) Denial of service (DoS) is a type of cyber attack designed to disable, shut down or disrupt a network, website or service.

Real-World example 1 2017 Equifax data breach The  Equifax data breach  occurred between May and July 2017 at the American  credit bureau   Equifax . Private records of 147.9 million Americans along with 15.2 million British citizens and about 19,000 Canadian citizens were compromised in the breach, making it one of the largest cybercrimes related to  identity theft . Since the initial disclosure in September 2017, Equifax expanded the number of records they discovered were accessed. In both October 2017 and March 2018, Equifax reported that an additional 2.5 and 2.4 million American consumer records were accessed, respectively, bringing the total to 147.9 million.

Real-World example 2 WannaCry attack The WannaCry  ransomware attack was a major security incident that impacted organizations all over the world. On May 12, 2017, the WannaCry ransomware worm spread to more than 200,000 computers in over 150 countries. Notable victims included FedEx, Honda, Nissan, and the UK's National Health Service (NHS), the latter of which was forced to divert some of its ambulances to alternate hospitals.