Monday, September 16, 2019
Ethical Principles
1. Contribute to society and human well-being.This principle concerning the quality of life of all people affirms an obligation to protect fundamental human rights and to respect the diversity of all cultures. An essential aim of computing professionals is to minimize negative consequences of computing systems, including threats to health and safety. When designing or implementing systems, computing professionals must attempt to ensure that the products of their efforts will be used in socially responsible ways, will meet social needs, and will avoid harmful effects to health and welfare. 2. Avoid harm to others.ââ¬Å"Harmâ⬠means injury or negative consequences, such as undesirable loss of information, loss of property, property damage, or unwanted environmental impacts. This principle prohibits use of computing technology in ways that result in harm to any of the following: users, the general public, employees, and employers. Harmful actions include intentional destruction or modification of files and programs leading to serious loss of resources or unnecessary expenditure of human resources such as the time and effort required to purge systems of ââ¬Å"computer viruses.â⬠3. Be honest and trustworthy.Honesty is an essential component of trust. Without trust an organization cannot function effectively. The honest computing professional will not make deliberately false or deceptive claims about a system or system design, but will instead provide full disclosure of all pertinent system limitations and problems.A computer professional has a duty to be honest about his or her own qualifications, and about any circumstances that might lead to conflicts of interest. 4. Be fair and take action not to discriminate.The values of equality, tolerance, respect for others, and the principles of equal justice govern this imperative.Inequities between different groups of people may result from the use or misuse of information and technology. In a fair society, a ll individuals would have equal opportunity to participate in, or benefit from, the use of computer resources regardless of race, sex, religion, age, disability, national origin or other such similar factors. However, these ideals do not justify unauthorized use of computer resources nor do they provide an adequate basis for violation of any other ethical imperatives of this code.5. Honor property rights including copyrights and patent.Violation of copyrights, patents, trade secrets and the terms of license agreements is prohibited by law in most circumstances. Even when software is not so protected, such violations are contrary to professional behavior. Copies of software should be made only with proper authorization. Unauthorized duplication of materials must not be condoned. 6. Give proper credit for intellectual property.Computing professionals are obligated to protect the integrity of intellectual property. Specifically, one must not take credit for other's ideas or work, even in cases where the work has not been explicitly protected by copyright, patent, etc. 7 Respect the privacy of others.Computing and communication technology enables the collection and exchange of personal information on a scale unprecedented in the history of civilization. Thus there is increased potential for violating the privacy of individuals and groups. It is the responsibility of professionals to maintain the privacy and integrity of data describing individuals. This includes taking precautions to ensure the accuracy of data, as well as protecting it from unauthorized access or accidental disclosure to inappropriate individuals. Furthermore, procedures must be established to allow individuals to review their records and correct inaccuracies. 8. Honor confidentiality.The principle of honesty extends to issues of confidentiality of information whenever one has made an explicit promise to honor confidentiality or,à implicitly, when private information not directly related to the performance of one's duties becomes available. The ethical concern is to respect all obligations of confidentiality to employers, clients, and users unless discharged from such obligations by requirements of the law or other principles of this Code.The Ten Commandments of Computer EthicsWritten by the Computer Ethics Institute1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always us e a computer in ways that ensure consideration and respect for your fellow humans.Information Ethics1. Personal Privacy IT enables data exchange of information on a large scale from anybody, on any locations or parts of the world, at any times. In this situation, there is increased potential for disclosing information and violating the privacy of any individuals and groups of people due to its widespread disseminations worldwide. It is our challenge and responsibility to maintain the privacy and integrity of data regarding individuals. This also includes taking precautions to ensure the accuracy of data, as well as protecting it from unauthorized access or accidental disclosure to inappropriate individuals. 2. Ethical IssuesEthical issues in computing systems is access right. Due to the current popularity of international commerce on the Internet, the topic of computer security and access right has moved quickly from being a low priority for corporations and government agencies to a high priority. This interest has been heightened by computer break-ins at places like Los Alamos National Laboratories and NASA in the US. Many attempts of such illegal access to United States government and military computers by computer hackers have been widely reported. Without implementation of proper computer security policies and strategies, network connections on the Internet canââ¬â¢t be made secure from illegal accesses3. Harmful ActionsIn computer ethics, harmful action means injury or negative consequences, such as undesirable loss of information, loss of property, property damage, or unwanted environmental impacts. This principle prohibits use of computing technology in ways that result in harm to any of users, the general public, employees, and employers. Harmful actions include intentional destruction or modification of files and programs leading to serious loss of resources or unnecessary expenditure of human resources such as the time and effort required to purge systems from ââ¬Å"computer viruses.â⬠In the following tables, a survey of various activities on Internet indicates that illegal information nowadays is often reported. The data shows that the percentage of response from Japanese companies and organizations is quite significant (Kubo, 1999).Code of Ethics for the Filipino I.T. ProfessionalsPreamble:I will use my social knowledge and skills for the benefit of employers and clients with integrity, subject to an overriding responsibility for the public interest, and I will strive to enhance the competence and prestige of the professional. By these, I mean:1. I will promote public knowledge technology; 2. I will consider the general welfare and public good in the performance of my work; 3. I will advertise good or professional in a clear and truthful manner; 4. I will comply and strictly abide by the in related laws inà respect of information technology; 5. I will accept full responsibility for the work undertaken and will uti lize my skills with competence and professionalism; 6. I will make truthful statements on and qualities of my products and service; 7. I will not disclose or use any confidential information obtained in the course of professional duties without the consent of the parties concerned, except when required by law; 8. I will try to attain the highest in both the products and services I offer; 9. I will not knowingly participate in the development of Information Technology System that will promote the Commission of fraud and other unlawful acts; 10. I will uphold and improve the IT professional standard through continuing professional development in order to enhance IT profession.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.