0% found this document useful (0 votes)
56 views8 pages

Proffessional Issues

This document discusses various topics related to ethics and technology including different ethical theories like relativism, egoism, and Kantianism. It also covers codes of ethics for professionals, computer ethics, and the impacts of technology on privacy. Some key points discussed include subjective and cultural relativism, the code of ethics for Filipino IT professionals, the ten commandments of computer ethics, and three levels of computer ethics analysis. The document also examines privacy rights in the Philippines constitution and various laws related to technology impacts like identity theft.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views8 pages

Proffessional Issues

This document discusses various topics related to ethics and technology including different ethical theories like relativism, egoism, and Kantianism. It also covers codes of ethics for professionals, computer ethics, and the impacts of technology on privacy. Some key points discussed include subjective and cultural relativism, the code of ethics for Filipino IT professionals, the ten commandments of computer ethics, and three levels of computer ethics analysis. The document also examines privacy rights in the Philippines constitution and various laws related to technology impacts like identity theft.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Chapter I

Relativism - is the theory that there are no universal moral norm of the right and wrong.

Two particular kinds of relativism

Subjective relativism – holds that each person decides right and wrong for himself/herself. This notion is
captured in the popular expression “what’s right for you may not be right for me”.

The case for subjective relativism

Well-meaning and intelligent people can have totally opposite opinions about moral issues.

For example: consider the issue of reproductive health (RH) bill in our country.

Cultural Relativism – is the ethical theory that the meaning of “right” and “ wrong” rest with a society’s
actual moral guidelines.

F2 Epidemic – one of the problems of an ITE instructor.

– ITE students during the early 80’s use either the Pascal and/ or the BASIC language
running under DOS operating system.

– function key to save file.

– like an epidemic which transfer to others as quick as a speed of light.

Divine command theory – is based on the idea that good actions are those aligned with the will of God
and bad actions are those contrary to the will God.

Ethical Egoism – is the philosophy that each person should focus exclusively on his or her self interest.

- The morally right action for a person to take in a particular situation is the action that
will provide that person with me maximum long-term benefit.
- Does not prohibit acting to help someone else, but assisting another is the right thing
to do if and only if it is in the helper’s own long-term best interest.

Consequentialism – an action justifies the moral acceptability of the means taken to reach that end.

- Its an action which determines whether or not the action is moral.

Kantiansim - is anobligation-based theory whose chief author was Immanuel kant, who lived in the 18th
century.
Chapter II

Professional Code of ethics

Is a set of guidelines which are designed to set out acceptable behavior of member of a
particular group, association or profession.

Practitioners in many professions subscribe to a code of ethics that governs their behavior.

For example: doctors adhere to varying version of the 2000-year-old Hippocratic Oath, which
medical schools offer as an affirmation to their graduating classes.

1. Ethical Decision Making: adherence to professional code of ethics means that practitioners use
a common set of core values and beliefs as a guideline for ethical decision making.
2. High Standards of Practice and Ethical Behavior: adherence to a code of ethics reminds
professionals of the responsibilities and duties that they may be tempted to compromise to
meet the pressures of day to day.
3. Trust and Respect from the General Public: public trust is built on the expectation that a
professional will behave ethically.
4. Evaluation Benchmark: a code of ethics provides an evaluation benchmark that a professional
can use as a means of self-assessment. Peers of the professional can also use the code for
recognition or censure.

Two main parts of Code of ethics

1. Outlines what the organizations aspires to become.


2. Typically list rules and principles by which members of the organization are expected to abide.

Code of ethics of the filipino IT Professionals.

1. I will promote public knowledge, understanding and appreciation of information Technology.


2. I will consider the general welfare and public welfare and public good in the performance of my
work.
3. I will advertise goods or professional services in a clear and truthful manner.
4. I will comply and strictly abide by the intellectual property laws, patent laws and other related
laws in respect of information Technology.
5. I will accept the full responsibility for the work undertaken and utilize my skills with competence
and professionalism.
6. I will make truthful statement on my areas of competence as well as the capabilities and
qualities of my product and services.
7. I will not disclose or use any confidential information obtained in course of professional duties
without the consent of the parties concerned except when required by the laws.
8. I will strive to attain the highest quality in both the products and services that offer.
9. I will knowingly participate in the development of the Information Technology.
10. I will uphold and improve the IT professional’s standard through continuing profession in order to
enhance the IT profession.
The Ten Commandments

The ten commandments of computer ethics have been defined by the computer Ethics Institute.

1. Thou shalt not use a computer to harm other people.


2. Thou shalt not interfere with other people’s computer work
3. Thou shalt not snoop around in other people’s files.
4. Thou shalt not use a computer to steal
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people’s computer resources without authorization
8. Thou shalt not appropriate other people intellectual output
9. Thou shalt think about the social consequences of the program you write
10. Thou shalt use a computer in ways that show consideration and respect

Computer Ethics

-Is open to interpretations both board and narrow.

- is a new branch of ethics that is growing and changing rapidly as computer technology also
grows and develops.

Invisibility Factor

About computers is that most of the time, and under most conditions, computer operations are
invisible.

1. Invisible abuse: moor describes this as: ‘the intentional use of the invisible operations of a
computer to engage in unethical conduct”,

The programmer who realized he could steal excess interest from a bank. When interest
on a bank account calculated, there is often a fraction of a cent left over after rounding
off. This programmer instructed a computer to deposit these fractions of a cent his own
account.
The invasion of the property and privacy of others, computers can be programmed to
surreptitiously remove or alter confidential information.
2. Invisible programming values: these are values which, according to Moor, are embedded into a
computer program:
a programmer makes some value judgments about what is important and what is not.
These values become embedded in the final product and mat be invisible to someone
who runs the program.
3. Invisible complex calculation: in this context, Moot writes:
Computer today are capable of enormous calculations beyond human comprehension.
Even if a program Is understood, it does not follow that the respective calculations are
understood. Computers today perform…calculations which are too complex for human
inspection and understanding.

3 levels of computer ethics.

1.’pop’ computer ethics – this is the overall goal.

Example: newspapers, magazines and TV news programs have engaged


increasingly in computer ethics of this sort.

2.’para’ computer ethics – someone who takes a special interest in computer ethics cases, collects

Example: clarifies them, looks for similarities and differences, reads related
works, attends relevant events, and so on,

“para” borrowed this term from keith Miller, who is the first person I ever hear use it

3.’theorethical’ computer ethics- because it applies scholarly theories to computer ethics cases and
concepts. Someone proficient in “theoretical” computer ethics would be able not only to identify, clarify,
compare and contrast computer ethics cases;

Chapter 3

Tech. impact on privacy

1. Privacy
1.) The privacy of communication and correspondence shall be inviolable except upon lawful
order of the court, or when public safety or order require otherwise as prescribed by law.
2.) Any evidence obtained in violation of this or the preceding section shall be inadmissible for
any purpose in any proceeding. (art.II,sec. 3)

A. Exemption 1. Lawful court order.


the court order is lawful when the search warrant ( court order) is issued by the judge after
he personally determines that there is a probable cause which is required by art.II section 2
of the constitution

B. Public order or safety requirement


This provision is best explained without regard to technology. In the Philippines, terrorists
often carry out their attacks in public places such as LRT/MRT station and shopping malls.

C. Express provision of the law


There are so many laws which provide an express provision requiring surrender of one’s
privacy, For instance, under the Anti Money Laundering law.

2. A.O.308
*Is unconstitutional usurpation of the legislative powers of congress
*it violates the individual’s right to privacy.
* whether or not A.O.308 is unconstitutional for violation of individual’s right to privacy.

3. R.A. 3019

4. R.A. 4200

5. Identity Theft
6. Due process

Procedural and substantive


Chapter 4

BLOG is a type of website usually maintained by an individual with regular entries of commentary,
descriptions of events, or other material such as graphics or video.

Libel

DEFAMATION
EXCEPTION

You might also like