Professional Documents
Culture Documents
Professional Behavior
Group 1 ● Members are expected to uphold
professional behavior that reflects
Chapter 1: Professional Codes of Ethics positively on the entire profession.
● A professional code of ethics is 2. Integrity
designed to ensure employees are ● Professionals must act with integrity,
behaving in a manner that is socially dignity, and honor to gain the
acceptable and respectful of one community's trust and have a
another. positive impact on society.
Professional Code of Ethics (AAT’s Code Chapter 2: Code of Ethics of the Filipino
of Ethics) Computing and Information Technology
Often contain five fundamental principles Professional
(PIPCO): ● The Code of Ethics of the Filipino
Computing and Information
Technology Professional sets forth a
framework of principles guiding the
conduct of professionals in the field
of computing and information ● Advertise goods/services
technology in the Philippines. honestly and transparently.
4. I will comply and strictly abide by
Information Technology the intellectual property laws,
● The preparation, collection, creation, patent laws, and other related
transport, retrieval, storage, access, laws in respect of information
presentation and transformation of technology.
electronic information in all its forms ● Strict adherence to
including, but not limited to, voice, intellectual property, patent,
graphics, text, video, data and and related laws.
image. 5. I will accept full responsibility for
the work undertaken and will
Information Technology Professional utilize my skills with competence
● The one who develops or provides and professionalism.
information technology products ● Taking accountability for work
and/or services to the public. and performing tasks with
competence.
Filipino Code of Ethics 6. I will make truthful statements on
Preamble my areas of competence as well
● I will use my special knowledge and as the capabilities and qualities of
skills for the benefit of the public. I my products and services.
will serve employers and clients with ● Providing honest information
integrity, subject to an overriding about one's competence and
responsibility to the public interest, product/service qualities.
and I will strive to enhance the 7. I will not disclose or use any
competence and prestige of the confidential information obtained
professional. By these, I mean: in the course of professional
duties without the consent of the
1. I will promote public knowledge, parties concerned, except when
understanding, and appreciation required by law.
of information technology. ● Not disclosing confidential
● The professional will actively information without consent
contribute to public unless required by law.
understanding of IT. 8. I will try to attain the highest
2. I will consider the general welfare quality in both the products and
and public good in the services I offer.
performance of my work. ● Striving for the highest
● Prioritizing the well-being of quality in both products and
the public in the execution of services.
duties. 9. I will not knowingly participate in
3. I will advertise goods or the development of Information
professional services in a clear Technology Systems that promote
and truthful manner. fraud and other unlawful acts.
● Not participating in the information processing. Further, I
development of IT systems shall not use knowledge of a
that promote fraud or confidential nature to further my
unlawful activities. personal interest, nor shall I violate
10. I will uphold and improve the IT the privacy and confidentiality of
professional standards through information entrusted to me or to
continuing professional which I may gain access.
development in order to enhance 4. That I have an obligation to my
the IT profession College or University,therefore, I
● Upholding and improving shall uphold its ethical and moral
professional standards principles.
through ongoing learning. 5. That I have an obligation to my
employer whose trust I hold,
Chapter 3: Professionals Code of Ethics therefore, I shall endeavor to
of Association of IT Professionals discharge this obligation to the best
● The Professionals Code of Ethics of of my ability, to guard my employer’s
the Association of IT Professionals interests, and to advise him or her
outlines ethical standards for IT wisely and honestly.
professionals, guiding their behavior 6. That I have an obligation to my
and promoting integrity in their work. country, therefore, in my personal,
It serves to protect stakeholders' business, and social contacts, I shall
interests, maintain the profession's uphold my nation and shall honor
reputation, and ensure legal the chosen way of life of my fellow
compliance. citizens.
THEORETICAL
● The third level of computer ethics I
call “theoretical” computer ethics,
because it applies scholarly theories
to computer ethics cases and
concepts.
● Someone proficient in “theoretical”
● Computer ethics would be able not
only to identify, clarify, compare and
● Computer ethics questions can be contrast computer ethics cases; she
raised and studied at various“levels.” or he could also apply theories and
And each level is vital to the overall tools from philosophy, social science
goal of protecting and advancing or law in order to deepen our
human values. On the most basic understanding of the issues.
level, computer ethics tries to ● Such “theoretical” computer ethics is
sensitize people to the fact that normally taught in college-level
computer technology has social and courses with titles like“Computer
ethical consequences. Ethics,” “Computers and Society,”
POP “Computers and the Law.”
● This is the overall goal of what some
call “pop” computer ethics. ● All three “levels of analysis” are
● Newspapers, magazines and TV important to the goal of advancing
news programs have engaged and defending human values.
increasingly in computer ethics of ● Voters and the public at large, for
this sort. example, should be sensitive to the
● Every week, there are news stories social and ethical consequences of
about computer viruses, or software information technology. Computer
ownership lawsuits, or professionals and public policy
computer-aided bank robbery, or makers should have “para” computer
ethics skills and knowledge in order policy and assume that everything is
to do their jobs effectively. in good place without even realizing
we might solely permit a gateway
IX. Social Networking access to our personal information.
● Social networks are websites and
apps that allow users and FREE SPEECH
organizations to connect, ● Although free speech is not seen as
communicate, share information and unobtrusive and supported
form relationships. People can democratic ideology, it is a
connect with others in the same dangerous weapon for a specific
area, families, friends, and those group of people to manipulate the
with the same interests. Social right to release an unethical
networks are one of the most sentiment such as racial or religious
important uses of the internet today. sentiment within the digital space.
Home is the clearest example of a place People detained or arrested have the right
where you have a reasonable expectation of to know the reasons for the detention or
privacy. arrest right away.
Privacy law protects you from humiliation The right to speak to a lawyer is a
or having private details made public. fundamental right. It allows people
detained or arrested to discuss their rights
Legal Principles Governing Privacy and responsibilities with a lawyer.
Rights Between Spouses
The purpose of the right to remain silent is
1. Marital Communications Privilege to prevent people detained from hurting
● Spouses cannot be forced to testify their cases by helping the police.
against each other
In 2012, the Philippines passed Republic 3. Look at your bills
Act No.10173 or the Data Privacy Act of 4. Read your email
2012 (DPA)
What to Do if You Think You're a Victim
Personal data of Identity Theft
● refers to all types of personal 1. Contact your bank or credit card issuer
information. 2. Review your credit reports
3. Freeze your credit
Who implements the DPA? 4. File an identity theft report.
● The National Privacy Commission 5. File a police report.
(NPC) is in charge of administering 6. Being a victim of identity theft is a
and implementing the DPA. harrowing experience.
9 of the most common ways identity UNIT IV: Technologies’ Impact on Privacy
thieves get hold of your data: Group 4
1. Data Breaches
2. Unsecure Browsing Programmer's source code
3. Dark Web Marketplaces ● should reflect a conscientious effort
4. Malware Activity to address social and professional
5. Credit Card Theft issues in ICT.
6. Mail Theft
7. Phishing And Spam Attacks The Programmers Source Code
8. Wi-Fi Hacking 1. Occupation
9. Mobile Phone Theft ● refers to the occupation of the
programmer who created the code.
How to Check for Identity Theft
1. Monitor your credit score
2. Keep an eye on your credit reports
2. Law Intellectual Property (RA 8293)
● refer to legal considerations and ● Contains provisions which protects
obligations that programmers need the rights of people regarding their
to be aware of and comply intellectual creations.
3. Donation ● Other laws which govern the use of
● act of voluntarily contributing/sharing technology:
code with others ○ E-Commerce law
4. Tradition ○ Access Devices Regulation
● the established practices, Act
conventions, and standards ○ Cybercrime law
5. Intellectual Creation
● Presentations are communication Intellectual property rights consists of:
tools. 1. Copyright & Related Rights
6. Prescription ● Copyright law protects original works
● the acquisition or loss of rights to the of authorship fixed in a tangible
code over time medium of expression
7. Succession 2. Trademarks & Service Marks
● The original and creative expression ● Trademarks are symbols, names, or
embodied in the code. designs used to identify and
distinguish goods or services
Intellectual Creation 3. Geographic Indications
1. Innovative Solutions ● Signs used on goods that have a
● Programmers use their creativity and specific geographical origin
problem-solving skills to devise 4. Industrial Design
innovative solutions ● Industrial design protection applies
2. Policy Analysis & Advocacy to the ornamental or aesthetic
● Intellectual creation extends to the aspects of a product
critical analysis of ICT policies. 5. Patents
3. Ethical design & Development ● Patents protect inventions, including
Practices processes, methods, and
● Involves the development of ethical technological innovations
design and development practices 6. Layout Designs
● ● Layout design protection, also
Intellectual Creation Examples known as semiconductor or
● Painting by an artist integrated circuit (IC).
● Books written by an author 7. Protection of Undisclosed Information
● Logo designed by a student ● Referred to as trade secrets,
● Programs written by a programmer safeguards confidential business
● Newspaper articles information.
● PowerPoint presentations
● Thesis Why Promote and Protect Intellectual
● Dissertations Property?
● Protection of IP rights is an incentive
to human creativity.
● Promotes respect for individual
artists, and enables them to earn 3. Trademark
livelihoods. ● Protect brand names, logos, and
● Prevents infringement. slogans. This is a brand element
● It serves as an instrument for which distinguishes your goods and
economic development. services
● New creativity helps create ● Works
sustainable and competitive ○ Word mark, logo, slogan,
businesses locally and shapes
internationally. ● Rights
○ Exclusive right to use the
3 Branches of Intellectual Property mark and prevent everyone
1. Copyright from using it without
● Protection is automatically granted permission
to the author for their original, ● Validity
creative or intellectual work. ○ Valid 10 years which can be
● Works made perpetual
○ Books, lectures, dramatic
and musical works
● Rights
○ To distribute copies or phone
records of the work to the
public by sale or transfer of
ownership (rental/lease)
● Validity
○ Valid through the lifetime of
the author and 60 years after
his death
2. Patent
● This concerns obtaining protection
for new inventions that are new,
original and useful.
● Works
○ Novels or original that has an
inventive step
● Rights
○ Exclusive authority over the
patented invention, right to
exclude others and exploit
the patent
● Validity
○ Valid for period of 20 years
after which it goes in public
domain