You are on page 1of 28

E t hi c s

p u te r
Co m
A. Paal a
ol i Ma rk
N
What is Computer Ethics?
It is a new branch of ethics that is growing and
changing rapidly as a computer technology also
grows and develops. The term “computer ethics” is
open to interpretations both broad and narrow. On
one hand, for example , computer ethics might be
understood very narrowly as the efforts of
professional philosophers to apply traditional ethical
theories like utilitarianism, Kantianism, or other
moral theories to issues regarding the use of
computer technology.
What is Computer Ethics?
On the other hand , it is possible to construe
computer ethics in a very broad way to
include, as well, standards of professional
practice , codes of conduct , aspects of
computer law, public policy , corporate ethics
—even certain topics in the sociology and
psychology of computing.
Social Networking Ethical
Issues
Obviously if we have hundreds of millions of users of
one social networking site, it will be almost impossible
that ALL of these users will abide by the golden rule.
We, Filipinos, Are very good in turning our national
problems into a joke expressed in a picture message
published in social networking sites. For instance when
the MRT-3 train was derailed in Taft Avenue station, a
netizen was quick to express in one of his picture
message, “BUTI NA LANG NANDYAN SI SPIDEY”,
depicting a scene from the movie “Spider-Man 2.”
Social Networking Ethical
Issues
Another good illustration if after the airport
brawl incident between Mon Tulfo and
Santiagos. A netizen post the following picture
depicting the move the AVENGERS.
Posting a Picture
The above pictures may be just fine because it is
entertaining . But, what if your friend post your
picture which , to your mind should not be seen by
others, will that be OK with you? Hence, as a rule
of thumb , netizens should NOT post a picture
which may be offensive to some person(s) included
in the picture. Of course, if the picture is on its face
, a good picture, we do not need to get the consent
of everyone.
Posting a Picture
If we asked someone to join us in a photo shoot (or selfie), do
we need to ask his permission to allow us to upload the said
picture on any social networking site.

Not anymore . This is due to the fact that once you ask
someone popular, say, Manny Pacquiao, to join us in the
photo shoot , he is aware that we are going to upload the
same picture in our Facebook and other social networking
sites. The only exemption is when he (Manny Pacquiao) will
expressly prohibit us from uploading the same to the internet
. His mere silence is tantamount to an implied consent.
Posting a Picture
However , if we take a photo or video of a
private person without his consent , it is NOT
proper to publish the same the internet
subject to some exemptions. To illustrate,
supposed you fell asleep inside the library and
one of your classmates take a picture of you
and posted it in his Facebook; of course you
will get furious. The act of your classmate is
unethical and improper.
Exemptions
1. If the taking of picture and video involves
news of the day and other miscellaneous facts
having the character of mere items of press
information. Example is the videotaping of a
man who jumped from the bridge in EDSA.
Exemptions
If the unauthorized picture taking and/or videotaping is done for
the general welfare of the public . Here a video showed an
abusive traffic enforcer who threatened the life of truck driver.
Because of the viral video, the abusive traffic enforcer was
immediately suspended by the Office of the Vice Mayor Isko
Moreno.

Taking a picture of public personalities in public.

Example: So if you will take a picture of Manny Pacquiao as


shown in the picture, that will be fine . However , if Manny Pacquiao
went to the comfort room, never take his picture or video!
The Impact of Technology
The impact of technology has affected almost every individual
from a nursery pupil to the oldest senior citizens. A laptop
being used by the three year old child now common; senior
citizens who used to hate computers are now using Facebook
and Twitter. An employee who came to work without his
mobile phone will be forced to go back home for he cannot
live a day without his phone. During my daughter’s eighteenth
birthday , the resort owner told me, “Sir because of Facebook,
my gross income was significantly increased due to the
frequent reunion prepared by my customers which was usually
initiated due to posting of class pictures in Facebook.”
The Impact of Technology
On the other hand, there are problems
brought by the stalkers who used technologies
in order to obtain private information from
Facebook users by pretending to be a friend.
Hence, there are also drawbacks brought
about by technological advances.
The Impact of Technology
In addiction to these are new technologies such as
advanced data-mining software, facial recognition
devices, retinal scanner, and other advance in
biometrics – the goal of these chapter is to address how
these new technologies and programs can be used
without prying into one’s privacy. To do so, we first
need to look at the right to privacy from several angles,
specifically, how it is conceived constitutionally, legally,
and normatively by looking at public opinion and
jurisprudence.
The Impact of Technology
Sometime in the year 2003, as dean of the collage of computer
studies in one of the schools in Laguna, I was invited as one of the
panel of judges for the “Search for Ms Information Technology.”
During the “Question and Answer” portion, all of the finalist were
asked, ‘Is it possible for IT Professional to help in preventing
terrorist attack which just happen in the USA last September 11,
2001?” Four of the Finalist answered that technology was not the
solution to the problem but Love. But one of them answered
positively and said, “Yes sir. Through a National ID system enabled
by technology in its full potential , terrorist can be easily tracked
down and hence, prevent any possible attack. Fortunately, that
finalist won the most coveted title of Ms. IT 2003.
The Impact of Technology
The implementation of the National ID System in the
Philippines has been hotly debated by our lawmakers
from the time of Pres. Ramos until the time of Pres.
Arroyo. It’s time of Pres. Arroyo. Its implementation was
strongly opposed by the militant groups for the main
reason that it shall violent their right to privacy. Others
are in favor and argued that the benefits of
implementing the National ID System are very
substantial and will not violate the citizen’s right to
privacy.
Life Under The Technology
Enabled National ID System
Let us take a quick imagination of how the
technology-enabled National ID System will
work. Of course, the law shall compel all
citizens to register and failure to do so will be
penalized. The effect is that, even terrorist
should register; otherwise, they may be
imprisoned not because of violation of Anti-
terrorist law but by violation of the law
implementing the National ID system.
Life Under The Technology
Enabled National ID System
When you go to a mall, hotel and in any other place
which is capable of using technology you can easily
be identified using biometrics technology because
you will be denied entry upon failure to prove that
you are a registered individual of the Philippines. So
a terrorist who decided NOT to register cannot
afford to enter such places because he will
recognized as a not registrant. As matter of law,
such crime is a continuing commuting an offense.
Life Under The Technology
Enabled National ID System
The consequence is that he can be arrested even without
the benefit of a warrant of arrest. As a general rule, a
person ONLY be arrested if the police officer is armed with
warrant of arrest. One of the exemptions to this general
rule is that when the person to be arrested has
committed, or is actually committing, or is attempting to
commit a crime. When a non registered individual is
being identified, he is actually committing a crime, hence
a police officer or any PRIVATE INDIVIDUAL can arrest
him even without a warrant of arrest (Sec. 5(a), Rule 113,
Rules of court).
The Ten Commandments
The Ten Commandments of computer ethics have
been defined by the Computer Ethics Institute. Here is
our interpretation of them:
1. Thou shalt not use a computer to harm other people.

2. Thou shalt not interfere with other people’s computer work

3. Thou shalt not snoop around in other people’s files.

4. Thou shalt not use a computer to steal.

.
The Ten Commandments
5. Thou shalt not use a computer to bear false witness.

6. Thou shalt not use or copy software for which you have not paid.

7. Thou shalt not use other people’s computer resources without


authorizations

8. Thou shalt not appropriate other people’s intellectual output.

9. Thou shalt think about the social consequences of the program


you write.

10.. Thou shalt use a computer in ways that show consideration and
respect

You might also like