Friday, March 8, 2019
Ethical Principles
1. make for to society and homophile well-being.This principle concerning the quality of life of only mickle affirms an obligation to protect fundamental human rights and to respect the diversity of all cultures. An essential aim of figuring professionals is to minimize negative consequences of reckon systems, including threats to wellness and safety. When designing or implementing systems, computing professionals must attempt to ensure that the products of their efforts leave al whiz be officed in socially responsible shipway, pull up stakes fit social needs, and exit avoid harmful effects to health and offbeat. 2. block harm to former(a)s.Harm means lesion or negative consequences, much(prenominal) as undesirable tone ending of information, loss of property, property damage, or casteless environmental impacts. This principle prohibits use of computing technology in ways that result in harm to every of the following users, the general earth, employees, and employ ers. ruinous actions include intentional destruction or passing of files and programs leading to skillful loss of resources or unnecessary expenditure of human resources such(prenominal) as the time and effort required to purge systems of ready reckoner viruses. 3. Be near and trustworthy.Honesty is an essential component of trust. Without trust an organization cannot function effectively. The unspoilt computing professional get out not make deliberately false or deceptive claims about a system or system design, moreover will instead provide full disclosure of all clever system limitations and problems.A electronic estimator professional has a duty to be honest about his or her own qualifications, and about any circumstances that superpower lead to conflicts of interest. 4. Be fair and take action not to discriminate.The value of equality, tolerance, respect for former(a)s, and the principles of equal justice govern this imperative.Inequities between different groups of community may result from the use or misuse of information and technology. In a fair society, all individuals would arouse equal opportunity to insert in, or benefit from, the use of computer resources regardless of race, sex, religion, age, disability, national inauguration or new(prenominal) such similar factors. However, these ideals do not apologize unauthorized use of computer resources nor do they provide an adequate fanny for violation of any other ethical imperatives of this code.5. Honor property rights including copyrights and patent.Violation of copyrights, patents, good deal secrets and the terms of license agreements is prohibited by law in nigh circumstances. Even when software is not so protected, such violations are depraved to professional behavior. Copies of software should be make only with proper liberty. self-appointed duplication of materials must not be condoned. 6. Give proper accredit for understanding property.Computing professionals are oblig ated to protect the integrity of intellectual property. Specifically, one must not take credit for others ideas or work, even in cases where the work has not been explicitly protected by copyright, patent, etc. 7 Respect the screen of others.Computing and communication technology enables the collection and exchange of individualised information on a scale unprecedented in the taradiddle of civilization. Thus there is increased potential for violating the privacy of individuals and groups. It is the indebtedness of professionals to nourish the privacy and integrity of data describing individuals. This includes taking precautions to ensure the verity of data, as well as protecting it from unauthorized entre or inadvertent disclosure to inappropriate individuals. Furthermore, procedures must be established to allow individuals to follow-up their records and correct inaccuracies. 8. Honor confidentiality.The principle of honesty extends to issues of confidentiality of informati on whenever one has made an explicit promise to honor confidentiality or,implicitly, when private information not at present related to the performance of ones duties becomes available. The ethical concern is to respect all obligations of confidentiality to employers, clients, and users unless fulfill from such obligations by requirements of the law or other principles of this Code.The Ten Commandments of computing device EthicsWritten by the Computer Ethics Institute1. universal gravitational constant shalt not use a computer to harm other people. 2. grand shalt not interfere with other peoples computer work. 3. Thou shalt not snoop around in other peoples computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other peoples computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other peoples intellectual output. 9. Thou shalt think about the social consequences of the program you are penning or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow worker humans. cultivation Ethics1. Personal Privacy IT enables data exchange of information on a large scale from anybody, on any locations or parts of the world, at any times. In this situation, there is increased potential for disclosing information and violating the privacy of any individuals and groups of people due to its widespread disseminations worldwide. It is our challenge and responsibility to halt the privacy and integrity of data regarding individuals. This also includes taking precautions to ensure the accuracy of data, as well as protecting it from unauthorized access or accidental disclosure to inappropriate individuals. 2. Ethical IssuesEthical issues in computing systems is access right. Due to the current popularity of international commerce on the meshing, the topic of computer security and access right has moved quickly from being a low priority for corporations and government agencies to a high priority. This interest has been heightened by computer break-ins at places like Los Alamos National Laboratories and NASA in the US. Many attempts of such illegal access to United States government and military computers by computer hackers have been widely reported. Without implementation of proper computer security policies and strategies, network connections on the Internet cant be made seize from illegal accesses3. Harmful ActionsIn computer ethics, harmful action means injury or negative consequences, such as undesirable loss of information, loss of property, property damage, or unwanted environmental impacts. This principle prohibits use of computing technology in ways that result in harm to any of users, the general public, employees, and employers. Harmful actions include intentional destr uction or modification of files and programs leading to serious loss of resources or unnecessary expenditure of human resources such as the time and effort required to purge systems from computer viruses. In the following tables, a survey of various activities on Internet indicates that illegal information nowadays is often reported. The data shows that the percentage of resolution from Japanese companies and organizations is quite significant (Kubo, 1999).Code of Ethics for the Filipino I.T. ProfessionalsPreambleI will use my social knowledge and skills for the benefit of employers and clients with integrity, subject to an overriding responsibility for the public interest, and I will strive to compound the competence and prestigiousness of the professional. By these, I mean1. I will promote public knowledge technology 2. I will consider the general welfare and public good in the performance of my work 3. I will advertise good or professional in a understand and truthful manner 4 . I will comply and strictly appease by the in related laws inrespect of information technology 5. I will accept full responsibility for the work undertaken and will utilize my skills with competence and professionalism 6. I will make truthful statements on and qualities of my products and service 7. I will not disclose or use any confidential information obtained in the course of professional duties without the harmonize of the parties concerned, except when required by law 8. I will pass judgment to attain the highest in both the products and services I offer 9. I will not knowingly participate in the development of Information Technology System that will promote the Commission of fraud and other unlawful acts 10. I will uphold and improve the IT professional meter through continuing professional development in order to enhance IT profession.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment