Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.

Slides:



Advertisements
Similar presentations
Technology and Ethics Joel Price. Lenses The first lens is as a technology user. The second lens is as an educator. The third lens is as a writer.
Advertisements

Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Vladimir Misic: 10 Professionalism and Ethics Ownership and Protection.
An Introduction of Multimedia Etiquette Nicole Huang.
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
Legislation in ICT.
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
Spring 2010 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering Privacy Concerns (Chapters [B]) Spring.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The Legal Framework Can you work out which slide each bullet point should go on?!
Computer ethics.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Computer Ethics for Computer Users
Computer Ethics Christina McCorkle.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
COMPUTER ETHICS Do you know the difference between right and wrong?
Beth Sanderson University of Washington Libraries, Bothell © Lawrence Snyder 2004 Computer / Information / Internet Ethics.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Unit 3- Introduction to Computer Ethics
CC2018 Legal, Social, ethical and Professional Issues in Systems Development – Part 1.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
1 Chapter 11. Using Information Ethically Managing and Using Information Systems: A Strategic Approach by Keri Pearlson PowerPoint Slides prepared by Gene.
Ownership of Software Software represents the results of intellectual rather than purely physical efforts and is therefore inherently non- tangible. So.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
University of Sunderland MSc HIM Computer Legislation.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
ETHICS IN USING COMPUTER
Computing, Ethics and The Law
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Professional Ethics and Responsibilities Part-II
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computer Ethics IT Fundamentals Battlefield High School.
Computers Are Your Future
Computers Are Your Future Twelfth Edition
Legislation in ICT.
Unit 3- Introduction to Computer Ethics
Legislation in ICT.
Presentation transcript:

Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership – copyright – data protection – effect on employment (redundancies/reskilling) – etc. v These issues should be an integral part of systems development - not a “bolt-on” v Emphasis here should be on the fact that it is perilous to ignore ethical issues and that this should be an integral part of the development process not an add on as an afterthought. v Should be part of the organisations standards/policies.

Professional Codes of Conduct v BCS (British Computer Society) Code of Practice and Conduct v ACM (Association of Computing Machinery) Code of Ethics and Professional Conduct

Ethics ‘Ethics is the practice of making a principled choice between right and wrong.’ (Kallman and Grillo) ‘Ethics does not define and then impose a defined set of values.’ (Langford) ‘Ethical issues surrounding computers are new species of old and recurrent moral issues.’ (Johnson)

Computer Ethics Computer crime and the problem of computer security e.g. ATM fraud British banks & building societies sued by their customers who claimed unauthorised withdrawals had been made. Software theft & the problem of intellectual property rights e.g. software piracy

Computer Ethics Hacking & the creation of viruses A hacker - someone who accesses a computer system without the express or implied permission of the owner. A virus - self-replicating program that causes damage. Computer unreliability & the question of software quality e.g. 1992, British hospital, over 10 year period 1000 cancer patients had been given incorrect radiation therapy (dosage too low) - undetected program error. Data storage and the invasion of privacy e.g. DPA (1984,1998)

The Ten Commandments of Computer Ethics v Thou shalt not use a computer to harm other people. v Thou shalt not interfere with other people's computer work. v Thou shalt not snoop around in other people's files. v Thou shalt not use a computer to steal. v Thou shalt not use a computer to bear false witness. v Thou shalt not use or copy software for which you have not paid. v Thou shalt not use other people's computer resources without authorisation. v Thou shalt not appropriate other people's intellectual output. v Thou shalt think about the social consequences of the program you write. v Thou shalt use a computer in ways that show consideration and respect. From the Computer Ethics InstituteComputer Ethics Institute

Legislation v Data Protection Act (1984,1998) –Personal data (held on computer) is protected by the Act from 3 potential dangers: u against being incorrect, incomplete or irrelevant u against being distributed to unauthorised users u against being used for a purpose other than that for which it is collected –8 principles –Right of subjects to view v Computer Misuse Act (1990) –unauthorised access to computerised material u …..with intent to commit or facilitate further offences (eg blackmail re ) u unauthorised modification of computer material –Also includes conspiracy to commit the above

Other Legislation v Copyright, Designs & Patents Act 1988 v Copyright (Computer programs) Regulations 1992 –Attempt to implement the EC directive on the Legal Protection of Computer Programs 1991 –Copyright of programs (not computer generated) u author, but if program written by employee in course of employment copyright belongs to employer –If program written in software house by: u employee, copyright s’ware house u outside consultant, copyright consultant unless negotiated v For improper electronic claims & transfers u Forgery and Counterfeiting Act 1981 u Theft Act 1968

References v Johnson D G, Computer Ethics, 2nd edition, Prentice Hall, 1994 v Kallman E A and Grillo J P, Ethical Decision Making and IT, 2nd edition, McGraw-Hill, 1995 v Forester T and Morrison P, Computer Ethics, 2nd edition, MIT Press, 1994