Sask 3.0 Summit -The ethics of privacy & censorship- Lindskog
1. Donna Lindskog
Canadian Information Processing Society (CIPS)
The Ethics of Privacy and Censorship
1: http://www.business.com/guides/business-ethics-basics-21726/
2.
3. a branch of philosophy that involves
systematizing, defending, and recommending
concepts of right and wrong behavior.¹
Involves:
› Articulating the good habits that we should acquire,
› The duties that we should follow
› Or the consequences of our behavior on others
We are constantly faced with ethical decisions
moment to moment, day to day. ²
[We need to] support our ability to reinforce our
own inner wisdom as well as help others around
us reflect. ²
1: http://www.iep.utm.edu/ethics/
2: http://coopcatalyst.wordpress.com/2011/05/16/fostering-ethics-requires-
practice-mindfulness-for-all-ages-guest-post-jennifer-sertl/
4. All CIPS members (including students) agree to abide by the
Code of Ethics and its ethical principles/imperatives:
1. Protecting the Public Interest and
Maintaining Integrity;
2. Demonstrating Competence and Quality
of Service;
3. Maintaining Confidential Information and
Privacy;
4. Avoiding Conflict of Interest; and
5. Upholding Responsibility to the IT Profession.
5. Identify what ethical imperatives /
principles are relevant to the situation
Begin to generate alternative actions
and examine probable outcomes
Reflection (feelings and intuitions)
Determine action plan
Take action
At any time: request interpretation or
clarification from CIPS¹
1: Understanding the code of ethics, http://www.cips.ca/ethics
6. Review actions day to day
Consider how this impacts others
Look at Risks and Rewards for all parties
Talk to other professionals
Speak on behalf of what is best for all
Speak on topics where you are expert:
e.g. the Internet
7. Facebook gives notice as it
defaults your security to “everyone”
Google gives notice as Google search
gets default SSL security¹ but not secure
to advertisers.
transparent does not always mean ethical ²
1: http://www.zdnet.com/blog/google/google-search-gets-default-ssl-security/3407
2: http://www.informationdiet.com/
8. How good is this estimate? How much risk is there that the
project will overrun? What are the open questions that will
make this estimate change the most?
How good is this design? Is it “futureproof” or will new
technologies soon require an upgrade or rewrite or leave
holes for hackers? Will it work well with other software in
your architecture, now or in the future?
How well was this tested? We know there will be
bugs. How can they check for them? How major can a
failure be? What plans do they need if this does not work?
Where did this data come from? How was it
calculated? How accurate is it?
Who can see this data? Are there any back doors or
defaults that may cause security problems? How much
does security / privacy depend on the people running the
processes?
9. The right to keep who you are private?
How do we tell who posted Child porn?
Value of an opinion nobody admits to?
Risk: no way to verify rights to content, or
ensure behavior is ethical
Reward: important (in countries) where
speaking out has dire
consequences, encourages free speech
10. American bills that allow censorship.
The Stop Online Piracy Act (any site)and
the PROTECT IP Act (site with sole
purpose the distribution of infringing
content) are two very similar bills.
REWARD: Piracy costs studios $25B / year¹
RISK: Free Speech, user-generated
content , digital media investors, US
Gov’t control of the internet
11. Anti-Counterfeiting Trade Agreement
an international treaty of 39 countries –
Canada joined 2011 (thus Bill C-30)
Internet Service Providers legally
responsible for their subscribers
Reward: Less impact from Piracy
Risk: no public input from 2006 until 2008
when discussion papers were leaked by
Wikileaks, Policy laundering, ISP
monitoring (privacy and cost concerns)
12. legislation already in place.
Digital Millennium Copyright Act (1998).
Illegal anti-circumvention technology &
Safe Harbor for content hosts
REWARD: piracy made harder, cleanup
without legal fees
RISK: can’t discuss flaws in security
technology? Copyright holders must
monitor everywhere, Creators can’t defend
their works,
13.
14. require that a minimum of social
responsibility be met¹
treating people with respect and
dignity, and being honest in your
business dealings. ¹
However, the priorities of individuals differ from the
priorities of a business, therefore the ethics upheld
vary from company to company.²
1: http://www.business.com/guides/business-ethics-basics-21726/
2. http://www.business.com/guides/business-ethics-key-terms-33375/
15. We are experts in Information Technology
which is not understood by most business
We work on the World Wide Web
We have computing values:
› Openness
› Reuse
› Generative:
Build on previous ideas
› Permissionless
› ???
16. Discussion on LinkedIn under CIPS group
From Sean Heuchert (Ontario):
"Case Studies in Information Technology Ethics" by
Richard A. Spinello. 1996
“helped me find my ethical centre”
Let’s use them to continue this discussion
“to reinforce our own inner wisdom” .
wrong behavior....This may involve articulating the good habits that we should acquire, the duties that we should follow, or the consequences of our behavior on others. http://www.iep.utm.edu/ethics/
Competence: Only on topics where you know your stuffIn class we studied several ethics statements. Most are very similar to this. We summarized them all to say:Know what you are doingDon’t be a jerkBe a good citizenEven shorter than that, I’d say: Behave so people will trust you.
Identify the key ethical issues in the situation• Identify what ethical imperatives are relevant to the situation• Determine what ethical principles are of major importance to the situation and begin to implement some possible action by;- generating alternatives and examining the risks and benefits of each- securing additional information- consulting with colleagues, the CIPS Registrar, or with other appropriate sources- examining the probable outcomes of various courses of action• Reflection (include in decision making process the feelings and intuitions evoked by ethical challenges)• Determine action plan• Take action (follow a concrete action plan, evaluate the plan, and be prepared to correct any negative consequences that might occur from the action taken).• In addition, CIPS member may request interpretation, clarification or amplification of any part of the Code of Ethics.- Such requests may be general in nature or may refer to a particular hypothetical or real situation.- Such requests shall be submitted (in confidence) in writing to the Registrar’s Office of CIPS.
Let’s work through a few topics as examples. See if you find it worthwhile.Intellectual property and user created content (all our YouTube videos!) are important parts of the internet.
I used to think that if they told us what they were doing, then they were being ethical.
If being transparent is the MINIMUM step before we leap to ensuring we are ethical, what should WE be transparent about? These are just some of my thoughts about what we need to keep in mind every day.Hopefully you can see something here that convinces you that there are ethics questions in your life every workday. Part of being ethical is giving good explanations to people who must trust your expertise.
One of our ethical statements says that we should be sure to give credit to our peers & I want to be sure to do so.Next 3 slides: Include info from CS280 class assignment on Internet Censorship by:Kyle Stein, ShahrukhMukhtar, Paul Smart, TavisTetlock, & Matthew CunninghamOn January 18, 2012, major websites such as Reddit, Mozilla, Google, Flicker, Wired, and Wikipedia “blacked” out their websites in protest against SOPA and PIPA. Very big online protest. These bills are currently “on hold” or “being reviewed”. Canadian Poker site closed down. New Zealand MegaVideo site closed down. Norwegian site closed down? Some key figures – In 2008, pirated content accounted for 41% of all installed PC software, which translated to a loss of $51 billion. Movie piracy costs movie studios roughly $25 billion a year. http://www.webpronews.com/infographic-the-true-cost-of-piracy-2012-03
The Anti-Counterfeiting Trade Agreement, unlike SOPA or PIPA, is not a law. It is an international treaty with intent to establish standards on intellectual property rights enforcement. The treaty was first created by the United States and Japan in 2006, with Australia, Canada, Morocco, New Zealand, Singapore, and South Korea signing on last year. By signing the agreements, these countries agree to work with one another to prevent counterfeiting and copyright theft.ACTA was first introduced to the public in 2008 when discussion papers were leaked by Wikileaks. ACTA negotiations were keep in secret in 39 countries with no public input or oversight. Recording Industry Association of America (RIAA) were in on the negotiations, but not the public.Not fair to say “if you are against Bill C-30 you are for child porn”. CIPS collected constructive feedback to April 10. Hopefully will be making a submission.
that it establishes a "Safe Harbor" for content hosts against liability for copyright infringement. Essentially if a copyright holder discovers their work being hosted or distributed without permission, they must notify the host, and if the host responds promptly to remove the content they are exempt from liability.So what does all this have to do with you? These are more Global Computing Issues than ones you have to deal with every day. Well, you still need to think about what images and quotes you can use. The point of all this legislation is to ensure people like you are not violating anyone’s intellectual property rights. You need to know about copyright rules….for example….
This is my granddaughter. Any good grandmother likes to find a way to work that picture into the conversation. In this case, I’m using a photo that I took myself. I have an even better one from a photographer, but we’re still discussing where I can use those photos. I paid her money so I could use the professional pictures on the internet, but she seems to require that her watermark / logo be included.Did you know?Almost all things are granted copyright the moment they are written or created. No notice is required.Just because something is posted to the net does not mean anyone can use or copy it.Anything derived from copyrighted works is illegal unless you have requested permission. SongVids are causing lots of issues!We should not assume that giving someone’s work visibility will be a good thing. You have to ask.www.templetons.com/brad/copymyths.htmlhttp://en.wikipedia.org/wiki/Viddinghttp://www.tourofdutyvids.com/songvids.html
Business ethics require that a minimum of social responsibility be met during your day-to-day operations by being open for business during your stated hours, answering your telephone calls and responding to emails, treating people with respect and dignity, and being honest in your business dealings.Ethical practices are important to your business because they protect you from legal ramifications. Corporate ethics training helps teach your employees how to handle situations like harassment, bullying and discrimination, all of which are illegal practices.”Most businesses these days have defined their business purpose and even their values. “Business ethics has become an important issue since the fall of Enron several years ago. However, the priorities of individuals differ from the priorities of a business, therefore the ethics upheld vary from company to company.” http://www.business.com/guides/business-ethics-basics-21726/ http://www.business.com/guides/business-ethics-key-terms-33375/ Most businesses have their business ethics or values defined. So is it important that we have ONE set of standards for the IT industry values?
More of my own thoughts. This idea of computing values is just starting to emerge. Until now, they have been talking about computational thinking. Permission is a barrier to innovation.
As I quoted in my first definitions of ethics, we need discussion “to reinforce our own inner wisdom” . We need to talk about specific cases, not just overarching statements.