Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 36

I.

T Issues and
Opportunities
Module1 – Computer Ethics
Introduction
The use of technology in all aspects of our daily
lives continues to expand each year.

Most laws were written years ago and were


meant to apply to more standard types of media
such as books, paintings, and movies.
Topics Covered
Ethics
Privacy
Computer Crimes and Threats
 System Intrusion
 Computer Viruses
Intellectual Property Law
Issues in I.T

Computer
Ethics Crimes

Privacy IP Law
Issues in IT:
Ethics
Ethics
 “doing what is right, to achieve what is good”
 refers to the rules and standards that govern
how an individual behaves in society.

Computer Ethics

 refers to the laws and standards that govern


our behavior when using technology.
Computer Ethics
ACM Code of Ethics

The Code and its supplemented Guidelines are


intended to serve as a basis for ethical decision-
making in the conduct of professional work.

Secondarily, they may serve as a basis for


judging the merit of a formal complaint pertaining to
violation of professional ethical standards.
The Ten Commandments of Computer Ethics

1) Thou shalt not use a computer to harm other


people

2) Thou shalt not interfere with other people's


computer work

3) Thou shalt not snoop around in other people's


files

4) Thou shalt not use a computer to steal


The Ten Commandments of Computer Ethics

5) Thou shalt not use a computer to bear false


witness

6) Thou shalt not use or copy software for


which you have not paid

7) Thou shalt not use other people's computer


resources without authorization
The Ten Commandments of Computer Ethics

8) Thou shalt not appropriate other people's


intellectual output

9) Thou shalt think about the social consequences


of the program you write

10) Thou shalt use a computer in ways that show


consideration and respect
Issues in IT:
Privacy
Issues in I.T: Privacy
Privacy generally means being able to keep
personal information from being accessed by
anyone with the owner’s consent or knowledge.
Privacy: Censorship
To censor something means to ban or block
from publication. This includes not only
pornographic material, but also hate sites that
target a specific race or group of people.

There are certainly many sites


available on the Internet that
the majority of society would
consider inappropriate or
obscene.
Issues in IT:
Computer Crimes
System Intrusion
Security
• Security deals along the
lines of data encryption
methods, keeping
information secure and
doesn’t ends up to the
wrong hands.
• Encryption is the process
of running data through
filters which scramble the
information while it is
being sent.
System Intrusion
Firewall

 is software that is
designed to restrict
unwanted access to an
organization’s network.
 The firewall screens
electronic traffic in both
directions so that
organizational security
is maintained.
System Intrusion
Hackers
Hackers are people that break into someone’s computer
system without permission. Some hackers intentionally steal
data or commit vandalism, while others merely “explore” the
system to see how it works and what files it contains.

Cybersquatting
is registering a domain name that a famous
Cybersquatting
company will want to use and then selling that name back to
the company for a profit.
On November 29, 1999, President Clinton signed into law
the Anticybersquatting Consumer Protection Act, making
cybersquatting illegal.
System Intrusion
Piracy

The unlawful duplication of


software, called software
piracy, is making companies
vulnerable to legal action by
affected vendors.
System Intrusion
Piracy

The general rule is:

one software package per computer. Any other


duplication whether for sale or for the owner’s
personal use, is an infringement of copyright law.
System Intrusion
Piracy
Pilferage
- is the term used to
describe the situation in
which a company
purchases a software
product without a site
usage license agreement,
then copies and distributes
the software throughout the
company.
Issues in IT:
Computer Virus
Types of Virus
1. Worms – can move from a
machine to machine across
networks, and may have parts
of themselves running on
different machines.

2. Trojan horse – appears


to be one sort of program,
but actually are doing damage
behind the scenes.
Types of Virus

3. Logic bombs – check for


particular conditions and then
execute when those conditions
arise

4. Bacteria or rabbits –
multiply rapidly and fill up the
computer’s memory
Issues in IT:
Intellectual Property
Intellectual Property defined

 refers to creations of the mind:


• inventions,
• literary and artistic works,
• symbols,
• names,
• images, and designs used in commerce.
Intellectual Property Rights
 “the exclusive right to inventions, writings and
artistic creations shall be secured to inventors,
authors, and artists for a limited period”
IP Law in the Philippines
Republic Act 165 Republic Act 8293
"first-to-invent system" "first-to-file system”

Inventions: from 17 years from 20 years from date of filing


grant
Industrial designs, the previous grant of 5 years plus renewals of 5
years each was maintained.

The penalties for repetition of The penalties range from


infringement are:  PhP10,000 PhP100,000 to PhP300,000
and/or 5 years of imprisonment and/or 6 months to 3 years of
and the offense prescribes in 2 imprisonment and the offense
years; prescribes in 3 years. 
Two Categories of IP

 Industrial property

 Copyright
Two Categories of IP

 Industrial property
which includes inventions (patents),
 Copyright
trademarks, industrial designs, and
geographic indications of source;

which includes literary and artistic works


such as novels, poems and plays, films,
musical works, artistic works such as
drawings, paintings, photographs and
sculptures, and architectural designs.
Industrial Property: PATENTS

 a patent is the right granted to an inventor by a


State, which allows the inventor to exclude
anyone else from commercially exploiting his
invention for a limited period.

 patents provide incentives to individuals, offering


them recognition for their creativity and material
reward for their marketable inventions.
Industrial Property:
Trademarks, Service marks
 A trademark is a sign, or a combination of signs,
which distinguishes the goods or services of one
enterprise from those of another.
 Service mark – a trademark used in connection
with services
 A commercial or trade name is the name or
designation that identifies an enterprise.
Copyright Law
According to the law, a copyright protection
extends to “original works of authorship fixed in any
tangible medium or expression, now known or later
developed, from which they can be perceived,
reproduced, or otherwise communicated, either
directly or with the aid of a machine or device.”

is the
Fair use – use of copyright materials that does not
violate or infringe the exclusive rights of the copyright
holder.
Limitations of Copyright
1. Copyright does not protect the author’s creative idea.
2. Copyright protects only fixed, original and creative
expressions, not the ideas or facts upon which the
expression is based
For Example:
Copyright may protect a film but it cannot protect the underlying theme of the
film.

3. Copyright does not protect facts, whether scientific,


historical, biographical, or news of the day. Any facts that an
author discovers in the course of research are in public
domain.
Name as many as you can!!!
End.
This presentation is available at
the yahoo group, ETHICS.ppt
References
 http://www.wipo.int/about-ip/en/

You might also like