ethics, rules, and lawsstaffsites.slcschools.org/sraymond/computer_tech... · what are ethics rules...
TRANSCRIPT
Ethics, Rules, and Laws
Using the computer appropriately
Have you used a computer today?
What are ethics
Rules we use to determine the right and wrong things to do in our behavior
A gauge of personal integrity
The basis of trust and cooperation in relationships with others
“The principles of conduct governing an individual or a group” – Merriam-Webster Collegiate Dictionary
Assume people are rational and free to make choices
What ethics is not!
Laws or regulations that carry a criminal penalty
Detailed instructions for every possible situation
While from culture to culture ethics can be flexible and changing depending on each unique person or situation – once a society has “agreed upon” ethics, they do not change
Where do ethics come from?
Values of a society
Values of a school, business, or organization
Values from family and heritage
Values of an individual
Most ethical beliefs are learned during childhood and are derived from our family, society, or religious tradition
An ethical person . . .
Has an inner sense of what is moral and...
is able to choose correct behavior in many different situations, including those that are new and different.
Variety of Ethical Views
Deontological – action good or bad because of its intrinsic properties
Consequential – action good or bad because the consequences
*Ethics doesn’t have all the answers, just sets the guidelines*
What follows an unethical choice?
Lost opportunities
Destruction of trust
Damage to people and things
And . . . ?
What are rules
Specific guidelines about appropriate use of computers as outlined in . . .
Acceptable Use Policies (AUPs)
Professional Codes of Ethics
Classroom Disclosures
with . . .
consequences and punishments issued by the computer owners if rules are violated.
What are laws
Regulations passed by state and federal bodies that protect against some forms of misuse of computers and information resources.
So what if I break the law?
You may not be discovered, this time,
but next time . . .
A serial number may be traced
A help line may become suspicious
An acquaintance may report you
A web address may record your visits
And more . . .
And just like that, you’re a criminal …
with a record
and maybe a fine
and maybe even a jail sentence
when you’re convicted of breaking the law
Copyright laws
The exclusive privilege that allows an author or owner to print, sell, publish, etc. his or her own work is known as a copyright.
Software developers own their programs. Software buyers only own the right to use the
software according to the license agreement. No copying, reselling, lending, renting, leasing,
or distributing is legal without the software owner’s permission.
Why Not Steal Software?
Classic excuses everyone’s doing it
we won’t get caught
it’s the software company’s fault: if they don’t want theft, they should charge less
if they don’t want their software stolen, they should make it harder to copy
but I need it and I don’t want to pay for it
it doesn’t hurt anyone
it only hurts a company - I wouldn’t steal it from an individual
no software should ever be copyrighted - it should always be free
Software licenses: Four types
Public Domain
Freeware
Shareware
All Rights Reserved
A site license allows the owner to copy the software onto several computers as stated in the license.
Public Domain License
This software has no owner and is not protected by copyright law.
It was either created with public funds, or the ownership was forfeited by the creator.
The material is available for free to anyone who wants it.
Rare
Unreliable
Poor quality
Virus-laden
No cost? That may be exactly how much this software is worth.
Freeware License
Freeware is copyrighted software that is licensed to be copied and distributed without charge.
Freeware is free because the license says it is, but it’s still under the owner’s control.
This software can be downloaded legally and ethically from the Internet for free.
Some freeware is
“really good stuff.”
Pegasus Mail
Eudora Light
Netscape
Internet Explorer
Shareware License
The software is licensed for copying and sharing for a trial period, but payment is expected to be made to the owner for permanent use.
Some shareware trials expire on a certain date
Payment depends on the honor system
Purchasing (the right to use) the software may also get you a version with more powerful features and published documentation.
All Rights Reserved License
May be used by the purchaser according the exact details spelled out in the license agreement.
You can’t legally use it--or even possess it--without the owner’s permission.
“Wonderful stuff!”
Word Excel PowerPoint Access Illustrator
MicroType QuarkXPress Fireworks Dreamweaver Vision
Windows Quick Books ClickArt Freehand Flash
In Design Quattro Pro Paint MP3 Point and
Click
PhotoShop Age of
Empires
WordPerfect Anti-Virus Camedia
The software and
accompanying
documentation may
not be transmitted
electronically,
including over the
Internet, rented,
loaned, leased,
sold, distributed,
made available,
directly or
indirectly, for USE
by any other person
or entity not
covered by this
License Agreement.
Excerpts from QuarkXPress software license agreement
Even if you can.
Even if no one will ever find out.
Follow the license agreement or you will be breaking the law.
Software piracy.
Conviction of a first offense can result in a fine of up to 250,000.
and a jail sentence of up to five years.
Laws about nuisance or harassment
It doesn’t matter if your intention was to be funny, or friendly, or something else. If the person you contact through the Internet is uncomfortable,
Or it’s illegal.
Laws concerning fraud or plagiarism
Individuals who create “intellectual property” have the right to receive credit
Owners of recorded works deserve to be protected from the incorrect use of their creations
Be sure to give credit where credit is due.
Cite borrowed material with textual citations and a references slide using an accepted format.
Use material in a way that preserves the meaning and context intended by the author
Laws about vandalism
Attempts to harm or destroy data or hardware of another user, agency, or network can be prosecuted to the full extent of the law.
Laws about privacy
Private information cannot be legally used without permission from its owner. Information is owned by the person it describes.
Medical records and school grades are protected by privacy laws.
Other categories of personal information have become more public in recent years. Courts have not set a consistent precedent to preserve the privacy of your full name, address, telephone numbers, debts you owe, court judgments against you, courses you’ve taken, and police actions relating to you.
Be ethical.
Don’t share personal information without that person’s permission.
Always consider ethics, rules, and laws as you choose how to behave when using computers.
The Ten Commandments of Computer Ethics
Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people's computer work. Thou shalt not snoop around in other people's computer files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness. Thou shalt not copy or use proprietary software for which you have
not paid. Thou shalt not use other people's computer resources without
authorization or proper compensation. Thou shalt not appropriate other people's intellectual output. Thou shalt think about the social consequences of the program you
are writing or the system you are designing. Thou shalt always use a computer in ways that insure consideration
and respect for your fellow humans.
References
Bower, Kevin W. Ethics and Computing. IEEE Computer Society Press, 1996.
Hilton, Dr. Thomas, et. Al. “Ethics Teaching Module.” http://complit.usu.edu/ethics_modules.html. (23 Oct. 2002)
Fuller, Floyd. Computers: Navigating Change. EMC Paradigm, 2002