Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

SECURITY & ETHIC

CHAPTER 1

CFB2003 Computer Ethics & Cyber Laws By Mr. Hanizan Shaker Hussain

Security and Ethics


Employment Privacy

Health

Business/IT Security Ethics and Society

Crime

Individuality

Working Conditions

Professional Environment:
Deals with codes of conduct, professional expectation Question: Can we influence individuals conduct by making them aware of their professional/environment codes?

Professional Codes:

General codes: UB code MIS related codes: ACM http://www.acm.org/constitution/bylaw17.html


IEEE http://www.ieee.org/committee/ethics/

AITP http://www.aitp.org/

Ethical Guidelines

James Rachels, moralist, suggest two criteria:


1. Reason.. Decision based on REASONS acceptable to other RATIONAL persons.
2. Impartiality.. Decision is impartial when INTERESTS of all those affected by it are taken into account

State of Ethics in Corporate World

The Enron scandal was a corporate scandal involving the American energy company Enron Corporation based in Houston, Texas. Enron undoubtedly is the biggest audit failure.

Enron

Merck --draws VIOXX

Merck says it will fund the $4.85 billion settlement designed to resolve tens of thousands of lawsuits related to its Vioxx painkiller, waiving its right to walk away from the settlement deal. Payments to claimants will begin to be made before the end of August. Nearly 60,000 people have registered a claim that the once-popular painkiller caused a heart attack or stroke.

AIG, Marsh & McLennan - Insurance fraud Options back dating etc

The America's biggest insurers are mired in a brewing scandal that many executives fear could shake the industry to its core. Marsh & McLennan accused of price fixing (alleged conflicts of interest).

Options backdating is the practice of granting an employee stock option that is dated prior to the date that the company actually granted the option. This practice raises a number of legal and accounting issues. The practice of backdating itself is not illegal, nor is granting of discounted stock options. What is illegal is the improper disclosures, both in financial records and in filings with the United States Securities and Exchange Commission (SEC).

Legal and Ethical Issues


ETHICAL UNETHICAL

LEGAL I
III

ILLEGAL II
IV

I WORK WITHIN ETHICS AND LAW.. II INTRODUCE A TESTED BUT UNFINISHED DRUG IN 3RD WORLD WHICH IS TIME SENSITIVE and MAY BENEFIT MASSES III INTRODUCE AN APPROVED BUT HARMFUL DRUG.. IV GIVE BRIBES TO GET CONTRACTS..
By : Haag & Cummins

Ethical Responsibility

Business Ethics Stockholder Theory Social Contract Theory Stakeholder Theory

Ethical Responsibility

Technology Ethics

Ten Commandments Of Computer Ethics


Created by the Computer Ethics Institute


Thou Shalt Not Use A Computer To Harm Other People. Thou Shalt Not Interfere With Other Peoples Computer Work. Thou Shalt Not Snoop Around In Other Peoples Computer Files. Thou Shalt Not Use A Computer To Steal. Thou Shalt Not Use A Computer To Bear False Witness. Thou Shalt Not Copy Or Use Proprietary Software For Which You have Not Paid. Thou Shalt Not Use Other Peoples Computer Resources Without Authorization Or Proper Compensation. Thou Shalt Not Appropriate Other Peoples Intellectual Output. Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing. Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Humans.

Privacy Issues Right to Privacy

Computer Profiling Computer Matching Privacy Laws Computer Libel and Censorship Spamming

Privacy Issues Other Challenges

Employment Challenges Working Conditions Individuality Issues Health Issues

Ergonomics
DESIGN HEALTHY WORK ENVIRONMENT which is: Safe Comfortable Pleasant

Privacy Issues

Ergonomics

Security Management
Security Technology Used
Antivirus
96%

Virtual Private Networks


86%

Intrusion-Detection Systems
85%

Content Filtering/Monitoring
77%

Public-Key Infrastructure
45%

Smart Cards
43%

Biometrics
19%

Security Management Computer Crime


Hacking Cyber Theft Unauthorized Use of Work Piracy of Intellectual Property Computer Viruses and Worms

You might also like