Chapter 3. Ethics in Information Technology

Download as pdf or txt
Download as pdf or txt
You are on page 1of 36

GEE-LIVING IN THE IT ERA

Chapter 3. Ethics in Information Technology


 Course Learning Outcome for the Lesson
 design a blog (vlog) that shows appreciation of the latest
developments in information technology.

Intended Learning Outcome


Understand the ethics in the field of Information Technology.
define the different cybercrimes and identify the steps to combat it.
explain the imperatives of professional conduct for IT professionals.
 Introduction
 “Just because you can do something doesn’t mean you should do it”
 Like any other profession, information technology benefits from a standard, accepted code of ethics
that helps guide behavior in sometimes confusing contexts.

 Information technology ethics is the study of the ethical issues arising out of the use and
development of electronic technologies. Its goal is to identify and formulate answers to questions
about the moral basis of individual responsibilities and actions, as well as the moral underpinnings of
public policy.

Information technology ethics raises new and unique moral problems because information
technology itself has brought about dramatic social, political, and conceptual change. Because
information technology affects not only how we do things but how we think about them, it challenges
some of the basic organizing concepts of moral and political philosophy such as property, privacy, the
distribution of power, basic liberties and moral responsibility.
 Specific questions include the following. What are the moral responsibilities of computer professionals?
Who is to blame when computer software failure causes harm? Is computer hacking immoral? Is it
immoral to make unauthorized copies of software? Questions related to public policy include: what
constitutes just policy with respect to freedom of speech, association, and the exercise of other civil
liberties over computer networks? What determines the extent and limits of property rights over
computer software and electronic information? What policies adequately protect a right to privacy?

The list of questions shifts in response to developments in information technology. One noteworthy
example is the rise in prominence of questions about communication and information in response to the
explosive growth of high-speed digital networks. This shift has subsumed the field commonly called
‘computer ethics’ under the broader rubric of ‘information technology ethics’.
Lesson 3.1 Cybercrime Law
Cybercrime
refers to any and all illegal activities carried out using technology.

 Cybercriminals
 who range from rogue individuals to organized crime groups to state sponsored factions — use
techniques like phishing, social engineering, and all kinds of malware to pursue their nefarious plans.

 Cybercrime Law
 includes laws related to computer crimes, internet crimes, information crimes, communications crimes,
and technology crimes. While the internet and the digital economy represent a significant opportunity,
they’re also an enabler for criminal activity. Cybercrime laws are laws that create the offences and
penalties for cybercrimes.
Cybercrime describes:
crimes directed at computers, data or information communications technologies (ICTs), and
crimes committed by people using computers or ICT.

Cybercrime is a global problem, which requires a coordinated international response.

Cybercrime Law in the Philippines


The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No. 10175 was approved on
September 12, 2012. It aims to address legal issues concerning online interactions and the internet in the
Philippines. Among the cybercrime offences included in the bill are: cybersquatting, cybersex, child
pornography, identity theft, illegal access to data and libel.
 The different types of Cybercrime (in the Philippine context), its definition, the fine and punishments.

CYBERSQUATTING

 Def. The acquisition of a domain name on the Internet in bad faith or with the intent to profit, mislead,
destroy one’s reputation or deprive others from registering the same domain name. Also covered by
the law are computer-related forgery, fraud and identity theft.
Punishment and fine
 Any person found guilty of any of the punishable acts enumerated in Sections 4A and 4B of this Act
shall be punished with imprisonment of prison mayor or a fine of at least Two Hundred Thousand
Pesos (PhP200,000.00) up to a maximum amount commensurate to the damage incurred or both
https://www.youtube.com/watch?v=5RzXprxLtec&t=1s
 CYBERSEX
Def. Cybersex can be defined as a subcategory of online sexual activity where Internet is used for
sexually gratifying activities.
Punishment and fine
 Individuals found guilty of cybersex face a jail term of prison mayor (6 years and one day to 12 years)
or a fine of at least P200,000 but not exceeding P1 million.
https://www.youtube.com/watch?v=3qtXuw3N9xM
 CHILD PORNOGRAPHY
 Def. Federal and state laws make it a crime to produce, distribute, or even just possess pornographic
materials that portray a minor (someone under the age of 18). Increasingly, child pornography laws are
being relied on to punish individuals who use the internet to share or obtain pornographic images and
videos involving children.

 Punishment and fine


 via computer carries a penalty one degree higher than that provided by RA 9775, or the Anti-Child
Pornography Act of 2009. Under RA 9775, those who produce, disseminate or publish child
pornography will be fined from P50,000 to P5 million, and slapped a maximum jail term of reclusion
perpetua, or 20 to 40 years.
 https://www.youtube.com/watch?v=apgDs5aFTNM
 IDENTITY THEFT
Def. Identity theft occurs when an unauthorized party uses your personally identifying information, such
as your name, address, Social Security Number (SSN), or credit card or bank account information to
assume your identity in order to commit fraud or other criminal acts.

 Punishment and fine.


 Accessing personal information and sensitive personal information due to negligence are punishable
by one to three years’ imprisonment and fine ranging from P500,000 to P2 million, and three to six
years’ imprisonment and a fine ranging from P500,000 to P4 million, respectively.
 https://www.youtube.com/watch?v=kDFeSUUwRnA&t=1s
 CYBER LIBEL
 Def. This includes false and damaging statements made about another person through e-mail,
message boards, blogs, chatrooms, on Web sites, or any other Internet-based communication
medium.
 Punishment and fine
 LIBEL now carries a higher penalty of fine from the old rate of P200 to P6,000 to the new rate of
P40,000 to P1.2 million. The penalty is imprisonment for a minimum period of four years and one
day to a maximum period of four years and one day to a maximum of eight years, per offense.
 https://www.youtube.com/watch?v=hHuuhe-f5AY
 How to protect yourself against cybercrime?
Avoid using public networks.
Avoid using public computers for sensitive business.
Use strong passwords
Keep your software updated
Manage your social media settings
Avoid downloading unknown applications
Strengthen your home network
Know that identity theft can happen anywhere
Keep an eye on the kids
Know what to do if you become a victim

https://www.youtube.com/watch?v=8KseFc_v-k4
 Lesson 3.2 Dos and Don'ts of using the Internet

 There are plenty of things that we can do using the internet. But we have to always
remember what spider said “with great power comes with great responsibility”. Even if we
have the power to do almost everything with the internet we have to be responsible enough
to consider our online behavior and choices that can have an impact on ourselves, and
others.
So, here are the 10 commandments of computer ethics:

1. Thou shalt not use a computer to harm other people. 6. Thou shalt not copy or use proprietary software for which you
have not paid.

2. Thou shalt not interfere with other people's computer work. 7. Thou shalt not use other people's computer resources without
authorization or proper compensation.

3. Thou shalt not snoop around in other people's computer files. 8. Thou shalt not appropriate other people's intellectual output.

4. Thou shalt not use a computer to steal. 9. Thou shalt think about the social consequences of the program
you are writing or the system you are designing.

10. Thou shalt always use a computer in ways that insure


5. Thou shalt not use a computer to bear false witness.
consideration and respect for your fellow humans.
 Lesson 3.3 Intellectual Property

 Intellectual Property refers to creations of the mind. It can be an invention (patent / utility
model), a design (industrial design), a brand name (trademark, or a literary and artistic work
(copyright).
 It is a category of property that includes intangible creations of the human intellect.
 4 TYPES OF INTELLECTUAL PROPERTY
 Patent
 Trademark
 Trade Secret
 Copyright
1. PATENT. A patent grants property rights on an invention, allowing the patent holder to exclude others from
making, selling, or using the invention. Inventions allow many businesses to be successful because
inventions develop new or better processes or products that offer a competitive advantage in the
marketplace. Patent owners may also give permission to, or license, other parties to use their inventions on
mutually agreed terms. Owners may also sell their invention rights to someone else, who then becomes the
new owner of the patent.

 Eligibility. The Intellectual Property Code of the Philippines sets three conditions for an invention
to be deemed patentable: it has to be new, involves an inventive step, and industrially applicable.
 How are these defined? In the IP Code, an invention is not considered new if it already forms part
of the domain of prior art. Prior art is explained in the Intellectual Property Code of the
Philippines, Chapter 2, Section 24 - 24.2
 An invention involves an inventive step if, having regard to prior art, it is not obvious to a person
skilled in the art at the time of the filing date or priority date of the application claiming the
invention. An invention that can be produced and used in any industry is considered industrially
applicable.
 Term of Protection. The term of a patent shall be twenty (20) years from the filing date of the
application. The patent must be maintained yearly, starting from the 5th year.
 https://www.youtube.com/watch?v=4bmOBxgYK0k
2. TRADEMARK. A trademark is any special mark which differentiates goods and services of
one entity from its competitors. Intellectual property examples of trademarks are slogans, logo,
colors or even sounds. Trademarks may sometimes overlap with copyrights. For example, it is
possible for a logo to be registered as a trademark, and also be copyrightable as an artistic
creation. Trademarks may protect designs, words, or other elements which are not considered
copyrightable. They may be protected under the common law and the Lanham Act even when a
trademark is not registered.

 Eligibility. The Intellectual Property Code of the Philippines prescribes grounds for non-
registrability. See the Intellectual Property Code of the Philippines, Section 123. Generally,
the distinctiveness of the mark is the key point of consideration
 Term of Protection. A trademark can be protected in perpetuity if regularly monitored and
properly maintained. The period of protection is ten (10) years from the date of issuance
and is renewable for a period of ten (10) years at a time.
 https://www.youtube.com/watch?v=2aHcfcadJW4
3. TRADE SECRET. A trade secret is a formula, process, device, or other business information
that companies keep private to give a business advantage over the business' competitors.
Intellectual property examples of common trade secrets include: (1) manufacturing processes;
(2) client lists; (3) ingredients; (4) sales method; (5) launch strategies; and (6) business plans.

 Eligibility. Trade secret is information that has either actual or potential independent economic
value by virtue of not being generally known, has value to others who cannot legitimately obtain
the information, and is subject to reasonable efforts to maintain its secrecy. All three elements
are required; if any element ceases to exist, then the trade secret will also cease to exist.
Otherwise there is no limit on the amount of time a trade secret is protected.
 Term of Protection. Trade secret protection is a complement to patent protection. Patents
require the inventor to provide a detailed and enabling disclosure about the invention in
exchange for the right to exclude others from practicing the invention for a limited period of time.
Patents expire, and when that happens the information contained within is no longer protected.
However, unlike trade secrets, patents may protect against independent discovery. Patent
protection also eliminates the need to maintain secrecy.
 https://www.youtube.com/watch?v=2aHcfcadJW4
4. COPYRIGHT. Copyright protects intellectual property of a creative or artistic nature. Copyright
often lasts 50 to 70 years after the creator's death. In some countries, copyright must be
registered to become effective. In the United States, copyright is established as soon as a work is
created, and in the case of software or a digital drawing, even as soon as it is saved to the hard
drive.
 Eligibility. Works covered by copyright that can be deposited with IPOPHL are, but are not limited to:
novels, poems, plays, reference works, newspapers, advertisements, computer programs,
databases, films, musical compositions, choreography, paintings, drawings, photographs, sculpture,
architecture, maps and technical drawings.
 Term of Protection. The term of protection for copyright in literary and artistic works, and in
derivative works is generally the lifetime of the author plus fifty (50) years. Different rules may apply,
however in: (1) Works of joint authorship; (2) Works of anonymous or pseudonymous works; (3)
Photographic works; (4) Works of applied art; and (5) Audio-visual works

 https://www.youtube.com/watch?v=270ZqrBtN5w
MOST COMMON VIOLATION OF INTELLECTUAL PROPERTY

 Infringement. This is where Intellectual Property is used or appropriated without the owner's
permission by another. Can be a breach of civil law or criminal law, which depends on the type of
Intellectual Property involved, the jurisdiction and the nature of action.
 a. Patent Infringement. The term patent infringement means that someone has sold or used a
patented invention without the permission of the person who owns the patent.
 b. Trademark Infringement. Trademark infringement occurs when someone uses a trademark
that is confusingly similar to someone else's registered mark.
 c. Copyright Infringement. Copyright infringement is when some else displays, produces, or
distributes your work without your approval. This type of intellectual property theft can also occur if
someone has produced a work that is derivative of your copyrighted work or holds an unapproved
performance of your work. Copyright infringement involving copying or selling music or movies is
commonly called piracy.
Lesson 3.4 Identity Theft
What is Identity theft?
Identity Theft is also known as identity fraud, is a crime in which an imposter obtains key pieces of personally
identifiable information.
Identity theft is defined when someone uses your personal information without your permission, to commit
fraud or other crime

 5 Most Common Types of Identity Theft


 1. Financial Identity Theft
 Occurs when someone gains access to your financial information and uses it for their own gain while pretending to
be you
 2. Driver’s License Identity Theft
 DATA breach; Stolen
 3. Criminal Identity Theft
 Occurs when someone cited or arrested for a crime presents himself as another person, by using that person’s
name and identifying information.
 4. Social Security Identity Theft
 Is a federally issued number used to identify consumers for tax, employment and credit purposes.
 5. Medical Identity Theft
 The illegal access and use of a patient's personally identifiable information (PII) to obtain medical treatment,
services or goods
The Law Regarding Identity Theft
RA 10173- DATA PRIVACY ACT OF 2012…AN ATIDOTE TO IDENTITY THEFT IN THE PH
“AN ACT PROTECTING INDIVIDUAL PERSONAL INFORMATION IN INFORMATION AND
COMMUNICATIONS SYSTEMS IN THE GOVERNMENT AND THE PRIVATE SECTOR, CREATING FOR
THIS PURPOSE A NATIONAL PRIVACY COMMISSION, AND FOR OTHER PURPOSES.”
The law was based on Senate Bill No. 2965, which was sponsored by Senator Edgardo Angara

 Online Identity Theft


 PHISHING is a cybercrime, lure individuals into providing sensitive data such as
personally identifiable information, banking and credit card details, and passwords.
 Things to remember:
 (1) Too Good to Be True;
 (2) Sense of Urgency;
 (3) Hyperlinks;
 (4) Attachments; and
 (5) Unusual Sender.
 Safety Measures
 1. Be wary in giving away your information
 2. Visit only secure websites
 3. Be prompt once alerted
 4. Invest in RFID protection
 5. Avoid games and quizzes on social media
 6. Protect your computer from viruses and malware
Lesson 3.5 Hacking
What is hacking?
 What is hacking?
 Hacking is an attempt to exploit a computer system or a private network
inside a computer. Simply put, it is the unauthorized access to or control
over computer network security systems for some illicit purpose.
 Hacker is someone who uses a computer system to gain unauthorized access to another system for
data or who makes another system unavailable.
 Use their skills for a specific goal, such as stealing money, gaining fame by bringing down a computer
system, or making a network unavailable -- even sometimes destroying them.
Three Types of Hackers

Black Hat. Hack to take control over the system for personal gains. They can destroy, steal
or even prevent authorized users from accessing the system. Who hacks for evil and
malicious intent and without permission.

White Hat. Who hacks against a black hat in order to protect computer and network
access. Has the company’s permission to do so.

Grey Hat. Who hacks not for evil and not for good, neutral in their cause. Usually sells
their skills for monetary gain.
What is Ethical hacking?
Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or
individual to help identify potential threats on a computer or network. An ethical hacker attempts to
bypass system security and search for any weak points that could be exploited by malicious
hackers.

 What is its purpose?


 To improve the security of the network or systems by fixing the vulnerabilities found during testing.

 For hacking to be deemed ethical, the hacker must obey the following rules:
 Expressed (often written) permission to probe the network and attempt to identify potential
security risks.
 You respect the individual's or company's privacy.
 You close out your work, not leaving anything open for you or someone else to exploit at a later
time.
 You let the software developer or hardware manufacturer know of any security vulnerabilities you
locate in their software or hardware, if not already known by the company
Lesson 3.6 Cyber Security

Computer security, cyber security or information technology security (IT security) is the protection of
computer systems from the theft of or damage to their hardware, software, or electronic data, as
well as from the disruption or misdirection of the services they provide.
Major areas covered in cyber security are:
Application Security it encompasses measures or counter-measures that are taken during the
development life-cycle to protect applications from threats that can come through flaws in the
application design, development, deployment, upgrade or maintenance.

Major techniques used to cover this are: a) Identification, authentication & authorization of user, b)
Cryptography.
Disaster recovery planning is a process that includes performing risk assessment, establishing
priorities, developing recovery strategies in case of a disaster. Any business should have a
concrete plan for disaster recovery to resume normal business operations as quickly as possible
after a disaster.
Network security includes activities to protect the usability, reliability, integrity and safety of the
network. Effective network security targets a variety of threats and stops them from entering or
spreading on the network. Network security components include:
a) Anti-virus and anti-spyware,
b) Firewall, to block unauthorized access to your network,
c) Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or
zero-hour attacks, and
d) Virtual Private Networks (VPNs), to provide secure remote access.
 Common methods attackers use to control computers or networks
 Viruses. A type of computer program that, when executed, replicates itself by modifying other
computer programs and inserting its own code. When this replication succeeds, the affected areas are
then said to be "infected" with a computer virus.
 Worms. A type of malicious software program whose primary function is to infect other computers
while remaining active on infected systems.
 Spyware. Is unwanted software that infiltrates your computing device, stealing your internet usage
data and sensitive information. Spyware is classified as a type of malware — malicious software
designed to gain access to or damage your computer, often without your knowledge. Spyware gathers
your personal information and relays it to advertisers, data firms, or external users.
 Trojans. A type of malicious code or software that looks legitimate but can take control of your
computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action
on your data or network.
 Ransomware. A type of malicious software, or malware, designed to deny access to a computer
system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by
unknowingly visiting an infected website. Ransomware can be devastating to an individual or an
organization.
What can you do to avoid being hacked?

Remember this: Never, Ignore, Install, Never


Never open an email if it appears in your spam folder.
Ignore unexpected warnings from sources you don’t trust.
Install a good antivirus and anti-malware program on your computer and keep it updated.
Never give out personal information to strangers who call on the phone.
Computers and information systems are used everywhere in society. New technologies are
invaluable tools but they may have serious ethical consequences. The way an information
technology tool affects sensitive issues has a direct impact on its effectiveness and usability. It
may be difficult for users and stakeholders to adopt a computer system if they feel that its use
violates important values and interests. To take advantage of a computer tool may not be easy in
situations dominated by ethical conflicts. There is a great risk that expensive but necessary
computer systems are abandoned because of scandals and conflicts. There is also a risk that
ethically controversial systems are used sub optimally, that persons may get hurt, and that
organizations may be damaged if they hesitate to use otherwise important and necessary
computer tools.
 Ethics in IT aims at the construction of tools that can be applied in systems development and use
for the consideration of significant ethical aspects. The application of suitable ethical tools is a
prerequisite to consider significant aspects in all phases of computer systems development,
implementation and use. Ethical tools are necessary not only to construct a system that avoids
conflicts with significant moral principles but mainly to build a successful system that will play a
significant role in satisfying the most important values of users and stakeholders.
END OF PRESENTATION

You might also like