SlideShare a Scribd company logo
1 of 17
Donna Lindskog
 Canadian Information Processing Society (CIPS)




                              The Ethics of Privacy and Censorship




1: http://www.business.com/guides/business-ethics-basics-21726/
   a branch of philosophy that involves
    systematizing, defending, and recommending
    concepts of right and wrong behavior.¹
    Involves:
    › Articulating the good habits that we should acquire,
    › The duties that we should follow
    › Or the consequences of our behavior on others
   We are constantly faced with ethical decisions
    moment to moment, day to day. ²
   [We need to] support our ability to reinforce our
    own inner wisdom as well as help others around
    us reflect. ²

1: http://www.iep.utm.edu/ethics/
2: http://coopcatalyst.wordpress.com/2011/05/16/fostering-ethics-requires-
practice-mindfulness-for-all-ages-guest-post-jennifer-sertl/
All CIPS members (including students) agree to abide by the
Code of Ethics and its ethical principles/imperatives:


1.   Protecting the Public Interest and
     Maintaining Integrity;
2.   Demonstrating Competence and Quality
     of Service;
3.   Maintaining Confidential Information and
     Privacy;
4.   Avoiding Conflict of Interest; and
5.   Upholding Responsibility to the IT Profession.
 Identify what ethical imperatives /
  principles are relevant to the situation
 Begin to generate alternative actions
  and examine probable outcomes
 Reflection (feelings and intuitions)
 Determine action plan
 Take action


    At any time: request interpretation or
     clarification from CIPS¹
1: Understanding the code of ethics, http://www.cips.ca/ethics
 Review actions day to day
 Consider how this impacts others
 Look at Risks and Rewards for all parties
 Talk to other professionals
 Speak on behalf of what is best for all


   Speak on topics where you are expert:
               e.g. the Internet
 Facebook gives notice as it
  defaults your security to “everyone”
 Google gives notice as Google search
  gets default SSL security¹ but not secure
  to advertisers.

transparent does not always mean ethical ²

1: http://www.zdnet.com/blog/google/google-search-gets-default-ssl-security/3407
2: http://www.informationdiet.com/
   How good is this estimate? How much risk is there that the
    project will overrun? What are the open questions that will
    make this estimate change the most?
   How good is this design? Is it “futureproof” or will new
    technologies soon require an upgrade or rewrite or leave
    holes for hackers? Will it work well with other software in
    your architecture, now or in the future?
   How well was this tested? We know there will be
    bugs. How can they check for them? How major can a
    failure be? What plans do they need if this does not work?
   Where did this data come from? How was it
    calculated? How accurate is it?
   Who can see this data? Are there any back doors or
    defaults that may cause security problems? How much
    does security / privacy depend on the people running the
    processes?
 The right to keep who you are private?
 How do we tell who posted Child porn?
 Value of an opinion nobody admits to?
 Risk: no way to verify rights to content, or
  ensure behavior is ethical
 Reward: important (in countries) where
  speaking out has dire
  consequences, encourages free speech
 American bills that allow censorship.
 The Stop Online Piracy Act (any site)and
  the PROTECT IP Act (site with sole
  purpose the distribution of infringing
  content) are two very similar bills.
 REWARD: Piracy costs studios $25B / year¹
 RISK: Free Speech, user-generated
  content , digital media investors, US
  Gov’t control of the internet
   Anti-Counterfeiting Trade Agreement
 an international treaty of 39 countries –
  Canada joined 2011 (thus Bill C-30)
 Internet Service Providers legally
  responsible for their subscribers
 Reward: Less impact from Piracy
 Risk: no public input from 2006 until 2008
  when discussion papers were leaked by
  Wikileaks, Policy laundering, ISP
  monitoring (privacy and cost concerns)
 legislation already in place.
 Digital Millennium Copyright Act (1998).
 Illegal anti-circumvention technology &
  Safe Harbor for content hosts
 REWARD: piracy made harder, cleanup
  without legal fees
 RISK: can’t discuss flaws in security
  technology? Copyright holders must
  monitor everywhere, Creators can’t defend
  their works,
 require that a minimum of social
  responsibility be met¹
 treating people with respect and
  dignity, and being honest in your
  business dealings. ¹
      However, the priorities of individuals differ from the
       priorities of a business, therefore the ethics upheld
       vary from company to company.²



          1: http://www.business.com/guides/business-ethics-basics-21726/
      2. http://www.business.com/guides/business-ethics-key-terms-33375/
 We are experts in Information Technology
  which is not understood by most business
 We work on the World Wide Web
 We have computing values:
    › Openness
    › Reuse
    › Generative:
       Build on previous ideas
    › Permissionless
    › ???
 Discussion on LinkedIn under CIPS group
 From Sean Heuchert (Ontario):

    "Case Studies in Information Technology Ethics" by
      Richard A. Spinello. 1996

   “helped me find my ethical centre”

   Let’s use them to continue this discussion
    “to reinforce our own inner wisdom” .
 Questions?
 Discussion?
 Cases?

More Related Content

More from SaskSummit

Sask 3.0 Summit David G. Brown
Sask 3.0 Summit David G. BrownSask 3.0 Summit David G. Brown
Sask 3.0 Summit David G. Brown
SaskSummit
 
Sask 3.0 Summit Pci dss presentation Bashir Fancy
Sask 3.0 Summit  Pci dss presentation   Bashir FancySask 3.0 Summit  Pci dss presentation   Bashir Fancy
Sask 3.0 Summit Pci dss presentation Bashir Fancy
SaskSummit
 
Sask 3.0 Summit Naveen Singh
Sask 3.0 Summit  Naveen SinghSask 3.0 Summit  Naveen Singh
Sask 3.0 Summit Naveen Singh
SaskSummit
 
Sask 3.0 Summit Dtapp ppt Awareness_Clients_Lakkavally_Chandramohan
Sask 3.0 Summit Dtapp ppt Awareness_Clients_Lakkavally_ChandramohanSask 3.0 Summit Dtapp ppt Awareness_Clients_Lakkavally_Chandramohan
Sask 3.0 Summit Dtapp ppt Awareness_Clients_Lakkavally_Chandramohan
SaskSummit
 
SK Summit 3.0_Roda_Mc_innis_Contractor
SK Summit 3.0_Roda_Mc_innis_ContractorSK Summit 3.0_Roda_Mc_innis_Contractor
SK Summit 3.0_Roda_Mc_innis_Contractor
SaskSummit
 
Sask 3.0 Summit Digital Identity - D. Nikolejsin
Sask 3.0 Summit Digital Identity -  D. NikolejsinSask 3.0 Summit Digital Identity -  D. Nikolejsin
Sask 3.0 Summit Digital Identity - D. Nikolejsin
SaskSummit
 
Sask 3.0 Summit Kind of a Big Deal- D. Risling
Sask 3.0 Summit  Kind of a Big Deal- D. RislingSask 3.0 Summit  Kind of a Big Deal- D. Risling
Sask 3.0 Summit Kind of a Big Deal- D. Risling
SaskSummit
 
Sask 3.0 Summit L. Zacharilla
Sask 3.0 Summit   L. ZacharillaSask 3.0 Summit   L. Zacharilla
Sask 3.0 Summit L. Zacharilla
SaskSummit
 
Sask 3.0 Summit -Seeing the Meaning, IBM R. Loepp
Sask 3.0 Summit -Seeing the Meaning, IBM  R. LoeppSask 3.0 Summit -Seeing the Meaning, IBM  R. Loepp
Sask 3.0 Summit -Seeing the Meaning, IBM R. Loepp
SaskSummit
 
Sask 3.0 Smmit Govt 2 0 - N. Gruen
Sask 3.0 Smmit Govt 2 0  - N. GruenSask 3.0 Smmit Govt 2 0  - N. Gruen
Sask 3.0 Smmit Govt 2 0 - N. Gruen
SaskSummit
 
Sask 3.0 Summit A. Chopra
Sask 3.0 Summit  A. ChopraSask 3.0 Summit  A. Chopra
Sask 3.0 Summit A. Chopra
SaskSummit
 

More from SaskSummit (11)

Sask 3.0 Summit David G. Brown
Sask 3.0 Summit David G. BrownSask 3.0 Summit David G. Brown
Sask 3.0 Summit David G. Brown
 
Sask 3.0 Summit Pci dss presentation Bashir Fancy
Sask 3.0 Summit  Pci dss presentation   Bashir FancySask 3.0 Summit  Pci dss presentation   Bashir Fancy
Sask 3.0 Summit Pci dss presentation Bashir Fancy
 
Sask 3.0 Summit Naveen Singh
Sask 3.0 Summit  Naveen SinghSask 3.0 Summit  Naveen Singh
Sask 3.0 Summit Naveen Singh
 
Sask 3.0 Summit Dtapp ppt Awareness_Clients_Lakkavally_Chandramohan
Sask 3.0 Summit Dtapp ppt Awareness_Clients_Lakkavally_ChandramohanSask 3.0 Summit Dtapp ppt Awareness_Clients_Lakkavally_Chandramohan
Sask 3.0 Summit Dtapp ppt Awareness_Clients_Lakkavally_Chandramohan
 
SK Summit 3.0_Roda_Mc_innis_Contractor
SK Summit 3.0_Roda_Mc_innis_ContractorSK Summit 3.0_Roda_Mc_innis_Contractor
SK Summit 3.0_Roda_Mc_innis_Contractor
 
Sask 3.0 Summit Digital Identity - D. Nikolejsin
Sask 3.0 Summit Digital Identity -  D. NikolejsinSask 3.0 Summit Digital Identity -  D. Nikolejsin
Sask 3.0 Summit Digital Identity - D. Nikolejsin
 
Sask 3.0 Summit Kind of a Big Deal- D. Risling
Sask 3.0 Summit  Kind of a Big Deal- D. RislingSask 3.0 Summit  Kind of a Big Deal- D. Risling
Sask 3.0 Summit Kind of a Big Deal- D. Risling
 
Sask 3.0 Summit L. Zacharilla
Sask 3.0 Summit   L. ZacharillaSask 3.0 Summit   L. Zacharilla
Sask 3.0 Summit L. Zacharilla
 
Sask 3.0 Summit -Seeing the Meaning, IBM R. Loepp
Sask 3.0 Summit -Seeing the Meaning, IBM  R. LoeppSask 3.0 Summit -Seeing the Meaning, IBM  R. Loepp
Sask 3.0 Summit -Seeing the Meaning, IBM R. Loepp
 
Sask 3.0 Smmit Govt 2 0 - N. Gruen
Sask 3.0 Smmit Govt 2 0  - N. GruenSask 3.0 Smmit Govt 2 0  - N. Gruen
Sask 3.0 Smmit Govt 2 0 - N. Gruen
 
Sask 3.0 Summit A. Chopra
Sask 3.0 Summit  A. ChopraSask 3.0 Summit  A. Chopra
Sask 3.0 Summit A. Chopra
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Sask 3.0 Summit -The ethics of privacy & censorship- Lindskog

  • 1. Donna Lindskog Canadian Information Processing Society (CIPS) The Ethics of Privacy and Censorship 1: http://www.business.com/guides/business-ethics-basics-21726/
  • 2.
  • 3. a branch of philosophy that involves systematizing, defending, and recommending concepts of right and wrong behavior.¹ Involves: › Articulating the good habits that we should acquire, › The duties that we should follow › Or the consequences of our behavior on others  We are constantly faced with ethical decisions moment to moment, day to day. ²  [We need to] support our ability to reinforce our own inner wisdom as well as help others around us reflect. ² 1: http://www.iep.utm.edu/ethics/ 2: http://coopcatalyst.wordpress.com/2011/05/16/fostering-ethics-requires- practice-mindfulness-for-all-ages-guest-post-jennifer-sertl/
  • 4. All CIPS members (including students) agree to abide by the Code of Ethics and its ethical principles/imperatives: 1. Protecting the Public Interest and Maintaining Integrity; 2. Demonstrating Competence and Quality of Service; 3. Maintaining Confidential Information and Privacy; 4. Avoiding Conflict of Interest; and 5. Upholding Responsibility to the IT Profession.
  • 5.  Identify what ethical imperatives / principles are relevant to the situation  Begin to generate alternative actions and examine probable outcomes  Reflection (feelings and intuitions)  Determine action plan  Take action  At any time: request interpretation or clarification from CIPS¹ 1: Understanding the code of ethics, http://www.cips.ca/ethics
  • 6.  Review actions day to day  Consider how this impacts others  Look at Risks and Rewards for all parties  Talk to other professionals  Speak on behalf of what is best for all  Speak on topics where you are expert: e.g. the Internet
  • 7.  Facebook gives notice as it defaults your security to “everyone”  Google gives notice as Google search gets default SSL security¹ but not secure to advertisers. transparent does not always mean ethical ² 1: http://www.zdnet.com/blog/google/google-search-gets-default-ssl-security/3407 2: http://www.informationdiet.com/
  • 8. How good is this estimate? How much risk is there that the project will overrun? What are the open questions that will make this estimate change the most?  How good is this design? Is it “futureproof” or will new technologies soon require an upgrade or rewrite or leave holes for hackers? Will it work well with other software in your architecture, now or in the future?  How well was this tested? We know there will be bugs. How can they check for them? How major can a failure be? What plans do they need if this does not work?  Where did this data come from? How was it calculated? How accurate is it?  Who can see this data? Are there any back doors or defaults that may cause security problems? How much does security / privacy depend on the people running the processes?
  • 9.  The right to keep who you are private?  How do we tell who posted Child porn?  Value of an opinion nobody admits to?  Risk: no way to verify rights to content, or ensure behavior is ethical  Reward: important (in countries) where speaking out has dire consequences, encourages free speech
  • 10.  American bills that allow censorship.  The Stop Online Piracy Act (any site)and the PROTECT IP Act (site with sole purpose the distribution of infringing content) are two very similar bills.  REWARD: Piracy costs studios $25B / year¹  RISK: Free Speech, user-generated content , digital media investors, US Gov’t control of the internet
  • 11. Anti-Counterfeiting Trade Agreement  an international treaty of 39 countries – Canada joined 2011 (thus Bill C-30)  Internet Service Providers legally responsible for their subscribers  Reward: Less impact from Piracy  Risk: no public input from 2006 until 2008 when discussion papers were leaked by Wikileaks, Policy laundering, ISP monitoring (privacy and cost concerns)
  • 12.  legislation already in place.  Digital Millennium Copyright Act (1998).  Illegal anti-circumvention technology & Safe Harbor for content hosts  REWARD: piracy made harder, cleanup without legal fees  RISK: can’t discuss flaws in security technology? Copyright holders must monitor everywhere, Creators can’t defend their works,
  • 13.
  • 14.  require that a minimum of social responsibility be met¹  treating people with respect and dignity, and being honest in your business dealings. ¹  However, the priorities of individuals differ from the priorities of a business, therefore the ethics upheld vary from company to company.² 1: http://www.business.com/guides/business-ethics-basics-21726/ 2. http://www.business.com/guides/business-ethics-key-terms-33375/
  • 15.  We are experts in Information Technology which is not understood by most business  We work on the World Wide Web  We have computing values: › Openness › Reuse › Generative:  Build on previous ideas › Permissionless › ???
  • 16.  Discussion on LinkedIn under CIPS group  From Sean Heuchert (Ontario): "Case Studies in Information Technology Ethics" by Richard A. Spinello. 1996  “helped me find my ethical centre”  Let’s use them to continue this discussion “to reinforce our own inner wisdom” .

Editor's Notes

  1. wrong behavior....This may involve articulating the good habits that we should acquire, the duties that we should follow, or the consequences of our behavior on others. http://www.iep.utm.edu/ethics/ 
  2. Competence: Only on topics where you know your stuffIn class we studied several ethics statements. Most are very similar to this. We summarized them all to say:Know what you are doingDon’t be a jerkBe a good citizenEven shorter than that, I’d say: Behave so people will trust you.
  3. Identify the key ethical issues in the situation• Identify what ethical imperatives are relevant to the situation• Determine what ethical principles are of major importance to the situation and begin to implement some possible action by;- generating alternatives and examining the risks and benefits of each- securing additional information- consulting with colleagues, the CIPS Registrar, or with other appropriate sources- examining the probable outcomes of various courses of action• Reflection (include in decision making process the feelings and intuitions evoked by ethical challenges)• Determine action plan• Take action (follow a concrete action plan, evaluate the plan, and be prepared to correct any negative consequences that might occur from the action taken).• In addition, CIPS member may request interpretation, clarification or amplification of any part of the Code of Ethics.- Such requests may be general in nature or may refer to a particular hypothetical or real situation.- Such requests shall be submitted (in confidence) in writing to the Registrar’s Office of CIPS.
  4. Let’s work through a few topics as examples. See if you find it worthwhile.Intellectual property and user created content (all our YouTube videos!) are important parts of the internet.
  5. I used to think that if they told us what they were doing, then they were being ethical.
  6. If being transparent is the MINIMUM step before we leap to ensuring we are ethical, what should WE be transparent about? These are just some of my thoughts about what we need to keep in mind every day.Hopefully you can see something here that convinces you that there are ethics questions in your life every workday. Part of being ethical is giving good explanations to people who must trust your expertise.
  7. One of our ethical statements says that we should be sure to give credit to our peers & I want to be sure to do so.Next 3 slides: Include info from CS280 class assignment on Internet Censorship by:Kyle Stein, ShahrukhMukhtar, Paul Smart, TavisTetlock, & Matthew CunninghamOn January 18, 2012, major websites such as Reddit, Mozilla, Google, Flicker, Wired, and Wikipedia “blacked” out their websites in protest against SOPA and PIPA. Very big online protest. These bills are currently “on hold” or “being reviewed”. Canadian Poker site closed down. New Zealand MegaVideo site closed down. Norwegian site closed down? Some key figures – In 2008, pirated content accounted for 41% of all installed PC software, which translated to a loss of $51 billion. Movie piracy costs movie studios roughly $25 billion a year. http://www.webpronews.com/infographic-the-true-cost-of-piracy-2012-03
  8. The Anti-Counterfeiting Trade Agreement, unlike SOPA or PIPA, is not a law. It is an international treaty with intent to establish standards on intellectual property rights enforcement. The treaty was first created by the United States and Japan in 2006, with Australia, Canada, Morocco, New Zealand, Singapore, and South Korea signing on last year. By signing the agreements, these countries agree to work with one another to prevent counterfeiting and copyright theft.ACTA was first introduced to the public in 2008 when discussion papers were leaked by Wikileaks. ACTA negotiations were keep in secret in 39 countries with no public input or oversight. Recording Industry Association of America (RIAA) were in on the negotiations, but not the public.Not fair to say “if you are against Bill C-30 you are for child porn”. CIPS collected constructive feedback to April 10. Hopefully will be making a submission.
  9. that it establishes a "Safe Harbor" for content hosts against liability for copyright infringement. Essentially if a copyright holder discovers their work being hosted or distributed without permission, they must notify the host, and if the host responds promptly to remove the content they are exempt from liability.So what does all this have to do with you? These are more Global Computing Issues than ones you have to deal with every day. Well, you still need to think about what images and quotes you can use. The point of all this legislation is to ensure people like you are not violating anyone’s intellectual property rights. You need to know about copyright rules….for example….
  10. This is my granddaughter. Any good grandmother likes to find a way to work that picture into the conversation. In this case, I’m using a photo that I took myself. I have an even better one from a photographer, but we’re still discussing where I can use those photos. I paid her money so I could use the professional pictures on the internet, but she seems to require that her watermark / logo be included.Did you know?Almost all things are granted copyright the moment they are written or created. No notice is required.Just because something is posted to the net does not mean anyone can use or copy it.Anything derived from copyrighted works is illegal unless you have requested permission. SongVids are causing lots of issues!We should not assume that giving someone’s work visibility will be a good thing. You have to ask.www.templetons.com/brad/copymyths.htmlhttp://en.wikipedia.org/wiki/Viddinghttp://www.tourofdutyvids.com/songvids.html
  11. Business ethics require that a minimum of social responsibility be met during your day-to-day operations by being open for business during your stated hours, answering your telephone calls and responding to emails, treating people with respect and dignity, and being honest in your business dealings.Ethical practices are important to your business because they protect you from legal ramifications. Corporate ethics training helps teach your employees how to handle situations like harassment, bullying and discrimination, all of which are illegal practices.”Most businesses these days have defined their business purpose and even their values. “Business ethics has become an important issue since the fall of Enron several years ago. However, the priorities of individuals differ from the priorities of a business, therefore the ethics upheld vary from company to company.” http://www.business.com/guides/business-ethics-basics-21726/ http://www.business.com/guides/business-ethics-key-terms-33375/ Most businesses have their business ethics or values defined. So is it important that we have ONE set of standards for the IT industry values?
  12. More of my own thoughts. This idea of computing values is just starting to emerge. Until now, they have been talking about computational thinking. Permission is a barrier to innovation.
  13. As I quoted in my first definitions of ethics, we need discussion “to reinforce our own inner wisdom” . We need to talk about specific cases, not just overarching statements.