0% found this document useful (0 votes)
18 views25 pages

Session 1

This document provides an overview of a session on social, ethical and professional issues in information technology. The session covers professionalism and professional bodies in IT, areas of computer law like contracts, intellectual property, and data protection. It also addresses topics like computer crime, privacy, computer security, and risks of safety critical systems failing as seen in examples like the Therac-25 radiation therapy machine and Ariane 5 rocket accidents. The goal is for students to understand how IT gives rise to social and ethical issues and dilemmas.

Uploaded by

erik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views25 pages

Session 1

This document provides an overview of a session on social, ethical and professional issues in information technology. The session covers professionalism and professional bodies in IT, areas of computer law like contracts, intellectual property, and data protection. It also addresses topics like computer crime, privacy, computer security, and risks of safety critical systems failing as seen in examples like the Therac-25 radiation therapy machine and Ariane 5 rocket accidents. The goal is for students to understand how IT gives rise to social and ethical issues and dilemmas.

Uploaded by

erik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 25

INFORMATION TECHNOLOGY LAW & ETHICS

Session 1 – INTRODUCTION TO SOCIAL, ETHICAL AND


PROFESSIONAL ISSUES IN INFORMATION TECHNOLOGY

Lecturer: Akolgo Eric Ayintareba


Session Overview
The widespread use of Information Technology has changed the way we
work, play, and interact with other people. These changes have given
rise to a wealth of new social and legal issues that can be challenging to
understand and navigate. Ethical, Legal and Professional Issues in IT
provides a comprehensive treatment of the issues facing IT
professionals in today's modern, working environment

At the end of the session, the student will


– Understand how IT and information systems give rise to social issues and
ethical dilemmas.
– Understand the Emergence of social and Ethical problems in IT
– Know the relationship between information technology and society

Slide 2
Session Outline
The key topics to be covered in the session are as follows:

• Professional and Professional bodies in IT

• Computer Law

• Risks and Threats

• Crime, Privacy and Security & Safety Critical Systems


Slide 3
Information Technology Law & Ethics
Topic One

PROFESSIONAL AND PROFESSIONAL BODIES IN


IT

Information Technology Law & Ethics Slide 4


Professionalism
Who is a professional?

Competence-Responsibility-Trust

When do you become one?

What is a profession?

Information Technology Law & Ethics Slide 5


Professional Bodies
– British Computer Society

– Chartered Information Technology Professionals (CITP)

– Institution of Engineering and Technology

– Engineering Council
– Which Professional bodies are in Ghana?

Information Technology Law & Ethics Slide 6


Code of Conduct
Professional Behaviour
– Professional Conduct
– Professional Integrity
– Public Interest
– Technical Competence
– Impartiality

Information Technology Law & Ethics


Slide 7
Code of Good Practice
Professional Competence
– Personal Requirements
– Organisation and Management
– Privacy, Security and Integrity
– Development
– Implementation
– Live Systems

Information Technology Law & Ethics Slide 8


Standards
Professional Guidelines
– There are many international standards providing
guidance on computer related matters
• Quality
• Quality Management and Quality Assurance
(ISO9000/TickIT)
• Safety
• Information Security Management Systems (BS
7799)

Information Technology Law & Ethics Slide 9


Topic Two

COMPUTER LAW

Information Technology Law & Ethics Slide 10


Computer Law
• In most countries there is a considerable body of law
that can apply to IT professionals

Such laws include:


– Contract Law

– Intellectual Property Law

– Data Protection Law

– Computer Misuse Law

– Computer Evidence
Information Technology Law & Ethics Slide 11
Contract Law
• Contractors versus employees
• Intellectual property
• Package licensing versus bespoke software
• Contractual duties
• Confidence
• Culpability

Information Technology Law & Ethics Slide 12


Intellectual Property Law

• Moral rights : Right of paternity

• Copyright : Protect original works, sound recordings,


typographical layouts

• Patents : Protect ideas which are novel and not obvious

• Design rights : Protect designs such as circuit board layout

Information Technology Law & Ethics Slide 13


Data Protection Law
• The subject of personal data has the right to view and
correct that data
• Personal data should be accurate, adequate, relevant and
kept up to date
• Personal data should not be kept for longer than is
necessary
• Appropriate technical and organisational measures should
be taken against unauthorised or unlawful processing of
personal data and against accidental loss or destruction of
personal data
Information Technology Law & Ethics
Slide 14
Computer Misuse Law
• Unauthorised access
– Systems
– Programs
– Data

• Unauthorised modification
⁻ Editing
⁻ Deleting

Slide 15
• Information Technology Law & Ethics
Ethical Decision Making
● Not just about right and wrong

● Moral systems and principles

Slide 16

Not just about right and wrong
● Scientists and engineers are generally not very good at
explaining their work or justifying their actions in non-
technical terms

● It is crucial that technologists can provide clear and


understandable justifications for their motives, decisions
and actions

Slide 17
10 Commandments of Computer Ethics
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people's computer resources without
authorization.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you
write.
10. Thou shalt use a computer in ways that show consideration and
respect.
18
Computer Crime
• Theft
– Stealing plain and simple; taking away another’s property
• Piracy
₋ Stealing potential revenue; copyright or patent violation
• Espionage
– Stealing secrets; acquisition of confidential information
• Fraud
• Deceitfully gaining advantage; financial or other advantage
• Sabotage
• Reducing effectiveness of a system; deliberate damage

Slide 19
Computers and Privacy
• Personal Data
– Consumer databases
– Health databases
– Profiling
– Identity theft

• Surveillance
• Satellite and street cameras
• Website tracking
• Mobile phone tracking

Slide 20
Computer Security
• Verification of identities

• Authentication of messages

• Encryption of data

• Access controls

• Audit trails
Slide 21
Topic Three

SAFETY CRITICAL SYSTEMS

Slide 22
Therac-25
• The Therac-25 was a new version of a radiation therapy machine
with more software control
‾ Between June 1985 and January 1987 overdoses of

radiation were given to six people


‾ Three of them died
• Causes
₋ Poor safety design - lack of safety interlocks

₋ Software errors - insufficient testing and debugging

₋ Inadequate reporting and investigation of accidents

₋ Overconfidence

Slide 23
Ariane 5
• In June 1996, 40 seconds after initiation of its flight
sequence, at an altitude of about 3700m, the Ariane 5
rocket veered off its flight path, broke up and exploded
• The cause was an internal variable related to the
horizontal velocity exceeding the maximum value that a
16-bit integer could hold
• This software was, in fact, unnecessary for Ariane 5 but
necessary in its predecessor, Ariane 4
• It had been retained in the reference system of Ariane 5
for reasons of commonality
Slide 24
Summary
• We have looked at what it means to be an IT professional
– What a professional is and the role of professional bodies
• We have considered the main branches of law that affect the
practise of IT
– Contracts, Intellectual Property, Data Protection,
Computer Misuse and Computer Evidence
• We have studied some examples of the relationship between
computer technology and society
– Crime, privacy, security, risks and threats

Slide 25

You might also like