You are on page 1of 19

WEEK 3

ETHICAL CODES
WMSU Prepared by: SABANAL, ERLITO JR. MAPO
Lesson Outcomes:

At the end of the lesson, the students should be able to:

1. Describe the different Ethical Codes and Conducts;


2. Illustrate the link between Ethics to ACM(Association
for Computing Machinery; and
3. Synthesize the connection of Ethical Codes to the
Philippine Laws.

2
Lesson Introduction:
A code of ethics is a guide of principles designed to help
professionals conduct business honestly and with integrity. A code
of ethics document may outline the mission and values of the
business or organization, how professionals are supposed to
approach problems, the ethical principles based on the
organization's core values, and the standards to which the
professional is held.
3
ACM CODES

The Code is designed to inspire and guide the ethical conduct of all
computing professionals, including current and aspiring practitioners,
instructors, students, influencers, and anyone who uses computing technology
in an impactful way. Additionally, the Code serves as a basis for remediation
when violations occur. The Code includes principles formulated as statements
of responsibility, based on the understanding that the public good is always the
primary consideration. Each principle is supplemented by guidelines, which
provide explanations to assist computing professionals in understanding and
applying the principle.

4
GENERAL ETHICAL PRINCIPLES:

1.Contribute to society and to human well-being,


acknowledging that all people are stakeholders in computing.

This principle, which concerns the quality of life of all people, affirms an
obligation of computing professionals, both individually and collectively, to use
their skills for the benefit of society, its members, and the environment
surrounding them.

5
2. Avoid harm

In this document, "harm" means negative consequences,


especially when those consequences are significant and unjust. Examples
of harm include unjustified physical or mental injury, unjustified
destruction or disclosure of information, and unjustified damage to
property, reputation, and the environment. This list is not exhaustive.

6
3.Be Honest and Trustworthy.

Honesty is an essential component of trustworthiness. A


computing professional should be transparent and provide full disclosure
of all pertinent system capabilities, limitations, and potential problems to
the appropriate parties. Making deliberately false or misleading claims,
fabricating or falsifying data, offering or accepting bribes, and other
dishonest conduct are violations of the Code.
7
4.Be fair and take action not to discriminate.
The values of equality, tolerance, respect for others, and justice
govern this principle. Fairness requires that even careful decision processes
provide some avenue for redress of grievances.
Computing professionals should foster fair participation of all people,
including those of underrepresented groups. Prejudicial discrimination on the
basis of age, color, disability, ethnicity, family status, gender identity, labor
union membership, military status, nationality, race, religion or belief, sex,
sexual orientation, or any other inappropriate factor is an explicit violation of
the Code. Harassment, including sexual harassment, bullying, and other
abuses of power and authority, is a form of discrimination that, amongst
other harms, limits fair access to the virtual and physical spaces where such
harassment takes place. 8
5.Respect the work required to produce new ideas, inventions,
creative works, and computing artifacts.
Developing new ideas, inventions, creative works, and computing
artifacts creates value for society, and those who expend this effort
should expect to gain value from their work. Computing professionals
should therefore credit the creators of ideas, inventions, work, and
artifacts, and respect copyrights, patents, trade secrets, license
agreements, and other methods of protecting authors' works.

9
6.Respect Privacy.
The responsibility of respecting privacy applies to computing
professionals in a particularly profound way. Technology enables the
collection, monitoring, and exchange of personal information quickly,
inexpensively, and often without the knowledge of the people affected.
Therefore, a computing professional should become conversant in the
various definitions and forms of privacy and should understand the rights
and responsibilities associated with the collection and use of personal
information.
7.Honor Confidentiality.
Computing professionals are often entrusted with confidential
information such as trade secrets, client data, nonpublic business
strategies, financial information, research data, pre-publication scholarly
articles, and patent applications. Computing professionals should protect
confidentiality except in cases where it is evidence of the violation of
law, of organizational regulations, or of the Code. In these cases, the
nature or contents of that information should not be disclosed except to
appropriate authorities. A computing professional should consider
thoughtfully whether such disclosures are consistent with the Code.
Applicable Philippine Law
Act. No. 10157 Cybercrime Law Act of 2012
An Act defining cybercrime, providing for the prevention, investigation,
suppression and the imposition of penalties therefor and for other
purposes.
The Philippine Cybercrime Prevention Act of 2012 focuses on the
pre-emption, prevention and prosecution of cybercrimes such as offenses
against the confidentiality, integrity and availability of computer data and
systems, computer-related offenses, and content-related offenses.

12
Act. No. 8792 E-commerce law of June 14, 2000
An act of providing for the recognition and use of electronic commercial and
non-commercial transaction and documents, penalties for unlawful use thereof,
and for other purposes.
On 14 June 2000, President Joseph E. Estrada signed into law R.A. 8792 "An
Act Providing For The Recognition And Use of Electronic Commercial And
Non-Commercial Transactions, Penalties For Unlawful Use Thereof, And
Other Purposes, also known as the "Electronic Commerce Act."

13
This Act aims to facilitate domestic and international dealings,
transactions, arrangements, agreements, contracts and exchanges and
storage of information through the utilization of electronic, optical and
similar medium, mode, instrumentality and technology to recognize the
authenticity and reliability of electronic data messages or electronic
documents related to such activities and to promote the universal use of
electronic transactions in the government and by the general public.
Act. No. 3815 Revised Penal Code of December 08, 1930.
An Act of Revising Penal Code and other Penal laws.
General provision regarding the date in enforcement and application of
the provisions on this code, and regarding the offenses, the persons liable
and the penalties.
The Revised Penal Code criminalizes a whole class of acts that are generally
accepted as criminal, such as the taking of a life whether
through murder or homicide, rape, robbery and theft, and treason. The Code also
penalizes other acts which are considered criminal in the Philippines, such
as adultery. It expressly defines the elements that each crime comprises, and the
existence of all these elements have to be proven beyond reasonable doubt in
order to secure conviction.
• Special laws – laws that define and penalizes crime not included in the RPC
In general
• When the crime is punished by a special law, as a rule, intent to commit the
crime is not necessary. It is sufficient that the offender has the intent to
perpetrate the act prohibited by the special law.
• In intent to commit the crime, there must be criminal intent; in intent to
perpetrate the act, it is enough that the prohibited act is done freely and
consciously. (Elenita C. Fajardo vs. People, G. No. 190889, January 10,
2011)
• Although Republic Act No. 7610 is a special law, the rules in the
Revised Penal Code for graduating penalties by degrees or
determining the proper period should be applied. The penalty for
Other Acts of Child Abuse is prision mayor in its minimum
period. Although R. No. 7610 is a special law, the rules in the
Revised Penal Code for graduating penalties by degrees or
determining the proper period should be applied.
Act. No. 9775 Anti Child Pornography of 2009
An act of defining the crime of child pornography, prescribing
penalties therfor and for other purposes.

The State recognizes the vital role of the youth in nation


building and shall promote and protect their physical, moral, spiritual,
intellectual, emotional, psychological and social well-being.
........End of the Report……

Thank You for Listening!

Things me letter!

19

You might also like