You are on page 1of 17

Ethics in it

BY:
PALLAVI
MAURYA,UMMED
SINGH,PANKAJ
WHAT IS ETHICS?
• Ethics is a conception of right and wrong behavior,
defining for us when our action are moral and when
immoral.
• A business ethics is a set of moral standards which
people owing and manage the business is expected
to follow.
TECHNOLOGY ETHICS

• With the advent of new technology new ethical issue


emerged.
• The line between personal and professional lives has
become blurred.
• The growth of the internet have
increased the risk of using information
technology unethically.
Ethical Behaviors?
 That sure is a great music where did you get it?
• Violation of copyright law
 Have you given a friend a copy of your Microsoft
Project software?
• Software Piracy
 Did you read the confidential company file that
was accidentally attached to your email?
• Computer abuse
 Did you gain access to the network and invade
other workers emails and files?
• Computer abuse
 You formatted your hard drive prior to leaving
your company because you were angry about
leaving.
• Destruction of property
Cont…
• Organization contact millions of people worldwide
through unsolicited email at low cost.
• Breaking of database of financial institute and steal
customer information. --Hacking
• Student download material from internet and
plagiarizing content for their term papers.
• Website plant cookies and spy-ware on visitor hard
drives to track their internet activity.
PRINCIPLES OF TECHNOLOGICAL ETHICS

• Proportionality:-the good achieved by the


technology must outweigh the harm and risk.
• Informed consent: those affected by the
technology should understand and accept the
risk.
• Justice: benefit should be distributed fairly.
• Minimized risk: even if judged acceptable.
ETHICAL CHALLENGES IN IT
• COMPUTER CRIME:
computer crime poses serious threats to the integrity,
safety and survivals of most business system.
• It includes:
 Unauthorized use, access of hardware, software etc.
 Unauthorized release of information
 Unauthorized copying of software
 Denying an end user access to his or her own
hardware, data.
•HACKING

 A hacker use the internet and other networks to


steal or damage data and program
 A hacker can monitor e-mails, web servers access or
file transfer to extract the password
 Hacker use TELNET to access a
computer’s email port
•unauthorized use at work
Going private, personal use of company network,
playing video games etc.

• software piracy: unauthorized copying of software,


piracy of
music and movies.

• privacy issue: confidential e-mail message by


employee are monitored by many companies.
• All time monitoring create stress to the
employee as company violating the
workers privacy and personal freedom.

HEALTH ISSUE: heavy use of computer


create health problems.
• Fingers, wrist, arms, neck, and back may become
weak and painful.
• Computer monitoring create mental stress.
Intellectual Property Rights
• These rights are a bundle of exclusive rights
over creations of the mind, both artistic and
commercial.
• The term intellectual property denoted “the
specific legal rights and not the intellectual
work itself.”
Types of intellectual Property Rights
are :
• Copyright
• Trademarks
• Patents
• Industrial design.
What is copyright.....
• Copyright is a set of exclusive rights granted to
the author or creator of an original work,
including the right to copy, distribute and adapt
the work.

• Copyright owners have the exclusive statutory


right to exercise control over copying and other
exploitation of the works for a specific period of
time, after which the work is said to enter the
public domain.
Continue…..
• Initially copyright law only applied to the
copying of books.
• Copyright now covers a wide range of works,
including maps, sheet music, dramatic works,
paintings, photographs, sound recordings
motion pictures and computer programs.
TRADEMARK…
• A trademark is a distinctive sign or indicator
used by an individual, business organization,
or other legal entity to identify that the
products or services to consumers with which
the trademark appears originate from a
unique source, and to distinguish its products
or services from those of other entities.
A trademark may be designated by the
following symbols:

• ™ (for an unregistered trade mark, that is, a


mark used to promote or brand goods)
• ℠ (for an unregistered service mark, that is, a
mark used to promote or brand services)
• ® (for a registered trademark)
Patent…
• A patent is a set of exclusive rights granted by
a state (national government) to an inventor
or their assignee for a limited period of time in
exchange for a public disclosure of an
invention.
• A patent for an invention grants a property
right to the inventor that will prevent anyone
else from making, using, or selling an
invention.

You might also like