Chapter 3. Ethics in Information Technology
Chapter 3. Ethics in Information Technology
Chapter 3. Ethics in Information Technology
Information technology ethics is the study of the ethical issues arising out of the use and
development of electronic technologies. Its goal is to identify and formulate answers to questions
about the moral basis of individual responsibilities and actions, as well as the moral underpinnings of
public policy.
Information technology ethics raises new and unique moral problems because information
technology itself has brought about dramatic social, political, and conceptual change. Because
information technology affects not only how we do things but how we think about them, it challenges
some of the basic organizing concepts of moral and political philosophy such as property, privacy, the
distribution of power, basic liberties and moral responsibility.
Specific questions include the following. What are the moral responsibilities of computer professionals?
Who is to blame when computer software failure causes harm? Is computer hacking immoral? Is it
immoral to make unauthorized copies of software? Questions related to public policy include: what
constitutes just policy with respect to freedom of speech, association, and the exercise of other civil
liberties over computer networks? What determines the extent and limits of property rights over
computer software and electronic information? What policies adequately protect a right to privacy?
The list of questions shifts in response to developments in information technology. One noteworthy
example is the rise in prominence of questions about communication and information in response to the
explosive growth of high-speed digital networks. This shift has subsumed the field commonly called
‘computer ethics’ under the broader rubric of ‘information technology ethics’.
Lesson 3.1 Cybercrime Law
Cybercrime
refers to any and all illegal activities carried out using technology.
Cybercriminals
who range from rogue individuals to organized crime groups to state sponsored factions — use
techniques like phishing, social engineering, and all kinds of malware to pursue their nefarious plans.
Cybercrime Law
includes laws related to computer crimes, internet crimes, information crimes, communications crimes,
and technology crimes. While the internet and the digital economy represent a significant opportunity,
they’re also an enabler for criminal activity. Cybercrime laws are laws that create the offences and
penalties for cybercrimes.
Cybercrime describes:
crimes directed at computers, data or information communications technologies (ICTs), and
crimes committed by people using computers or ICT.
CYBERSQUATTING
Def. The acquisition of a domain name on the Internet in bad faith or with the intent to profit, mislead,
destroy one’s reputation or deprive others from registering the same domain name. Also covered by
the law are computer-related forgery, fraud and identity theft.
Punishment and fine
Any person found guilty of any of the punishable acts enumerated in Sections 4A and 4B of this Act
shall be punished with imprisonment of prison mayor or a fine of at least Two Hundred Thousand
Pesos (PhP200,000.00) up to a maximum amount commensurate to the damage incurred or both
https://www.youtube.com/watch?v=5RzXprxLtec&t=1s
CYBERSEX
Def. Cybersex can be defined as a subcategory of online sexual activity where Internet is used for
sexually gratifying activities.
Punishment and fine
Individuals found guilty of cybersex face a jail term of prison mayor (6 years and one day to 12 years)
or a fine of at least P200,000 but not exceeding P1 million.
https://www.youtube.com/watch?v=3qtXuw3N9xM
CHILD PORNOGRAPHY
Def. Federal and state laws make it a crime to produce, distribute, or even just possess pornographic
materials that portray a minor (someone under the age of 18). Increasingly, child pornography laws are
being relied on to punish individuals who use the internet to share or obtain pornographic images and
videos involving children.
https://www.youtube.com/watch?v=8KseFc_v-k4
Lesson 3.2 Dos and Don'ts of using the Internet
There are plenty of things that we can do using the internet. But we have to always
remember what spider said “with great power comes with great responsibility”. Even if we
have the power to do almost everything with the internet we have to be responsible enough
to consider our online behavior and choices that can have an impact on ourselves, and
others.
So, here are the 10 commandments of computer ethics:
1. Thou shalt not use a computer to harm other people. 6. Thou shalt not copy or use proprietary software for which you
have not paid.
2. Thou shalt not interfere with other people's computer work. 7. Thou shalt not use other people's computer resources without
authorization or proper compensation.
3. Thou shalt not snoop around in other people's computer files. 8. Thou shalt not appropriate other people's intellectual output.
4. Thou shalt not use a computer to steal. 9. Thou shalt think about the social consequences of the program
you are writing or the system you are designing.
Intellectual Property refers to creations of the mind. It can be an invention (patent / utility
model), a design (industrial design), a brand name (trademark, or a literary and artistic work
(copyright).
It is a category of property that includes intangible creations of the human intellect.
4 TYPES OF INTELLECTUAL PROPERTY
Patent
Trademark
Trade Secret
Copyright
1. PATENT. A patent grants property rights on an invention, allowing the patent holder to exclude others from
making, selling, or using the invention. Inventions allow many businesses to be successful because
inventions develop new or better processes or products that offer a competitive advantage in the
marketplace. Patent owners may also give permission to, or license, other parties to use their inventions on
mutually agreed terms. Owners may also sell their invention rights to someone else, who then becomes the
new owner of the patent.
Eligibility. The Intellectual Property Code of the Philippines sets three conditions for an invention
to be deemed patentable: it has to be new, involves an inventive step, and industrially applicable.
How are these defined? In the IP Code, an invention is not considered new if it already forms part
of the domain of prior art. Prior art is explained in the Intellectual Property Code of the
Philippines, Chapter 2, Section 24 - 24.2
An invention involves an inventive step if, having regard to prior art, it is not obvious to a person
skilled in the art at the time of the filing date or priority date of the application claiming the
invention. An invention that can be produced and used in any industry is considered industrially
applicable.
Term of Protection. The term of a patent shall be twenty (20) years from the filing date of the
application. The patent must be maintained yearly, starting from the 5th year.
https://www.youtube.com/watch?v=4bmOBxgYK0k
2. TRADEMARK. A trademark is any special mark which differentiates goods and services of
one entity from its competitors. Intellectual property examples of trademarks are slogans, logo,
colors or even sounds. Trademarks may sometimes overlap with copyrights. For example, it is
possible for a logo to be registered as a trademark, and also be copyrightable as an artistic
creation. Trademarks may protect designs, words, or other elements which are not considered
copyrightable. They may be protected under the common law and the Lanham Act even when a
trademark is not registered.
Eligibility. The Intellectual Property Code of the Philippines prescribes grounds for non-
registrability. See the Intellectual Property Code of the Philippines, Section 123. Generally,
the distinctiveness of the mark is the key point of consideration
Term of Protection. A trademark can be protected in perpetuity if regularly monitored and
properly maintained. The period of protection is ten (10) years from the date of issuance
and is renewable for a period of ten (10) years at a time.
https://www.youtube.com/watch?v=2aHcfcadJW4
3. TRADE SECRET. A trade secret is a formula, process, device, or other business information
that companies keep private to give a business advantage over the business' competitors.
Intellectual property examples of common trade secrets include: (1) manufacturing processes;
(2) client lists; (3) ingredients; (4) sales method; (5) launch strategies; and (6) business plans.
Eligibility. Trade secret is information that has either actual or potential independent economic
value by virtue of not being generally known, has value to others who cannot legitimately obtain
the information, and is subject to reasonable efforts to maintain its secrecy. All three elements
are required; if any element ceases to exist, then the trade secret will also cease to exist.
Otherwise there is no limit on the amount of time a trade secret is protected.
Term of Protection. Trade secret protection is a complement to patent protection. Patents
require the inventor to provide a detailed and enabling disclosure about the invention in
exchange for the right to exclude others from practicing the invention for a limited period of time.
Patents expire, and when that happens the information contained within is no longer protected.
However, unlike trade secrets, patents may protect against independent discovery. Patent
protection also eliminates the need to maintain secrecy.
https://www.youtube.com/watch?v=2aHcfcadJW4
4. COPYRIGHT. Copyright protects intellectual property of a creative or artistic nature. Copyright
often lasts 50 to 70 years after the creator's death. In some countries, copyright must be
registered to become effective. In the United States, copyright is established as soon as a work is
created, and in the case of software or a digital drawing, even as soon as it is saved to the hard
drive.
Eligibility. Works covered by copyright that can be deposited with IPOPHL are, but are not limited to:
novels, poems, plays, reference works, newspapers, advertisements, computer programs,
databases, films, musical compositions, choreography, paintings, drawings, photographs, sculpture,
architecture, maps and technical drawings.
Term of Protection. The term of protection for copyright in literary and artistic works, and in
derivative works is generally the lifetime of the author plus fifty (50) years. Different rules may apply,
however in: (1) Works of joint authorship; (2) Works of anonymous or pseudonymous works; (3)
Photographic works; (4) Works of applied art; and (5) Audio-visual works
https://www.youtube.com/watch?v=270ZqrBtN5w
MOST COMMON VIOLATION OF INTELLECTUAL PROPERTY
Infringement. This is where Intellectual Property is used or appropriated without the owner's
permission by another. Can be a breach of civil law or criminal law, which depends on the type of
Intellectual Property involved, the jurisdiction and the nature of action.
a. Patent Infringement. The term patent infringement means that someone has sold or used a
patented invention without the permission of the person who owns the patent.
b. Trademark Infringement. Trademark infringement occurs when someone uses a trademark
that is confusingly similar to someone else's registered mark.
c. Copyright Infringement. Copyright infringement is when some else displays, produces, or
distributes your work without your approval. This type of intellectual property theft can also occur if
someone has produced a work that is derivative of your copyrighted work or holds an unapproved
performance of your work. Copyright infringement involving copying or selling music or movies is
commonly called piracy.
Lesson 3.4 Identity Theft
What is Identity theft?
Identity Theft is also known as identity fraud, is a crime in which an imposter obtains key pieces of personally
identifiable information.
Identity theft is defined when someone uses your personal information without your permission, to commit
fraud or other crime
Black Hat. Hack to take control over the system for personal gains. They can destroy, steal
or even prevent authorized users from accessing the system. Who hacks for evil and
malicious intent and without permission.
White Hat. Who hacks against a black hat in order to protect computer and network
access. Has the company’s permission to do so.
Grey Hat. Who hacks not for evil and not for good, neutral in their cause. Usually sells
their skills for monetary gain.
What is Ethical hacking?
Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or
individual to help identify potential threats on a computer or network. An ethical hacker attempts to
bypass system security and search for any weak points that could be exploited by malicious
hackers.
Computer security, cyber security or information technology security (IT security) is the protection of
computer systems from the theft of or damage to their hardware, software, or electronic data, as
well as from the disruption or misdirection of the services they provide.
Major areas covered in cyber security are:
Application Security it encompasses measures or counter-measures that are taken during the
development life-cycle to protect applications from threats that can come through flaws in the
application design, development, deployment, upgrade or maintenance.
Major techniques used to cover this are: a) Identification, authentication & authorization of user, b)
Cryptography.
Disaster recovery planning is a process that includes performing risk assessment, establishing
priorities, developing recovery strategies in case of a disaster. Any business should have a
concrete plan for disaster recovery to resume normal business operations as quickly as possible
after a disaster.
Network security includes activities to protect the usability, reliability, integrity and safety of the
network. Effective network security targets a variety of threats and stops them from entering or
spreading on the network. Network security components include:
a) Anti-virus and anti-spyware,
b) Firewall, to block unauthorized access to your network,
c) Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or
zero-hour attacks, and
d) Virtual Private Networks (VPNs), to provide secure remote access.
Common methods attackers use to control computers or networks
Viruses. A type of computer program that, when executed, replicates itself by modifying other
computer programs and inserting its own code. When this replication succeeds, the affected areas are
then said to be "infected" with a computer virus.
Worms. A type of malicious software program whose primary function is to infect other computers
while remaining active on infected systems.
Spyware. Is unwanted software that infiltrates your computing device, stealing your internet usage
data and sensitive information. Spyware is classified as a type of malware — malicious software
designed to gain access to or damage your computer, often without your knowledge. Spyware gathers
your personal information and relays it to advertisers, data firms, or external users.
Trojans. A type of malicious code or software that looks legitimate but can take control of your
computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action
on your data or network.
Ransomware. A type of malicious software, or malware, designed to deny access to a computer
system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by
unknowingly visiting an infected website. Ransomware can be devastating to an individual or an
organization.
What can you do to avoid being hacked?