Friday, February 27, 2015







  

Computer Ethics is a new branch of ethics that is growing and changing rapidly as computer technology also grows and develops.
·       Computers are involved to some extent in almost every aspect of our lives.
·       They often perform life-critical tasks
·       Computer science is not regulated to the extent of medicine, air travel, or construction zoning
·       Therefore, we need to carefully consider the issues of ethics.

Ethics?
Ethics refers to the standards and rules; be followed and it helps us to regulate our conduct in a group or with a set of individuals. Since the term Ethics is a relative term, it is branched under philosophy, which states how users of World Wide Web should make decisions regarding their conduct.

·       Standards of right and wrong behaviour.
·       A gauge of personal integrity

Computer Professionals:
n  Are experts in their field,
n  Know customers rely on their knowledge, expertise, and honesty,
n  Understand their products (and related risks) affect many people,
n  Follow good professional standards and practices,
n  Maintain an expected level of competence and are up-to-date on current knowledge and technology, and
n  Educate the non-computer professional

Four primary issues

Privacy – responsibility to protect data about individuals
Accuracy - responsibility of data collectors to authenticate information and ensure its  accuracy
Property - who owns information and software and how can they be sold and exchanged
Access - responsibility of data collectors to control access and determine what information a person has the right to obtain about others and how the information can be used.

Computers are often far more efficient than humans in performing many tasks. In the industrialized world many workers already have been replaced by computerized devices -- bank tellers, auto workers, telephone operators, typists, graphic artists, security guards, assembly-line workers, and on and on. Even professionals like medical doctors, lawyers, teachers, accountants and psychologists are finding that computers can perform many of their traditional professional duties quite effectively.
 Why do we need computer ethics?  The growth of the WWW has created several novel legal issues The existence of new questions that older laws cannot answer Traditional laws are out dated/anachronistic in this world a more coherent body of law is needed to govern Internet and computers.

 Cyber Ethics

The most common problem isn't hacking (illegally accessing Web sites) or cracking (vandalizing Web sites); It's the unauthorized downloading of games and software.
The average hacker is likely to be a teenager and given that most homes now have at least one computer.

 Code of Ethics

Information stored on the computer should be treated as seriously as written or spoken word.
Privacy should not be violated. In case of academic use, it is known plagiarism.
Information from public viewing should not be modified or deleted or inaccessible since these are considered as destructive acts.
Intrusive software such as & worm; and viruses; which are destructive to the computer system is also illegal.
Congesting somebody’s system with a lot of unwanted information is also unethical.
Sending obscene and crude messages through mail or chat is also forbidden.
Sending sexually explicit content, message or pictures is also forbidden.
Ethics is a set of moral principles that govern individual or a group on what is acceptable behaviour while using a computer. Computer ethics is set of moral principles that govern the usage of computers. One of the common issues of computer ethics is violation of copyright issues. Duplicating the copyrighted content without the authors approval, accessing personal information of others are some of the examples that violate ethical principles.
Complain about illegal communication and activities, if found, to Internet service Providers and local law enforcement authorities.
   Users are responsible f or safeguarding their User Id and passwords. They should not write them on paper or anywhere else f or remembrance.
   Users should not intentionally use the computers to retrieve or modify the information of others which may include password information, files etc.

Technologies Impact to Piracy in the Philippines


THE RIGHT TO PRIVACY

Section 3. The privacy of communication and correspondence shall be inviolable except upon lawful order of the court, or when public safety or order requires otherwise as prescribed by law.
Any evidence obtained in violation of this or the preceding section shall be inadmissible for any purpose in any proceeding.
Read:
NOTE: Applicable provisions of the Human Security Act/Anti-Terrorism Law, Republic Act No. 9372, Approved on March 6, 2007 and effective on July 15, 2007 (This Law shall be automatically suspended one (1) month before and two (2) months after the holding of any election).
Please observe the procedure in obtaining the “The Warrant [or Order] of Surveillance”, not found in the 1987 Philippine Constitution.

SURVEILLANCE OF SUSPECTS AND INTERCEPTION AND RECORDING OF COMMUNICATIONS OF SUSPECTS OR CHARGED OF TERRORISM

Section 7. Surveillance of suspects and interception and recording of communications. The provisions of RA 4200 (Anti-Wiretapping Law) to the contrary notwithstanding, a police or law enforcement official and the members of his team may, upon a written order of the Court of Appeals, listen to, intercept and record, with the use of any mode, form or kind or type of electronic or other surveillance equipment or intercepting and tracking devices, or with the use of any other suitable ways or means for that purpose, any communication, message, conversation, discussion, or spoken or written words between members of a judicially declared and outlawed terrorist organization, association, or group of persons or of any person charged with or suspected of the crime of terrorism or conspiracy to commit terrorism.
Provided, That surveillance, interception and recording of communications between lawyers and clients, doctors and patients, journalists and their sources and confidential business correspondence shall not be authorized.
Section 8. Formal Application for Judicial Authorization.- The written order of the authorizing division of the Court of Appeals to track down, tap, listen, intercept, and record communications, messages, conversations, discussions, or spoken or written words of any person suspected of the crime of terrorism or the crime of conspiracy to commit terrorism, shall only be granted by the authorizing division of the Court of Appeals UPON AN EX-PARTE written application of a police or law enforcement official who has been duly authorized in writing by the Anti-Terrorism Council created in Section 53 of this Act to file such ex-parte application, and upon examination under oath and affirmation of the applicant and the witnesses who may produce to establish:

That there is probable cause to believe based on personal knowledge of facts and circumstances that the said crime of terrorism or conspiracy to commit terrorism has been committed, or is being committed, or is about to be committed;
That there is probable cause to  believe based on personal knowledge of facts and circumstances that evidence which is essential to the conviction of any charged or suspected person for, or to the solution or prevention of any such crimes, will be obtained; and
That there is no other effective means readily available for acquiring such evidence.
Sec. 9. Classification and Contents of the Order of the Court. The written order granted by the authorizing division of the Court of Appeals as well as its order, if any, to extend or renew the same, the original application of the applicant, including his application to extend or renew, if any, and the written authorizations of the Anti-Terrorism Council shall be deemed and are hereby declared as classified information: Provided, That the person being surveilled or whose communications, letters, papers, messages, conversations, discussions, spoken or written words and effects have been monitored, listened to, bugged or recorded by law enforcement authorities has the right to be informed of the acts done by the law enforcement authorities in the premises or to challenge, if he or she intends to do so, the legality of the interference before the Court of Appeals which issued said written order. The written order of the authorizing division of the court of Appeals shall specify the following:The identity, such as name and address, if known, of the charged of suspected persons whose communications, messages, conversations, discussions, or spoken or written words are to be tracked down, tapped, listened to, intercepted or recorded and, in case of radio, electronic, or telephone (whether wireless or otherwise) communications, messages, conversations, discussions, or spoken or written words, the electronic transmission systems or the telephone numbers to be tracked down, tapped, listened to, intercepted, and recorded and their locations if the person suspected of the crime of terrorism or conspiracy to commit terrorism is not fully known, such person shall be subject to continuous surveillance  provided there is reasonable ground to do so;
The identity (name and address, and the police or law enforcement organization) of the members of his team judicially authorized to track down, tap, listen to, intercept, and record the communications, messages, conversations, discussions, or spoken or written words;


ZULUETA VS. CA, February 10, 1996

The wife forcibly opened the drawers at the clinic of her doctor-husband and took diaries, checks and greeting cards  of his alleged paramours. Thereafter, she used the same in their legal separation case. Said documents are inadmissible in evidence. This is so because the intimacies of husband and wife does not justify the breaking of cabinets to determine marital infidelity.


OPLE VS. TORRES, July 23, 1998
Puno, J.
Facts:
          On December 12, 1996, then President FIDEL V. RAMOS issued Administrative Order No. 308 entitled “ADOPTION OF A NATIONAL COMPUTERIZED IDENTIFICATION REFERENCE SYSTEM”.
The AO seeks to have all Filipino citizens and foreign residents to have a Population Reference Number (PRN) generated by the National Statistics Office (NSO) through the use of BIOMETRICS TECHNOLOGY.
Further, the AO does not even tell us in clear and unequivocal terms how these information’s gathered shall be handled. It does not provide who shall control and access the data and under what circumstances and for what purpose. These factors are essential to safeguard the privacy and guaranty the integrity of the information. The computer linkage gives other government agencies access to the information. YET, THERE ARE NO CONTROLS TO GUARD AGAINST LEAKAGE OF INFORMATIONS. WHEN THE ACCESS CODE OF THE CONTROL PROGRAMS OF THE PARTICULAR COMPUTER SYSTEM IS BROKEN, AN INTRUDER, WITHOUT FEAR OF SANCTION OR PENALTY, CAN MAKE USE OF THE DATA FOR WHATEVER PURPOSE, OR WORSE, MANIPULATES THE DATA STORED WITHIN THE SYSTEM.

AO No. 308 is unconstitutional since it falls short of assuring that personal information gathered about our people will be used only for specified purposes thereby violating the citizen’s right to privacy.