Is102 1PM Lesson 1 4

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

IS102

LESSON 1-4
COURSE CREDIT: 3 UNITS - 54 HOURS LECTURE

LESSON 1- SOCIAL ISSUE AND ETHICS


SOCIAL ISSUE- issue that has been recognized by society as a problem that is
preventing society from functioning at an optimal level.
Society – Association of people organized under a system of rules – Rules:
advance the good of members over time

Four Factors to consider:


1. The public must recognize the situation as problem.
2. The situation is against the general values accepted by society.
3. A large segment of the population recognizes the problem as valid
concern.
4. The problem can be rectified or alleviated through the joint action of
citizens and/or community.FA

3 Domains on how to live


1. Morality – Informal framework. A society’s rules of conduct – Christianity,
Buddhism etch. Many people also inherit their morality from their family,
community or culture .
“How should I live? And what should I do?”
2. Law- formal rule on how we behave. It specify MUST DO and MUST NOT
DO
3. ETHICS-branch of philosophy- the way in which we look at and
understand life, in terms of good and bad or right or wrong. Rational
examination of morality – Evaluation of people’s behavior. Each person is
able to reflect and discover their own sense of what’s good, right, and
meaningful. Formal Study of Ethic- 2,400 years, traced by the Greek
Philosopher Socrates

Two ways to view world


– Selfish point of view: consider only own self and core values -Ethnocentrism
– Ethical point of view: respect other people and their core values

COMMON ETHICAL THEORY


1. Relativism- different individuals or groups of people can have completely
opposite views of a moral problem, and both can be right.
Kinds:
1.1. Subjective Relativism
-holds that each person decides right and wrong for himself/herself. This notion
is captured in the popular expression ―What’s right for you may not be right for
me.‖
 Mary loves dogs, but Ann doesn’t.
1.2. Cultural Relativism- Ethical theory that the meaning of right and
wrong rests with society’s actual moral guidelines. Right or wrong is
culture specific
 Indian’s custom – Sawi Tribe- changed 1962
 Clothes - miniskirt
Cultural relativists believe that all cultures are worthy in their own right and are
of equal value.
2. Divine Common Theory- this theory is based on the idea that good
actions are those aligned with the will of God and bad actions are those
contrary to the will of God.
 -Jehova’s witnesses do not eat blood and do not allow blood transfusion
 INC do not eat blood but allow blood transfusion
 Catholic allow both
- Muslim brothers and sisters and Catholic (Marriage)
3. Ethical Egoism- is the philosophy that each person should focus
exclusively on his or herself human actions are based on self-interest.
 Politics Campaign
 Facebook likes
4. Consequentialism is an ethical theory that judges whether or not
something is right by what its consequences are. Right action is the one
that promotes the greatest happiness of the greatest number. ―the end
justifies the means‖
 Robinhoods’ story
 Doctor-medicine-patient
 Math equation. Find the value of X
 Family matter Son-Father-FAMILY
5. Kantialism-Business Ethics- Morality is based on pure reason. ―Act morally
regardless of the consequences‖. Moral decisions should be made
based on one’s duty.
 Lawyer’s duty – ―Why do lawyers need to defend even the worst
criminals?‖-FAIR/LEGAL
 Policemen and soldiers maintaining peace and order

LESSON 2- COMPUTER ETHICS

Computer ethics is the set of commonly agreed principles that govern the use
of computers. Like ethics more generally, computer ethics is essentially a set
of philosophical guidelines or moral standards that aim to influence behaviour
and prevent harm.

Ethics- Ethics refers to well founded standards of right and wrong that prescribe
what humans ought to do, usually interms of rights, obligations, benefits to
society, fairness or specific virtues.

Professional Codes of Ethics


-designed to ensure employees are behaving in a manner that is socially
acceptable and respectful of one another. It establishes the rules for behavior
and sends a message to every employee that universal compliance is
expected.
Examples; Lawyers, Doctors, Teachers etc.

Code of Ethics of the Filipino IT Professionals


1. I will promote public knowledge, understanding, and appreciation of
Information Technology.
2. I will consider the general welfare and public welfare and public good in the
performance of my work.
3. I will advertise goods or professional services in a clear and truthful manner.
4. I will comply and strictly abide by the intellectual property laws, patent laws,
and other related laws in respect of Information Technology.
5. I will accept full responsibility for the work undertaken and utilize my skills with
competence and professionalism.
6. I will make truthful statements on my areas of competence as well as the
capabilities and qualities of my product and services.
7. I will not disclose or use any confidential information obtained in course of
professional duties without the consent of the parties concerned, except when
required by law.
8. I will strive to attain the highest quality in both the products and services that
offer.
9. I will knowingly participate in the development of the Information
Technology.
10. I will uphold and improve the IT professionals' standards through continuing
profession in order to enhance the IT profession.

Code of Ethics of Association of IT Professionals- AITP (Association of Information


Technology Professionals)
- is the Association of Information Technology Professionals, a national
organization dedicated to ethics and professionalism in the field of data
processing.

Code of Ethics:
I acknowledge:

1. That I have an obligation to management, therefore, I shall promote the


understanding of information processing methods and procedures to
management using every resource at my command.
2. That I have an obligation to my fellow members, therefore, I shall uphold
the high ideals of AITP as outlined in the Association Bylaws. Further, I shall
cooperate with my fellow members and shall treat them with honesty
and respect at all times.
3. That I have an obligation to society and will participate to the best of my
ability in the dissemination of knowledge pertaining to the general
development and understanding of information processing. Further, I
shall not use knowledge of a confidential nature to further my personal
interest, nor shall I violate the privacy and confidentiality of information
entrusted to me or to which I may gain access.
4. That I have an obligation to my College or University, therefore, I shall
uphold its ethical and moral principles.
5. That I have an obligation to my employer whose trust I hold, therefore, I
shall endeavor to discharge this obligation to the best of my ability, to
guard my employer's interests, and to advise him or her wisely and
honestly.
6. That I have an obligation to my country, therefore, in my personal,
business, and social contacts, I shall uphold my nation and shall honor
the chosen way of life of my fellow citizens.
7. I accept these obligations as a personal responsibility and as a member
of this Association. I shall actively discharge these obligations and I
dedicate myself to that end.

Principles:
Principle 1: Public - Software engineers shall act consistently with the public
interest.
Principle 2: Client & Employer - Software engineers shall act in a manner that is
in the best interests of their client and employer, consistent with the public
interest.
Principle 3: Product - Software engineers shall ensure that their products and
related modifications meet the highest professional standards possible.
Principle 4: Judgment - Software engineers shall maintain integrity and
independence in their professional judgement.
Principle 5: Management - Software engineering managers and leaders shall
subscribe to and promote an ethical approach to the management of
software development and maintenance.
Principle 6: Profession - Software engineers shall advance the integrity and
reputation of the profession consistent with the public interest.
Principle 7: Colleagues - Software engineers shall be fair to and supportive of
their colleagues.
Principle 8: Self - Software engineers shall participate in lifelong learning
regarding the practice of their profession and shall promote an ethical
approach to the practice of the profession.

The Ten Commandments

1. Thou shalt not use a computer to harm other people.


2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not
paid.
7. Thou shalt not use other people's computer resources. without
authorization or proper compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are
writing or the system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and
respect for your fellow humans.

The Hacking Community’s Constitution

We believe:

 That every individual should have the right to free speech in cyber
space.
 That every individual should be free of worry when pertaining to
oppressive governments that control cyber space.
 That democracy should exist in cyber space to set a clear example as to
how a functioning element of society can prosper with equal rights and
free speech to all.
 That hacking is a tool that should and is used to test the integrity of
networks that hold and safe guard our valuable information.
 Those sovereign countries in the world community that do not respect
democracy should be punished
 That art, music, politics, and crucial social elements of all world societies
can be achieved on the computer and in cybers.
 That hacking, cracking, and phreaking are instruments that can achieve
three crucial goals:
- Direct Democracy in cyber space.
- The belief that information should be free to all.
o -The idea that one can test and know the dangers and exploits of
systems that store the individual's information.
 That cyber space should be a governing body in the world community,
where people of all nations and cultures can express their ideas and
beliefs has to how our world politics should be played.
 That there should be no governing social or political class or party in
cyber space.
 That the current status of the internet is a clear example as to how many
races, cultures, and peoples can communicate freely and without
friction or
 In free enterprise and friction free capitalism.
 In the open-source movement fully, as no government should adopt
commercial or priced software for it shows that a government may be
biased to something that does not prompt the general welfare of the
technology market and slows or stops the innovation of other smaller
company’s products.
 That technology can be wielded for the better placement of mankind
and the environment we live in.
 That all sovereign countries in the world community should respect these
principles and ideas released in this constitution.

Computer Ethics
- Computer ethics is a field of applied ethics that addresses ethical issues
in the use, design and management of information technology
- Computer ethics deals with the procedures, values and practices that
govern the process of consuming computing technology and its related
disciplines without damaging or violating the moral values and beliefs of
any individual, organization or entity.
- It is a concept in ethics that addresses the ethical issues and constraints
that arise from the use of computers, and how they can be mitigated or
prevented.
- Computer ethics also entails the behavior and approach of a human
operator, workplace ethics and compliance with the ethical standards
that surround computer use.

Three Levels of Computer Ethics


Pop Computer Ethics - Simply the exposure to stories and reports found in the
popular media regarding the good or bad ramifications of computer
technologies.
Para Computer Ethics - Involves taking a real interest in computer ethics cases
and acquiring some level of skill and knowledge in the field.
Theoretical Computer Ethics - interest to multidisciplinary researchers who apply
the theories of philosophy, sociology, and psychology to computer science
with the goal of bringing some new understanding to the field.

Social networking Sites


- is an online platform used to build social networks or social relationships with
people who share similar personal or career content, interests, activities,
backgrounds, or real-life connections. A social networking site is an online
platform that allows users to create a public profile and interact with other
users.

Social networking - is the practice of using a dedicated online platform to


maintain contact, interact and collaborate with like-minded individuals, peers,
friends and family.

Social networking Ethical Issues


PERSONAL PRIVACY - Social Networking Sites have raised concerns amongst
users on the dangers of giving out too much personal information

IDENTITY THEFT – Is a Form of stealing someone’s identity in which someone


pretends to be someone else by assuming that person’s identity. Typically in
order to access resources or misuse it to publically disgrace the person.

CYBER BULLYING –

CYBER STALKING – It is the use of the internet to stalk or harass an individual,


group or organization. It may include false accusations, defamation, slander
and label.

DATA LEAKAGE- Data security and protection is expensive and difficult,


although many new techonologies related to data security and protection
have been introduced in the market, data leakage still remains as a big issue.
Posting a picture message
- Appropriating a picture or piece of information that is not your own and
posting it on a public social media network without the owner's permission.
There is an exemption, however, if the information is for public.

LESSON 3- TECHNOLOGIES IMPACT ON PRIVACY

Constitutional - relating to an established set of principles governing a state

Provision - the action of providing or supplying something for use

Constitutional provision - seeks to protect all forms of information, be it private,


personal, or sensitive. It is meant to cover both natural and juridical persons
involved in the processsing of personal information.a law that is written in the
Constitution itself and does not come from a rule or statute. It establishes the
basic rights, duties and structure of the polity. These provisions cannot be easily
altered except by the way of amendment procedure given in the Constitution
itself.

Privacy - is a fundamental human right, enshrined in numerous international


human right instruments. It is the ability to control who can access information
about our private life and our activities.
- the state or condition of being free from being observed or disturbed by other
people

Rational Relationship/Basis Test normal standard of review that courts apply when
considering constitutional questions, including due process or equal protection
questions under the Fifth Amendment or Fourteenth Amendment. The purpose of
the rational basis test is to determine whether a law is related to a legitimate
interest of the government.

Reasonable Expectations of Privacy - is a key component of Fourth Amendment


analysis. The Fourth Amendment protects people from warrantless searches of
places or seizures of persons or objects, in which they have a subjective
expectation of privacy that is deemed reasonable in public norm. Overall,
expectations of privacy can be subjective or objective.

2 types of Expectation of Privacy:


 Subjective expectation of privacy: a certain individual's opinion that a certain
location or situation is private; varies greatly from person to person
 Objective, legitimate, reasonable expectation of privacy: an expectation of
privacy generally recognized by society and perhaps protected by law.

Privacy Between Spouses Among the laws that have a crucial bearing on
married life are the provisions of the Family Code on property relations. It
envisages a prohibition against a spouse from testifying against the other about
almost anything under the sun simply on account of their subsisting marriage.

3 property relations between spouses


1. Conjugal Partnership of Gains (CPG); the spouses retain individual ownership
of the property they had before they got married.
2. Absolute Community of Property (ACP); the spouses become co-owners of
properties they had separately owned at the time of the celebration of marriage
and those acquired thereafter during the course of their marriage.
3. Complete Separation of Properties. the spouses become co-owners of
properties they had separately owned at the time of the celebration of marriage
and those acquired thereafter during the course of their marriage.

REPUBLIC ACT NO. 7438 -April 27, 1992


Section 1. Statement of Policy. - It is the policy of the Senate to value the dignity
of every human being and guarantee full respect for human rights
Sec. 2. Rights of Persons Arrested, Detained or under Custodial Investigation;
Duties of Public Officers.
Sec. 3. Assisting Counsel. - Assisting counsel is any lawyer, except those directly
affected by the case, those charged with conducting preliminary investigation or
those charged with the prosecution of crimes.
Sec. 4. Penalty Clause. - (a) Any arresting public officer of employee, or any
investigating officer, who fails to inform any person arrested, detained or under
custodial investigation of his right to remain silent and to have competent and
independent counsel preferably of his own choice, shall suffer a fine of Six
thousand pesos (P6,000.00) or a penalty of imprisonment of not less than eight
years, or both.
Sec. 5. Repealing Clause Republic Act. No. 857, as amended, is hereby repealed.
Other laws, presidential decrees, executive orders or rules and regulations, or
parts thereof inconsistent with the provisions of this Act are repealed or modified
accordingly.
Sec. 6. Effectivity. This Act shall take effect fifteen (15) days following its
publication in the Official Gazette or in any daily newspapers of general
circulation in the Philippines.

Data Privacy Act of 2012


Republic Act No. 10173 or Data Privacy Act of 2012 is an act protecting individual
personal information in information and communications systems in the
government and the private sector, creating for this purpose a national privacy
commission, and for other purposes.
Personal information, is any information that relates to a specific person. Some of
the most obvious examples of personal information include someone's name,
mailing address, email address, phone number, and medical records (if they can
be used to identify the person).
Sensitive information refers to privileged or proprietary information that only
certain people are allowed to see and that is therefore not accessible to
everyone. If sensitive information is lost or used in any way other than intended,
the result can be severe damage to the people or organization to which that
information belongs.
Privileged means that which is to be only shared between specific parties and
not admissible in court, protected from a subpoena. Legal definition for
PRIVILEGED INFORMATION: Special, confidential information.

Data Privacy Principles


transparency requires that any information addressed to the public or to the data
subject be concise, easily accessible and easy to understand, and that clear and
plain language and, additionally, where appropriate, visualization be used.
Identity Theft -also known as (identity fraud), It is a crime in which an imposter
obtains key pieces of personally identifiable information such as Social Security or
driver's license numbers, to impersonate someone else.
The two categories of identity theft are:
1. True-name identity theft - the thief uses PII to open new accounts. The thief
might open a new credit card account, establish cellular phone service or open
a new checking account to obtain blank checks.
2. Account-takeover identity theft- when the imposter uses PII to gain access to
the person's existing accounts.

DUE PROCESS- includes here, inter alia, provisions ensuring an accused person a
fair and public trial before a competent tribunal, the right to be present at the
trial, and the right to be heard in his or her own defense. Due process includes
both the right to a fair trial and the right to an effective remedy.

TYPES OF DUE PROCESS


1. SUBSTANTIVE DUE PROCESS- Rights of the individual specified and unspecified
in the Constitution that must be protected from government interference.
2. PROCEDURAL DUE PROCESS- Is that which hears before it condemns, which
proceeds upon inquiry and renders judgment only after trial. It contemplates
notice and opportunity to be heard before judgment is rendered affecting one's
person or property

LESSON 4- ESSENTIALS OF THE DATA PRIVACY LAW

Laws governing data privacy prevent data breaches and hold companies
responsible for data misuse by legislating how companies collect confidential
information, where they can share and store this data, and how they keep
promises advertised in their Privacy Policies (to which consumers must agree
before conducting online transactions).
Data privacy describes the practices which ensure the data shared by
customers is only used for its intended purpose. Relates to how a piece of
information— or data—should be handled based on its relative importance
Republic Act No. 10173, otherwise known as the Data Privacy Act of the
Philippines, was passed by the Philippine Congress in 2012. The law sought to
breathe life to the policy of the State to protect the fundamental human right of
privacy, while nonetheless ensuring free flow of information to promote
innovation and growth.
it is a law that seeks to protect all forms of information, be it private, personal, or
sensitive. It is meant to cover both natural and juridical persons involved in the
processing of personal information.

Personal data is the collective term used to refer to personal information,


sensitive personal information, and privileged information
Personal information is one or more data point from which the identity of an
individual is obvious or can be reasonably and directly determined by the entity
holding it.
Data subject refers to any individual person who can be identified, directly or
indirectly, via an identifier such as a name, an ID number, location data, or via
factors specific to the person’s physical, physiological, genetic, mental,
economic, cultural, or social identity. In other words, a data subject is an end
user whose personal data can be collected.

A personal information controller or “PIC” A person or organization who performs


such functions as instructed by another person or organization, and an individual who
collects, holds, processes, or uses personal information in connection with the
individual’s personal, family, or household affairs.
A personal information controller or “PIC‖ is a person or organization who processes
personal data on behalf of a personal information controller. The PIP must be separate
and distinct from the PIC. This means, under ordinary circumstances, an officer,
employee, or agent of a company or organization is not the latter’s PIP.

Rights of a Data Subject Under Chapter IV of the Act, there are eight (8) rights
that belong to data subjects, namely: the right to be informed; the right to
access; the right to object; the right to erasure and blocking; the right to rectify;
the right to file a complaint; the right to damages; and the right to data
portability.
1. Right to be informed means that the data subject has the right to know
when his or her personal data shall be, are being, or have been
processed. C
2. Right to access involves being able to compel any entity possessing any
personal data to provide the data subject with a description of such data
in its possession, as well as the purposes for which they are to be or are
being processed.
3. Right to object requires that the consent of the data subject be secured in
the collecting and processing of his or her data.
4. Right to erasure or blocking allows the data subject to suspend, withdraw
or order the blocking, removal, destruction of his or her personal
information from the personal information controller’s filing system upon
discovery and substantial proof.
5. Right to rectify, allows the data subject to dispute any inaccuracy or error
in the personal information processed, and to have the personal
information controller correct it immediately
6. Right to data portability enables the data subject to obtain and
electronically move, copy, or transfer personal data for further use.
7. Right to file a complaint with the National Privacy Commission affords a
remedy to any data subject who ―[feels] that [his or her] personal
information has been misused, maliciously disclosed, or improperly
disposed,‖ or in case of any violation of his or her data privacy rights.
8. Right to damages entitles the aggrieved data subject to be indemnified
for any damages sustained due to inaccurate, incomplete, outdated,
false, unlawfully obtained or unauthorized use of his or her personal
information.

You might also like