Ethics in Internet. Joshi AG Centre for Information and Network Security University of Pune



Similar documents
UNIVERSITY OF ST ANDREWS. POLICY November 2005

CUBIC ENERGY, INC. Code of Business Conduct and Ethics

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE

DIOCESE OF DALLAS. Computer Internet Policy

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306)

REGION 19 HEAD START. Acceptable Use Policy

Odessa College Use of Computer Resources Policy Policy Date: November 2010

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY

Acceptable Use Policy

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Acceptable Use Policy

Information Technology Security Policies

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

Google: Trust, Choice, and Privacy

The Internet and 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

Pacific Northwest University of Health Sciences

OLYMPIC COLLEGE POLICY

How To Use A College Computer System Safely

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator

We will pursue our business with honor, fairness, and respect for the individual and. the public at large ever mindful that there

CODE OF CONDUCT Ethical rules and guidelines

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

Intellectual Property, Copyright and Fair Use: What Students Should Know

Acceptable Use Policy

Information Security It s Everyone s Responsibility

Information Security Policy

1. Computer and Technology Use, Cell Phones Information Technology Policy

State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.

AT&T s Code of Business Conduct

Guidelines Applicability Guidelines Statements Guidelines Administration Management Responsibility... 4

Riverside Community College District Policy No General Institution

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

Policy 4132/4232 PERSONNEL CERTIFIED/NON-CERTIFIELD. Employee use of the District s Computer Systems

Marist College. Information Security Policy

ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS

Legal and Ethical Issues in Computer Security

La Cañada Unified School District Personnel Use of Technology Regulations (AR ) Also known as the Staff Technology and Internet Use Policy

13.19 ETHICS REPORTING POLICY AND PROCEDURE

Our Vendor Code of Conduct

Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy

ACCEPTABLE USE OF TECHNOLOGY

CODE OF BUSINESS CONDUCT

C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY

Message from the Co-Chairmen and Chief Executive Officers

Warren Consolidated Schools Technology Acceptable Use & Internet Safety Guidelines

RIVERVIEW SCHOOL DISTRICT

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

DATA ACCESS POLICY. Attached is a policy statement regarding data access at the New Jersey Institute of Technology.

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

13. Acceptable Use Policy

CODE OF ETHICS AND BUSINESS CONDUCT

Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy

Delaware State University Policy

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

Code - A Date Approved: July 24/01

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Anchor Bay Schools Software Policy

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

Cis1 Chapter 15 Computer Crime and Ethics

Working to standard: a code of conduct for support workers in health care. 1.1 Welcome to this code of conduct for support workers in health care.

How To Use Your Cell Phone At Renaissance Academy Charter School

Forrestville Valley School District #221

Technology Department 1350 Main Street Cambria, CA 93428

Ethical Guidelines for the Online Researcher

Electronic Communication

CITY OF SALINE CELL PHONE POLICY

Milgram Activities. Everyone was paid $4.50 and told that they would receive this even if they quit during the study.

Information Technology Network/ /Internet Acceptable Use Agreement Form IT-D

NewLead Holdings Ltd. Code of Ethics

Acme Consultants Inc.

Transcription:

Ethics in Internet Joshi AG Centre for Information and Network Security University of Pune

The World Today Communication knows no physical boundaries Interconnected globe humming with electronic transmissions a chattering planet nestled in provident silence of space every person everywhere

The Internet The Internet has a number of striking features. It is instantaneous, immediate, worldwide, decentralized, interactive, endlessly expandable in contents and outreach, flexible and adaptable to a remarkable degree Anyone with the necessary equipment and modest technical skill can be an active presence in cyberspace

Potential Supply information whenever required Way to convey thoughts Sharing knowledge and information Beware it has the potential to harm Can be used in - Business - Research - Communication - Fun and Games Doing illegal, immoral activities

Security Concerns in Electronic Environment Availability Confidentiality and Privacy Integrity not while data transfer over public / private media only, but while storage also.

Play it SAFE Don t take candy from STRANGERS Don t go where you don t BELONG Those are real PEOPLE out there WHAT you do reflects on you Play by the RULES Don t POLLUTE Do YOUR part

Ethics Everyone has his own way Story of Blind Men and Elephant The meaning of "ethics" is hard to pin down

Sociologist Raymond Baumhart asked business people "What does ethics mean to you?" Among their replies were the following "Ethics has to do with what my feelings tell me is right or wrong." "Ethics has to do with my religious beliefs." "Being ethical is doing what the law requires." "Ethics consists of the standards of behavior our society accepts." "I don't know what the word means." Contd..

Computer Ethics From the 1940s through the 1960s, therefore, there was no discipline known as "computer ethics Walter Maner in the 1970s decided to use the term "computer ethics" in the mid-70s, Walter Maner defined the field as one which examines "ethical problems aggravated, transformed or created by computer technology

Contd Wiener in 1950 in his book The Human Use of Human Beings, and Moor also discussed it briefly in "What Is Computer Ethics?" [1985]. According to this alternative account, computer ethics identifies and analyzes the impacts of information technology upon human values like health, wealth, opportunity, freedom, democracy, knowledge, privacy, security, self-fulfillment, and so on

Ethics and Internet The technological configuration underlying the Internet has a considerable bearing on its ethical aspects: People have tended to use it according to the way it was designed, and to design it to suit that kind of use Internet is not value free zone. Have sensitivity to social culture

Example Topics in Computer Ethics No matter which re-definition of computer ethics one chooses, the best way to understand the nature of the field is through some representative examples of the issues and problems that have attracted research and scholarship. Consider, for example, the following topics: Computers in the Workplace Computer Crime Privacy and Anonymity Intellectual Property Professional Responsibility Globalization The Metaethics of Computer Ethics

Classes of ethical problems Personal Intrusion Privacy Morality Deception Security Access Intellectual Property Ownership and control Technology and social responsibility

http://ethics.csc.ncsu.edu/

Scenarios 1. Preeti has walked away from a lab computer without logging off. Hemant sits down and, still logged in as Preeti, sends inflammatory e-mail messages out to a number of students and posts similar messages on the class newsgroup A secretary on the campus of a tax-supported university has been requested to give her staff password to her supervisor. The supervisor would like to check the secretarys e-mail when she is not at work to see if departmental-related mail is coming in. The secretary is not comfortable giving her password to her supervisor, but is afraid to say no..contd

Contd Tina's e-mail is being diverted and sent out to her entire class. The messages are quite personal and Tina is very embarrassed Maria figures out that when she is logged into the server she can look at others' directories, make copies of files, and deposit new files. The operating system was designed to allow this functionality so that people could share their work. Mr. Kulkarni objects when he observes Maria poking around in another student's directory. But Maria responds by saying, "If the system allows me to do it and there's no specific rule against it, what's the problem?"

..Contd Smitha had a report to write on acid rain. She used several sources -- books, magazines, newspaper articles, and an electronic encyclopedia. She listed all these sources in her bibliography at the end of the report. She found the encyclopedia to be the most convenient source because she could highlight portions of the text and paste them into her word processing document Joy really enjoys music but doesn't have much money to buy new CDs. He notices that the public library has a lot of CDs and decides to check them out. Once Joy has the CDs at home he realizes that he can burn the CDs and keep copies for himself.

Who should act? Government Regulatory Authority Organizations Educators Parents Individuals

Standardization and Auditing Need for Standardization E.g HIPAA, ISO 17799, BS7799 Auditing Policy of the organization

Association for Computing Machinery (ACM). This Code, consisting of 24 imperatives formulated as statements of personal responsibility, identifies the elements of such a commitment 1. GENERAL MORAL IMPERATIVES Contribute to society and human well-being Avoid harm to others. Be honest and trustworthy. Be fair and take action not to discriminate Honor property rights including copyrights and patent Give proper credit for intellectual property Respect the privacy of others Honor confidentiality

Rfc 1087 Unethical characterized as unethical and unacceptable any activity which purposely: (a) seeks to gain unauthorized access to the resources of the Internet, (b) disrupts the intended use of the Internet, (c) wastes resources (people, capacity, computer) through such actions, (d) destroys the integrity of computer-based information, and/or (e) compromises the privacy of users. Network Working Group Internet Activities Board Request for Comments: 1087 January 1989

Users Responsibility That Which is Not Yours Sharing that Which is Yours Protecting that Which is Yours

THANK YOU! joshiag@cins.unipune.ernet.in