Professionalpracticesi N Information Technology: Handbook
Professionalpracticesi N Information Technology: Handbook
ProfessionalPracticesi
n Information
Technology
HandBook
Lecture No. 3
Historical
Professional associations use mechanism to establish status as a profession. Regulate their
membership and convince public that associate deserves to be self-regulated.
Self-regulation: one solution
– Apply code of ethics
– Ethics review board
– Deter unethical behavior of members
Code of ethics
– Lists possible violations
– Threaten sanctions for such violations
– Association of Computing Machinery (ACM)
One of the two most important professional associations for computer scientists / IT
professionals
1972: Code of Professional conduct and 1992: Code of Ethics and Professional Conduct.
Difficulties implementing ethics review system
– 1972’s goal was “carrots and sticks”
– 1992’s goal: major shift towards socialization and education
– Clarifies professionals’ responsibility to society
Most important goal
Professional Practices in Information Technology CSC 110
Provides an aid to individual decision making, presentation addresses nine different cases (with
some overlap)
– Intellectual property
– Privacy
– Confidentiality
– Professional quality
– Fairness or discrimination
– Liability
– Software risks
– Conflicts of interest
– Unauthorized access to computer systems
– “Computer professionals are obligated to preserve the integrity of data about individuals…”
– “… from unauthorized access or accidental disclosure to inappropriate individuals”
Code also specifies for organizational leaders:
– Principle 3.5 (enhance personal dignity)
– Principle 3.4 (assess needs of all those affected by system)
Company officials:
– Have an obligation to protect privacy of their employees.
– Therefore they should not accept inadequate security.
Aisha’s first obligation:
Attempt to educate company officials (implied by principle 2.7)
– If that fails, she needs to consider her contractual obligations (principle 2.6) in ho ouring
assigned responsibilities.
We don’t have Aisha’s contract, but she may have to choose between her contract and her
obligation to honour privacy and security.