0% found this document useful (0 votes)
81 views7 pages

Chapter 2 IT Fundamentals

The document discusses the profession of information and communication technology (ICT). It outlines various ICT career opportunities and roles including database analyst, privacy coordinator, and digital strategist. It also discusses the importance of ethics in the ICT field and provides examples of codes of ethics from different ICT professional organizations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views7 pages

Chapter 2 IT Fundamentals

The document discusses the profession of information and communication technology (ICT). It outlines various ICT career opportunities and roles including database analyst, privacy coordinator, and digital strategist. It also discusses the importance of ethics in the ICT field and provides examples of codes of ethics from different ICT professional organizations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Introduction to the Profession

Career opportunities in ICT

ICT professionals use Information Technology to build connections toward success.

The Information Communication Technology (ICT) program strives to educate students to assume
leadership roles where the application of information technology is concerned with the ultimate goal of
connecting people, organizations, and communities to enhance their ability to succeed. The broad
cluster of occupations that fall within the ICT arena includes:

Career opportunities in ICT

Database Analyst

Privacy Coordinator

Computer & Information Systems Manager

Web Marketing Manager

Information Security Analyst

Digital Strategist

Staff Technologist

Computer Support Specialist

Mobilization Specialist

Government Technologist

Information Assurance Analyst

Careers in information and communication technology fields include a variety of roles and tasks
associated with planning, researching, installing and monitoring the performance of IT systems. IT
professionals should have technical expertise in computer systems, hardware and networks. They need
exceptional problem solving and analytical abilities to diagnose and repair defects or malfunctions.
Individuals in the IT field should have natural interest and capabilities with programs and information
computer systems. They should be able to grasp large amounts of information and be able to quickly
learn and adapt to new technologies and advances in the field. Individuals wanting to get into the field
should complete an IT course, like a bachelor degree in IT studies, and gain hands-on experience.

These are few reasons to choose ICT field

Good job opportunities

Demand across the world

Higher economic benefits

Different career development paths


Traveling opportunities to other countries

If you are really good at what you do, you'll have the demand across the globe.

There are many paths you can consider

Software Engineering Network Engineering

System security Project Management

Quality assurance and Testing System administration

Wed site development Database administration

Technical support Client management

IT consultancy

Code of Ethics for ICT Professionals

Professional Ethics

• Encompass the personal and corporate standards of behavior expected of professionals

• Set of standards adopted by a professional community that are regulated by standards called “codes
of ethics”.

• The code of ethics is very important because it gives us boundaries that we have to stay within in our
professional careers.

• The one problem with the code of ethics is that we cant always have the answers black and white.
Sometimes there are grey areas where the answers arent so simple.

Information Scientists CoE

(American Society for Info Science)

• Responsibility to Individual Persons

1. strive to make information available to individuals who need it

2. strive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing
information about individuals

3. protect each information users and providers right to privacy and confidentiality 4. respect an
information providers proprietary rights

• Responsibility to Society
1. serve the legitimate information needs of a large and complex society while at the same time
being mindful of individuals rights

2. 2. resist efforts to censor publications

3. 3. play active roles in educating society to understand and appreciate the importance of
information promoting equal opportunity for access to information

Filipino IT Professionals CoE

(Philippine Computing Society)

• Preamble: I will use my special knowledge and skills for the benefit of the public.

I will serve employers and clients with integrity, subject to an overriding responsibility to the public
interest, and I will strive to enhance the competence and prestige of the professional. By these, I
mean:

1. I will promote public knowledge, understanding and appreciation of information technology;

2. I will consider the general welfare and public good in the performance of my work;

3. I will advertise goods or professional services in a clear and truthful manner; I will comply and
strictly abide by the intellectual property laws, patent laws and other related laws in respect of
information technology;

4. I will accept full responsibility for the work undertaken and will utilize my skills with competence
and professionalism;

5. I will make truthful statements on my areas of competence as well as the capabilities and qualities
of my products and services;

6. I will not disclose or use any confidential information obtained in the course of professional duties
without the consent of the parties concerned, except when required by law;

7. I will try to attain the highest quality in both the products and services I offer;

8. I will not knowingly participate in the development of Information Technology Systems that will
promote the commission of fraud and other unlawful acts;

9. I will uphold and improve the IT professional standards through continuing professional
development in order to enhance the IT profession.

Programmers CoE (Int’l Programmers Guild)

1. A programmer must......never create or distribute malware.

2. 2. ...never write code that is obfuscated or intentionally difficult to follow.

3. 3. ...never write documentation that is intentionally confusing or inaccurate.

4. 4. ...never reuse copyrighted code unless the proper license is purchased or permission is
obtained.
5. 5. ...acknowledge (verbally and in source code comments) the work of other programmers on
which the code is based, even if substantial changes are made.

6. 6. ...never write code that is deliberately inefficient with the intent of later claiming credit for
making efficiency improvements.

7. 7. ...never intentionally introduce bugs with the intent of later claiming credit for fixing the bugs,
or to stimulate the uptake of later versions.

8. 8. ...never write code that intentionally breaks another programmers code for the purpose of
elevating ones status.

9. 9. ...never hide known obstacles to a projects completion during any phase of development,
especially the design phase. ...never dishonestly downplay the difficulty of completing a project.

10. 10....report any illegal activities of the employer.

11. 11....never defame the profession.

12. 12....never falsely deny the presence of bugs.

13. 13....never reveal the secret corporate knowledge of an employer.

14. 14....never accept compensation from multiple parties for the same work unless permission is
given.

15. 15....never perform competitive work without the employers knowledge.

16. 16....never conceal pertinent information from other members of the development team.

17. 17....never conceal from the employer their financial interest in development resources.

18. 18....never conceal any conflict of interest that may affect the project.

19. 19....never seek external profit from a project that was funded by a second party without
permission. If permission is given to resell a product, the work should be discounted.

20. 20. . ..never maliciously injure the reputation of an employer or members of the development
team.

21. 21. ...never misrepresent their knowledge, experience, or abilities.

22. 22. ...never take credit for anothers work.

23. 23. ...never steal software, especially development tools.

24. 24. ...never conceal the deficiencies of other programmers by writing code for them and
allowing them to pass it off as their own work.

25. 25. ...stay current on the advancement of the field of Computer Science.

Philippines’ Cybercrime Prevention Act


PHILIPPINES’ CYBERCRIME PREVENTION ACT OF 2012

The cybercrime prevention act of 2012, officially recorded as republic act no. 10175, is a law in
the philippines approved on september 12, 2012. It aims to address legal issues concerning online
interactions and the internet in the philippines. Among the cybercrime offenses included in the bill
are cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel.

Year 2003

Another Cybercrime bill was filed in 2003 that is seen as a complement to the E-Commerce Law
andIntellectual Property Code.A growing number of companies are coming out as well announcing
cases they have filed againstlocal scammers and hackers taking advantage of Filipino e-commerce
sites. TSSI in 2003, with thecooperation of authorities, entrapped 3 suspected money remittance
service fraudster who usesstolen credit cards to load money in the service.With the growing number
of crimes, organizations such as the Philippine Computer EmergencyResponse Team (PH-CERT) took
on the advocacy of pushing for the passage of a Cybercrimelegislation.

Year 2004

The growth of home-based workers and BPO industries further strengthen the need for a Cyber
crime Law as it is seen a factor in contributing to the future growth of this sector. This is important
as investors have a lot of choices in the region and having an efficient cyber crime legislation is seen
as critical. Although most legislations around the world are local in application by nature.

Year 2005

First cybercrime conviction happened with JJ Maria Giner convicted under the E-Commerce Law for
hacking the government’s .gov.ph site. (Criminal Case No. 419672-CR filed at Branch 14 of the
Metropolitan Trial Court of Manila under Judge Rosalyn Mislos-Loja) On its 10th revision, the
Cybercrime Prevention Bill was revised and covered cellphone transactions and anti-spam measures.
The International Intellectual Property Alliance saw the Cybercrime bill as an important measure in
fighting copyright piracy on the Internet. Data Privacy legislation need became evident this year for
outsourcing competitiveness.

Why should there be a cybercrime law?

All over the Philippines, there are millions of people using the internet every day. The internet
hasbecome such an integral part of all the people’s lives that almost everyone in the country is a
partof the netizen community.

The crimes committed over the internet have been so frequent and numerous recently that
thegovernment saw it fit to take action to be able to protect the people online. In finding a
solutionas to how to decrease cybercrime in the Philippines, the government came up with
the CybercrimeBill. It is because of all the types of crime being done over the internet that the
government decidedto create a bill such as that. Crimes like plagiarism, child pornography, identity
theft, and manymore have been rampant over the net that the government saw the need to draft
the CybercrimeBill to help lessen all these crimes.
The Cybercrime Prevention Act of 2012 is the first law in the Philippines which
specificallycriminalizes computer crime, which prior to the passage of the law had no strong legal
precedentin Philippine jurisprudence. While laws such as the Electronic Commerce Act of 2000
(Republic ActNo. 8792 regulated certain computer-related activities, these laws did not provide a
legal basis forcriminalizing crimes committed on a computer in general: for example, Onel de
Guzman, thecomputer programmer charged with purportedly writing the ILOVEYOU computer
worm, wasultimately not prosecuted by Philippine authorities due to a lack of legal basis for him to
be chargedunder existing Philippine laws at the time of his arrest

Punishable acts

Offenses punishable under Cybercrime Prevention Act are:

• Offenses against the confidentiality, integrity and availability of computer data and systems

• Illegal access to the whole or any part of a computer system without rights

• Illegal interception of any non-public transmission of computer data to, from, or within a
computer system

• Data interference such as alteration, damaging, deletion or deterioration of data without rights,
including the introduction or transmission of viruses

• System (computer or computer network) interference

• Cyber-squatting or the acquisition of a domain name over the Internet in bad faith to profit,
mislead, destroy reputation, and deprive others from registering the same

• Misuse of devices

Computer-related offenses:

Computer-related forgery (input, alteration, or deletion of data) without rights resulting


ininauthentic data, with the intent that it be considered or acted upon for legal purposes asif it were
authentic

Computer-related fraud (input, alteration, or deletion of data or interference in thefunctioning of a


computer system) causing damage

Computer-related identity theft or the acquisition, use, misuse, transfer, possession,alteration or


deletion of the identifying information of another person

Content-related offenses:

Cybersex or the engagement, maintenance, control, or operation of any lasciviousexhibition of sexual


organs or sexual activity, with the aid of a computer system

Child pornography or the unlawful acts as defined and punishable by Republic Act No. 9775or the Anti-
Child Pornography Act of 2009 committed through a computer system
Unsolicited commercial communications which seek to advertise, sell, or offer for saleproducts and
services

Libel or unlawful acts as defined in Article 355 of the Revised Penal CodeOthers:

Aiding or abetting in the commission of cybercrime

Attempt in the commission of cybercrime

Penalties

Any person found guilty of committing cybercrime acts enumerated in the first two groups shall
bepunished with prision mayor, or serving of six years and one day to twelve12 years in prison, or afine
of at least PHP 200,000 up to PHP 500,000.

A person found guilty of committing punishable acts enumerated in the first group shall be
punishedwith reclusion temporal, or serving of 12 years and one day to 20 years in prison, or a fine of at
leastPHP 500,000 up to the maximum amount in proportion to the damage incurred, or both.

A person found guilty of committing cybersex shall be punished with prision mayor, or serving of
sixyears and one day to 12 years in prison, or a fine of at least PHP 200,000 but not exceeding
PHP1,000,000, or both.

A person found guilty of committing unsolicited commercial communications shall be punished


witharresto mayor, or serving of one month and one day to six months, or a fine of at least PHP
50,000but not exceeding PHP 250,000, or both.

A person found guilty of committing other offenses enumerated in the last group shall be punishedwith
imprisonment one degree lower than that of the prescribed penalty for the offense, or a fineof at least
PHP 100,000 but not exceeding PHP 500,000, or both.

You might also like