8/7/2019 busines ethic1
1/18
By
Jyotsna
SharvaPallavi
Neha
Shweta
8/7/2019 busines ethic1
2/18
In the industrialized world computers are changing
everything:
` from education to health,
`
from voting to making friends or making war.
We are living a technological and informational
revolution. It is therefore important for policy makers,
leaders, teachers, computer professionals and all social
thinkers to get involved in the social and ethical impacts
of this communication technology
8/7/2019 busines ethic1
3/18
Cyberethics - is the field of applied ethics that examines
moral, legal, and social issues in the development and
use of cybertechnology.
Computer ethics - the application of classical ethical
principles to the use of computer technology
8/7/2019 busines ethic1
4/18
Privacy
` Computers create a false sense of security
` People do not realize how vulnerable information store
on computers are
Property
` Physical property` Intellectual property (in both copyright and patent)
` Data as property
8/7/2019 busines ethic1
5/18
Access
` Access to computing technology
` Access to data
Accuracy
` Accuracy of information stored
` Hacking, cracking and virus creation Software piracy
8/7/2019 busines ethic1
6/18
Computer Crime` ITInfrastructure Illegal access
` Illegal Interuption
` Data Interfare System Interfrence
` Misuse Of Devices
` Electronic Fraud
Software Piracy: a common violation occurs when employees copy
software from their work computers for use at home
` Reselling Media
` Downloading from a website` Taping songs
` Buying a used book or CD
8/7/2019 busines ethic1
7/18
Types of PIRACY
End-User Piracy :
` This occurs when a company employee reproducescopies of software without authorization
` Copying disk for installation and distribution` Swapping disks in or outside the workplace
Client-Server Piracy :
` This type of piracy occurs when too many employees ona network are using a central copy of a program at thesame time. System Overuse
8/7/2019 busines ethic1
8/18
Internet Piracy :
` This occurs when software is downloaded from the
Internet The same purchasing rules should apply to
online software purchase as for those bought in
traditional ways. Pirate website Unauthorized transfer of
copyrighted program
Software Counterfeiting :
` This type of piracy is the illegal duplication and sale of
copyrighted material with the intent of directly imitatingthe copyrighted product.
8/7/2019 busines ethic1
9/18
Inappropriate Use of Computing Resources
some employees use their work computers to surfpopular Web sites that have nothing to do with their jobs
Inappropriate Sharing of Information
Private data describes individual employees
Confidential information describes a company and its
operations
Sharing this information with unauthorized party, eveninadvertently
8/7/2019 busines ethic1
10/18
Defining and limiting the apropriate use of it resources
` to enance their job performance
` prohibiting employes for visiting objectionable web sites
Estabilishing guidleines for use of company software
` goal should be that employees have legal copies of all software
Structuring information system to protect data and information
Installing and maintaining a corporate firewell
Firewell is a software or hardware device that serve as barrier
between comapnay and outside world
8/7/2019 busines ethic1
11/18
Code of ethics is an instrument that establishes a common ethical
framework for a large group of people
RFC 1087
In January 1989, the Internet Architecture Board in RFC
1087 defines an activity as unethical and unacceptable if it:` Seeks to gain unauthorized access to the resources of the Internet.
` Disrupts the intended use of the Internet.
` Wastes resources (people, capacity, computer) through such
actions.
` Destroys the integrity of computer-based information, or` Compromises the privacy of users
8/7/2019 busines ethic1
12/18
` Thou shalt not use a computer to harm other people
` Thou shalt not interfere with other people's computer
work
` Thou shalt not snoop around in other people's computer
files
` Thou shalt not use a computer to steal
` Thou shalt not use a computer to bear false witness
8/7/2019 busines ethic1
13/18
` Thou shalt not copy or use proprietary software for which you
have not paid
` Thou shalt not use other people's computer resources without
authorization or proper compensation
` Thou shalt not appropriate other people's intellectual output
` Thou shalt think about the social consequences of the
program you are writing or the system you are designing
` Thou shalt always use a computer in ways that ensure
consideration and respect for your fellow humans
8/7/2019 busines ethic1
14/18
The Code of Fair Information Practices
The Code of FairInformation Practices is based on fiveprinciples outlining the requirements for records keeping
systems. This requirement was implemented in 1973 by
the U.S. Department of Health, Education and Welfare.
` There must be no personal data record-keeping systems
whose very existence is secret.
` There must be a way for a person to find out what
information about the person is in a record and how it is
used.
8/7/2019 busines ethic1
15/18
` There must be a way for a person to prevent information about the
person that was obtained for one purpose from being used or made
available for other purposes without the person's consent.
` There must be a way for a person to correct or amend a record of
identifiable information about the person.
` Any organization creating, maintaining, using, or disseminating
records of identifiable personal data must assure the reliability of the
data for their intended use and must take precautions to prevent
misuses of the data.
8/7/2019 busines ethic1
16/18
(ISC)2 Code of Ethics
(ISC)2an organization committed to certification of computer security
professional has further defined its own Code of Ethics generally as:
` Act honestly, justly, responsibly, and legally, and protecting the
commonwealth.
` Work diligently and provide competent services and advance the
security profession.
` Encourage the growth of research teach, mentor, and value the
certification.
8/7/2019 busines ethic1
17/18
` Discourage unsafe practices, and preserve and strengthen the
integrity of public infrastructures.
` Observe and abide by all contracts, expressed or implied, and give
prudent advice.
` Avoid any conflict of interest, respect the trust that others put in you,
and take on only those jobs you are qualified to perform
` Stay current on skills, and do not become involved with activities
that could injure the reputation of other security professionals
8/7/2019 busines ethic1
18/18
THANK YOU