You are on page 1of 14

COMPUTER ETHICS

Intended Learning Outcomes

At the end of this chapter, the student is expected to:

 State the Principle of Ethics of Filipino IT Professionals;


 Apply the Principles formulated by the Association of Computing Machinery in dealing with other people,
in making judgment, in software designs and all other dealings in the exercise of the IT profession;
 Explain the Ten Commandments of Computer Ethics;
 Identify problems in a work scenario;
 Be a morally responsible student; and
 Manifest ethical thinking skills in analyzing and justifying computing issues.

This chapter may be completed in a span of four and half (4.5) lecture hours including the assessment task (except
major exam).

Professional Code of Ethics


Professional code of ethics is a set of guidelines which are designed to set out acceptable behavior of
member of a particular group, association, or profession.
A professional code of ethics states the principles and core values that are essential to the work of a particular
occupational group. Practitioners in many professions subscribe to a code of ethics that governs their behavior. For
example, doctors adhere to varying versions of the 2000-year-oldHippocratic Oath, which medical schools offer as an
affirmation to their graduating classes. Most codes of ethics created by professional organizations have two main parts:
(a) outlines what the organizations aspires to become, and (b) typically lists rules and principles by which members of
the organization are expected to abide. Many codes also include a commitment to continuing education for those who
practice the profession.
Laws do not provide a complete guide to ethical behavior. Just because an activity is not defined as illegal
does not mean it is ethical. You also cannot expect a professional code of ethics to provide an answer to every ethical
dilemma- no code can be definitive collection of behavioral standards. However, following a professional code of ethics
can produce many benefits for the individual, the profession and society as a whole:
1. Ethical Decision Making: adherence to professional code of ethics means that practitioners use a common
set of core values and beliefs as a guideline for ethical decision making.
2. High Standards of Practice and Ethical Behavior: adherence to a code of ethics reminds professionals
of the responsibilities and duties that they may be tempted to compromise to meet the pressures of day-to-day
business. The code also defines behaviors that are acceptable and unacceptable to guide professionals in their
intersection with others. Strong codes of ethics have procedures for censuring professionals for serious violations, with
penalties that can include the loss of the right to practice. Such codes are the exception, however and few exist in the
IT arena.
3. Trust and Respect from the General Public: public trust is built on the expectation that a professional
will behave ethically. People must often defend on the integrity and good judgments of a professional to tell the truth,
abstain from giving self-service advice, and offer warnings about the potential negative side effects of their actions.
Thus, adherence to a code of ethics enhances trust and respect for professionals and their profession.
4. Evaluation Benchmark: a code of ethics provides an evaluation benchmark that a professional can use
as a means of self- assessment. Peers of the professional can also use the code for recognition or censure.

Code of Ethics of the Filipino IT Professionals


1. I will promote public knowledge, understanding and appreciation of Information Technology.
2. I will consider the general welfare and public welfare and public good in the performance of my work.
3. I will advertise goods or professional services in a clear and truthful manner.
4. I will comply and strictly abide by the intellectual property laws, patent laws and other related laws in respect of
Information Technology.
5. I will accept the full responsibility for the work undertaken and utilize my skills with competence and professionalism.
6. I will make truthful statements on my areas of competence as well as the capabilities and qualities of my product
and service.
7. I will not disclose or use any confidential information obtained in course of professional duties without the consent
of the parties concerned except when required by the laws.
8. I will strive to attain the highest quality in both the products and services that offer.
9. I will knowingly participate in the development of the Information technology.
10. I will uphold and improve the IT professional’s standard through continuing profession in order to enhance the IT
profession.

Code of Ethics of Association of Information Technology Professionals (AITP)


I acknowledge:
That I have an obligation to management, therefore, I shall promote the understanding of information processing
methods and procedures to management using every resource at my command.
That I have an obligation to my fellow members, therefore I shall uphold the high ideals of AITP as outlined in the
Association By laws. Further, I shall cooperate with my fellow members and shall treat them with honestly and respect
at all times.
That I have an obligation to society and I will participate to the best of my ability in the dissemination of knowledge
to the general development and understanding of information processing. Further, I shall not use knowledge of a
confidential nature to further my personal interest, nor shall I violate the privacy and confidentiality of information
entrusted to me or to which I may gain access.
That I have an obligation to my College or University, therefore, I shall uphold its ethical an moral principles.
That I have an obligation to my employer whose trust I hold, therefore, I shall endeavor to discharge this obligation
to the best of my ability, to guard my employer’s interests, and to advice him or her wisely and honestly.
That I have an obligation to my country, therefore, in my personal, business, social contacts, I shall uphold my nation
and shall honor the chosen way of life of my fellow citizen.
I accept these obligations as a personal responsibility and as a member of this association. I shall actively discharge
these obligations and I dedicate myself to that end.
Principles
Principle 1: Public
Software engineers shall act consistently with the public interest. In particular software engineers shall, as
appropriate:
1.01 Accept fully responsibility for their own work.
1.02 Moderate the interests of the software engineers, the employer, the client and the user with the public good.
1.03 Approve software only if they have well- founded belief that is safe, meets specifications, passes appropriate
tests, and does not diminish quality of life, diminish privacy or harm the environment. The ultimate effect of the work
should be for the public good.
1.04 Disclose to appropriate persons or authorities any actual or potential danger to the user, the public or the
environment, that they reasonably believe to be associated with software or related documents.
1.05 Cooperate in the efforts to address matters of grave public concern caused by software, its installation,
maintenance, support or documentation.
1.06 Be fair and avoid deception in all statements, particularly public ones, concerning software or related documents,
methods and tolls.
1.07 Consider issues of physical disabilities, allocation of resources, economic disadvantage and other factors that can
diminish access to the benefit of software.
1.08 Be encouraged to volunteer professional skills for good causes and contribute to public education concerning the
discipline.

Principle 2; Client and Employer


Software engineers shall act in a manner that is in the best interests of their client and employer, consistent
with the public interest. In particular, software engineers shall, as appropriate:
2.01 Provide service in their areas of competence, being honest and forthright about any limitations of their experience
and education.
2.02 Not knowingly use software that is obtained or retained either illegally or unethically.
2.03 Use the property of the client or employer only in ways properly authorized, and with the clients or employer’s
knowledge and consent.
2.04 Ensure that any document upon which they rely on has been approved when required, by someone authorized to
approve it.
2.05 Keep private any confidential information gained in their professional work, where such confidentiality is consistent
with the public interest and consistent with the law.
2.06 Identify, document, collect evidence and report to the client or the employer promptly if, in their opinion, a project
likely to fail, to prove too expensive, to violate intellectual property law or otherwise to be problematic.
2.07 Identify, document and report significant issues of social concern, of which they are aware, in software or related
documents, to the employer or the client.
2.08 Accept no outside work detrimental to the work they perform for their primary employer.
2.09 Promote no interest adverse to the employer or client, unless a higher ethical concern is being compromised; in
that case, inform the employer or another appropriate authority of the ethical concern.

Principle 3: Product
Software engineers shall ensure that their products are related modifications meet the highest professional
standards possible. In particular, software engineers shall, as appropriate:
3.01 Strive high quality, acceptable cost and a reasonable schedule, ensuring significant tradeoffs are clear to and
acceptable by the employer and the client, and are available for consideration by the user and the public.
3.02 Ensure proper and achievable goals and objectives for any project on which they work or purpose.
3.03 Identify, define and address ethical, economic, cultural legal and environmental issues related to work projects.
3.04 Ensure that they are qualified foe any project on which they work or propose to work to an appropriate combination
of education and training, end experience.
3.05 Ensure that appropriate method is used for any project on which they work or purpose to work.
3.06 Work to follow professional standards, when available, that are most appropriate for the task at hand, departing
from these only when ethically or technically justified.
3.07 Strive to fully understand the specifications for software on which they work.
3.08 Ensure that specifications for software on which they work have been well documented, satisfy the user’s
requirements and have the appropriate approvals.
3.09 Ensure realistic quantitative estimates of cost, scheduling, personnel, quality and outcomes on any projects on
which they work or purpose to work and provide an uncertainty on any project on which they work or purpose to work
and provide an uncertainty assessment of these estimates.
3.10 Ensure adequate testing, debugging, and review of software and related documents on which they work.
3.11 Ensure adequate documentation, including significant problems discovered and solutions adopted, for any project
on which they work.
3.12 Works to develop software and related documents that respect the privacy of those who will affected by that
software.
3.13Be careful to use only accurate data derived by ethical and lawful means and use it only in ways properly
authorized.
3.14 Maintain the integrity of data, being sensitive to outdated or flawed occurrences.
3.15 Treat all forms of software maintenance with the same professionalism as new development.
Principle 4: Judgment
Software engineers shall maintain integrity and independence in their professional judgment. In particular, software
engineers shall, as appropriate:
4.01 Temper all technical judgments by the need to support and maintain human value.
4.02 Only endorse documents either prepared under their supervision or within their areas of competence and with
which they are in agreement.
4.03 maintain professional objectivity with respect to any software or related documents they are asked to evaluate;
4.04 Not engage in deceptive financial practices such as bribery, double billing, or other improper financial practices;
4.05 Disclose to all concerned parties those conflicts of interest that cannot reasonably be avoided or escaped.
4.06 Refuse to participate, as members or advisors in a private, governmental or professional body concerned with
software related issues, in which they, their employers or their clients have undisclosed potential conflicts of interest.

Principle 5: Management

Software are engineering managers and leaders shall subscribe to and promote in ethical approach to the management
of software development and maintenance. In particular, those managing or leading software engineers shall, as
appropriate.

5.01 Ensure good management for any project on which they work, including effective procedures for promotion of
quality and reduction of risk.

5.02 Ensure that software engineers are informed of standards before being held to hem.

5.03 Ensure that software engineers know the employer’s policies and procedures for protecting passwords, files and
information that is confidential to the employer or confidential to others.
5.04 assign work only after taking into account appropriate contributions of education and experience tempered with
a desire to further that education and experience.
5.05 Ensure realistic quantitative estimates of cause scheduling, personnel, quality and outcomes on any project in
which they work or propose to work and uncertainty assessment of this estimates.
5.06 Attract potential engineers only by a full and accurate description of the conditions of employment
5.07 Offer fair and just remuneration.
5.08 Not unjustly prevent someone from taking position for reach that which that person is suitably qualified.
5.09 Ensure that there is a fair agreement concerning ownership of any software, processes, research, writing or other
intellectual property to which a software engineer has contributed.
5.10 Provide for due process in hearing charges of violation of an employer’s policy or of this Code.
5.11 Not ask a software engineer, to do anything inconsistent with this Code.
5.12 Not punish anyone for expressing ethical concerns about a project.

Principle 6: Profession

Software engineers shall advance the integrity and reputation of the profession consistent with the public
interest. In particular, software engineers shall, as appropriate:

6.01 help develop an organizational environment favorable to acting ethically.


6.02 Promote public knowledge of software engineering.
6.03 Extend software engineering knowledge by appropriate participation in profession organizations, meeting and
publications
6.04 Support, as members of profession, other software engineers striving to follow this code.
6.05 Not promote their own interest at the expense of the profession, client or employer.
6.06 Obey all laws governing their work, unless in exceptional circumstances, such compliance is inconsistent with the
public interests.
6.07 Be accurate in stating the characteristics of software on which they work, avoiding not only false claims but also
claims that might reasonably be supposed to be speculative, vacuous, deceptive, misleading, or doubtful.
6.08 Take responsibility for detecting, correcting and reporting errors in software and associated documents on which
the work.
6.09 Ensure that clients, employers and supervisors know of the software engineer’s commitment to this code of ethics
and the subsequent ramification of such commitment.
6.10 Avoid association with business and organizations which are in conflict with this code.
6.11 Recognized that violations of this code are inconsistent with being a professional engineer.
6.12 Express concerns to the people involved when significant violations of this code are detected unless this is
impossible, counter-productive, or dangerous.

Principle 7: Colleagues

Software engineers shall be fair to and supportive of their colleagues. In particular, software engineers shall, as
appropriate:

7.01 Encourage colleagues to adhere to this Code.


7.02 Assist colleagues in professional development.
7.03 Credit fully the work of others and refrain from taking undue credit.
7.04 Review the work of others in an objective, candid and properly documented away.
7.05 Give a fair hearing to the opinions, concerns or complains of a colleague.
7.06 Assist colleagues in being fully aware of current standard work practices including policies and procedures for
protecting passwords, files and other confidential information and security measures in general.
7.07 Not unfairly intervene in the career of any colleague; however, concerns of the employer the client or public interest
may compel software engineers on good faith to question the competence of colleague.
7.08 In situations outside of their own areas of competence call upon the opinions of other professionals who have
competence on that area.
Principle 8: Self
Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote
an ethical approach to the practice of the profession. In particular, software engineers shall continually endeavor to:

8.01 Further their knowledge of development in the analysis, specification, design, development, maintenance and
testing of software and related document, together with the management of the development process.
8.02 Improve their ability to create safe, reliable, and useful quality software at reasonable cost and within a reasonable
time.
8.03 Improve their ability to produce accurate, informative, and well-written documentation.
8.04 Improve their understanding of the software and related documents on which they work and of the environment
in which they will be used.
8.05 Improve their knowledge of relevant standards and the law governing the software and related documents on
which they work.
8.06 Improve their knowledge of this Code, its interpretation and its application to their work.
8.07 Not give unfair treatment to anyone because of any irrelevant prejudices.
8.08 Not influence others to undertake any action that involves a breach of this Code.
8.09 Recognize that personal violations of this Code are inconsistent with being a professional software engineer.

Strengths Weaknesses
 Codes inspire the member of a profession to behave  Directives included in many codes tend to be too
ethically. general and too vague.

 Codes guide the member of a profession in ethical  Codes are not always helpful when two or more
choices. directives conflict.

 Codes educate the members of profession about their  A professional code’s directives are never complete or
professional obligations. exhaustive.

 Codes discipline members when they violate one or  Codes are ineffective (have no “teeth” ) in disciplinary
more of the code’s directives. matters.

 Codes “sensitize’ members of a profession to ethical  Directives in codes are sometimes inconsistent with
issues and otherwise might overlook. one another.

 Codes inform the public about the nature and roles of


the professions.  Codes do not always distinguish between microethics
issues and macroethics issues.
 Codes enhance the profession in the eye of the public.
 Codes can be self-serving for the profession.

The Ten Commandments


The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. Here is our
interpretation of them:

1. Thou shalt not use a computer to harm other people.


2. Thou shalt not interfere with other people’s computer work.
3. Thou shalt not snoop around in other people’s files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people’s computer resources without authorization.
8. Thou shalt not appropriate other people’s intellectual output.
9. Thou shalt think about the social consequences of the program you write.
10. Thou shalt use a computer in ways that show consideration and respect.

The Hacking Community’s Constitution

1. We believe: That every individual should have the right to free speech in cyber space.
2. We believe: That every individual should be free of worry when pertaining to oppressive government that control
cyber space.
3. We believe: That democracy should exist in cyber space to set a clear example as to show a functioning element
of society can prosper with equal rights and free speech of all.
4. We believe: That hacking is a tool that should and is used to test the integrity of networks that hold and safe
guard our valuable information.
5. We believe: Those sovereign countries in the world community that do not respect democracy should be
punished.
6. We believe: That art, music, politics, and crucial social element of all world societies can be achieved on the
computer and in cyber space.
7. We believe: That hacking, cracking, and phreaking are instruments that can achieve three crucial goals:
a. Direct Democracy in cyber space.
b. The belief that information should be free to all.
c. The idea that one can test and know the dangers and exploits of system that store the individual’s
information.
8. We believe: That cyber space should be a governing body in the world community, where people of all nations
and cultures can express their ideas and beliefs as to how our world politics should be played.
9. We believe: That there should be no governing social or political class or party in cyber space.
10. We believe: That the current status of the internet is clear example as how many races, cultures, and peoples
can communicate freely and without friction or conflict.
11. We believe: In free enterprise and friction free capitalism.
12. We believe: In the open source movement fully, as no government should adopt commercial or priced software
for it shows that a government may be biased to something that does not prompt the general welfare of the
technology market and slow or stops the innovation of other smaller company’s product.
13. We believe: That technology can be wielded for the better placement of man kind and the environment we live
in.
14. We believe: That all sovereign countries in the world community should respect these principles and ideas
released in this constitution.

The above declared constitution is like the bill of rights which should be read in relation to the Ten Commandments.

What is Computer Ethics?

It is a new branch of ethics that is growing and changing rapidly as computer technology also grows and develop.
The term “computer ethics” is open to interpretations both broad and narrows. On one hand, for example, computer
ethics might be understood very narrowly as the efforts of professional philosopher to apply traditional ethical theories
like utilitarianism, Kantianism, or other moral theories to issues regarding the use of computer technology. On the other
hand, it is possible to construe computer ethics in a very broad way to include, as well, standard of professional practice,
codes of conduct, aspects of computer law, public policy, corporate ethics—even certain topics in the sociology and
psychology of computing.

In the industrialized nation of the world, the “information revolution” already has significantly altered many aspects
of life – in banking and commerce, work and employment, medical care, national defense, transportation and
entertainment. Consequently, information technology has begun to affect (in both good and bad ways) community life,
human relationship, education, freedom, democracy, and so on (to name a few examples). Computer ethics in the
broadest sense can be understood at that branch of applied ethics which studies and analyzes such social and ethical
impacts of information technology.

In recent years, this robust new field has led to new university courses, conferences, workshop, professional
organizations, curriculum materials, books, articles, journals, and research centers. And in the age of the world-wide-
web, computer ethics is quickly being transformed into “global information ethics”.

Computer ethics deals with practical problems and focuses on the nature of moral action and responsibility: How do
I know whether or not an action is morally right or wrong?

Problem in Computer Ethics

A typical problem in Computer Ethics arises because there is a policy vacuum about how computer technology should
be used. Computer provide us with new capabilities and these in turn give us new choices for action. Often, either no
policies for conduct in these situation exist or existing policies seem inadequate. A central task of Computer Ethics is
to determine what we should do in such cases, that is, formulate policies to guide our actions… One difficulty is that
long with a policy vacuum there is often a conceptual vacuum. Although a problem in Computer Ethics may seem clear
initially, a little reflection reveals a conceptual muddle. What is needed in such cases is an analysis that provides a
coherent conceptual framework within which a policy for action. (Moor 1985, p.266)

Moor said that computer technology is genuinely revolutionary because it is “logically malleable”:

Computers are logically malleable in that they can be shaped and molded to do any activity that can be characterized
in terms of inputs, outputs and connecting logical operations. . . . Because logic applies everywhere, the potential
applications of computer technology appear limitless. The compute is the nearest thing we have to a universal tool.
Indeed, the limits of computer are largely the limits of our own creativity.

According to Moor, the computer revolution occurs in two stages. The first stage is that of “technological introduction”
in which computer technology is developed and refined. This already occurred during the first 40 years after the Second
World War. The second stage – one that the industrialized world has only recently entered – is that of “technological
permeation” in which technology gets integrated into everyday human activities and into social institutions, changing
the very meaning of fundamental concepts, such as “money,” “education,” “work,” and “fair elections.” Moor’s way of
defining computer ethics is very powerful and suggestive. It is broad enough to be compatible with a wide range of
philosophical theories and methodologies, and it is rooted in a perceptive understanding of how technological
revolutions proceed.

Moor argues that computer ethics is unique because computers have certain properties that raise unique issues
and, according to Moor there are three properties that make computers a special case:

Computers Special Case

Logical Invisibility factor Impact on


Malleability Society

Invisible abuse Invisible Invisible


programming complexcaculation
Figure 1.0: Moor makes the case that characteristics of computer-based technologies are such that they raise ethical
issues that are somewhat unique. Others have suggested that computers no different from any other branch of
professional ethics.

Logical Malleability:

Computers can be shaped and molded to perform, any activity that can be characterized in terms of inputs, outputs
and connecting logical operations. This is contrast to the majority of manufactured products. For example, a car,
television or refrigerator has well-defined and quite specific functions.

The logic of computers, however, can be shaped in infinite ways through changes in hardware and software and in
terms of their usage. This enables computer-based technologies to exhibit tremendous flexibility. Moor writes:

Just as the power as steam engine was the raw resources of the Industrial Revolution so the logic of a computer is
a raw of the Information Revolution. Because the logic applies everywhere, the potential applications of computer
technology appear limitless. The computer is the nearest thing we have to a universal tool. Indeed, the limits of
computers are largely the limits of our own creativity.

Impact on Society:

The extensive impact of computerization on society is clear. Naturally, in 1985, when wrote his paper, relatively few
could foresee the extent of that impact, nor did anyone envisage the Internet and the World Wide Web. Moor did,
however, foresee the changing workplace, and the nature of work:

Computer have been used for years by business to expedite routine work, such as calculating payrolls. However,
as personal computers become widespread and allow executives to work at home, as robots do more and more factory
work, the emerging question will not be merely How well do computers help us work? But what is the nature of this
work?

Invisibility Factor:

An important fact about computers is that most of the time, and under most conditions, computer operations are
invisible. Moor identifies three kinds of invisibility that can be have ethical significance:

1. Invisible Abuse: Moor describes this as: “the intentional use of the invisible operations of a computer to
engage in unethical conduct.” He cites an examples:

The programmer who realized he could steal excess from a bank. When interest on a bank account is
calculated, there is often a fraction of a cent left over after rounding off. This programmer instructed a computer
to deposit these fractions of a cent to his own account.

The invasion of the property and privacy of others, computers can be programmed to surreptitiously remove
or alter confidential information.

2. Invisible Programming Values: these are values which, according to Moor, are embedded into a computer
program:

A programmer makes some value judgments about what is important and what is not. These values
become embedded in the final product and may be invisible to someone who runs the program.

3. Invisible Complex Calculation: In this context, Moor writes:


Computer today are capable of enormous calculations beyond human comprehension. Even if a program
is understood, it does not follow that the respective calculations are understood. Computers today perform . .
. calculations which are too complex for human inspection and understanding.
He argues that the issue is how much should trust computer’s invisible calculation. This become a
significant issue as the consequences grow in importance.
For example:
Computers are used by the military in making decisions about launching nuclear weapons. On the one
hand, computers are fallible and there may not be time to confirm their assessment of the situation. On the
other hand, making decisions about launching nuclear weapons without using computers may be even more
fallible and more dangerous. What should be our policy about trusting invisible calculation?

Three “Levels” of Computer Ethics”

Computer ethics questions can be raised and studied at various “levels.” And each level is vital to the overall goal
of protecting and advancing human values. On the most basic level, computer ethics tries to sensitize people to the
fact that computer technology has social and ethical consequences.

This is the overall goal of what some call “pop” computer ethics. Newspapers, magazines and TV news programs
have engaged increasingly in computer ethics of this sort. Every week, there are news stories about computer viruses,
or software ownership law suits, or computerized weapons, etc. As the social impact of information technology grows,
such articles will proliferate. That’s good! The public at large should be sensitized to the fact that computer technology
can threaten human values as well as advance them.

The second “level” of computer ethics can be called “para” computer ethics. Someone who takes a special interest
in computer ethics cases, collects examples, clarifies them, looks for similarities and differences, reads related works,
attends relevant, and so on, is learning “para” computer ethics. (I’ve borrowed this term from Keith Miller, who is the
first person I ever heard use it.) By analogy with a para medic – who is not a physician, but who does have some
technical medical knowledge – a “para” computer ethicist is not a professional ethicist, but does have some relevant
special knowledge. A para medic, of course, cannot do all that a physician does, but he or she can make preliminary
medical assessments, administer first aid and provide rudimentary medical assistance. Similarly, a “para” computer
ethicist does not attempt to apply the tools and procedures of a professional philosopher or lawyer or social scientist.
Rather, he or she makes preliminary assessment and identifications of computer ethics cases, compares them with
others, suggest possible analyses.

The third level of computer ethics I call “theoretical” computers ethics, because it applies scholarly theories to
computer ethics cases and concepts. Someone proficient in “theoretical” computer ethics would be able not only to
identify, clarify, compare and contrast computer ethics cases; she or he could also apply theories and tools from
philosophy, social science in order to deepen our understanding of the issues. Such “theoretical” computer ethics is
normally taught in college-level courses with titles like “Computer Ethics” Computers and Society,” “Computers and the
Law.”

All three “levels of analysis” are important to the goal of advancing and defending human values. Voters and the
public at large, for example, should be sensitive to the social and ethical consequences of information technology.
Computer professionals and public policy makers should have “para” computer ethics skill and knowledge in order to
do their jobs effectively. And scholars must continue to deepen our understanding of the social and ethical impact of
computing by engaging in theoretical analysis and research. In reality, of course, none of these three “Levels” of
computer ethics is cleanly separated from the others. One blends gradually into the next. Nevertheless, I think it is
useful to distinguish them, and I well continue to do so here.
Moral Responsibilities of Computer Professionals

Some ethicist believe that all professionals, regardless of their practice, have special moral obligations as
professionals. For example, Michael Bayles (2003) argues that professionals have a special obligation to their clients
to be worthy of a client’s trust, and this, Bayles further suggest, leads to obligations of honesty, candor, competence,
diligence, loyalty and discretion. In Bayles’s scheme, all professionals who work in the computing field would be bound
to similar standard of obligations to their clients, regardless of their specific professional type.

Many computer professionals are software engineers or members of software engineering teams. Gotterbarn (2001)
believes that because software engineers and their teams are responsible for developing safety-critical systems, they
have significant opportunities to:

 Do good or cause harm


 Enable others to do good or cause harm
 Influence others to do good or cause harm

Thus, Gotterbarn suggest that the roles and responsibilities involved in the development of safety-critical software
applications typically include:
 Aircraft and air traffic control system
 Mass transportation system
 Nuclear reactors
 Missile system
 Medical treatment system

Social Networking Sites

The Philippines is still the Social Capital of the World.


Filipinos are using social media platforms 53 hours a week. That’s a whole 11 hours more than the global average
of 42 hours!

In a global study called Wave 7, Filipinos are using social media to primarily connect with their families living
overseas. As of this writing, there are more than 11 million Filipinos living outside the Philippines. Social media has
become a way for them to communicate with their families and friends instead of using overseas call and text, which
are the traditional ways of communication.

In the past, local telcos usually have ongoing overseas call and text promotions which are actually quite expensive.
The telco usually charged around 50 cents (which is roughly 25 pesos) per minute when calling someone abroad. You
would not call someone abroad to talk for just under a minute, right?
Philippines is the social media capital. As proof, Makati city takes the most selfies than anywhere in the world. As
Internet penetration increases in the Philippines, it seems that Filipinos have grown fond of using apps such as WeChat,
Line, Skype, and Facebook Messenger. Line has a free Call services. I use Skype to call my friends abroad. With social
media, the barrier to communications between families separated by countries have diminished, and only the country’s
total social activity has increased.

Social Networking Ethical Issues

Obviously if we have hundreds of millions of users of one social networking site, it will be almost impossible that
ALL of these users will abide by the golden rule. We, Filipinos, are very good in turning our national problems into joke
expressed in a picture message published in social networking sites. For instance, when the MRT-3 train that was
derailed in Taft Avenue station, a netizen was quick to express in one of his picture message, “BUTI NA LANG
NANDYAN SI SPIDEY”, depicting a scene from the movie “Spider-Man 2.”

Another good illustration if after the airport brawl incident between Mon Tulfo and the Santiagos. A netizen post the
following picture depicting the move the AVENGERS.

Posting a picture Message

The above pictures may be just fine because it is entertaining. But, what if tour friends post your picture which, to
your mind should not be seen by others, will that be OK with you? Hence, as a rule of thumb, netizens should NOT
post a picture which may be offensive to some person(s) included in the picture. Of course, if the picture is on its face,
a good picture, we do not need to get the consent of everyone.

If we asked someone to join us in a photo shoot (or selfie), do we need to ask his permission to allow us to upload
the said picture on any social networking site?

Not anymore. This is due to the fact that once you ask someone popular, say, Manny Pacquiao, to join us in a photo
shoot, he is aware that we are going to upload the same picture in our Facebook and other social networking sites.
The only exemption is when he (Manny Pacquiao) will expressly prohibit us from uploading the same to the internet.
His mere silence is tantamount to an implied consent.

However, if we take a photo or video of a private person without his consent, it is NOT proper to publish the same
in the internet subject to some exemptions. To illustrate, supposed you fell asleep inside the library and one of your
classmates take a picture of you and posted it in his Facebook; of course you will get furious. The act of your classmate
is unethical and improper.
Exemptions:

1. If the taking of a picture or video involves news of the day and other miscellaneous facts having the character
of mere items of press information. Example is the videotaping of a man who jumped from the bridge in EDSA.

2. If the unauthorized picture taking and/or videotaping is done for the general welfare of the public.

Here a video showed an abusive traffic enforcer who threatened the life of a truck driver. Because of this
viral video, the abusive traffic enforcer was immediately suspended by the Office of the Vice Mayor Isko
Moreno.

3. Taking a picture of public personalities in public.


Example: So if you will take a picture of Manny Pacquiao as shown in the picture, that will be fine. However,
if, Manny Pacquiao went to the comfort room, never take his picture or video!

PART 11

LEGAL
ASPECTS

THE TEN COMMANDMENTS OF COMPUTER ETHICS IN RELATION TO THE APPROPRIATE


PHILIPPINE LAWS

COMMANDMENTS APPLICABLE PHILIPPINE LAWS

Commandments #1 E-COMMERCE LAW

Commandments #2 ANTI-CYBERCRIME LAW

Commandments #3 ART.III SEC.III

Commandments #4 CONSTITUTION (PRIVACY RIGHT)

Commandments #5 ACCESS DEVICE REGULATION ACT

Commandments #6 INTELECTUAL PROPERTY LAW

Commandments #7
CIVIL CODE
Commandments #8
ANTI-WIRETAPPING LAW
Commandments #9
REVISED PENAL CODE
Commandments #10

Part II deals with the legal aspects in computing. In selecting the appropriate Philippine Laws to be included in this
part, the authors considered the ten (10) commandments of computer ethics designed by the Computer Ethics Institute.
For example, Commandments # 6 states, “Thou shalt not use or copy software for which you have not paid.” To
address this problem, the Intellectual Property Law was included in part II, etc. in the figure above, the intellectual
property law includes the Optical Media Act of 2003.

Chapter III
TECHNLOGIES’ IMPACT ON PRIVACY

Intended Learning Outcomes

At the end of this chapter, the student is expected to:


 Be knowledge of his privacy rights and the rights to due process guaranteed by the constitution;
 To evaluate whether a particular instance a violation of his rights to privacy;
 To defend and argue whether in a particular instance, a person may have a reasonable expectation to privacy;
and
 Demonstrate the concept of identity theft and illustrate the ways from which such may be avoided.

This chapter may be completed in a span of seven (7) hours including the assessment task (except major exam).
After this chapter, a two-hour major assessment task (Prelim Exam) may be administered.

An Englishman’s home is his castle. The poorest man may in his cottage bid defiance to all the forces of the crown.
It may be frail, its roof may shake; the wind may blow through it; the storms may enter, the rain may enter,- but the
King of England cannot enter; all his forces dare not across the threshold of the ruined tenement.
The only privacy that’s left is inside of your head. How do we draw the line between protection of national security,
obviously the government’s need to obtain intelligence data, and the protection of civil liberties, particularly the sanctity
of my home? You’ve got no right to come into my home!

INTRODUCTION
The impact of technology has affected almost every individual from a nursery pupil to the oldest senior citizens. A
laptop being used by a three year old child is now common; senior citizens who used to hate computers are now using
Facebook and Twitter. An employee who come to work without his mobile phone will be forced to go back home for he
cannot live a day without his phone. During my daughter’s eighteen birthday, the resort owner told me, “Sir, because
of Facebook, my gross income was significantly increased due to the frequent reunion prepared by my customers
which was usually initiated due to posting of class pictures in Facebook.”
On the other hand, there are problems brought about by stalker who used technologies in order to obtain private
information from Facebook users by pretending to be a friend. Hence, there are also drawbacks brought about by
technological advances.
In addition to these are new technologies such as advanced data-mining software, facial recognition devices, retinal
scanner, and other advance in biometrics – the goal if this chapter is to address how these new technologies and
programs can be used without prying into one’s privacy. To do so, we first need to look at the right to privacy from
several angles, specifically, how it is conceived constitutionally, legally, and normatively by looking at public opinion
and jurisprudence.
Sometimes in the year 2003, as dean of the college of computer studies in one of the school in Laguna, I was invited
as one of the panel of judges for the “Search for Ms. Information Technology.” During the “Question and Answer”
portion, all of the finalists were asked, “Is it possible for It Professionals to help in preventing terrorist attack which just
happened in the USA last September 11, 2001?” Four of the finalist answered positively and said, “Yes sir. Through a
National ID system enabled by technology in its full potential, terrorist can be easily tracked down and hence, prevent
any possible attack. Fortunately, the finalist won the most coveted title of Ms.IT 2003.
The implementation of the National ID System in the Philippines has been hotly debated by our lawmakers from the
time of pres. Ramos until the time of Pres. Arroyo. Its implementation was strongly opposed by the militant groups for
the main reason that it shall violate their right to privacy. Others are in favor and argued that the benefits of implementing
the National ID System are very substantial and will not violate the citizen’s right to privacy.

LIFE UNDER THE TECHNOLOGY ENABLED NATIOAL ID SYSTEM


Let us take a quick imagination of how the technology-enabled National ID System will work. Of course, the law
shall compel all citizens to register and failure to do so will be penalized. The effect is that, even terrorist should register;
otherwise, they may be imprisoned not because of violation of the Anti-terrorist law but by violation of the law
implementing the National ID System.
When you go to a mall, hotel and in any other place which is capable of using technology, you can easily be identified
using biometrics technology because you will be denied entry upon failure to prove that you are registered individual
of the Philippines. So a terrorist who decides NOT to register cannot afford to enter such places because he will be
recognized as a non-registrant. As a matter of law, such crime is a continuing crime, that is, as long as an individual is
not registered, he is continually committing an offense. The consequence is that he can be arrested even without the
benefit of a warrant of arrest. As a general rule, a person can ONLY be arrested if the police officer is armed with a
warrant of arrest. One of the exceptions to this general rule is that when the person to be arrested has committed, or
is actually committing, or is attempting to commit a crème. When a nonregistered individual is being identified, he is
actually committing a crime, hence, a police officer or any PRIVATE INDIVIDUAL can arrest him even without a warrant
of arrest (Sec. 5 (a), Rule 113, Rules of Court).
This continuing offense is distinguish from a person who drives a car without a driver’s license. When such person
stops driving, then he is not anymore committing an offense and the Land Transportation Office (LTO), Metropolitan
Manila Development Authority (MMDA) officer cannot anymore hold him liable.
Now supposed Juan is accused of raping Juana on June 29, 2015 around 7:00PM. Juan contended

You might also like