Professional Documents
Culture Documents
1
Professional Relationships That
Must Be Managed
• IT workers are involved in relationships
with:
– Employers
– Clients
– Suppliers
– Other professionals
– IT users
– Society at large
2
IT Workers must set example
• As steward of organization’s IT
resources, IT workers must set an
example and enforce policies regarding
the ethical use of IT
3
IT Workers
• Confidential information
– IT workers see a lot of confidential information
• Whistle Blowing
– Must be prepared to expose unethical behaviour
4
Relationships Between
IT Workers and Clients
• Client makes decisions about a project
based on information, alternatives, and
recommendations provided by the IT
worker
• Client trusts IT worker to act in client’s
best interests
5
Relationships Between
IT Workers and Clients
• Conflict of interest
– Must always avoid conflict of interest
• Ethical problems arise if a company
recommends its own products and
services to remedy problems they have
detected
6
Relationships Between
IT Workers and Clients
• Fraud
– Crime of obtaining goods, services, or property
through deception or trickery
• Misrepresentation
– Misstatement or incomplete statement of material
fact
7
Relationships Between
IT Workers and Clients
• Breach of contract
– One party fails to meet the terms of a contract
• IT projects are joint efforts in which
vendors and customers work together
– When there are problems, it is difficult to assign
who is at fault
8
Relationships Between
IT Workers and Suppliers
• Bribery
– Providing money, property, or favors to obtain a
business advantage
– At what point does a gift become a bribe?
– No gift should be hidden
– Perceptions of donor and recipient can differ
9
Relationships Between
IT Workers and Suppliers
10
Relationships Between
IT Professionals
11
Relationships Between
IT Workers and IT Users
• IT workers’ duties
– Establish environment that supports ethical
behaviour:
– To minimize inappropriate use of corporate
computing resources
– Enforce policies on appropriate use
12
Relationships Between
IT Workers and Society
• Society expects members of a
profession:
– To provide significant benefits
– To not cause harm through their actions
– To not take advantage of their specialised
knowledge to the disadvantage of others
13
Professional Codes of Ethics
• State the principles and core values that
are essential to the work of an
occupational group
14
Professional Codes of Ethics
15
Professional Organizations
• Prominent organizations include:
– Association for Computing Machinery (ACM)
– Institute of Electrical and Electronics Engineers
Computer Society (IEEE-CS)
– Association of IT Professionals (AITP)
– SysAdmin, Audit, Network, Security (SANS)
Institute
16
IT Professional Malpractice
17
Question
• If an IT Professional makes a
programming mistake (and was
negligent by not testing his code) and
someone dies as a result (for example
in a computer controlled machine in a
hospital) should he/she be sent to jail
for manslaughter?
18
• Stopped here Mon 23 at 11.00
Question
• Do you think that the IT manager in an
organisation should be held accountable if
employees have downloaded and installed
illegal software on the organisation’s
computers. The code of conduct of the
organisation clearly states that illegal software
cannot be installed on the computers
– If so, what penalty would you give him?
– If not, who is accountable?
20
Question
• An organisation has not written in its policies
that illegal software cannot be installed on its
computers. An external auditor finds illegal
software on an employee’s (Mariam)
computer and the company will be
prosecuted.
• Who is/are the person(s) that should be held
accountable – the CEO, the IT Manager, or
Mariam?
21
Policies -
Support Ethical Practices
22
Policies -
Support Ethical Practices
23
24
Compliance
• Ensuring that all parts of the
organisation are following established
policies, guidelines, specifications, and
legislation
• Compliance Audit ( may be done by
internal or external team)
• May have a Compliance Committee
and/or a Compliance officer
25
Question
• If you are the IT manager and you find
that an employee has an unlicenced
copy of software on a company
computer e.g. a pirate copy of
Photoshop, what would you do?
ACM Code of Ethics
• https://www.acm.org/code-of-ethics
• ACM Code of Ethics and Professional
Conduct
Software Engineering Code of
Ethics
• https://ethics.acm.org/code-of-ethics/
software-engineering-code/
IEEE Code of Ethics
• https://www.ieee.org/about/corporate/
governance/p7-8.htm
Global Issues
Question
• If you learned that the company selling
coffee on the campus are using child
workers in their factory in Musaffa
would you consider it ethical?
• What would you do?
Question
• If you learned that the coffee company
is doing everything ethically in the UAE
but that they are using child workers in
South America where they grow the
coffee would you consider that ethical?
• What would you do?
Question
• If you found that one of the oil
companies working in the UAE is
causing major pollution in the desert
would you consider that ethical?
• What would you do?
Question
• If you found that one of the oil
companies working in the UAE is doing
all its operations at a high standard here
but that they are causing a lot of
pollution in Africa would you consider
that ethical?
• What would you do?
Pollution
36
Question
• Animal Rights - What rights should animals
have?
• Our sensitivity to other peoples, minorities,
etc. continues to expand. We're less tolerant
of cruelty. What about animals, excessive
constraints in raising livestock, for instance?
Egg farms? Animal laboratory testing?
• Some people link Animal Rights with Ethics.
What do you think?
Question
• Environment - What obligations do we
have to the environment?
• To what extent must we go to preserve
species of animals or plants?
• How much intervention in foreign affairs is
ethical in the service of "saving" forests,
whales, various other ecological systems?
– Read about Greenpeace -http://www.greenpeace.org/international/en/
Question
• What would you do if you found out that
Coca-Cola obtained the sugar to make
its drink from sugarcane grown on land
that was confiscated from poor farmers
and that some of these farmers suffered
loss of livelihood and hunger as a
result?
40
41
Privacy
Outline
• Privacy Issues
• Privacy and Computer Technology
• Protecting Privacy
• Communications
Privacy
• What does Privacy mean to you?
Question
• I, Minister of Transport, have been told to do
whatever is necessary to reduce the number of road
accidents. I intend to introduce a system whereby
every car in the UAE will be fitted with a tracking
system. A central monitoring station will record the
position and speed of every car and automatically
issue speeding fines and black points.
• What are your opinions on this system?
Question
• https://www.aclu.org/technology-and-liberty/
ordering-pizza-2015
Privacy and the Internet
• http://www.youtube.com/watch?v=tD4_gJwfCMM
Privacy
continued …
Privacy International - Watchdog
Privacy and Computer
Technology
New Technology, New Risks.
• For example:
– Government and private databases
– Sophisticated tools for surveillance and data
analysis e.g.
• Re-identification – identifying an individual from
anonymous data
– Vulnerability of data
Terminology
• Invisible information gathering -
collection of personal information about
someone without the person’s
knowledge
• Secondary use - use of personal
information for a purpose other than the
one it was provided for
Terminology
• Data mining - searching and analyzing
masses of data to find patterns and
develop new information or knowledge
• Computer matching - combining and
comparing information from different
databases (using social security
number, for example, to match records)
Terminology
• Computer profiling - analyzing data in
computer files to determine
characteristics of people most likely to
engage in certain behavior
• Re-identification – identifying an individual from
anonymous data – intersection of various anonymous
data sets
Data Collection Principles
Principles for Data Collection and Use:
• Informed consent
• Opt-in and opt-out policies
• Fair Information Principles (or
Practices)
• Data retention
– How long data can be kept
Data Collection and Use
Principles
• Informed Consent
– User consents after being fully informed
Data Collection and Use Principles
• Opt-out policy
– Assumes that consumers approve of
companies collecting, storing and using
their personal information
– Requires consumers to actively opt out
– Favored by data collectors
Data Collection and Use
Principles
• Opt-in policy
– Must obtain specific permission from
consumers before collecting or using any
data
– Favored by consumers
Fair Information Principles
• Inform people when personally identifiable information about
them is collected, what is collected, and how it will be used
• Collect only the data needed
• Offer a way for people to opt out from mailing lists, advertising,
transfer of their data to other parties, and other secondary uses
• Provide stronger protection for sensitive date, for example an
opt-in policy for disclosure of medical data
• Keep data only as long as needed
• Maintain accuracy of data. Where appropriate and reasonable
provide a way for people to access and correct data stored
about them
• Protect security of data (from theft and from accidental leaks)
• Develop policies for responding to law enforcement requests to
data
Privacy Policies
• In developed countries organisations
are legally required to publish their
privacy policies
Discussion Questions
• The Internet
– Not able to make decisions on when to
provide information
– Vulnerable to online predators
• Parental monitoring
– Software to monitor Web usage
– Web cams to monitor children while
parents are at work
Discussion Questions