Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

UNIT ETHICAL

UNIT 1:5:Multimedia AND LEGAL CONSIDERATIONS


Concepts

Introduction
Privacy in the internet is one of the most popular among the issues. Very few
are chosen to practice the internet and stay fully secured, and in the other side
almost everyone decided to consider less about how much personal information is
available and accessible out there. And how we actually vulnerable and easy access
in excessive information sharing?

What is Privacy?
It defines the personal information of an individual that are not exposing online
or the data that cannot be produce or share without the consent or permission of the
owner. For example a lot of website asks for name and birthday for registration. For
the well-skilled hackers those information are more than enough to hacked and
reach our privacy and create falls identity. Also they can access even the secured
bank accounts. So better be careful about when and where input data.

How Safe and Secured are you online?


The 21st century generation or the computer era makes a huge change to the
community and individual, it means the more people expose to the internet the more
privacy and security needs to be implemented.

Four Types of Privacy Harms

1. Intrusion
 Unwanted email (Spam)
 Unwanted phone calls

2. Informtion Collection
 Surveillance
 Wiretapping

3. Information Processing
 Identification theft
 Data Mining

4. Information Dissemination
 Breach of confidentiality
 Appropriation (Pretending to be someone)

IT 301: APPLICATION DEVELOPMENT AND EMERGING TECHNOLOGIES 5.1


UNIT 5: ETHICAL AND LEGAL CONSIDERATIONS

Different Type of Information at Risk


1. Mother and fathers name

2. Address

3. Phone and Cellphone number

4. Email address

5. Complete Name

6. School or job

7. Bank accounts

Different examples of Anti-Virus


1. ESET

2. KASPERSKY

3. AVAST

4. F-SECURE

5. NORTON

IT 301: APPLICATION DEVELOPMENT AND EMERGING TECHNOLOGIES 5.2


UNIT 5: ETHICAL AND LEGAL CONSIDERATIONS

6. SMADAV

Different Internet Threats


 Malware
 Stands for malicious software
 Originated in the Pandacan of Manila in th Philippines
 May 5, 2000

a. Virus
 Designed to replicate and transfer from one computer to
another

b. Worm
 Programs that transfer from one computer to another by
any types of means. Ex. ILOVEYOU VIRUS

ILOVEYOU VIRUS
 Also known as Love Bug or Love Letter
 Spreading as an email message with the subject
line “ILOVEYOU” and the attachment “LOVE-
LETTER-FOR-YOU.txt.vbs”
 (‘ybs’, a type of interpreted file) was most often
hidden by default on Windows computers of the
time
 Opening the attachment the visual basic script.

c. Trojan
 Programs that disguises as a valuable programs but once
downloaded or installed, leaves your computer unsecured

d. Spyware
 Runs in the Background without the user knowing and
also known as spy its purpose is to monitor what the user
are currently doing and typing

e. Adware
 Designed to send you advertisement as pop-ups

f. Ransomware
 Its main purpose is to threaten to publish the user’s
information or data block access to it unless a ransom is
paid

IT 301: APPLICATION DEVELOPMENT AND EMERGING TECHNOLOGIES 5.3


UNIT 5: ETHICAL AND LEGAL CONSIDERATIONS

g. Spam
 It is the unwanted email mostly form bots or
advertisement the sends to your emails.

h. Phishing
 It is the unwanted acquisition of someone’s personal data
like passwords and back accounts and other credentials

IT 301: APPLICATION DEVELOPMENT AND EMERGING TECHNOLOGIES 5.4


UNIT 5: ETHICAL AND LEGAL CONSIDERATIONS

 INTELLECTUAL PROPERTY RIGHTS


What is Intellectual Property Rights?
(Says, A., Says, M., & Says, E. (2019, June 14)) stated that Intellectual
Property Rights (IPRs) are the lawful rights that occur in particular types of
inventive works. There are works exist spontaneously and others need to be
registered to be effective. There are possibilities that a quantity of these rights may
occur concurrently in one type of work

The Importance of Intellectual Property Rights


The importance of intellectual property clearly stated by (Burnett, C. (2019,
January 22). In which the purpose of intellectual property rights is to encourage
new creations, including technology, artwork, and inventions, that might increase
economic growth. Intellectual property rights increase the incentives for individuals
to continue to produce things that further create job opportunities and new
technologies, while enabling our world to improve and evolve even faster.

Types of Intellectual Property

Intellectual property is a human intellectual property to legal protection of the


product or value that they made. It has distinct types of property: copyrights,
patents, trademarks, trade secrets, and (in some jurisdictions) certain types of
ideas.. Each of these has unique description. (Gasaway, Laura,2001)

IT 301: APPLICATION DEVELOPMENT AND EMERGING TECHNOLOGIES 5.5


UNIT 5: ETHICAL AND LEGAL CONSIDERATIONS

Types of Intellectual Property Rights (IP) . Figure 4.0

Types of intellectual property rights that may be involved in marketing campaigns

Trademark

Word or Figurative is a trademark see (Figure 5.0) sign, which


recognizes products or services of a particular source from those of others.
In the marketing advertisement it is a common occurrence to see new signs
launched in the communication. These signs are usually sub-brands which,
together or not with the main brand of the company, emerge as a brand-new
communication to launch a new product, service or advantage for the
relevant public. Being distinctive signals and respecting the principle of
novelty for marks, they should be registered as trademarks. (A. 2009).

● Figure 5.0 : Trademark Samples

IT 301: APPLICATION DEVELOPMENT AND EMERGING TECHNOLOGIES 5.6


UNIT 5: ETHICAL AND LEGAL CONSIDERATIONS

Trade Secret

The word trade secret refers to a special intellectual property (IP) resource
that is unique and not reasonably noticeable by others. Businesses generally
leverage trade secret protection to attain a business advantage over their
competitors. Some refer to trade secrets simply as “confidential information.” Trade
secret. (n.d).

Examples:

● Max Fried Chicken Ingredients

● Coco Cola Formula

● WD 40 Chemical Formula

Patent

Patents ( Types of Intellectual Property Rights. (n.d.)) protect inventions.


Inventions relate either to a product or a process to make a product. These
products and processes should deal with new functional and technical aspects and
so mainly relate to:

a) How things work;


b) What they are made of;
c) How they are made;
d) What they do; or
e) How they do it.

An invention must be new and inventive to be protected by a patent. This


means that the invention must not have been made available to the public
anywhere else in the world and must not be an obvious product or process to
have been invented. A patent gives an absolute monopoly right. Protection is
only available if registration is obtained and then lasts for 20 years starting from
the date the patent application was filed.

IT 301: APPLICATION DEVELOPMENT AND EMERGING TECHNOLOGIES 5.7


UNIT 5: ETHICAL AND LEGAL CONSIDERATIONS

Copyright

Copyright protects a massive array of different works. Copyright only


protects the form in which ideas are expressed and not the idea or concept itself.
Copyright can arise separately in each of the following shown in Figure 5.0

Types of Work . Figure 6.0

A B C D

Books, Diagrams Performance music


articles drawings works broadcasts
theses blueprints artistic works sound recordings
presentations charts videos and and
lecture notes artwork and films typographical
course materials photographs arrangements of
test results published
editions
research
notes
computer softre
examination
papers

All of the above types of work in the figure 6.0 are protected by ,copyright as
soon as they are created. Registration is not required. All that is required is that the
work be original i.e.not copied from another source. Types of Intellectual Property
Rights. (n.d.).

 POLICIES AND PROCEDURES


What are policies and procedure?

The term policy from the middle English term “policie” which means
“government” or “civil administration” and that word was originated from the latin
“politia” meaning “polity,” a politically united by the group of any kind while a
procedure, came from the French “procedure,” fact or manner of proceeding

IT 301: APPLICATION DEVELOPMENT AND EMERGING TECHNOLOGIES 5.8


UNIT 5: ETHICAL AND LEGAL CONSIDERATIONS
(Online Etymology Dictionary, 2020).

These two terminologies are not interchangeable because it must go hand-


in-hand. In which we can define policy that it is a framework where the
organization’s plan for tackling an issue that set of general guidelines. Page (n.d.)
stated that, policies connects the daily operations of the organization’s values and
vision. While a procedure states the detailed sequence for carrying out a policy. It
instructs the personnel how to do business with a situation and when to support the
operationalize processes of a work (Breezee & Hoo, 2020).

Importance of Policies and Procedure in Information Technology


✔ Providing security due to the threats are on the rise for an organization.

(Lorenzen & Follow, n.d.)

✔ Fight threats such as ransomware, email phishing, and lack of security

training. (Lorenzen & Follow, n.d.)

✔ Guided on how an organization wishes to implement, operate, and

manage technology in a way that enables the organization to meet legal


and ethical considerations. (Lorenzen & Follow, n.d.)

What are the IT Policies?

IT policy describes the development, implementation and secures


information technology of an organization. IT policies regularly practiced,
expectations must be defined clearly, and up-to-date and appropriate to
the organization (Lorenzen & Follow, n.d.).

IT Policies
Figure 1.0

IT 301: APPLICATION DEVELOPMENT AND EMERGING TECHNOLOGIES 5.9


UNIT 5: ETHICAL AND LEGAL CONSIDERATIONS

Information Bring YOur Own


Information
Data Policy Technology Device (BYOD)
Access Control
Security Policy Policy

Technology
Policy for getting
Hardware Website Policy
software
Purchasing Policy

Policy makers

These personnel must be always present in making policy especially in the process
of consultation i.e. Management Committee, Board of Directors, Executives.

Steps in Developing a Policy

1. Determine the purpose


It is important that the organization determined that purpose of the
policy to develop to make it align and precise in making actions.

2. Identify the person/s to coordinate the policy development process


There must be someone or member or committee that will take
the responsibility in making the policy.

3. Gather information

● Read policy documents on the same topic

● Research legal responsibilities

● Organize a meeting

● Check if there is already a template

● Read … read…read

4. Draft Policy
Consider the words and the length in which it suitable to the people
who will be expected to implement it.

IT 301: APPLICATION DEVELOPMENT AND EMERGING TECHNOLOGIES 5.10


UNIT 5: ETHICAL AND LEGAL CONSIDERATIONS

5. Consultation
When the draft policy is done it should be disseminated to primary
users, circulated in the organization’s bulletin or web site, discussed in
meetings and forums. This is the stage where will need the help from
stakeholders to polish the content, clarify meaning and make corrections
to the policy before it is finalized.

6. Approve policy
In finalizing the policy the assigned personnel of the policy
development process is fairly satisfied that all matters and concerns
about the policy have been aired and dealt with. The final policy
document needs to be officially accepted by the management with an
appropriate record inserted into the minutes.

7. Implement
To whom the policy will be communicated and to how?. And also
consider if there is a need of a training to support the implementation
among staff and volunteers?

8. Monitor, review, revise

In order to endure that the policy is implemented and to assess usage


and responses monitoring and reporting systems must be done and the
basis and when will the policy be reviewed and revised.

⮚ Policy Template Structure (Policy Template Structure. (n.d.))

Component/ Meaning Example


Section
Policy Statement Policy statements refers to Information Technology
what its objective are Security Policy


Purpose This is the section that
● Ensure the Safety of the
provides the introduction
and the information in which Information.

IT 301: APPLICATION DEVELOPMENT AND EMERGING TECHNOLOGIES 5.11


UNIT 5: ETHICAL AND LEGAL CONSIDERATIONS
why there is a need for the
● Protect the information
Policy.
that is being used.

This section defines word/s


that being used in the policy.
Definition of Term
Safety refers to protection
information that is being
used

Procedure This section details will be 1.Fill in the Enrollment form


written concerning how to (see Appendix A) from the
give effect to the policy MIS Department
statement 2.Submit the form to the
MIS Department for
encoding.
3. So on

Related Forms This section is used to Enrollment Form
attach forms that re related
to the policy. In which ,
forms must be present in the
website and the forms must
have name

IT Procedures

As stated by (Lorenzen & Follow, n.d.) a procedure outlines the implementing


policy plan of action. A well-defined procedure must be unambiguous, precise,
and determine precise actions. These specific actions should also detail when
the actions should take place, alternative actions, emergency procedures,
warnings and cautions, and examples.

Figure 2.0 Procedure


on
Procedure Purchasing
Sample of Hardware

Procedure
Procedure
on Keeping on
Mobile Software
Secure
Request

Procedure
on Procedure
Purchasing on Physical
computer Security
peripherals

IT 301: APPLICATION DEVELOPMENT AND EMERGING TECHNOLOGIES 5.12


UNIT 5: ETHICAL AND LEGAL CONSIDERATIONS

Procedure Writing Tips

● A written procedure is a direct guide of the reader task which in an

orderly manner. In which in developing a procedure you have to read a lot about
procedure before you begin in writing it and always bare in mind the
preparation, writing and follow up major steps.. (Writing a Procedure that the
Reader Can Follow. (n.d.).

Determine the purpose statement


1

Identify an overview of the procedure


2

Recognize precondition of knowledge and skils


3

Consider the safety issues and other concerns


4
Figure 3.0
Include equipment, supplies, etc.
5
Procedure Development
Steps
Outline the order of the steps and substeps.
6
Include graphics , illustrations, models for the further
7 understanging of the process

Dissiminate the procedure information in different media


8

Why is it Important to Follow Rules and Procedures at Work?

Policies and procedures are one thing that makes an organization a


corporation. After the employees, it is the policies that determine the form and
culture of the organization. Therefore, any employee in the company should obey
the rules.

The company typically includes a few predefined rules and regulations at

IT 301: APPLICATION DEVELOPMENT AND EMERGING TECHNOLOGIES 5.13


UNIT 5: ETHICAL AND LEGAL CONSIDERATIONS

work , ensuring that everything goes seamlessly in the right direction. In basic
terms, it is a series of guidelines defined by the company that must be observed by
workers and employers at the workplace.

Employees must obey the policies and procedures when working with the
company. By involving certain policies in the workplace, there would be a sort of
professionalism and seriousness among workers that can contribute to improved
efficiency. This implicitly leads to the growth of the sector.

If the rules and policies are broken, then it will have a strong negative
impact on the organization. Violation of laws will lead to a decline in corporate
culture and ethics.

 NET NEUTRALITY

What is Net Neutrality?

Net neutrality is about the rules of the road for Internet users, and about the
relationship between the owners of those roads and the users. The existence of net
neutrality is bound to have problems. Indicating that, in developing countries such
as Philippines most internet users cannot afford line connection lacking to have of
a choice turns out to shifts into broadband or data connections. It shows that the
broadbands did not meet the needs of expectation of the users; connections are
not fast enough in viewing videos in YouTube and other public services content.
According to Marsden (2010), people are dismay or upset when someone connects
or want to share with their connection because they are aware that the speeds
slow down dramatically. To further inputs and information you may watch this video
to understand better what is Net Neutrality https://www.youtube.com/watch?
v=aiZ8xwwycXA.

Legal Content and Treatment

There is certain legal content for the costumer to ensure that they can
access what they want to while also ensuring that some companies using these
IT 301: APPLICATION DEVELOPMENT AND EMERGING TECHNOLOGIES 5.14
UNIT 5: ETHICAL AND LEGAL CONSIDERATIONS

broadband networks will not interfered controls in the internet connection into
customer’s home. To further understand, net neutrality refers to a bunch of open
access principles enforced in such a variety of legal and technical ways (Fetzer,
2019). In layman’s term, it means that all internet content must be treated alike and
move at the same speed over the network. To understand better the effect of Net
Neutrality you mean watch this video for more information
https://www.youtube.com/watch?v=zq-2Yk5OgKc.

In net neutrality, there are three must understand simultaneously.


1. A collection of theoretical— a net neutrality principle which, mainly, the
principle that we should protect innovation, free speech and competition on
the internet.
2. Set of legal rules and policies— an internet policy statement and the
recently open internet rules.
3. Network protocols and Internet architecture— that can direct, on the
technical level, how ISPs discriminate among content, services or
applications.

In conclusions, these three the theoretical, legal and technical definitions are
related in that theoretical net neutrality principles often to inform the state of legal
codification and technical execution (Fetzer, 2019).

The impact of network neutrality on 5G

The impact of network neutrality on 5G will be more resolute by the means


of exceptions for reasonable traffic management and other services that are
interpreted (Yoo & Lambert, 2019). A comprehensive interpretation must
accommodate other network and new businesses that desired to have support of
5G, but on the other hand the narrow interpretation could restrict innovation and
investment. Watch this video to understand better the impact of Net Neutrality on
5G, https://www.youtube.com/watch?v=pu0nt7KfPJg.

Net Neutrality, Free Internet and Open Internet


In the field of internet traffic for it to be treated for its non-discrimination,
there are terms like net neutrality, free internet and open internet these are not the
same but it gives principles and guidance anchored by it (Damiani, 2019). Net
neutrality secures the protection of freedom from different discrimination among
IT 301: APPLICATION DEVELOPMENT AND EMERGING TECHNOLOGIES 5.15
UNIT 5: ETHICAL AND LEGAL CONSIDERATIONS
any type of source without any competing interest and countervailing
considerations. To understand what non-discrimination principle is, this is the
practice wherein inherently harmful pas such must be prohibited across the board.
The free internet tackles only in the prohibition of anticompetitive discrimination.
And the open internet protects two competing freedoms: freedom from
discrimination application and freedom to engage practices. Daminani (2019)
states that, the collaboration of these three helps to distinguish the underlying
principles; it identifies adopted policies; decision-making; assess the policies in the
context of the broadband internet access service.

IT 301: APPLICATION DEVELOPMENT AND EMERGING TECHNOLOGIES 5.16

You might also like