Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 18

By

Jyotsna
Sharva
Pallavi
Neha
Shweta
In the industrialized world computers are changing
everything:
 from education to health,

 from voting to making friends or making war.

We are living a technological and informational


revolution. It is therefore important for policy makers,
leaders, teachers, computer professionals and all social
thinkers to get involved in the social and ethical impacts
of this communication technology
 
Cyberethics - is the field of applied ethics that examines
moral, legal, and social issues in the development and
use of cybertechnology.

Computer ethics - the application of classical ethical


principles to the use of computer technology
Privacy

 Computers create a false sense of security


 People do not realize how vulnerable information store
on computers are

Property

 Physical property
 Intellectual property (in both copyright and patent)
 Data as property
Access

 Access to computing technology


 Access to data Accuracy
 Accuracy of information stored
 Hacking, cracking and virus creation Software piracy
Computer Crime
 IT Infrastructure Illegal access

 Illegal Interuption
 Data Interfare System Interfrence
 Misuse Of Devices
 Electronic Fraud

Software Piracy: a common violation occurs when employees copy software from
their work computers for use at home
 Reselling Media
 Downloading from a website
 Taping songs
 Buying a used book or CD
Types of PIRACY

End-User Piracy :

 This occurs when a company employee reproduces


copies of software without authorization
 Copying disk for installation and distribution
 Swapping disks in or outside the workplace

Client-Server Piracy :

 This type of piracy occurs when too many employees on


a network are using a central copy of a program at the
same time. System Overuse
Internet Piracy :
 This occurs when software is downloaded from the
Internet The same purchasing rules should apply to
online software purchase as for those bought in
traditional ways. Pirate website Unauthorized transfer of
copyrighted program

Software Counterfeiting :

 This type of piracy is the illegal duplication and sale of


copyrighted material with the intent of directly imitating
the copyrighted product.
Inappropriate Use of Computing Resources
some employees use their work computers to surf
popular Web sites that have nothing to do with their jobs

Inappropriate Sharing of Information

◦ Private data describes individual employees


◦ Confidential information describes a company and its
operations
◦ Sharing this information with unauthorized party, even
inadvertently
Defining and limiting the apropriate use of it resources
 to enance their job performance
 prohibiting employes for visiting objectionable web sites

Estabilishing guidleines for use of company software


 goal should be that employees have legal copies of all software

Structuring information system to protect data and information

Installing and maintaining a corporate firewell


Firewell is a software or hardware device that serve as barrier
between comapnay and outside world
Code of ethics is an instrument that establishes a common ethical
framework for a large group of people

RFC 1087
In January 1989, the Internet Architecture Board in RFC
1087 defines an activity as unethical and unacceptable if it:
 Seeks to gain unauthorized access to the resources of the Internet.

 Disrupts the intended use of the Internet.

 Wastes resources (people, capacity, computer) through such

actions.
 Destroys the integrity of computer-based information, or

 Compromises the privacy of users


 Thou shalt not use a computer to harm other people

 Thou shalt not interfere with other people's computer


work

 Thou shalt not snoop around in other people's computer


files

 Thou shalt not use a computer to steal

 Thou shalt not use a computer to bear false witness


 Thou shalt not copy or use proprietary software for which you
have not paid

 Thou shalt not use other people's computer resources without


authorization or proper compensation

 Thou shalt not appropriate other people's intellectual output

 Thou shalt think about the social consequences of the


program you are writing or the system you are designing

 Thou shalt always use a computer in ways that ensure


consideration and respect for your fellow humans
The Code of Fair Information Practices

The Code of Fair Information Practices is based on five


principles outlining the requirements for records keeping
systems. This requirement was implemented in 1973 by
the U.S. Department of Health, Education and Welfare.

 There must be no personal data record-keeping systems


whose very existence is secret.

 There must be a way for a person to find out what


information about the person is in a record and how it is
used.
 There must be a way for a person to prevent information about the
person that was obtained for one purpose from being used or made
available for other purposes without the person's consent.

 There must be a way for a person to correct or amend a record of


identifiable information about the person.

 Any organization creating, maintaining, using, or disseminating


records of identifiable personal data must assure the reliability of
the data for their intended use and must take precautions to prevent
misuses of the data.
(ISC)2 Code of Ethics

(ISC)2an organization committed to certification of computer security


professional has further defined its own Code of Ethics generally as:

 Act honestly, justly, responsibly, and legally, and protecting the


commonwealth.

 Work diligently and provide competent services and advance the


security profession.

 Encourage the growth of research – teach, mentor, and value the


certification.
 Discourage unsafe practices, and preserve and strengthen the
integrity of public infrastructures.

 Observe and abide by all contracts, expressed or implied, and give


prudent advice.

 Avoid any conflict of interest, respect the trust that others put in you,
and take on only those jobs you are qualified to perform

 Stay current on skills, and do not become involved with activities


that could injure the reputation of other security professionals
THANK YOU

You might also like