You are on page 1of 11

UNIT II: Computer Ethics 1.

Professional Behavior
Group 1 ● Members are expected to uphold
professional behavior that reflects
Chapter 1: Professional Codes of Ethics positively on the entire profession.
● A professional code of ethics is 2. Integrity
designed to ensure employees are ● Professionals must act with integrity,
behaving in a manner that is socially dignity, and honor to gain the
acceptable and respectful of one community's trust and have a
another. positive impact on society.

Professional Ethics 3. Professional Competence and Due


● About your obligation to the public. Care
● It is often established by ● Professionals should stay informed,
professional organizations to help maintain training, and ensure their
guide members in performing their subordinates exercise proper care.
job functions according to sound and
consistent ethical principles. 4. Confidentiality
● Members must protect sensitive
Code of Ethics information to prevent its
● A code of ethics is a guide of unauthorized sharing with third
principles designed to help parties.
professionals conduct business
honestly and with integrity. 5. Objectivity
● Members must exhibit fairness,
Why ethics for Professionals? impartiality, and intellectual honesty
● A basis for values and visions in their professional pursuits.
● To motivate employees
● Perhaps demanded by customers Symmetrical Ethics - The Golden Rule
● For good relationships to ● The Golden Rule is the principle of
stakeholders treating others as one would want
● An overall check on plans to be treated by them.
● To avoid various exposures and ● It is sometimes called an ethics of
risks reciprocity, meaning that you
● Part of governance should reciprocate to others how you
● Sustainability would like them to treat you.

Professional Code of Ethics (AAT’s Code Chapter 2: Code of Ethics of the Filipino
of Ethics) Computing and Information Technology
Often contain five fundamental principles Professional
(PIPCO): ● The Code of Ethics of the Filipino
Computing and Information
Technology Professional sets forth a
framework of principles guiding the
conduct of professionals in the field
of computing and information ● Advertise goods/services
technology in the Philippines. honestly and transparently.
4. I will comply and strictly abide by
Information Technology the intellectual property laws,
● The preparation, collection, creation, patent laws, and other related
transport, retrieval, storage, access, laws in respect of information
presentation and transformation of technology.
electronic information in all its forms ● Strict adherence to
including, but not limited to, voice, intellectual property, patent,
graphics, text, video, data and and related laws.
image. 5. I will accept full responsibility for
the work undertaken and will
Information Technology Professional utilize my skills with competence
● The one who develops or provides and professionalism.
information technology products ● Taking accountability for work
and/or services to the public. and performing tasks with
competence.
Filipino Code of Ethics 6. I will make truthful statements on
Preamble my areas of competence as well
● I will use my special knowledge and as the capabilities and qualities of
skills for the benefit of the public. I my products and services.
will serve employers and clients with ● Providing honest information
integrity, subject to an overriding about one's competence and
responsibility to the public interest, product/service qualities.
and I will strive to enhance the 7. I will not disclose or use any
competence and prestige of the confidential information obtained
professional. By these, I mean: in the course of professional
duties without the consent of the
1. I will promote public knowledge, parties concerned, except when
understanding, and appreciation required by law.
of information technology. ● Not disclosing confidential
● The professional will actively information without consent
contribute to public unless required by law.
understanding of IT. 8. I will try to attain the highest
2. I will consider the general welfare quality in both the products and
and public good in the services I offer.
performance of my work. ● Striving for the highest
● Prioritizing the well-being of quality in both products and
the public in the execution of services.
duties. 9. I will not knowingly participate in
3. I will advertise goods or the development of Information
professional services in a clear Technology Systems that promote
and truthful manner. fraud and other unlawful acts.
● Not participating in the information processing. Further, I
development of IT systems shall not use knowledge of a
that promote fraud or confidential nature to further my
unlawful activities. personal interest, nor shall I violate
10. I will uphold and improve the IT the privacy and confidentiality of
professional standards through information entrusted to me or to
continuing professional which I may gain access.
development in order to enhance 4. That I have an obligation to my
the IT profession College or University,therefore, I
● Upholding and improving shall uphold its ethical and moral
professional standards principles.
through ongoing learning. 5. That I have an obligation to my
employer whose trust I hold,
Chapter 3: Professionals Code of Ethics therefore, I shall endeavor to
of Association of IT Professionals discharge this obligation to the best
● The Professionals Code of Ethics of of my ability, to guard my employer’s
the Association of IT Professionals interests, and to advise him or her
outlines ethical standards for IT wisely and honestly.
professionals, guiding their behavior 6. That I have an obligation to my
and promoting integrity in their work. country, therefore, in my personal,
It serves to protect stakeholders' business, and social contacts, I shall
interests, maintain the profession's uphold my nation and shall honor
reputation, and ensure legal the chosen way of life of my fellow
compliance. citizens.

1. That I have an obligation to Chapter 4: Twelve Fundamental


management, therefore, I shall Principles of Ethics
promote the understanding of 1.Honesty
information processing methods and ● Putting honesty first in business
procedures to management using means being open, doing the right
every resource at my command. thing, and treating people fairly,
2. That I have an obligation to my starting by being truthful with
fellow members,therefore, I shall employees.
uphold the high ideals of AITP as 2. Integrity
outlined in the Association Bylaws. ● Integrity is having strong morals
Further, I shall cooperate with my shown through your actions, needing
fellow members and shall treat them you to be principled even if it means
with honesty and respect at all tempted by money or peer pressure.
times. 3. Trustworthiness
3. That I have an obligation to society ● Trustworthiness comes from keeping
and will participate to the best of my promises sincerely and adhering to
ability in the dissemination of agreements, creating strong
knowledge pertaining to the general relationships and improving
development and understanding of business prospects.
4. Loyalty 12. Responsibility
● Companies often seek employee ● It is by recognizing their obligations
loyalty, yet they also strive to to employees, customers, and
reciprocate by valuing loyalty to society, aiming to meet expectations
customers, while protecting sensitive set by others.
information.
5. Fairness Chapter 5: Ten Commandments of
● Ethical fairness means treating Computer Ethics
everyone equally, with companies ● Established by the Computer Ethics
offering equal opportunities to Institute in 1992, constitute a
employees and fair treatment to comprehensive set of standards
customers. designed to guide and instruct
6. Empathy people in the ethical use of
● Empathy is caring for stakeholders' computers.
well-being, prioritizing ethical
decisions even if they impact 1.Thou shalt not use a computer to harm
profitability, like recalling harmful other people.
products. 2. Thou shalt not interfere with other
7. Respect people’s computer work.
● The business itself and 3. Thou shalt not snoop around in other
professionals treat everyone with people’s computer files.
respect and courtesy, reciprocating 4. Thou shalt not use a computer to steal.
the behavior they expect from 5. Thou shalt not use a computer to bear
others. false witness.
8. Compliance 6. Thou shalt not copy or use proprietary
● Employers and employees follow the software for which you have not paid.
law and clean practices, avoiding 7. Thou shalt not use other people’s
dishonest practices like manipulating computer resources without authorization or
sales. proper compensation.
9. Pursuit of excellence 8. Thou shalt not appropriate other people’s
● It is by prioritizing excellence over intellectual output.
profits, focusing on adding value 9. Thou shalt think about the social
through their products or services. consequences of the program you are
Efficacy over financial gains. writing or the system you are designing.
10. Leadership 10. Thou shalt always use a computer in
● Businesses and leaders set positive ways that ensure consideration and respect
examples, embodying integrity, and for your fellow humans.
fostering a culture of growth,
guidance, and inspiration.
11. Reputation
● Companies prioritize reputation and
encourage employees to uphold it
through their conduct while also
boosting morale and behavior.
○ b. The belief that information
Unit II - Chapter 6: The Hacking should be free to all.
Community’s Constitution ○ c. The idea that one can test
Group 2 and know the dangers and
exploits of systems that store
VI. The Hacking Community’s the individuals’ information.
Constitution ● That cyber space should be a
● It is a set of moral principles that governing body in the world
regulate the use of computers. community, where people of all
● It is part of practical philosophy, nations and cultures can express
which deals with how computing their ideas and beliefs as to how our
professionals should make decisions world politics should be played.
regarding professional and social ● That there should be no governing
conduct. social or political class or party in
cyberspace.
We believe that: ● That the current status of the
● That every individual should have internet is a clear example as to how
the right to free speech in many races, cultures, and people
cyberspace. can communicate freely and without
● That every individual should be free friction or conflicts.
of worry when pertaining to ● In free enterprise and friction-free
oppressive governments that control capitalism.
cyberspace. ● In the open source movement fully,
● That democracy should exist in as no government should adopt
cyber space to set a clear example commercial or priced software for it
as to how a functioning element of shows that a government may be
society can prosper with equal rights biased to something that does not
and free speech to all. prompt the general welfare of the
● That hacking is a tool that should technology market and slows or
and is used to test the integrity of stops the innovation of other smaller
networks that hold and safeguard company’s products.
out valuable information. ● That technology can be wielded for
● Those sovereign countries in the the better placement of mankind and
world community that do not respect the environment we live in.
democracy should be punished. ● That all sovereign countries in the
● That art, music, politics and crucial world community should respect
social elements of all world societies these principles and ideas released
can be achieved on the computer in this constitution.
and in cyberspace. ● The above-declared constitution is
● That hacking, cracking and like a bill of rights which should be
phreaking are instruments that can read in relation to the Ten
achieve three crucial goals: Commandments.
○ a. Direct Democracy in
cyberspace.
VII. What is Computer Ethics harmful computer malfunctions, or
● Computer ethics deals with the computerized weapons, etc.
procedures, values and practices PARA
that govern the process of ● The second level of computer ethics
consuming computing technology can be called “para” computer
and its related disciplines without ethics.
damaging or violating the moral ● Someone who takes a special
values and beliefs of any individual, interest in computer ethics cases,
organization or entity. collects examples, clarifies them,
looks for similarities and differences,
VIII. Three Levels of Computer Ethics reads related works, attends
relevant events, and so on, is
learning “para” computer ethics.

THEORETICAL
● The third level of computer ethics I
call “theoretical” computer ethics,
because it applies scholarly theories
to computer ethics cases and
concepts.
● Someone proficient in “theoretical”
● Computer ethics would be able not
only to identify, clarify, compare and
● Computer ethics questions can be contrast computer ethics cases; she
raised and studied at various“levels.” or he could also apply theories and
And each level is vital to the overall tools from philosophy, social science
goal of protecting and advancing or law in order to deepen our
human values. On the most basic understanding of the issues.
level, computer ethics tries to ● Such “theoretical” computer ethics is
sensitize people to the fact that normally taught in college-level
computer technology has social and courses with titles like“Computer
ethical consequences. Ethics,” “Computers and Society,”
POP “Computers and the Law.”
● This is the overall goal of what some
call “pop” computer ethics. ● All three “levels of analysis” are
● Newspapers, magazines and TV important to the goal of advancing
news programs have engaged and defending human values.
increasingly in computer ethics of ● Voters and the public at large, for
this sort. example, should be sensitive to the
● Every week, there are news stories social and ethical consequences of
about computer viruses, or software information technology. Computer
ownership lawsuits, or professionals and public policy
computer-aided bank robbery, or makers should have “para” computer
ethics skills and knowledge in order policy and assume that everything is
to do their jobs effectively. in good place without even realizing
we might solely permit a gateway
IX. Social Networking access to our personal information.
● Social networks are websites and
apps that allow users and FREE SPEECH
organizations to connect, ● Although free speech is not seen as
communicate, share information and unobtrusive and supported
form relationships. People can democratic ideology, it is a
connect with others in the same dangerous weapon for a specific
area, families, friends, and those group of people to manipulate the
with the same interests. Social right to release an unethical
networks are one of the most sentiment such as racial or religious
important uses of the internet today. sentiment within the digital space.

Social Networking Sites DATA LEAKAGE


● Popular social networking sites -- ● Although numerous new
such as Facebook, Yelp, Twitter, technologies related to data
Instagram and TikTok -- enable protection have been introduced to
individuals to maintain social the market, data leakage still
connections, stay informed and remains a big issue.
access, as well as share a wealth of ● Data leakage is possibly caused by
information. These sites also enable the users minimal awareness and
marketers to reach their target understanding of ethical privacy and
audiences. protection value of the policies used
● Social networking sites have come a by social networking sites.
long way since the first social ● Social networking timelines such as
networking site, SixDegrees.com, location which are mostly shown in a
was launched in 1997. Today, the user's activities can be manipulated
world is rapidly adopting newer and compiled as a valuable source
social networking platforms. for data leakage.

X. Ethical Issues of Social Networking IDENTITY THEFT


PRIVACY ● It is a form of technique used by
● Privacy can be violated, including criminals to impersonate someone’s
social networks through intrusion, identity with the intention to commit
misuse of information, etc. a crime.
● The internet contains a wealthy ● Despite the rapid effort made by
amount of data and will always be a social networking sites to protect its
serious subject of concern. users from online impersonation, the
● Although terms and conditions were solution still depends on the ethical
always made to be seen and agreed value and proactive actions by the
during the users registration users themselves to self awareness
process, most users ignore the
on the risk of identity theft on social 2. Doctor-Patient Confidentiality
networking sites. ● Medical records are confidential
even from a spouse without the
patient's consent.
UNIT III: Technologies’ Impact on Privacy 3. Financial Records
Group 3 ● Financial information must be
disclosed during divorce
proceedings.
The 1987 Constitution Of The Republic 4. Personal Devices And Accounts
Of The Philippines – Article III ● Spouses have no inherent legal right
● Article III, Section 1 on due process to access each other's personal
is considered the main source of the devices or accounts
right to privacy. 5. Home Privacy
● Spouses have equal rights to be in
Rational Relationship Test the home and use its contents.
● A.K.A. rational-relationship test, 6. Domestic Violence Laws
minimum scrutiny, or minimal ● Abusive violations of privacy may
scrutiny. qualify as domestic violence.
● A way for judges to decide if a law is
fair. 7. Snooping And Wiretapping Laws
● A criterion used in constitutional law ● Unauthorized snooping or
to analyze a statute that does not wiretapping by a spouse may violate
involve a fundamental right. privacy laws.
8. Divorce And Separation
Reasonable Expectation of Privacy ● Courts can issue orders for
● An essential element of privacy law. temporary privacy and separation
● Allows you to hold someone 9. Premarital Agreements
accountable for violating your ● Spouses can contractually agree to
personal privacy. financial and asset privacy

Home is the clearest example of a place People detained or arrested have the right
where you have a reasonable expectation of to know the reasons for the detention or
privacy. arrest right away.

Privacy law protects you from humiliation The right to speak to a lawyer is a
or having private details made public. fundamental right. It allows people
detained or arrested to discuss their rights
Legal Principles Governing Privacy and responsibilities with a lawyer.
Rights Between Spouses
The purpose of the right to remain silent is
1. Marital Communications Privilege to prevent people detained from hurting
● Spouses cannot be forced to testify their cases by helping the police.
against each other
In 2012, the Philippines passed Republic 3. Look at your bills
Act No.10173 or the Data Privacy Act of 4. Read your email
2012 (DPA)
What to Do if You Think You're a Victim
Personal data of Identity Theft
● refers to all types of personal 1. Contact your bank or credit card issuer
information. 2. Review your credit reports
3. Freeze your credit
Who implements the DPA? 4. File an identity theft report.
● The National Privacy Commission 5. File a police report.
(NPC) is in charge of administering 6. Being a victim of identity theft is a
and implementing the DPA. harrowing experience.

Major functions of the NPC are: Due process


1.Rule making ● a requirement that legal matters be
2.Compliance and monitoring resolved according to established
3.Advisory rules and principles.
4.Public Education
5.Complaints and investigations Types of Due process
6.Enforcement 1. Procedural due process
● requires that when the federal
The Data Privacy Act, as well as RA No. government acts in a way that
10175 or the Cybercrime Prevention Act, denies a citizen
was only enacted in 2012. 2. Substantive due process
● is a principle allowing courts to
Identity theft protect certain fundamental rights
● when someone steals your personal from government interference.
information.

9 of the most common ways identity UNIT IV: Technologies’ Impact on Privacy
thieves get hold of your data: Group 4
1. Data Breaches
2. Unsecure Browsing Programmer's source code
3. Dark Web Marketplaces ● should reflect a conscientious effort
4. Malware Activity to address social and professional
5. Credit Card Theft issues in ICT.
6. Mail Theft
7. Phishing And Spam Attacks The Programmers Source Code
8. Wi-Fi Hacking 1. Occupation
9. Mobile Phone Theft ● refers to the occupation of the
programmer who created the code.
How to Check for Identity Theft
1. Monitor your credit score
2. Keep an eye on your credit reports
2. Law Intellectual Property (RA 8293)
● refer to legal considerations and ● Contains provisions which protects
obligations that programmers need the rights of people regarding their
to be aware of and comply intellectual creations.
3. Donation ● Other laws which govern the use of
● act of voluntarily contributing/sharing technology:
code with others ○ E-Commerce law
4. Tradition ○ Access Devices Regulation
● the established practices, Act
conventions, and standards ○ Cybercrime law
5. Intellectual Creation
● Presentations are communication Intellectual property rights consists of:
tools. 1. Copyright & Related Rights
6. Prescription ● Copyright law protects original works
● the acquisition or loss of rights to the of authorship fixed in a tangible
code over time medium of expression
7. Succession 2. Trademarks & Service Marks
● The original and creative expression ● Trademarks are symbols, names, or
embodied in the code. designs used to identify and
distinguish goods or services
Intellectual Creation 3. Geographic Indications
1. Innovative Solutions ● Signs used on goods that have a
● Programmers use their creativity and specific geographical origin
problem-solving skills to devise 4. Industrial Design
innovative solutions ● Industrial design protection applies
2. Policy Analysis & Advocacy to the ornamental or aesthetic
● Intellectual creation extends to the aspects of a product
critical analysis of ICT policies. 5. Patents
3. Ethical design & Development ● Patents protect inventions, including
Practices processes, methods, and
● Involves the development of ethical technological innovations
design and development practices 6. Layout Designs
● ● Layout design protection, also
Intellectual Creation Examples known as semiconductor or
● Painting by an artist integrated circuit (IC).
● Books written by an author 7. Protection of Undisclosed Information
● Logo designed by a student ● Referred to as trade secrets,
● Programs written by a programmer safeguards confidential business
● Newspaper articles information.
● PowerPoint presentations
● Thesis Why Promote and Protect Intellectual
● Dissertations Property?
● Protection of IP rights is an incentive
to human creativity.
● Promotes respect for individual
artists, and enables them to earn 3. Trademark
livelihoods. ● Protect brand names, logos, and
● Prevents infringement. slogans. This is a brand element
● It serves as an instrument for which distinguishes your goods and
economic development. services
● New creativity helps create ● Works
sustainable and competitive ○ Word mark, logo, slogan,
businesses locally and shapes
internationally. ● Rights
○ Exclusive right to use the
3 Branches of Intellectual Property mark and prevent everyone
1. Copyright from using it without
● Protection is automatically granted permission
to the author for their original, ● Validity
creative or intellectual work. ○ Valid 10 years which can be
● Works made perpetual
○ Books, lectures, dramatic
and musical works
● Rights
○ To distribute copies or phone
records of the work to the
public by sale or transfer of
ownership (rental/lease)
● Validity
○ Valid through the lifetime of
the author and 60 years after
his death
2. Patent
● This concerns obtaining protection
for new inventions that are new,
original and useful.
● Works
○ Novels or original that has an
inventive step
● Rights
○ Exclusive authority over the
patented invention, right to
exclude others and exploit
the patent
● Validity
○ Valid for period of 20 years
after which it goes in public
domain

You might also like