1.9 Policies

external image oa-badges.jpg

Policies are enforceable measures intended to promote appropriate and discourage inappropriate use relating to information technologies. They can be developed by governments, businesses, private groups or individuals. They normally consist of rules governing access to, or use of, information, hardware, software and networks. For example, a school policy on the use of IT would consist of each user signing an acceptable use policy. It would also address unlawful access to the network through, for example, identify theft or using hacking software, and how these transgressions would be treated. Many websites also require users to agree to specific policies before allowing access to their services.

Policies also affect the exchange of information, for example, by making it subject to copyright laws and raising peoples awareness of plagiarism. In general, policies can promote or restrict access, guide behavior, require the fulfillment of certain conditions prior to or during use, or need to be developed to address unforeseen issues such as cyber-bullying.

Source: Information technology in a global society guide. 2012 onward.

Learning Goals

Insert Learning Goals Here

Learning Resources

ITGSopedia Policies
International Standards Organizaton
How WiFi Works
Sample Acceptable Use Policy
Generic Business and Employment Policy
Farmington Public Schools Network Policy
Data Protection Act (1998)
HP Corporate Policies
8 Principles of Data Protection

Recent Articles


Required Reading

Information Technology in a Global Society, Stuart Gray. 1st Edition. © 2012 Stuart Gray. ISBN 9781468023619. Pages 290-306.This textbook has been developed independently of the International Baccalaureate ® This book was written specifically for the ITGS course, covering technical systems, social impacts and ethical issues, and each area of application.

Digital Planet: Tomorrow’s Technology And You, George and Ben Beekman. 10th Edition. © 2012 Pearson Education. ISBN 9780132091251.
Pages 358-392.

This book explains how various technologies work, how they are used to solve problems and extend human capabilities, and how our ever-growing network of digital devices affect our lives, our world, and our future.

Gift of Fire, Sara Baase. 4th Edition. (C) 2013 Pearson Education. ISBN 978013249267-6.
Chapters 2 and 3. This book examines the Social, Legal, and Ethical issues related to Computing Technologies.

Key Terms Study Widgets

ITGS Policies Jeopardy Game