Session 1
Session 1
Slide 2
Session Outline
The key topics to be covered in the session are as follows:
• Computer Law
Competence-Responsibility-Trust
What is a profession?
– Engineering Council
– Which Professional bodies are in Ghana?
COMPUTER LAW
– Computer Evidence
Information Technology Law & Ethics Slide 11
Contract Law
• Contractors versus employees
• Intellectual property
• Package licensing versus bespoke software
• Contractual duties
• Confidence
• Culpability
• Unauthorised modification
⁻ Editing
⁻ Deleting
Slide 15
• Information Technology Law & Ethics
Ethical Decision Making
● Not just about right and wrong
Slide 16
•
Not just about right and wrong
● Scientists and engineers are generally not very good at
explaining their work or justifying their actions in non-
technical terms
Slide 17
10 Commandments of Computer Ethics
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people's computer resources without
authorization.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you
write.
10. Thou shalt use a computer in ways that show consideration and
respect.
18
Computer Crime
• Theft
– Stealing plain and simple; taking away another’s property
• Piracy
₋ Stealing potential revenue; copyright or patent violation
• Espionage
– Stealing secrets; acquisition of confidential information
• Fraud
• Deceitfully gaining advantage; financial or other advantage
• Sabotage
• Reducing effectiveness of a system; deliberate damage
Slide 19
Computers and Privacy
• Personal Data
– Consumer databases
– Health databases
– Profiling
– Identity theft
• Surveillance
• Satellite and street cameras
• Website tracking
• Mobile phone tracking
Slide 20
Computer Security
• Verification of identities
• Authentication of messages
• Encryption of data
• Access controls
• Audit trails
Slide 21
Topic Three
Slide 22
Therac-25
• The Therac-25 was a new version of a radiation therapy machine
with more software control
‾ Between June 1985 and January 1987 overdoses of
₋ Overconfidence
Slide 23
Ariane 5
• In June 1996, 40 seconds after initiation of its flight
sequence, at an altitude of about 3700m, the Ariane 5
rocket veered off its flight path, broke up and exploded
• The cause was an internal variable related to the
horizontal velocity exceeding the maximum value that a
16-bit integer could hold
• This software was, in fact, unnecessary for Ariane 5 but
necessary in its predecessor, Ariane 4
• It had been retained in the reference system of Ariane 5
for reasons of commonality
Slide 24
Summary
• We have looked at what it means to be an IT professional
– What a professional is and the role of professional bodies
• We have considered the main branches of law that affect the
practise of IT
– Contracts, Intellectual Property, Data Protection,
Computer Misuse and Computer Evidence
• We have studied some examples of the relationship between
computer technology and society
– Crime, privacy, security, risks and threats
Slide 25