ethics, rules, and lawsstaffsites.slcschools.org/sraymond/computer_tech... · what are ethics rules...

Post on 14-Jul-2020

6 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

What are ethics

Rules we use to determine the right and wrong things to do in our behavior

A gauge of personal integrity

The basis of trust and cooperation in relationships with others

“The principles of conduct governing an individual or a group” – Merriam-Webster Collegiate Dictionary

Assume people are rational and free to make choices

What ethics is not!

Laws or regulations that carry a criminal penalty

Detailed instructions for every possible situation

While from culture to culture ethics can be flexible and changing depending on each unique person or situation – once a society has “agreed upon” ethics, they do not change

Where do ethics come from?

Values of a society

Values of a school, business, or organization

Values from family and heritage

Values of an individual

Most ethical beliefs are learned during childhood and are derived from our family, society, or religious tradition

An ethical person . . .

Has an inner sense of what is moral and...

is able to choose correct behavior in many different situations, including those that are new and different.

Variety of Ethical Views

Deontological – action good or bad because of its intrinsic properties

Consequential – action good or bad because the consequences

*Ethics doesn’t have all the answers, just sets the guidelines*

What follows an unethical choice?

Lost opportunities

Destruction of trust

Damage to people and things

And . . . ?

What are rules

Specific guidelines about appropriate use of computers as outlined in . . .

Acceptable Use Policies (AUPs)

Professional Codes of Ethics

Classroom Disclosures

with . . .

consequences and punishments issued by the computer owners if rules are violated.

What are laws

Regulations passed by state and federal bodies that protect against some forms of misuse of computers and information resources.

So what if I break the law?

You may not be discovered, this time,

but next time . . .

A serial number may be traced

A help line may become suspicious

An acquaintance may report you

A web address may record your visits

And more . . .

And just like that, you’re a criminal …

with a record

and maybe a fine

and maybe even a jail sentence

when you’re convicted of breaking the law

Copyright laws

The exclusive privilege that allows an author or owner to print, sell, publish, etc. his or her own work is known as a copyright.

Software developers own their programs. Software buyers only own the right to use the

software according to the license agreement. No copying, reselling, lending, renting, leasing,

or distributing is legal without the software owner’s permission.

Why Not Steal Software?

Classic excuses everyone’s doing it

we won’t get caught

it’s the software company’s fault: if they don’t want theft, they should charge less

if they don’t want their software stolen, they should make it harder to copy

but I need it and I don’t want to pay for it

it doesn’t hurt anyone

it only hurts a company - I wouldn’t steal it from an individual

no software should ever be copyrighted - it should always be free

Software licenses: Four types

Public Domain

Freeware

Shareware

All Rights Reserved

A site license allows the owner to copy the software onto several computers as stated in the license.

Public Domain License

This software has no owner and is not protected by copyright law.

It was either created with public funds, or the ownership was forfeited by the creator.

The material is available for free to anyone who wants it.

Rare

Unreliable

Poor quality

Virus-laden

No cost? That may be exactly how much this software is worth.

Freeware License

Freeware is copyrighted software that is licensed to be copied and distributed without charge.

Freeware is free because the license says it is, but it’s still under the owner’s control.

This software can be downloaded legally and ethically from the Internet for free.

Some freeware is

“really good stuff.”

Pegasus Mail

Eudora Light

Netscape

Internet Explorer

Shareware License

The software is licensed for copying and sharing for a trial period, but payment is expected to be made to the owner for permanent use.

Some shareware trials expire on a certain date

Payment depends on the honor system

Purchasing (the right to use) the software may also get you a version with more powerful features and published documentation.

All Rights Reserved License

May be used by the purchaser according the exact details spelled out in the license agreement.

You can’t legally use it--or even possess it--without the owner’s permission.

“Wonderful stuff!”

Word Excel PowerPoint Access Illustrator

MicroType QuarkXPress Fireworks Dreamweaver Vision

Windows Quick Books ClickArt Freehand Flash

In Design Quattro Pro Paint MP3 Point and

Click

PhotoShop Age of

Empires

WordPerfect Anti-Virus Camedia

The software and

accompanying

documentation may

not be transmitted

electronically,

including over the

Internet, rented,

loaned, leased,

sold, distributed,

made available,

directly or

indirectly, for USE

by any other person

or entity not

covered by this

License Agreement.

Excerpts from QuarkXPress software license agreement

Even if you can.

Even if no one will ever find out.

Follow the license agreement or you will be breaking the law.

Software piracy.

Conviction of a first offense can result in a fine of up to 250,000.

and a jail sentence of up to five years.

Laws about nuisance or harassment

It doesn’t matter if your intention was to be funny, or friendly, or something else. If the person you contact through the Internet is uncomfortable,

Or it’s illegal.

Laws concerning fraud or plagiarism

Individuals who create “intellectual property” have the right to receive credit

Owners of recorded works deserve to be protected from the incorrect use of their creations

Be sure to give credit where credit is due.

Cite borrowed material with textual citations and a references slide using an accepted format.

Use material in a way that preserves the meaning and context intended by the author

Laws about vandalism

Attempts to harm or destroy data or hardware of another user, agency, or network can be prosecuted to the full extent of the law.

Laws about privacy

Private information cannot be legally used without permission from its owner. Information is owned by the person it describes.

Medical records and school grades are protected by privacy laws.

Other categories of personal information have become more public in recent years. Courts have not set a consistent precedent to preserve the privacy of your full name, address, telephone numbers, debts you owe, court judgments against you, courses you’ve taken, and police actions relating to you.

Be ethical.

Don’t share personal information without that person’s permission.

Always consider ethics, rules, and laws as you choose how to behave when using computers.

The Ten Commandments of Computer Ethics

Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people's computer work. Thou shalt not snoop around in other people's computer files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness. Thou shalt not copy or use proprietary software for which you have

not paid. Thou shalt not use other people's computer resources without

authorization or proper compensation. Thou shalt not appropriate other people's intellectual output. Thou shalt think about the social consequences of the program you

are writing or the system you are designing. Thou shalt always use a computer in ways that insure consideration

and respect for your fellow humans.

References

Bower, Kevin W. Ethics and Computing. IEEE Computer Society Press, 1996.

Hilton, Dr. Thomas, et. Al. “Ethics Teaching Module.” http://complit.usu.edu/ethics_modules.html. (23 Oct. 2002)

Fuller, Floyd. Computers: Navigating Change. EMC Paradigm, 2002

top related