Professional Documents
Culture Documents
Is102 1PM Lesson 1 4
Is102 1PM Lesson 1 4
Is102 1PM Lesson 1 4
LESSON 1-4
COURSE CREDIT: 3 UNITS - 54 HOURS LECTURE
Computer ethics is the set of commonly agreed principles that govern the use
of computers. Like ethics more generally, computer ethics is essentially a set
of philosophical guidelines or moral standards that aim to influence behaviour
and prevent harm.
Ethics- Ethics refers to well founded standards of right and wrong that prescribe
what humans ought to do, usually interms of rights, obligations, benefits to
society, fairness or specific virtues.
Code of Ethics:
I acknowledge:
Principles:
Principle 1: Public - Software engineers shall act consistently with the public
interest.
Principle 2: Client & Employer - Software engineers shall act in a manner that is
in the best interests of their client and employer, consistent with the public
interest.
Principle 3: Product - Software engineers shall ensure that their products and
related modifications meet the highest professional standards possible.
Principle 4: Judgment - Software engineers shall maintain integrity and
independence in their professional judgement.
Principle 5: Management - Software engineering managers and leaders shall
subscribe to and promote an ethical approach to the management of
software development and maintenance.
Principle 6: Profession - Software engineers shall advance the integrity and
reputation of the profession consistent with the public interest.
Principle 7: Colleagues - Software engineers shall be fair to and supportive of
their colleagues.
Principle 8: Self - Software engineers shall participate in lifelong learning
regarding the practice of their profession and shall promote an ethical
approach to the practice of the profession.
We believe:
That every individual should have the right to free speech in cyber
space.
That every individual should be free of worry when pertaining to
oppressive governments that control cyber space.
That democracy should exist in cyber space to set a clear example as to
how a functioning element of society can prosper with equal rights and
free speech to all.
That hacking is a tool that should and is used to test the integrity of
networks that hold and safe guard our valuable information.
Those sovereign countries in the world community that do not respect
democracy should be punished
That art, music, politics, and crucial social elements of all world societies
can be achieved on the computer and in cybers.
That hacking, cracking, and phreaking are instruments that can achieve
three crucial goals:
- Direct Democracy in cyber space.
- The belief that information should be free to all.
o -The idea that one can test and know the dangers and exploits of
systems that store the individual's information.
That cyber space should be a governing body in the world community,
where people of all nations and cultures can express their ideas and
beliefs has to how our world politics should be played.
That there should be no governing social or political class or party in
cyber space.
That the current status of the internet is a clear example as to how many
races, cultures, and peoples can communicate freely and without
friction or
In free enterprise and friction free capitalism.
In the open-source movement fully, as no government should adopt
commercial or priced software for it shows that a government may be
biased to something that does not prompt the general welfare of the
technology market and slows or stops the innovation of other smaller
company’s products.
That technology can be wielded for the better placement of mankind
and the environment we live in.
That all sovereign countries in the world community should respect these
principles and ideas released in this constitution.
Computer Ethics
- Computer ethics is a field of applied ethics that addresses ethical issues
in the use, design and management of information technology
- Computer ethics deals with the procedures, values and practices that
govern the process of consuming computing technology and its related
disciplines without damaging or violating the moral values and beliefs of
any individual, organization or entity.
- It is a concept in ethics that addresses the ethical issues and constraints
that arise from the use of computers, and how they can be mitigated or
prevented.
- Computer ethics also entails the behavior and approach of a human
operator, workplace ethics and compliance with the ethical standards
that surround computer use.
CYBER BULLYING –
Rational Relationship/Basis Test normal standard of review that courts apply when
considering constitutional questions, including due process or equal protection
questions under the Fifth Amendment or Fourteenth Amendment. The purpose of
the rational basis test is to determine whether a law is related to a legitimate
interest of the government.
Privacy Between Spouses Among the laws that have a crucial bearing on
married life are the provisions of the Family Code on property relations. It
envisages a prohibition against a spouse from testifying against the other about
almost anything under the sun simply on account of their subsisting marriage.
DUE PROCESS- includes here, inter alia, provisions ensuring an accused person a
fair and public trial before a competent tribunal, the right to be present at the
trial, and the right to be heard in his or her own defense. Due process includes
both the right to a fair trial and the right to an effective remedy.
Laws governing data privacy prevent data breaches and hold companies
responsible for data misuse by legislating how companies collect confidential
information, where they can share and store this data, and how they keep
promises advertised in their Privacy Policies (to which consumers must agree
before conducting online transactions).
Data privacy describes the practices which ensure the data shared by
customers is only used for its intended purpose. Relates to how a piece of
information— or data—should be handled based on its relative importance
Republic Act No. 10173, otherwise known as the Data Privacy Act of the
Philippines, was passed by the Philippine Congress in 2012. The law sought to
breathe life to the policy of the State to protect the fundamental human right of
privacy, while nonetheless ensuring free flow of information to promote
innovation and growth.
it is a law that seeks to protect all forms of information, be it private, personal, or
sensitive. It is meant to cover both natural and juridical persons involved in the
processing of personal information.
Rights of a Data Subject Under Chapter IV of the Act, there are eight (8) rights
that belong to data subjects, namely: the right to be informed; the right to
access; the right to object; the right to erasure and blocking; the right to rectify;
the right to file a complaint; the right to damages; and the right to data
portability.
1. Right to be informed means that the data subject has the right to know
when his or her personal data shall be, are being, or have been
processed. C
2. Right to access involves being able to compel any entity possessing any
personal data to provide the data subject with a description of such data
in its possession, as well as the purposes for which they are to be or are
being processed.
3. Right to object requires that the consent of the data subject be secured in
the collecting and processing of his or her data.
4. Right to erasure or blocking allows the data subject to suspend, withdraw
or order the blocking, removal, destruction of his or her personal
information from the personal information controller’s filing system upon
discovery and substantial proof.
5. Right to rectify, allows the data subject to dispute any inaccuracy or error
in the personal information processed, and to have the personal
information controller correct it immediately
6. Right to data portability enables the data subject to obtain and
electronically move, copy, or transfer personal data for further use.
7. Right to file a complaint with the National Privacy Commission affords a
remedy to any data subject who ―[feels] that [his or her] personal
information has been misused, maliciously disclosed, or improperly
disposed,‖ or in case of any violation of his or her data privacy rights.
8. Right to damages entitles the aggrieved data subject to be indemnified
for any damages sustained due to inaccurate, incomplete, outdated,
false, unlawfully obtained or unauthorized use of his or her personal
information.