busines ethic1

  • View
    216

  • Download
    0

Embed Size (px)

Text of busines ethic1

  • 8/7/2019 busines ethic1

    1/18

    By

    Jyotsna

    SharvaPallavi

    Neha

    Shweta

  • 8/7/2019 busines ethic1

    2/18

    In the industrialized world computers are changing

    everything:

    ` from education to health,

    `

    from voting to making friends or making war.

    We are living a technological and informational

    revolution. It is therefore important for policy makers,

    leaders, teachers, computer professionals and all social

    thinkers to get involved in the social and ethical impacts

    of this communication technology

  • 8/7/2019 busines ethic1

    3/18

    Cyberethics - is the field of applied ethics that examines

    moral, legal, and social issues in the development and

    use of cybertechnology.

    Computer ethics - the application of classical ethical

    principles to the use of computer technology

  • 8/7/2019 busines ethic1

    4/18

    Privacy

    ` Computers create a false sense of security

    ` People do not realize how vulnerable information store

    on computers are

    Property

    ` Physical property` Intellectual property (in both copyright and patent)

    ` Data as property

  • 8/7/2019 busines ethic1

    5/18

    Access

    ` Access to computing technology

    ` Access to data

    Accuracy

    ` Accuracy of information stored

    ` Hacking, cracking and virus creation Software piracy

  • 8/7/2019 busines ethic1

    6/18

    Computer Crime` ITInfrastructure Illegal access

    ` Illegal Interuption

    ` Data Interfare System Interfrence

    ` Misuse Of Devices

    ` Electronic Fraud

    Software Piracy: a common violation occurs when employees copy

    software from their work computers for use at home

    ` Reselling Media

    ` Downloading from a website` Taping songs

    ` Buying a used book or CD

  • 8/7/2019 busines ethic1

    7/18

    Types of PIRACY

    End-User Piracy :

    ` This occurs when a company employee reproducescopies of software without authorization

    ` Copying disk for installation and distribution` Swapping disks in or outside the workplace

    Client-Server Piracy :

    ` This type of piracy occurs when too many employees ona network are using a central copy of a program at thesame time. System Overuse

  • 8/7/2019 busines ethic1

    8/18

    Internet Piracy :

    ` This occurs when software is downloaded from the

    Internet The same purchasing rules should apply to

    online software purchase as for those bought in

    traditional ways. Pirate website Unauthorized transfer of

    copyrighted program

    Software Counterfeiting :

    ` This type of piracy is the illegal duplication and sale of

    copyrighted material with the intent of directly imitatingthe copyrighted product.

  • 8/7/2019 busines ethic1

    9/18

    Inappropriate Use of Computing Resources

    some employees use their work computers to surfpopular Web sites that have nothing to do with their jobs

    Inappropriate Sharing of Information

    Private data describes individual employees

    Confidential information describes a company and its

    operations

    Sharing this information with unauthorized party, eveninadvertently

  • 8/7/2019 busines ethic1

    10/18

    Defining and limiting the apropriate use of it resources

    ` to enance their job performance

    ` prohibiting employes for visiting objectionable web sites

    Estabilishing guidleines for use of company software

    ` goal should be that employees have legal copies of all software

    Structuring information system to protect data and information

    Installing and maintaining a corporate firewell

    Firewell is a software or hardware device that serve as barrier

    between comapnay and outside world

  • 8/7/2019 busines ethic1

    11/18

    Code of ethics is an instrument that establishes a common ethical

    framework for a large group of people

    RFC 1087

    In January 1989, the Internet Architecture Board in RFC

    1087 defines an activity as unethical and unacceptable if it:` Seeks to gain unauthorized access to the resources of the Internet.

    ` Disrupts the intended use of the Internet.

    ` Wastes resources (people, capacity, computer) through such

    actions.

    ` Destroys the integrity of computer-based information, or` Compromises the privacy of users

  • 8/7/2019 busines ethic1

    12/18

    ` Thou shalt not use a computer to harm other people

    ` Thou shalt not interfere with other people's computer

    work

    ` Thou shalt not snoop around in other people's computer

    files

    ` Thou shalt not use a computer to steal

    ` Thou shalt not use a computer to bear false witness

  • 8/7/2019 busines ethic1

    13/18

    ` Thou shalt not copy or use proprietary software for which you

    have not paid

    ` Thou shalt not use other people's computer resources without

    authorization or proper compensation

    ` Thou shalt not appropriate other people's intellectual output

    ` Thou shalt think about the social consequences of the

    program you are writing or the system you are designing

    ` Thou shalt always use a computer in ways that ensure

    consideration and respect for your fellow humans

  • 8/7/2019 busines ethic1

    14/18

    The Code of Fair Information Practices

    The Code of FairInformation Practices is based on fiveprinciples outlining the requirements for records keeping

    systems. This requirement was implemented in 1973 by

    the U.S. Department of Health, Education and Welfare.

    ` There must be no personal data record-keeping systems

    whose very existence is secret.

    ` There must be a way for a person to find out what

    information about the person is in a record and how it is

    used.

  • 8/7/2019 busines ethic1

    15/18

    ` There must be a way for a person to prevent information about the

    person that was obtained for one purpose from being used or made

    available for other purposes without the person's consent.

    ` There must be a way for a person to correct or amend a record of

    identifiable information about the person.

    ` Any organization creating, maintaining, using, or disseminating

    records of identifiable personal data must assure the reliability of the

    data for their intended use and must take precautions to prevent

    misuses of the data.

  • 8/7/2019 busines ethic1

    16/18

    (ISC)2 Code of Ethics

    (ISC)2an organization committed to certification of computer security

    professional has further defined its own Code of Ethics generally as:

    ` Act honestly, justly, responsibly, and legally, and protecting the

    commonwealth.

    ` Work diligently and provide competent services and advance the

    security profession.

    ` Encourage the growth of research teach, mentor, and value the

    certification.

  • 8/7/2019 busines ethic1

    17/18

    ` Discourage unsafe practices, and preserve and strengthen the

    integrity of public infrastructures.

    ` Observe and abide by all contracts, expressed or implied, and give

    prudent advice.

    ` Avoid any conflict of interest, respect the trust that others put in you,

    and take on only those jobs you are qualified to perform

    ` Stay current on skills, and do not become involved with activities

    that could injure the reputation of other security professionals

  • 8/7/2019 busines ethic1

    18/18

    THANK YOU