27
1 Social and Ethical Consideration of IT Use Abdisalam Issa-Salwe Thames Valley University

Lecture7(ethics&it use)

Embed Size (px)

DESCRIPTION

Ethics and IT use Social, political issues raised by information systems Data protection Moral dimensions of information society

Citation preview

Page 1: Lecture7(ethics&it use)

1

Social and Ethical

Consideration

of IT Use

Abdisalam Issa-Salwe

Thames Valley University

Page 2: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

2

Topic list

Ethics and IT use

Social, political issues raised by information systems

Data protection

Moral dimensions of information society

Page 3: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

3

IT Dilemma

Computing technology is the most powerful and flexible technology ever devised.

It is changing everything - where and how we work, learn, shop, eat, vote, receive medical care, spend free time, make war and friends.

Page 4: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

4

IT Dilemma (cont…)

The information revolution has become a tidal wave that threatens to engulf and change all that humans value.

Governments, organisations and individual citizens therefore would make a grave mistake if they view the computer revolution as "merely technological".

It is fundamentally social and ethical.

Page 5: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

5

IT Dilemma (cont…) IT revolution widens to satisfy human

thirst for knowledge and the desire to be the dominant species on the globe and in the universe.

The newly-found powers of computing come at a price - dependence.

Information is now the life blood of society and its organisations, and our dependence grows daily with the advance of the global information net and multimedia

Page 6: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

6

IT dilemma (cont…)

Utilising new technology, needs implementing better security.

Digital technology as a double-edge sword that has many benefits but also presents ethical dilemmas.

Information can be gathered, manipulated and disseminated more quickly now than ever in our history.

Page 7: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

7

Data protection principles

Personal data is information about a living individual, including expression of opinion about him or her.

Data about organisation is not personal data

Data users are organisation or individuals who control personal data and the use of personal data

A data subject is an individual who is the subject of personal data

Page 8: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

8

Ethics

Principles of right and wrong

Can be used by individuals acting as free moral agents to make choices to guide their behaviour

Understanding the moral risks of new technology

Establishing corporate ethics policies that include information systems issues

Page 9: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

9

Ethics (cont…)

The dynamics connecting ethical, social, and political issues

Identifies the moral dimensions of the “information society”, across individual, social, and political levels of action

Information: the new life-blood of society, empowers

those who have it;

but it also disenfranchises those who do not

Page 10: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

10

Moral Dimensions

Information rights and obligations

Property rights

Accountability and control

System quality

Quality of life

Page 11: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

11

ETHICAL, SOCIAL & POLITICAL ISSUES

INDIVIDUAL

SOCIETY

POLITY

ETHICAL ISSUES

SOCIAL ISSUES

POLITICAL ISSUES

QUALITY OF LIFE

INFORMATION

RIGHTS &

OBLIGATIONS

PROPERTY

RIGHTS &

OBLIGATIONS

ACCOUNTABILITY

& CONTROL

SYSTEM

QUALITY

INFORMATION

&

TECHNOLOGY

Page 12: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

12

Basic concepts

Responsibility: accepting costs, duties, obligations for decisions

Accountability: assessing responsibilities for decisions & actions

Liability: must pay for legal damages

Due process: insures laws are applied properly

Page 13: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

13

Edward F. Gehringer

Page 14: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

14

Privacy and data protection

Privacy:

The right of the individual to control the use of information about him or her, including information on financial status, health and lifestyle (I.e. prevent unauthorised disclosure).

Page 15: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

15

Information rights

The right of the individual to control the use of information about him or her, including information on financial status, health and lifestyle (i.e. prevent unauthorised disclosure).

Fair information practices: Set of principles governing the collection and use of information on the basis of U.S. and European privacy laws

Page 16: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

16

Privacy protection tools

Page 17: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

17

Property rights

Intellectual property: Intangible creations protected by law

Trade secret: Intellectual work or product belonging to business, not in public domain

Copyright: Statutory grant protecting intellectual property from getting copied for 28 years

Patents: Legal document granting the owner an exclusive monopoly on the ideas behind an invention for 20 years

Page 18: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

18

Property rights (cont…)

Ethical issues: Production of intellectual property

Social issues: Current intellectual property laws breaking down

Political issues: Creation of new property protection measures

Page 19: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

19

Property rights (cont…)

Computer crime: Commission of illegal acts through the use of a computer or against a computer system

Computer abuse: Commission of acts involving a computer that may not be illegal but are considered unethical

Page 20: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

20

Data Protection Act 1998

The Data Protection Act 1998 regulates how and when information relating to individuals may be obtained, used and disclosed.

Makes new provision for the regulation of the processing of information relating to individuals, including the obtaining, holding, use or disclosure of such information.

Page 21: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

21

Data Protection Act 1998 (cont…)

In this Act, unless the context otherwise requires - "data" means information which

(a) is being processed by means of equipment operating automatically in response to instructions given for that purpose,

(b) is recorded with the intention that it should be processed by means of such equipment,

(c) is recorded as part of a relevant filing system or with the intention that it should form part of a relevant filing system, or

(d) does not fall within paragraph (a), (b) or (c) but forms part of an accessible record as defined by section 68

Page 22: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

22

Data Protection Act 1998 (cont…)

The Act also allows individuals access to personal data relating to them, to challenge misuse of it and to seek redress.

Enforcement of the Act is through the Information Commissioner

Page 23: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

23

Data Protection Act 1998 (cont…)

The Act places a duty on any person or organisation that holds personal information about living individuals on computer or in certain manual data systems (or has such information processed on computer by others)

Comply with the eight data protection principles and to notify the Commissioner about the processing carried out.

Page 24: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

24

Data Protection Act 1998 (cont…)

The Act principles require personal data to be: fairly and lawfully obtained; held only for specific and lawful purposes and not

processed in any manner incompatible with those purposes;

adequate, relevant and not excessive for those purposes;

accurate and where necessary kept up-to-date, not kept for longer than necessary;

processed in accordance with the rights of the person to whom the data refers;

kept securely to ensure data is not lost, disposed of or misused;

not transferred out of the European Economic Area unless the destination has an adequate level of data protection.

Page 25: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

25

Data Protection Act 1998 (cont…) Data controller means, subject to subsection (4), a

person who (either alone or jointly or in common with other persons) determines the purposes for which and the manner in which any personal data are, or are to be, processed;

Data processor, in relation to personal data, means any person (other than an employee of the data controller) who processes the data on behalf of the data controller;

Data subject means an individual who is the subject of personal data;

Personal data means data which relate to a living individual who can be identified –

(a) from those data, or

(b) from those data and other information which is in the possession of, or is likely to come into the possession of, the data controller

Page 26: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

26

Data Protection Act 1998 (cont…)

Sensitive personal data: "sensitive personal data" means personal data consisting of information as to (a) the racial or ethnic origin of the data subject,

(b) his political opinions,

(c) his religious beliefs or other beliefs of a similar nature,

(d) whether he is a member of a trade union

(e) his physical or mental health or condition,

(f) his sexual life,

(g) the commission or alleged commission by him of any offence, or

(h) any proceedings for any offence committed or alleged to have been committed by him, the disposal of such

proceedings or the sentence of any court in such proceedings.

Page 27: Lecture7(ethics&it use)

Abdisalam Issa-Salwe, Thames Valley University

27

Task

Find out from the Internet how organisations are

committed to protecting privacy information.

Discuss