Chapter 2 IT Fundamentals
Chapter 2 IT Fundamentals
The Information Communication Technology (ICT) program strives to educate students to assume
leadership roles where the application of information technology is concerned with the ultimate goal of
connecting people, organizations, and communities to enhance their ability to succeed. The broad
cluster of occupations that fall within the ICT arena includes:
Database Analyst
Privacy Coordinator
Digital Strategist
Staff Technologist
Mobilization Specialist
Government Technologist
Careers in information and communication technology fields include a variety of roles and tasks
associated with planning, researching, installing and monitoring the performance of IT systems. IT
professionals should have technical expertise in computer systems, hardware and networks. They need
exceptional problem solving and analytical abilities to diagnose and repair defects or malfunctions.
Individuals in the IT field should have natural interest and capabilities with programs and information
computer systems. They should be able to grasp large amounts of information and be able to quickly
learn and adapt to new technologies and advances in the field. Individuals wanting to get into the field
should complete an IT course, like a bachelor degree in IT studies, and gain hands-on experience.
If you are really good at what you do, you'll have the demand across the globe.
IT consultancy
Professional Ethics
• Set of standards adopted by a professional community that are regulated by standards called “codes
of ethics”.
• The code of ethics is very important because it gives us boundaries that we have to stay within in our
professional careers.
• The one problem with the code of ethics is that we cant always have the answers black and white.
Sometimes there are grey areas where the answers arent so simple.
2. strive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing
information about individuals
3. protect each information users and providers right to privacy and confidentiality 4. respect an
information providers proprietary rights
• Responsibility to Society
1. serve the legitimate information needs of a large and complex society while at the same time
being mindful of individuals rights
3. 3. play active roles in educating society to understand and appreciate the importance of
information promoting equal opportunity for access to information
• Preamble: I will use my special knowledge and skills for the benefit of the public.
I will serve employers and clients with integrity, subject to an overriding responsibility to the public
interest, and I will strive to enhance the competence and prestige of the professional. By these, I
mean:
2. I will consider the general welfare and public good in the performance of my work;
3. I will advertise goods or professional services in a clear and truthful manner; I will comply and
strictly abide by the intellectual property laws, patent laws and other related laws in respect of
information technology;
4. I will accept full responsibility for the work undertaken and will utilize my skills with competence
and professionalism;
5. I will make truthful statements on my areas of competence as well as the capabilities and qualities
of my products and services;
6. I will not disclose or use any confidential information obtained in the course of professional duties
without the consent of the parties concerned, except when required by law;
7. I will try to attain the highest quality in both the products and services I offer;
8. I will not knowingly participate in the development of Information Technology Systems that will
promote the commission of fraud and other unlawful acts;
9. I will uphold and improve the IT professional standards through continuing professional
development in order to enhance the IT profession.
4. 4. ...never reuse copyrighted code unless the proper license is purchased or permission is
obtained.
5. 5. ...acknowledge (verbally and in source code comments) the work of other programmers on
which the code is based, even if substantial changes are made.
6. 6. ...never write code that is deliberately inefficient with the intent of later claiming credit for
making efficiency improvements.
7. 7. ...never intentionally introduce bugs with the intent of later claiming credit for fixing the bugs,
or to stimulate the uptake of later versions.
8. 8. ...never write code that intentionally breaks another programmers code for the purpose of
elevating ones status.
9. 9. ...never hide known obstacles to a projects completion during any phase of development,
especially the design phase. ...never dishonestly downplay the difficulty of completing a project.
14. 14....never accept compensation from multiple parties for the same work unless permission is
given.
16. 16....never conceal pertinent information from other members of the development team.
17. 17....never conceal from the employer their financial interest in development resources.
18. 18....never conceal any conflict of interest that may affect the project.
19. 19....never seek external profit from a project that was funded by a second party without
permission. If permission is given to resell a product, the work should be discounted.
20. 20. . ..never maliciously injure the reputation of an employer or members of the development
team.
24. 24. ...never conceal the deficiencies of other programmers by writing code for them and
allowing them to pass it off as their own work.
25. 25. ...stay current on the advancement of the field of Computer Science.
The cybercrime prevention act of 2012, officially recorded as republic act no. 10175, is a law in
the philippines approved on september 12, 2012. It aims to address legal issues concerning online
interactions and the internet in the philippines. Among the cybercrime offenses included in the bill
are cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel.
Year 2003
Another Cybercrime bill was filed in 2003 that is seen as a complement to the E-Commerce Law
andIntellectual Property Code.A growing number of companies are coming out as well announcing
cases they have filed againstlocal scammers and hackers taking advantage of Filipino e-commerce
sites. TSSI in 2003, with thecooperation of authorities, entrapped 3 suspected money remittance
service fraudster who usesstolen credit cards to load money in the service.With the growing number
of crimes, organizations such as the Philippine Computer EmergencyResponse Team (PH-CERT) took
on the advocacy of pushing for the passage of a Cybercrimelegislation.
Year 2004
The growth of home-based workers and BPO industries further strengthen the need for a Cyber
crime Law as it is seen a factor in contributing to the future growth of this sector. This is important
as investors have a lot of choices in the region and having an efficient cyber crime legislation is seen
as critical. Although most legislations around the world are local in application by nature.
Year 2005
First cybercrime conviction happened with JJ Maria Giner convicted under the E-Commerce Law for
hacking the government’s .gov.ph site. (Criminal Case No. 419672-CR filed at Branch 14 of the
Metropolitan Trial Court of Manila under Judge Rosalyn Mislos-Loja) On its 10th revision, the
Cybercrime Prevention Bill was revised and covered cellphone transactions and anti-spam measures.
The International Intellectual Property Alliance saw the Cybercrime bill as an important measure in
fighting copyright piracy on the Internet. Data Privacy legislation need became evident this year for
outsourcing competitiveness.
All over the Philippines, there are millions of people using the internet every day. The internet
hasbecome such an integral part of all the people’s lives that almost everyone in the country is a
partof the netizen community.
The crimes committed over the internet have been so frequent and numerous recently that
thegovernment saw it fit to take action to be able to protect the people online. In finding a
solutionas to how to decrease cybercrime in the Philippines, the government came up with
the CybercrimeBill. It is because of all the types of crime being done over the internet that the
government decidedto create a bill such as that. Crimes like plagiarism, child pornography, identity
theft, and manymore have been rampant over the net that the government saw the need to draft
the CybercrimeBill to help lessen all these crimes.
The Cybercrime Prevention Act of 2012 is the first law in the Philippines which
specificallycriminalizes computer crime, which prior to the passage of the law had no strong legal
precedentin Philippine jurisprudence. While laws such as the Electronic Commerce Act of 2000
(Republic ActNo. 8792 regulated certain computer-related activities, these laws did not provide a
legal basis forcriminalizing crimes committed on a computer in general: for example, Onel de
Guzman, thecomputer programmer charged with purportedly writing the ILOVEYOU computer
worm, wasultimately not prosecuted by Philippine authorities due to a lack of legal basis for him to
be chargedunder existing Philippine laws at the time of his arrest
Punishable acts
• Offenses against the confidentiality, integrity and availability of computer data and systems
• Illegal access to the whole or any part of a computer system without rights
• Illegal interception of any non-public transmission of computer data to, from, or within a
computer system
• Data interference such as alteration, damaging, deletion or deterioration of data without rights,
including the introduction or transmission of viruses
• Cyber-squatting or the acquisition of a domain name over the Internet in bad faith to profit,
mislead, destroy reputation, and deprive others from registering the same
• Misuse of devices
Computer-related offenses:
Content-related offenses:
Child pornography or the unlawful acts as defined and punishable by Republic Act No. 9775or the Anti-
Child Pornography Act of 2009 committed through a computer system
Unsolicited commercial communications which seek to advertise, sell, or offer for saleproducts and
services
Libel or unlawful acts as defined in Article 355 of the Revised Penal CodeOthers:
Penalties
Any person found guilty of committing cybercrime acts enumerated in the first two groups shall
bepunished with prision mayor, or serving of six years and one day to twelve12 years in prison, or afine
of at least PHP 200,000 up to PHP 500,000.
A person found guilty of committing punishable acts enumerated in the first group shall be
punishedwith reclusion temporal, or serving of 12 years and one day to 20 years in prison, or a fine of at
leastPHP 500,000 up to the maximum amount in proportion to the damage incurred, or both.
A person found guilty of committing cybersex shall be punished with prision mayor, or serving of
sixyears and one day to 12 years in prison, or a fine of at least PHP 200,000 but not exceeding
PHP1,000,000, or both.
A person found guilty of committing other offenses enumerated in the last group shall be punishedwith
imprisonment one degree lower than that of the prescribed penalty for the offense, or a fineof at least
PHP 100,000 but not exceeding PHP 500,000, or both.