You are on page 1of 5

Bagongon, Alexis AEC 31: IT Application Tools in Business 09/26/19

Chiong, Zeimuill Andrau

Contratista, Wendellin

Ibale, Charissa

Pacamalan, Josini

1.)Ethics in Information Technology

Organizations implement codes of ethics in their policies that highlight the ethical
responsibilities of users in the use of information technology. These are:

· Ensure that information technology resources are used only for authorized purposes.

· Prevent sharing of access privileges, such as passwords, among users. This secures
computer systems from malicious attacks.

· Promotes respect in the use of information technology. This is because they prevent
users from denying others access to computer networks.

· Prevents unauthorized deletion, copying or modification of private data, such as emails


and files.

· Prevent users from introducing malicious software, such as viruses, to computer systems.

· Discourages users from vandalizing or misusing information technology resources.

· Prevent unlawful use of information technology systems or resources through activities


such as fraud and display or distribution of obscene materials.

· Discourages companies from collecting or using consumer data in a way that


compromises their privacy.

· Prevent conflict of interest in the use of technology and demonstrate competence and
quality of service.

2.) Legal and Ethical Issues in IT

Legal and Ethical Issues in IT

1. Privacy

Most people have their personal data spread throughout the digital world. Even
things thought to be secure, such as email or private accounts, can be accessed by
unintended sources. Most employers actively check their employees’ computer habits.
Privacy has evolving legal implications, but there are also ethical considerations.
Privacy concerns can easily become a slippery slope, slowly eroding an individual’s
right to privacy completely.
2. Digital Ownership

Digital mediums have allowed information to flow more freely than before. This
exchange of ideas comes with a legal and ethical backlash. Things can be easily copied
and pasted online, which makes intellectual property hard to control. Legal notions such
as copyright have struggled to keep up with the digital era. Companies in the music and
entertainment industries have pushed for greater legal protections for intellectual
properties while other activists have sought to provide greater freedoms for the
exchange of ideas in the digital realm.

3. Data Gathering

On some level, everyone knows that their online lives are monitored. The United
States has even passed legislation allowing the government to actively monitor private
citizens in the name of national security. These measures have revived a debate about
what information can be gathered and why. This debate applies on a smaller scale as
well because companies need to consider what information to collect from their
employees. This issue invokes a question of consent. Do people know what information
is being monitored? Do they have a right to know how their data is being used?

Phishing - a fraudulent attempt, usually made through email, to steal your personal
information. It is a cybercrime in which a target or targets are contacted by email,
telephone or text message by someone posing as a legitimate institution to lure
individuals into providing sensitive data such as personally identifiable information,
banking and credit card details, and passwords.

4. Security Liability

In the past, security issues were resolved by locking a door. Digital security is
much more complicated. Security systems for digital networks are computerized in
order to protect vital information and important assets. However, this increased security
comes with increased surveillance. All security systems have inherent risks, which
means it is a question of what risks are acceptable and what freedoms can be forfeited.

5. Access Costs

Net neutrality has become a trendy issue thanks to legislative efforts in the last
few years. The issue of net neutrality is essentially a question of access. Proponents
want the Internet to remain open to everyone while some businesses want to create
tiered access for those who are willing to pay. The issue even extends to private
Internet usage since the cost of service in some areas may be cost prohibitive. The
larger ethical question is whether or not digital exchange is now a universal right. The
cost of access can impede business growth, entrepreneurial spirit and individual
expression.

3.) IT Ethics in the Workplace

1. Data Governance

In any industry or company, the success of business depends on having the right
information at the right time at the right place to take informative decision. So as to
provide the right information, there is a need to have the right data about the
subject/customer.

Once this data is captured, IT department of a company is responsible for the security
of the data as well as the availability of the data to the people on a need to know basis.
The IT department also ensures that the data is secured and not shared nor sold to any
third party. Once this trust is gained in the society, then there will be more and more
people from the different parts of the society becoming part of this IT revolution.

For example, in companies like Intel and Infosys, a lot of emphasis and training is given
to the IT personnel on ethics related to the importance of data and its value.

2. Copyright Violation

Copyright law has been developed to establish exclusive rights for a copyright
holder. The copyright holder has the right to determine how their work may be used i.e.,
make copies, make different versions of the work or perform certain works in public and
decide whether they will grant the right to copy or use the material.. The company
should strictly give guidelines not to download any software, songs unless it is an open
source and do not copy copyrighted software without the author’s permission. The
company does a full scan of the computer from time to time to make sure that there is
no illegal software as well as there is no copyright violation.

3.Usage of Computer

The unauthorized and improper use of computer and their resources should be
prohibited. Using office computer and visiting sites which are related to violence,
pornography, abuse or getting emails related to any of the above topics is a serious
violation. This will decreases the productivity of the employee which in turn decreases
productivity of the company and that affects the society.

4. Sniffing

Sniffing attack or a sniffer attack, in context of network security, corresponds to


theft or interception of data by capturing the network traffic using a sniffer (an
application aimed at capturing network packets). When data is transmitted across
networks, if the data packets are not encrypted, the data within the network packet can
be read using a sniffer. Using a sniffer application, an attacker can analyze the network
and gain information to eventually cause the network to crash or to become corrupted,
or read the communications happening across the network.

5. Usage of Explicit Information from other Companies

Using explicit information from other companies for personal gains is a serious
company policy violation and there could be legal consequences. Many companies use
‘Non-disclosure agreements’ to reduce the risk for company explicit information
.company should train and alert their employees in best possible ways on the ethical
scenarios of using ‘company exclusive information for personal gain’ and the
consequences for the same so that employees are completely aware .

6. Spam Emails

Email spam, also known as different types of emails related to pornography,


sexually explicit emails, unwanted product offers, illegal prescription drug offers,
lottery’s, etc. contributes to the huge volume of spam emails. These spams emails often
leads users to malicious websites or even can infect users machines via attachments or
scripts contained in the message. Organizations should have strong email policies and
also train employees on the ethics and handling of unsolicited or sexually explicit emails
known as junk email, is unsolicited messages sent in bulk by email.
7. Phishing

Phishing is a cybercrime in which a target or targets are contacted by email,


telephone or text message by someone posing as a legitimate institution to lure
individuals into providing sensitive data such as personally identifiable information,
banking and credit card details, and passwords. Corporate & organizations should
device proper training and strong policies for their employees to handle unethical
phishing crimes, which may cost a lot of money and which can spoil the reputation
(confidential information leak) of the organization.

8. Computer Program and Effect

The unethical approach to programming and incorrect testing will have a severe
impact on the society – for example issues related to car programs not written and
tested correctly could be a life and death issue. Publishing of information without
checking the authenticity in media (social as well as digital) will affect the society in a
negative way.

9. Transparency

The implication of transparency is that all of an organization’s actions should be


scrupulous enough to bear public scrutiny. Increasingly, the nature of social media and
other communications means that even actions intended to be secret may be brought
into the public's awareness, despite an organization's best efforts to keep them hidden.

10. Acceptance of gifts

Accepting gifts can be interpreted as an act of gratitude or recognizing


achievement attained. But some acts of accepting gifts is aiming to establish or
enhance a relationship to bribe. One of the challenging areas will be on how to perceive
the gift given, is it a bribe or simply a gift. For example, you are a tax collector or
regulator and you accept gifts from your clients and give a special service consideration

11. Giving back to the society

It is commonly known as Corporate Social Responsibility. It is where companies


make efforts to contribute in the society including economic, social, and environmental.
Businesses can benefit in this program as it will boost their brand in the community. But
some activists define CSR as a “greenwash” strategy. A way to hide their true business
operation or to appear as a good company.

Starbuck is one of the companies that achieved CSR milestones such as their 99
percent ethically sourced coffee, creating global networks of farmers, pioneering green
building, and contributing community service.

12. Green Technology Initiatives

It is also known as sustainable technology. These are initiatives to use


technology in an environmentally friendly way. It strives to use resources efficiently,
reduce waste, attain sustainable development and best hope to counteract the effects of
climate change and pollution

SM Supermalls is one of the company that starts to adopt green initiatives and
committed to reduce greenhouse emissions and maximize energy efficiency. They
install solar panels at their stores like the SM City North Edsa which is the first ,all in the
Philippines to become solar powered.
4.)Factors affecting access to and acceptance of technology

1. Age

-Generational differences elders have less technological knowledge and may be


reluctant to conform. Persons who have grown up with technology are likely to be more
tech savvy and want the latest technology

2. Culture

-Language barriers may restrict participation in community events. Some cultures may
view certain technologies as unnecessary or untraditional.

3. Education

-Students in remote regions can access information and research immediately as well
as communicate with far away teachers

-Individuals who have been poorly educated and denied technology may fear
technology.

4. Economic Status

-newest technology is of low priority for those with low Socioeconomic status

- may cause tension in household if newest technologies cannot be accessed

5. Disability

They benefit greatly from technological developments, through systems to monitor


health and devices like auto wheelchairs, X-rays, IV fluids, hearing aids etc.

6. Geographical location

Those in remote locations may find it more difficult to access certain facilities,
technologies and services.

7. Gender

Technology associated with specific gender eg. males=machinery. females=social


media.

8. Religion

Religious beliefs may restrict acceptance of certain technologies e.g Amish

References:

Tutorialspoint.com. (0AD). IT Ethics at Workstation. Retrieved from


https://www.tutorialspoint.com/articles/it-ethics-at-workstation

What is transparency? - Definition from WhatIs.com. (0AD). Retrieved from


https://whatis.techtarget.com/definition/transparency

https://year12cafstechnology.wordpress.com/technology-and-well-being/factors-
affecting-access-to-and-acceptance-of-technology/

You might also like