Midterm Lesson 1 Ethics in Information Technology
Midterm Lesson 1 Ethics in Information Technology
A.G. Tupaz cor. M.V. Farinas Streets, Brgy. 8 San Vicente, Laoag City
F.R. Castro Street, Brgy. 1 San Lorenzo, Laoag City
1
Data Center College of the Philippines of Laoag City, Inc.
A.G. Tupaz cor. M.V. Farinas Streets, Brgy. 8 San Vicente, Laoag City
F.R. Castro Street, Brgy. 1 San Lorenzo, Laoag City
COMPUTER ILLITERACY
Society is now experiencing a similar development. An increasing number of occupations require
computer knowledge. The advent of the microcomputer, those little machines called PC’s cell phones by most
people, brought the technology to every business and millions of homes in much of the world.
Personalization
People generally do not like to be referred to as numbers. To think rationally, Development in
electronic communication also contributes to this impersonal treatment of individuals.
Over Reliance on Computers
The most widely used means of communication, the telephone network, is run by computer.
Computers control the flow 0f television signals through communication satellites.
Health Hazards
A historical review of labor legislation shows that new technologies often have subjected
workers to hazards. The advent of computers changed the work environment of millions of people.
Telecommunicating
There are millions of such workers, and other countries. Some have an office, but use it only
part of the week. Telecommunicating would eliminate tons of pollutants, save gallons of gasoline, and free
personal hours for increasing productivity or leisure time. Sociologists have mixed opinions about the
phenomenon. On one hand, telecommuting allows people to work who would otherwise be outside the
workplace.
INVASION OF PRIVACY
Society esteems personal achievement and growth. Looking for the individual to endeavor and
succeed. Privacy is essential for individual growth and raises its standard of living. Privacy is essential for
individual growth.
Data Collection
Not all data that others collect about us is erroneous. But when it is, and that happens all too
often, it is not that easy to correct the misinformation.
Data Collection for marketing purposes is more than a century old, but only the information
technology of the last two or three decades allows businesses to mix and match data from different sources.
● To minimize invasion of privacy, the following rules should be followed:
o Purpose. Determine a specific purpose for collecting and maintaining the data,
and ensure that the data object understands how the data will be used.
o Relevance. Record and use only those data necessary to fulfill your purpose.
2
Data Center College of the Philippines of Laoag City, Inc.
A.G. Tupaz cor. M.V. Farinas Streets, Brgy. 8 San Vicente, Laoag City
F.R. Castro Street, Brgy. 1 San Lorenzo, Laoag City
o Accuracy. Ensure that the data are accurate and enhanced through careful data
entry and periodic verification.
o Correctness. Make use of all the data about an individual.
o Security. Limit access to those who need to know. Security includes the physical
limitation of access to computers and terminals, the use of access codes and
passwords, and the establishment of audit trails.