Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
21 views7 pages

Lecture Seven

Uploaded by

muyerakingola
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views7 pages

Lecture Seven

Uploaded by

muyerakingola
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

MACHAKOS UNIVERSITY

CENTER OF OPEN, DISTANCE AND e-LEARNING

IN COLLABORATION WITH

SCHOOL OF ENGINEERING AND TECHNOLOGY

DEPARTMENT OF COMPUTING AND INFORMATION TECHNOLOGY.

SIT 180: COMPUTERS AND SOCIETY.

WRITTEN BY:

Mr. Martin Kimeu

Copyright © Machakos University, 2020


All Rights Reserved

OCTOBER, 2020
LECTURE SEVEN

ETHICS AND SOCIAL ISSUES

 In this lesson, we shall look at Law and Ethics and Intellectual property rights.
 The lecture covers:

1. Lecture objectives
2. Law and Ethics
3. Guidelines on the e-mail and Internet usage
4. Intellectual property Rights.
5. Learning Activities
6. Summary
7. Suggestions for further reading

1.1 Lecture Objectives

By the end of this lecture you should be able to:


1. Differentiate law and ethics.
2. Describe the Guidelines on the e-mail and Internet usage
3. Describe intellectual property Rights.
4. Explain why we need ethics and law in computing?

ETHICS AND SOCIAL ISSUES

A.) Ethics in general


1. We often see pirated CDs, software and VCD being sold at the
night market. Buying pirated software is an example of unethical
activity in computer ethic.
2. A guideline is needed to stop the current technology products from
being exploited, for example by replicating originals CDs and selling them as
pirated software. This unethical behavior can be controlled by the code of
conducts.
3. Computer ethics is a system of moral standards or values used as a
guideline for computer users.

COMPUTER ETHICS
Ethics in general, is a moral philosophy where a person makes specific
moral choice and sticks to it.

In computing, ethics are the moral guidelines to referred to when using


the computer and computer networks.

Computer ethics is a system of moral standards or values used as


computer guidelines for computer users.

B.) Guidelines on the e-mail and Internet usage


1. The ICT policy has provided guidelines on the e-mail and Internet
usage as reference to the staff.

2. This guidance covers the usage of e-mail account, mailbox


maintenance, and e-Mail preparation and delivery, mailing list and the
Internet.
3. Some guidelines from the ICT policy:
a) Use only individual e-mail address to forward individual opinion.
b) Keep the identity name and password a secret to avoid the misuse of
your e-mail without your knowledge.
c) E-mail must be active to promptly reply the necessary actions
needed for any matters.
d) Ensure the total mail kept in the box is within the computer
storage capacity.
e) Scan files regularly to avoid the transmission of virus from one
computer to another.
f) Do not send e-mails that contain classified information which can be
used to tarnish other people or country.
g) Choose a suitable time to search Internet to save access time and
cost.
h) Beware of prohibited sites which could affect one’s moral,
organization or nation.
i) Print only relevant documents that you think can be used in future to
save cost.

THE DIFFERENCES BETWEEN ETHICS AND LAW S


A.) Definition of Ethics
1. In general, ethics is a moral philosophy where a person makes a
specific moral choice and sticks to it.
2. On the other hand, ethics in computing means moral guidelines to
refer to when using the computer and computer networks. This
includes the Internet.

B.) Definition of Law


1. Law is a legal system comprising of rules and principles that
govern the affairs of a community and controlled by a political
authority.
2. Law differs from one country to another. In the era of technology,
computer law is needed to clarify goods or actions that fall under
the computer law. Computer law refers to all areas in law that
requires an understanding of computer technology such as
hardware, software and Internet.

C.) Why do we need ethics and law in computing?

1. Respecting Ownership

We must respect ownership by not stealing other people’s work


either by duplicating or distributing it. Duplicating and distributing
copies of audio tapes, video tapes and computer programs without
permission and authorization from the individual or company that
created the program are immoral and illegal.

2. Respecting privacy and confidentiality

We should respect other people’s privacy and confidentiality by


refraining ourselves from reading their mails or files without their
permission. If we do so, it is considered as violating an individual’s
right to privacy and confidentiality

3. Respecting property

Property here means ownership. Since an individual data and


information are considered as property, therefore, an act of tampering
and changing electronic information is considered as vandalism and
disrespect for other people’s property.
D.) Similarities between Ethics and Law

a. Both ethics and law are complimentary to each other and are made a.
to guide user from misusing computers
b. to create a healthy computer society, so that computers are used to
contribute to a better life.
c to prevent any crime.

E.) Differences between ethics and laws

Ethics Law

1. Guideline 1. Control
As a guideline to computer users As a rule to control computer
users.
2. Moral standard 2. Judicial standard
Ethical behavior is judged by Law is judged by judicial standards
moral standard.
3. Free to follow 3. Must follow
Computer users are free to follow Computer users must follow the
or ignore the code of ethics regulations and law
4. No punishments 4. Penalties, imprisonments and
No punishments for anyone who other punishments. Penalties,
violates ethics imprisonments and other
punishments for those who break
the law.

5. Universal 5. Depends on country


Universal, can be applied Depends on country and state
anywhere, all over the world where the crime is committed.
6. Produce ethical computer user 6. Prevent misusing of computers
To produce ethical computer users To prevent misuse of computers

7. Immoral 8. Crime

Not honoring computer ethics Not honoring the law means


means ignoring the moral committing a crime
elements (immoral).

INTELLECTUAL PROPERTY RIGHTS

It is important to have your creation patented to protect your rights.


Reproducing other people’s inventions without their permission or piracy
is illegal. We must respect the rights of others.

A.) Definition of Intellectual Property


1. Intellectual Property (IP) refers to works created by inventors, authors
and artists. Those works are unique and have value in the market value.

2. In our daily lives, we are surrounded by things that are protected by


IP. Your school bags, your shoes and even your socks are protected by
Intellectual Property Rights. Nike, Bata or Adidas, for example, are all
protected by a group of legal rights.

B.) Intellectual Property Law


- Intellectual property and intellectual property right can be protected
under the Intellectual Property Law.

- Intellectual Property Laws cover ideas, inventions, literary


creations, unique names, business models, industrial processes,
computer program codes and more.

C.) Inventions Protected By Intellectual Property Laws

1. As businesses continue to expand globally, business owners must


realize the importance of getting professional advice on how to establish
and safeguard their intellectual property rights.

2. This includes Trademarks, Service marks, Trade/Company names,


Domain names, Geographical indications, Copyrights, Patents.

3. Example of creation that are covered under the Intellectual Property


Law include architectural, audio visual, sound recording, Literary, musical
and sculptural.

D.) Intellectual Property Protection

There are four types of Intellectual Property Protection. They are:

1. Patents for invention


Utility, design or plant patents that protect inventions and
improvements to the existing inventions.
It is a grant of a property right to the inventor. For example; Centrino
is a processor which introduces efficient power management. The
design of the processor is patented by Intel.

2. Trademarks for brand identity


Words, names, symbols, devices and images that represent
products, goods or services. Trademarks for brands, identity of goods
and services allowed the distinction to be made between different
traders. For example: Intel and AMD.

3. Designs for product appearance


The features of, in particular, the lines, contours, colors, shape,
texture or material of the product itself or its ornaments.
The design for product appearance covered the whole or a part of a
product resulting from the feature such as the lines, contours,
colors, shape, texture or material. For example: Apple IMAC.
4. Copyright for material
Literary and artistic material, music, films, sound recordings
and broadcast, including software and multimedia.
Copyrights protect the expression of idea in literary, artistic and
musical works. For example, you can copyright the web content
you have just designed.

You might also like