Legal Regulation
Legal Regulation
Sub topic
COMPUTER ETHICS
Learning objectives
After studying this lesson, student should be able to:
1. Define computer and state some computer code of conduct and the commandments of
computer ethics
2. Discuss some issue of computer ethics and unethical actions taken by computer users
3. Discuss some legislations the govern computer ethics
INTRODUCTION
Computers are involved to some extent in almost every aspect of our lives. They often perform
life-critical tasks. Computer science is not regulated to the extent of medicine, air travel, or
construction zoning. Therefore, we need to carefully consider the issues of ethics.
Computer ethics helps us solve the legal issues that crop up every day, to underline and solve those
violations that were not defined by the older laws; to form new laws, rather to form an organized
structure of laws to govern the world of internet, which is termed as "cyber law". As technology
advances, computers continue to have a greater impact on society. Therefore, computer ethics
promotes the discussion of how much influence computers should have in areas such as artificial
intelligence and human communication. As the world of computers evolves, computer ethics
continues to create ethical standards that address new issues raised by new technologies. The
primary objective of computer ethics is identifying the ethical issues, which fall in the broad
category of copyright issues, issues concerning privacy and censorship.
The British Computer Society is a professional body and a learned society that represents those
working in Information Technology both in the United Kingdom and internationally. It set the
professional standards of competences, conduct and ethical practice for computing. As an aid to
understanding, these rules have been grouped into the principal duties which all members should
endeavour to discharge in pursuing their professional lives.
The IEEE (Institute of Electrical and Electronics Engineers) describes itself as "the world's largest
technical professional society -- promoting the development and application of electrotechnology
and allied sciences for the benefit of humanity, the advancement of the profession, and the well-
being of our members."
The IEEE fosters the development of standards that often become national and international
standards. The organization publishes a number of journals, has many local chapters, and several
large societies in special areas, such as the IEEE Computer Society.
Members commit themselves to the highest ethical and professional conduct and agree:
a) to accept responsibility in making decisions consistent with the safety, health, and welfare
of the public, and to disclose promptly factors that might endanger the public or the
environment;
b) to avoid real or perceived conflicts of interest whenever possible, and to disclose them to
affected parties when they do exist;
c) to be honest and realistic in stating claims or estimates based on available data;
d) to reject bribery in all its forms;
e) to improve the understanding of technology; its appropriate application, and potential
consequences;
f) to maintain and improve our technical competence and to undertake technological tasks for
others only if qualified by training or experience, or after full disclosure of pertinent
limitations;
g) to seek, accept, and offer honest criticism of technical work, to acknowledge and correct
errors, and to credit properly the contributions of others;
h) to treat fairly all persons regardless of such factors as race, religion, gender, disability, age,
or national origin;
i) to avoid injuring others, their property, reputation, or employment by false or malicious
action;
j) to assist colleagues and co-workers in their professional development and to support them
in following this code of ethics.
Is it OK to display personal information about others on the Internet (such as their online
status or their present location via GPS)?
Should users be protected from false information?
Who owns digital data (such as music, movies, books, web pages, etc.) and what should
users be allowed to do with it?
How much access should there be to gambling and pornography online?
Is access to the Internet a basic right that everyone should have?
The term netiquette is the short form of network etiquette. Network etiquette refers to the rules
of courtesy governing the use of computer networks. Generally, network users would rather make
friends than enemies, and if they follow a few basic rules, they are less likely to make the kind of
mistake that would prevent them from making friend. Some important netiquette rules include:
1) Privacy
Privacy is the responsibility to protect data about individuals. Privacy can be decomposed to the
limitation of others' access to an individual with "three elements of secrecy, anonymity, and
solitude". Anonymity refers to the individual's right to protection from undesired attention.
Solitude refers to the lack of physical proximity of an individual to others. Secrecy refers to the
protection of personalized information from being freely distributed.
Listed below are a few recommendations to restrict online databases from proliferating sensitive
personnel information.
a) Exclude sensitive unique identifiers from database records such as social security
numbers, birth dates, hometown and mothers' maiden names.
b) Exclude phone numbers that are normally unlisted.
c) Clear provision of a method which allows people to have their names removed from a
database.
d) Banning the reverse social security number lookup services (Spinello, 2006).
Private Data Collection: Data warehouses are used today to collect and store huge amounts of
personal data and consumer transactions. These facilities can preserve large volumes of consumer
information for an indefinite amount of time. Some of the key architectures contributing to the
erosion of privacy include databases, cookies and spyware.
2) Accuracy
Accuracy is the responsibility of data collectors to authenticate information and ensure its
accuracy. Due to the ease of accessibility and sometimes collective nature of the internet we often
come across issues of accuracy e.g. who is responsible for the authenticity and fidelity of the
information available online? Ethically this includes debate over who should be allowed to
contribute content and who should be held accountable if there are errors in the content or if it is
false. This also brings up the question of how is the injured party, if any, to be made whole and
under which jurisdiction does the offense lay?
3) Security
Security has long been a topic of ethical debate. Is it better to protect the common good of the
community or rather should we safeguard the rights of the individual? There is a continual dispute
over the boundaries between the two and which compromises are right to make. As an ever
increasing amount of people connect to the internet and more and more personal data is available
online there is susceptibility to identity theft, cyber crimes and computer hacking. This also leads
to the question of who has the right to regulate the internet in the interest of security?
4) Property
Who owns information and software and how can they be sold and exchanged? The controversy
over ownership occurs when the property of information is infringed upon or uncertain.
The ever-increasing speed of the internet and the emergence of compression technology, such as
mp3 opened the doors to Peer-to-peer file sharing, a technology that allowed users to anonymously
transfer files to each other. Much of this, however, was copyrighted music and illegal to transfer
to other users. Whether it is ethical to transfer copyrighted media is another question.
Proponents of unrestricted file sharing point out how file sharing has given people broader and
faster access to media, has increased exposure to new artists, and has reduced the costs of
transferring media (including less environmental damage). Supporters of restrictions on file
sharing argue that we must protect the income of our artists and other people who work to create
our media.
We also see a similar debate over intellectual property rights in respect to software ownership. The
two opposing views are for closed source software distributed under restrictive licenses or for free
and open source software
With the introduction of Digital Rights Management software, new issues are raised over whether
the subverting of DRM is ethical. Some champion the hackers of DRM as defenders of users'
rights, allowing the blind to make audio books of PDFs they receive, allowing people to burn
music they have legitimately bought to CD or to transfer it to a new computer. Others see this as
nothing but simply a violation of the rights of the intellectual property holders, opening the door
to uncompensated use of copyrighted media.
They are responsibility of data collectors to control access and determine what information a
person has the right to obtain about others and how the information can be used. Accessibility,
censorship and filtering bring up many ethical issues that have several branches in cyberethics.
Accessibility is the ability of a resource to be available for use on the Internet. Censorship is denial
of access to certain Internet resources for ethical, religious, political or other reasons. Filtering is
the act of allowing access only to some aspect of a resource while censoring other aspects
6) Freedom of information;
Freedom of information, that is the freedom of speech as well as the freedom to seek, obtain and
impart information brings up the question of who or what, has the jurisdiction in cyberspace. The
right of freedom of information is commonly subject to limitations dependant upon the country,
society and culture concerned.
paragraph, computers may be put to the wrong use. In order to safeguard computer users in the
UK there are different types of legislation covering the many uses or misuses of Information and
Communications Technology (ICT).
The Act was notable in that it was the first occasion that the UK government implemented
an EC directive through an Act of Parliament rather than an order under the European
Communities Act 1972.
Visit www.tsek3adiblog4ever.com for ask further notes on computer studies Page 8 of 10
Topic : Legal Regulation By: TSEKANE ADI L.
The law was part of a series of efforts by US lawmakers legislating over Internet pornography.
Parts of the earlier and much broader Communications Decency Act had been struck down as
unconstitutional by the Supreme Court in 1997 (Reno v. ACLU); COPA was a direct response to
that decision, narrowing the range of material covered. COPA only limits commercial speech and
only affects providers based within the United States.
COPA required all commercial distributors of "material harmful to minors" to restrict their sites
from access by minors. "Material harmful to minors" was defined as material that by
"contemporary community standards" was judged to appeal to the "prurient interest" and that
showed sexual acts or nudity (including female breasts). This is a much broader standard than
obscenity.
The Act has been amended a number of times – in 1986, 1989, 1994, 1996, in 2001 by the USA
PATRIOT Act, 2002, and in 2008 by the Identity Theft Enforcement and Restitution Act.
Subsection (b) of the Act makes it a crime not only to commit (or attempt to commit) an offense
under the Act, but also to conspire to do so.