0% found this document useful (0 votes)
179 views20 pages

Ethical Issues in Computing and Information Technology

This document discusses several major ethical issues in information technology and computing: 1. Personal privacy - Maintaining privacy and integrity of user data while allowing data sharing over networks. 2. Access rights - Unauthorized access to networks and data is a concern, especially with increased internet usage. 3. Harmful actions - Damage to IT systems through viruses or other attacks can result in lost data and resources. 4. Intellectual property - Laws around copyright, patents, trademarks are important to protect creations and inventions in the digital world. Piracy is also discussed.

Uploaded by

Jeysie Clarkson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
179 views20 pages

Ethical Issues in Computing and Information Technology

This document discusses several major ethical issues in information technology and computing: 1. Personal privacy - Maintaining privacy and integrity of user data while allowing data sharing over networks. 2. Access rights - Unauthorized access to networks and data is a concern, especially with increased internet usage. 3. Harmful actions - Damage to IT systems through viruses or other attacks can result in lost data and resources. 4. Intellectual property - Laws around copyright, patents, trademarks are important to protect creations and inventions in the digital world. Piracy is also discussed.

Uploaded by

Jeysie Clarkson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Ethical Issues in Computing

and Information Technology


Some of the major ethical issues faced by
Information Technology (IT) are:
1.Personal Privacy:
• It is an important aspect of ethical issues in information technology. IT
facilitates the users having their own hardware, operating system and
software tools to access the servers that are connected to each other
and to the users by a network. Due to the distribution of the network
on a large scale, data or information transfer in a big amount takes
place which leads to the hidden chances of disclosing information and
violating the privacy of any individuals or a group. It is a major
challenge for IT society and organizations to maintain the privacy and
integrity of data. Accidental disclosure to inappropriate individuals
and provisions to protect the accuracy of data also comes in the
privacy issue.
Privacy Issues
• Employers search social networking sites for background information
on applicants
• Monitoring systems are adopted by employers to check employee
performance
• Information technology has aided in the easy availability of personal
information
• Information in databases can be used for direct marketing and for credit checks
on potential borrowers or renters
Concepts of the Web and Network
Privacy
Acceptable use policy

• Set of rules specifying the legal and ethical use of a system


and the consequences of noncompliance

Accountability

• Issues involving both the user’s and the organization’s


responsibilities and liabilities

Nonrepudiation

• Method for binding all the parties to a contract


Guidelines to Minimize the Invasion of Privacy

• Conduct business only with websites having privacy policies


• Limit access to personal information to those with authorization
• Ensure data’s reliability and take precautions to prevent misuse of the
data
• Data collection must have a stated purpose
• Identify ways to prevent personal information gathered being
disclosed without consent
Guidelines to Minimize the Invasion of Privacy

• Organizations should use verification procedures to ensure data


accuracy
• Organizations must correct or delete incorrect data
• Prevent unauthorized access to data and misuse of data
• Users should review their records and correct any inaccuracies
• Transparency in record-keeping systems storing personal data
Privacy Issues Presented by E-mail

• Spam: Unsolicited e-mail sent for advertising purposes


• Sent in bulk using automated mailing software
• Ease of access
• Individuals should assume that others have access to their messages
• Any e-mails sent on company-owned computers are the property of the
organization
2. Access Right:

The second aspect of ethical issues in information


technology is access right. Access right becomes a high
priority issue for the IT and cyberspace with the great
advancement in technology. E-commerce and
Electronic payment systems evolution on the internet
heightened this issue for various corporate
organizations and government agencies. Network on
the internet cannot be made secure from unauthorized
access. Generally, the intrusion detection system are
used to determine whether the user is an intruder or
an appropriate user.
Data Collection on the Internet
• Number of people shopping online is increasing
• Some customers are reluctant to make online purchases
• Concerns about hackers getting access to their credit card numbers
• Many credit card companies reimburse fraudulent charges
• Other electronic payment systems are being developed
Data Collection on the Internet (cont’d.)
• Concerned about computers’ contents being searched while they’re
connected to the Internet
• Information users provide on the Web
• Combined with other information and technologies to produce new
information
• Log files
• Generated by Web server software
• Record a user’s actions on a Web site
• Data collected on the Internet must be used and interpreted with
caution
3. Harmful Actions:
Harmful actions in the computer ethics refers to the damage or
negative consequences to the IT such as loss of important
information, loss of property, loss of ownership, destruction of
property and undesirable substantial impacts. This principle of
ethical conduct restricts any outsiders from the use of information
technology in manner which leads to any loss to any of the users,
employees, employers and the general public. Typically, these
actions comprises of the intentional destruction or alteration of files
and program which drives a serious loss of resources. To recover
from the harmful actions extra time and efforts are required to
remove the viruses from the computer systems.

4. Intellectual Property
• Intellectual property
• Protections that involve copyrights, trademarks, trade secrets, and
patents for “creations of the mind” developed by people or
businesses
• Industrial property
• Inventions, trademarks, logos, industrial designs
• Copyrighted material
• Literary and artistic works
• May apply to online materials
• Exceptions under Fair Use Doctrine
Intellectual Property (cont’d.)
• Trademark
• Protects product names and identifying marks
• Patent
• Protects new processes
• Advantages of patents
• Software piracy
• Laws
• Telecommunications Act of 1996
• Communications Decency Act (CDA)
• Laws against spamming
Intellectual Property (cont’d.)
• Internet use policy
• Guard against legal issues and avoid the risks
• Cybersquatting
• Registering, selling, or using a domain name to
profit from someone else’s trademark
Patents:

It is more difficult to deal with these types of


ethical issues. A patent can preserve the unique
and secret aspect of an idea. Obtaining a patent is
very difficult as compared with obtaining a
copyright. A thorough disclosure is required with
the software. The patent holder has to reveal the
full details of a program to a proficient
programmer for building a program.
• Copyright:

The information security specialists are to be familiar


with necessary concept of the copyright law. Copyright
law works as a very powerful legal tool in protecting
computer software, both before a security breach and
surely after a security breach. This type of breach could
be the mishandling and misuse of data, computer
programs, documentation and similar material. In many
countries, copyright legislation is amended or revised
to provide explicit laws to protect computer programs.
• Trade Secrets:
Trade secrets is also a significant ethical issue in
information technology. A trade secret secures
something of value and usefulness. This law protects
the private aspects of ideas which is known only to the
discover or his confidants. Once disclosed, trade secret
is lost as such and is only protected by the law for trade
secrets. The application of trade secret law is very
broad in the computer range, where even a slight head
start in the advancement of software or hardware can
provide a significant competitive influence.

Liability:

One should be aware of the liability issue in making ethical decisions.


Software developer makes promises and assertions to the user about
the nature and quality of the product that can be restricted as an
express warranty. Programmers or retailers possess the legitimate to
determine the express warranties. Thus they have to be practical when
they define any claims and predictions about the capacities, quality and
nature of their software or hardware. Every word they say about their
product may be as legally valid as stated in written. All agreements
should be in writing to protect against liability. A disclaimer of express
warranties can free a supplier from being held responsible of informal,
speculative statements or forecasting made during the agreement
stages.
• Piracy:

Piracy is an activity in which the creation of illegal copy


of the software is made. It is entirely up to the owner
of the software as to whether or not users can make
backup copies of their software. As laws made for
copyright protection are evolving, also legislation that
would stop unauthorized duplication of software is in
consideration. The software industry is prepared to do
encounter against software piracy. The courts are
dealing with an increasing number of actions
concerning the protection of software.
References
• https://www.utc.edu/engineering-and-computer-
science/caecd/course-listing/cpsc-3610
• https://www.geeksforgeeks.org/ethical-issues-in-information-
technology-it/
Ethical Issues of Information Technologies
• https://www.csub.edu › ~ychoi2 › 300Lecture

You might also like