Computing and IT in The Workplace: Ethical & Legal Issues Part 1

You might also like

You are on page 1of 31

Computing and IT in the Workplace

CT006-1

Ethical & Legal Issues Part 1


Learning Outcomes

At the end of this section, YOU should be


able to:
• Explain and describe the common issues that arises
in the use of computing
• Explain and discuss the steps that can be taken to
ensure proper use of IT

CT024 PDT Introduction 2


Topics we will cover
• Ethics and Society
• Unauthorized use of computers and networks
• Software theft
• Information privacy
• Code of Conduct
• Spyware and Spam

5 Points to remember from each lecture

CT024 PDT Introduction 3


Ethics and Society

• What are Computer Ethics?


Moral guidelines that govern use of computers and
information systems

Information
Unauthorized Software theft
accuracy
use of computers
and networks Intellectual property
rights—rights to which Codes of
creators are entitled conduct
for their work
Information
privacy
CT024 PDT Introduction 4
Unauthorized Access and Use
• What is unauthorized access and how is
it achieved?

Use of a computer or
network without permission
Hackers typically break into computer by
connecting to it and then logging in as a
legitimate user
Hacker - someone who accesses a computer or
network illegally. Cracker –
one who accesses a computer or network illegally
with the INTENTION of destroying, stealing data
CT024 PDT Introduction 5
Unauthorized Access and Use
• How can companies protect against
hackers?
Access control defines who
Intrusion detection software can access computer and
analyzes network traffic, assesses
system vulnerabilities, and identifies
what actions they can take
intrusions and suspicious behavior

Audit trail records


access attempts
CT024 PDT Introduction 6
Hardware Theft and Vandalism
1. Hardware theft is the act of stealing
computer equipment
 Cables used to lock equipment
 Some notebook computers use
passwords, possessed objects,
and biometrics as security
methods
 For PDAs, you can password-
protect the device
2. Hardware vandalism is the act of
defacing or destroying computer
equipment
CT024 PDT Introduction 7
Software Theft

• What is software theft?


Software piracy
Act of STEALING or is illegal
illegally COPYING DUPLICATION
software or of copyrighted
intentionally software
ERASING
programs

CT024 PDT Introduction 8


Software Piracy
• Software piracy - unauthorized copying
or distribution of copyrighted software. How?
• By copying, downloading, sharing, selling or
installing multiple copies onto computers.
• People don't realize that when you purchase
software, you are actually purchasing a license
to use it, not the actual software.
• That license tells you how many times you can
install the software, so it's important to read it. If
you make more copies of the software than the
license permits, you are pirating.
CT024 PDT Introduction 9
Software Theft
• What is a license agreement?
 Right to use software
 Single-user license agreement allows user to install
software on one computer, make backup copy.

CT024 PDT Introduction 10


Software Theft
• What are some other safeguards against
software theft?

Product activation allows user to input


product identification number online or by
phone and receive unique installation
identification number

Business Software Alliance (BSA)


promotes better understanding of software
piracy problems

CT024 PDT Introduction 11


BSA

• The Business Software Alliance is a nonprofit


trade association to advance the goals of the
software industry and its hardware partners,
dedicated to promoting a SAFE AND LEGAL
digital world. Amongst its goals are:
• Protecting intellectual property (copyright,
patents, tech mandates)
• Opening markets to barrier-free trade
• Data security
CT024 PDT Introduction 12
Information Theft
• What is encryption?
 Safeguards against information theft
 Process of converting plaintext (readable data) into ciphertext
(unreadable characters)
 Encryption key (formula) often uses more than one method
 To read the data, recipient must decrypt or decipher the data

CT024 PDT Introduction 13


Information Theft

• What does an encrypted file look like?

CT024 PDT Introduction 14


IT Code of Conduct
• What is an IT code of conduct?
 Written guidelines that determine if computer action
is ethical
 Employers can distribute to employees
IT CODE OF CONDUCT

CT024 PDT Introduction 15


Information Privacy
• What is information privacy?
Right of individuals and
companies to restrict collection
and use of information about them

Difficult to maintain today


because data is stored online
Employee monitoring is using
computers to observe employee
computer use

Legal for employers to use


monitoring software programs
CT024 PDT Introduction 16
Information Privacy
Some ways to safeguard personal information
Install a cookie manager
Sign up for e-mail
Fill in necessary information to filter cookies filtering through your
on rebate, warranty, and Internet service provider or
registration forms use an antispam program,
Clear your history file when
you are finished browsing such as Brightmail
Avoid shopping club
and buyers cards Set up a free e-mail
account; Do not reply to spam
Inform merchants that you use this e-mail address for for any reason
do not want them to distribute merchant forms
your personal information Turn off file and print
sharing Surf the Web anonymously
on your Internet connection with a program such as
Limit the amount of Freedom Web Secure or
information through an anonymous
you provide to Web sites; fill Install a personal Web site such as
in only required information firewall Anonymizer.com
CT024 PDT Introduction 17
What is Anonymizer.com
• Is a proxy server that makes Internet
activity untraceable. It protects personally
identifying information by hiding private
information on the user's behalf
• When users anonymize their personal
information it can enable:
1. Risk minimization
2. Taboo electronic communications
3. Identity theft prevention
4. Protection of search history
CT024 PDT Introduction 18
Information Privacy
• What is an electronic profile?
 Data collected when you fill out form on Web
 Merchants sell
your electronic
profile
 Often you can
specify whether
you want
personal
information
distributed

CT024 PDT Introduction 19


Information Privacy
• What is a cookie?

Small file on Set browser to


your computer Some Web
sites sell or accept cookies,
that contains prompt you to
data about you trade
information accept cookies,
User or disable
stored in your
preferences cookies
cookies
How
regularly Interests
you visit and
Web sites browsing
habits
CT024 PDT Introduction 20
Information Privacy
• How do cookies work?
Step 1. When you type a
Web address of a Web site
Step 2. If the
in your browser window, browser finds a
the browser program cookie, it sends the
searches your hard disk
for a cookie associated
information in
with the Web site. cookie file to the
Step 3. If the Web site does not Web site.
receive the cookie info and is
expecting it, the Web site creates
an identification number for you
Web server for
in its database and sends that www.company.c
number to your browser. Browser om

in turn creates a cookie file based


on that number and stores cookie
file on your hard disk. The Web
site now can update info in cookie
files whenever you access the site.
CT024 PDT Introduction 21
Information Privacy

• What is a cookie
manager?

 Software
program
that
selectively
blocks
cookies

CT024 PDT Introduction 22


Information Privacy
1. Spyware is program
placed on computer
without user’s
knowledge
 Secretly collects
information
about the user
2. Spam is unsolicited
e-mail message sent
to many recipients

CT024 PDT Introduction 23


What is Spyware
• General term to describe software
that performs certain behaviors without obtaining
consent, such as:
a) Advertising & Collecting personal information
b) Changing the configuration of your computer
• Often associated with software that displays
advertisements (called adware) or software that
tracks personal or sensitive information.
• It can change your computer, causing it to slow
down/crash; change your web browser's
home/search page
CT024 PDT Introduction 24
Information Privacy

• How can you control spam?

Collects spam in
Service that
blocks e-mail E-mail filtering central location
that you can
messages from
view any time
designated
sources

Anti-spam program
Attempts to Sometimes
remove spam removes valid
e-mail messages
CT024 PDT Introduction 25
Privacy Law
• What privacy laws have been enacted?

CT024 PDT Introduction 26


Privacy Law
• What privacy laws have been enacted? (cont’d)

CT024 PDT Introduction 27


Content Filtering
 Process of restricting access to certain material
Internet Content
Rating
Association
(ICRA) provides
rating system of
Web content

Web filtering
software
restricts access
to specified sites

CT024 PDT Introduction 28


Review Questions

 What are the issues surrounding


information privacy?
 Explain the process of encryption and
discuss on why this process is needed.
 How to prevent unauthorized computer
access and discuss the implications
based on the case study given.

CT024 PDT Introduction 29


Question and Answer Session

Q&A

CT024 PDT Introduction 30


What we will cover next

Topic and Structure of next session

Ethical and Legal Issues Part 2

CT024 PDT Introduction 31

You might also like