SlideShare a Scribd company logo
1 of 29
ETHICS FOR IT WORKERS
AND IT USERS
A profession is a calling that requires
specialized knowledge and often long and
intensive academic preparation.
The U.S. Code of Federal Regulations defines a
person “employed in a professional capacity”
as one who meets these four criteria:
1. One’s primary duties consist of the
performance of work requiring knowledge
of advanced type in a field of science or
learning customarily acquired by a
prolonged course of specialized intellectual
instruction and study or work.
2. One’s instruction, study, or work is original
and creative in character in a recognized
field of artistic endeavor, the result of which
depends primarily on the invention,
imagination, or talent of the employee.
3. One’s work requires the consistent exercise
of discretion and judgment in its
performance.
4. One’s work is predominantly and varied in
character, and the output or result cannot
be standardized in relation to a given period
of time.
Example doctors, lawyers, accountants
- A professional is expected to contribute to
society, to participate in a life long training
program, to keep abreast of developments
in the field, and to help develop others
professionals
- From a legal standpoint, a professional has
passed the state licensing requirements and
earned the right to practice here
- many professional roles carry special right
and responsibilities
Many business workers have duties,
background and training that qualify them to
be classified as professionals, including
Marketing analyst, financial consultants, and IT
specialists.
It specialists includes programmers, system
analysts, software engineers, database
administrators, Local area network (LAN)
administrators, and chief information officers
(CIOs).
From a legal perspective, IT workers are not
recognized as professionals because they are
not licensed by the state or federal
government.
Example malpractice lawsuits – IT workers are
not liable for malpractice because they do not
meet the legal definition of professional
It workers are considered part of the
professional services industry, which is
experiencing immense changes that impact
how members of this industry must think and
behave to be successful.
Ross Dawson, author and CEO of the
consulting firm Advanced Human
Technology, identifies seven forces that are
changing the nature of professional services.
- Client Sophistication
- Governance
- Connectivity
- Transparency
- Modularization
- Globalization
- Commoditization
Client Sophistication
- Clients are more aware of what they need
from service providers, more willing to look
outside their own organization to get the best
possible services, and better able to drive a
hard bargain to get the best possible service
at the lowest possible cost.
Governance
- More scandals and tougher laws enacted to
avoid future scandals have created an
environment in which there is less trust and
more oversight in client-service provider
reationships.
Connectivity
- Clients and service providers have built their
working relationships on the expectation that
they can communicate easily and instantly
around the globe through electronic
teleconferences, audio conferences, e-mail, and
wireless devices.
Transparency
- Clients expect to be able to see work-in-
progress in real time, and they expect to be able
to influence that work. No longer are clients
willing to wait until end product is complete
before they weigh in with comments and
feedback.
Modularization
- Clients are able to break down their business
processes into the fundamental steps and
decide which they will perform themselves
and which they will outsource to service
providers.
Globalization
- Clients are able to evaluate and choose
among service providers around the globe,
making the service provider industry
extremely competitive.
Commoditization
- Clients look at the delivery of low-end
services as a commodity service for which
price is the primary criteria for choosing a
service provider. For the delivery of high-end
services, clients seek to form a partnership
with their service providers.
 Relationship Between IT Workers and
Employers
 Relationship Between IT Workers and Clients
 Relationship Between IT Workers and
Suppliers
 Relationship Between IT Workers and Other
Professionals
 Relationship Between IT Workers and IT Users
 Relationship Between IT Workers and Society
IT workers and employers have a critical,
multifaceted relationship that requires
ongoing effort by both parties to keep it
strong.
IT worker and an employer typically agree on
fundamental aspects of the relationship
before the worker accepts an employment
offer.
Job title, general performance expectations, specific work
responsibilities, drug-testing requirements, dress code,
location of employment, salary, work hours, and
company benefits.
Many other issues are addressed in the
company’s policy and procedure manual or
in the company’s code of conduct if exists.
Example protection of company secrets, vacation
policy, time off for a funeral, an illness in the
family, use of company resources
Some aspects are addressed by law – for
example, an employee cannot be required
to do something illegal, such as falsify the
results of a quality assurance test.
Some aspects are specific to the role of IT worker
and are established based on the nature of the
work or project – for example, the programming
language to be used, the type and amount of
documentation to produced, and the extent of testing
to be conducted.
IT workers must set an example and enforced
policies regarding the ethical use of IT. IT
workers have the skills and knowledge to
abuse systems and data or to allow others to
do so. Example Software piracy – laws and
policies.
The Business Software Alliance (BSA) is a
trade group that represents the world’s
largest software and hardware
manufacturers. It mission is to stop the
unauthorized copying of software produce
by its members.
“Know It, Report It, Reward It” program,
individuals who report software piracy are
eligible to receive up to $1 million in cash
rewards.
 Adobe
◦ Corel
◦ Dell
◦ IBM
◦ McAfee
 Apple
◦ Intel
◦ Microsoft
◦ Cisco Systems
 Autodesk
◦ HP
◦ SAP
◦ Symantec
A trade secrecy is information, generally
unknown to the public, that a company has
taken strong measures to keep confidential.
Trade secrets can include the design of new
software code, hardware designs, business
plans, the design of a user interface to a
computer program, and manufacturing
processes.
Example Intel’s manufacturing process for i7 quad core
processing chip
Whistle-blowing is an effort by an employee
to attract attention to a negligent, illegal,
unethical, abusive, or dangerous act by a
company that threatens the public interest.
An IT worker often provides services to clients
who either work outside the worker’s own
organization or are “internal”.
IT worker provides hardware, software, or
services at a certain cost and within a given
time frame.
Fraud is the crime of obtaining goods, services,
or property through deception or trickery.
Fraudulent misrepresentation occurs when a
person consciously decides to induce another
person to rely and act on the
misrepresentation.
Misrepresentation is the misstatement of
incomplete statement of a material fact. If
the misrepresentation causes the other party
to enter into a contract, that party may have
the legal right to cancel the contract and seek
reimbursement for damages.
Breach of contract occurs when one party fails
to meet the terms of a contract.
Material breach of contract occurs when a party
fails to perform certain express or implied
obligations, which impairs or destroys the
essence of the contract.
Frequent causes of problems in IT projects:
- The customer changes the scope of the project of
the system requirement
- Poor communication between customer and
vendor leads to performance that does not meet
expectations
- The vendor delivers a system that meets
customer requirements, but a competitor comes
out with a system that offers more advanced and
useful features
- The customer fails to reveal information about
legacy systems or databases that make the new
system extremely difficult to implement.
Bribery involves providing money, property, or
favors to someone in business or government
to obtain a business advantage.
Example A software supplier sales
representative who offer money to another
company’s employee to get its business.
This type of bribe is often referred to as a
kickback or a payoff.
Bribes Gifts
Are made in secret, as they are
neither legally nor morally
acceptable
Are made openly and publicly, as a
gesture of friendship or goodwill
Are often made indirectly through
a third party
Are made directly from donor to
recipient
Encourage an obligation for the
recipient to act favorably toward
the donor
Come with no expectation of a
future favor for the donor
Resume Inflation it involves lying on a resume and
claiming competence in an IT skill that is in high
demand.
Another ethical issue is the inappropriate sharing
of corporate information. Because of their roles,
IT workers have access to corporate databases of
private and confidential information about
employees, customers, suppliers, new product
plans, promotions, budgets and so on. It might
be sold to other organizations or shared
informally during work conversations with others
who have no need to know.
IT users – the person who uses a hardware or
software product from the IT worker who
develop, install, service, and support the product.
IT users need the product to deliver organizational
benefits or to increase their productivity.
IT workers have a key responsibility to establish an
environment that supports ethical behavior by
users.
- Software piracy, minimizes the inappropriate use
of corporate computing resources, and avoids
the inappropriate sharing of information.
Regulatory laws established safety standards for
products and services to protect the public.
The action of an IT worker can affect society.
Example a system analyst may design a
computer-based control system to monitor a
chemical manufacturing process. An error or
failure in the system may put workers or
residents near the plant at risk. As a result, IT
workers have a relationship with society
members who may be affected by their actions.
Negligence is not doing something that a
reasonable person would do, or doing
something that a reasonable person would
not do.
Duty of care refers to the obligation to protect
people against any unreasonable harm or
risk.

More Related Content

Similar to Ethics & Responsibilities for IT Workers & Users

1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docxjeremylockett77
 
ethics and it project management
ethics and it project managementethics and it project management
ethics and it project managementJennifer Cabrera
 
CustomerRecruitment_Ethicsl_Practical_Issues_ConferencePaper2013
CustomerRecruitment_Ethicsl_Practical_Issues_ConferencePaper2013CustomerRecruitment_Ethicsl_Practical_Issues_ConferencePaper2013
CustomerRecruitment_Ethicsl_Practical_Issues_ConferencePaper2013Kristyn Greenwood
 
Cyber-Law-and-Professional-Ethicsss.pptx
Cyber-Law-and-Professional-Ethicsss.pptxCyber-Law-and-Professional-Ethicsss.pptx
Cyber-Law-and-Professional-Ethicsss.pptxprabeshxdezo
 
Social media in the workplace
Social media in the workplace Social media in the workplace
Social media in the workplace AlphaStaff
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptxAmanuelZewdie4
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docxaryan532920
 
Declaring War on IT Turnover
Declaring War on IT TurnoverDeclaring War on IT Turnover
Declaring War on IT TurnoverBloomfire
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012PBeisty
 
Retaining Knowledge and Combatting IT Turnover
Retaining Knowledge and Combatting IT TurnoverRetaining Knowledge and Combatting IT Turnover
Retaining Knowledge and Combatting IT TurnoverBloomfire
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guideJoAnna Cheshire
 
Benefitsofentsocialforit 140911152413-phpapp02
Benefitsofentsocialforit 140911152413-phpapp02Benefitsofentsocialforit 140911152413-phpapp02
Benefitsofentsocialforit 140911152413-phpapp02Vini Dilavari
 
Ceo Update Aug Sep 2011
Ceo Update Aug Sep 2011Ceo Update Aug Sep 2011
Ceo Update Aug Sep 2011rnieman
 
Professional ethics and responsibilities
Professional ethics and responsibilitiesProfessional ethics and responsibilities
Professional ethics and responsibilities17221598-012
 
BYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesBYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesCassie McGarvey, JD
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology Kathirvel Ayyaswamy
 
The Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT ProfessionalsThe Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT ProfessionalsMicrosoft
 
Organizational behavioral practices in link3 technologies ltd.
Organizational behavioral practices in link3 technologies ltd.Organizational behavioral practices in link3 technologies ltd.
Organizational behavioral practices in link3 technologies ltd.Hasibul Islam
 
Mitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersMitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersBroadridge
 

Similar to Ethics & Responsibilities for IT Workers & Users (20)

1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
 
ethics and it project management
ethics and it project managementethics and it project management
ethics and it project management
 
CustomerRecruitment_Ethicsl_Practical_Issues_ConferencePaper2013
CustomerRecruitment_Ethicsl_Practical_Issues_ConferencePaper2013CustomerRecruitment_Ethicsl_Practical_Issues_ConferencePaper2013
CustomerRecruitment_Ethicsl_Practical_Issues_ConferencePaper2013
 
Cyber-Law-and-Professional-Ethicsss.pptx
Cyber-Law-and-Professional-Ethicsss.pptxCyber-Law-and-Professional-Ethicsss.pptx
Cyber-Law-and-Professional-Ethicsss.pptx
 
Social media in the workplace
Social media in the workplace Social media in the workplace
Social media in the workplace
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
Declaring War on IT Turnover
Declaring War on IT TurnoverDeclaring War on IT Turnover
Declaring War on IT Turnover
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012
 
Retaining Knowledge and Combatting IT Turnover
Retaining Knowledge and Combatting IT TurnoverRetaining Knowledge and Combatting IT Turnover
Retaining Knowledge and Combatting IT Turnover
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
 
Benefitsofentsocialforit 140911152413-phpapp02
Benefitsofentsocialforit 140911152413-phpapp02Benefitsofentsocialforit 140911152413-phpapp02
Benefitsofentsocialforit 140911152413-phpapp02
 
Ceo Update Aug Sep 2011
Ceo Update Aug Sep 2011Ceo Update Aug Sep 2011
Ceo Update Aug Sep 2011
 
Professional ethics and responsibilities
Professional ethics and responsibilitiesProfessional ethics and responsibilities
Professional ethics and responsibilities
 
BYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesBYOD: Advice for Employers and Employees
BYOD: Advice for Employers and Employees
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
The Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT ProfessionalsThe Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT Professionals
 
Organizational behavioral practices in link3 technologies ltd.
Organizational behavioral practices in link3 technologies ltd.Organizational behavioral practices in link3 technologies ltd.
Organizational behavioral practices in link3 technologies ltd.
 
Mitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersMitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker Dealers
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Ethics & Responsibilities for IT Workers & Users

  • 1. ETHICS FOR IT WORKERS AND IT USERS
  • 2. A profession is a calling that requires specialized knowledge and often long and intensive academic preparation. The U.S. Code of Federal Regulations defines a person “employed in a professional capacity” as one who meets these four criteria:
  • 3. 1. One’s primary duties consist of the performance of work requiring knowledge of advanced type in a field of science or learning customarily acquired by a prolonged course of specialized intellectual instruction and study or work. 2. One’s instruction, study, or work is original and creative in character in a recognized field of artistic endeavor, the result of which depends primarily on the invention, imagination, or talent of the employee.
  • 4. 3. One’s work requires the consistent exercise of discretion and judgment in its performance. 4. One’s work is predominantly and varied in character, and the output or result cannot be standardized in relation to a given period of time. Example doctors, lawyers, accountants
  • 5. - A professional is expected to contribute to society, to participate in a life long training program, to keep abreast of developments in the field, and to help develop others professionals - From a legal standpoint, a professional has passed the state licensing requirements and earned the right to practice here - many professional roles carry special right and responsibilities
  • 6. Many business workers have duties, background and training that qualify them to be classified as professionals, including Marketing analyst, financial consultants, and IT specialists. It specialists includes programmers, system analysts, software engineers, database administrators, Local area network (LAN) administrators, and chief information officers (CIOs).
  • 7. From a legal perspective, IT workers are not recognized as professionals because they are not licensed by the state or federal government. Example malpractice lawsuits – IT workers are not liable for malpractice because they do not meet the legal definition of professional
  • 8. It workers are considered part of the professional services industry, which is experiencing immense changes that impact how members of this industry must think and behave to be successful. Ross Dawson, author and CEO of the consulting firm Advanced Human Technology, identifies seven forces that are changing the nature of professional services.
  • 9. - Client Sophistication - Governance - Connectivity - Transparency - Modularization - Globalization - Commoditization
  • 10. Client Sophistication - Clients are more aware of what they need from service providers, more willing to look outside their own organization to get the best possible services, and better able to drive a hard bargain to get the best possible service at the lowest possible cost. Governance - More scandals and tougher laws enacted to avoid future scandals have created an environment in which there is less trust and more oversight in client-service provider reationships.
  • 11. Connectivity - Clients and service providers have built their working relationships on the expectation that they can communicate easily and instantly around the globe through electronic teleconferences, audio conferences, e-mail, and wireless devices. Transparency - Clients expect to be able to see work-in- progress in real time, and they expect to be able to influence that work. No longer are clients willing to wait until end product is complete before they weigh in with comments and feedback.
  • 12. Modularization - Clients are able to break down their business processes into the fundamental steps and decide which they will perform themselves and which they will outsource to service providers. Globalization - Clients are able to evaluate and choose among service providers around the globe, making the service provider industry extremely competitive.
  • 13. Commoditization - Clients look at the delivery of low-end services as a commodity service for which price is the primary criteria for choosing a service provider. For the delivery of high-end services, clients seek to form a partnership with their service providers.
  • 14.  Relationship Between IT Workers and Employers  Relationship Between IT Workers and Clients  Relationship Between IT Workers and Suppliers  Relationship Between IT Workers and Other Professionals  Relationship Between IT Workers and IT Users  Relationship Between IT Workers and Society
  • 15. IT workers and employers have a critical, multifaceted relationship that requires ongoing effort by both parties to keep it strong. IT worker and an employer typically agree on fundamental aspects of the relationship before the worker accepts an employment offer. Job title, general performance expectations, specific work responsibilities, drug-testing requirements, dress code, location of employment, salary, work hours, and company benefits.
  • 16. Many other issues are addressed in the company’s policy and procedure manual or in the company’s code of conduct if exists. Example protection of company secrets, vacation policy, time off for a funeral, an illness in the family, use of company resources Some aspects are addressed by law – for example, an employee cannot be required to do something illegal, such as falsify the results of a quality assurance test.
  • 17. Some aspects are specific to the role of IT worker and are established based on the nature of the work or project – for example, the programming language to be used, the type and amount of documentation to produced, and the extent of testing to be conducted. IT workers must set an example and enforced policies regarding the ethical use of IT. IT workers have the skills and knowledge to abuse systems and data or to allow others to do so. Example Software piracy – laws and policies.
  • 18. The Business Software Alliance (BSA) is a trade group that represents the world’s largest software and hardware manufacturers. It mission is to stop the unauthorized copying of software produce by its members. “Know It, Report It, Reward It” program, individuals who report software piracy are eligible to receive up to $1 million in cash rewards.
  • 19.  Adobe ◦ Corel ◦ Dell ◦ IBM ◦ McAfee  Apple ◦ Intel ◦ Microsoft ◦ Cisco Systems  Autodesk ◦ HP ◦ SAP ◦ Symantec
  • 20. A trade secrecy is information, generally unknown to the public, that a company has taken strong measures to keep confidential. Trade secrets can include the design of new software code, hardware designs, business plans, the design of a user interface to a computer program, and manufacturing processes. Example Intel’s manufacturing process for i7 quad core processing chip Whistle-blowing is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the public interest.
  • 21. An IT worker often provides services to clients who either work outside the worker’s own organization or are “internal”. IT worker provides hardware, software, or services at a certain cost and within a given time frame. Fraud is the crime of obtaining goods, services, or property through deception or trickery. Fraudulent misrepresentation occurs when a person consciously decides to induce another person to rely and act on the misrepresentation.
  • 22. Misrepresentation is the misstatement of incomplete statement of a material fact. If the misrepresentation causes the other party to enter into a contract, that party may have the legal right to cancel the contract and seek reimbursement for damages. Breach of contract occurs when one party fails to meet the terms of a contract. Material breach of contract occurs when a party fails to perform certain express or implied obligations, which impairs or destroys the essence of the contract.
  • 23. Frequent causes of problems in IT projects: - The customer changes the scope of the project of the system requirement - Poor communication between customer and vendor leads to performance that does not meet expectations - The vendor delivers a system that meets customer requirements, but a competitor comes out with a system that offers more advanced and useful features - The customer fails to reveal information about legacy systems or databases that make the new system extremely difficult to implement.
  • 24. Bribery involves providing money, property, or favors to someone in business or government to obtain a business advantage. Example A software supplier sales representative who offer money to another company’s employee to get its business. This type of bribe is often referred to as a kickback or a payoff.
  • 25. Bribes Gifts Are made in secret, as they are neither legally nor morally acceptable Are made openly and publicly, as a gesture of friendship or goodwill Are often made indirectly through a third party Are made directly from donor to recipient Encourage an obligation for the recipient to act favorably toward the donor Come with no expectation of a future favor for the donor
  • 26. Resume Inflation it involves lying on a resume and claiming competence in an IT skill that is in high demand. Another ethical issue is the inappropriate sharing of corporate information. Because of their roles, IT workers have access to corporate databases of private and confidential information about employees, customers, suppliers, new product plans, promotions, budgets and so on. It might be sold to other organizations or shared informally during work conversations with others who have no need to know.
  • 27. IT users – the person who uses a hardware or software product from the IT worker who develop, install, service, and support the product. IT users need the product to deliver organizational benefits or to increase their productivity. IT workers have a key responsibility to establish an environment that supports ethical behavior by users. - Software piracy, minimizes the inappropriate use of corporate computing resources, and avoids the inappropriate sharing of information.
  • 28. Regulatory laws established safety standards for products and services to protect the public. The action of an IT worker can affect society. Example a system analyst may design a computer-based control system to monitor a chemical manufacturing process. An error or failure in the system may put workers or residents near the plant at risk. As a result, IT workers have a relationship with society members who may be affected by their actions.
  • 29. Negligence is not doing something that a reasonable person would do, or doing something that a reasonable person would not do. Duty of care refers to the obligation to protect people against any unreasonable harm or risk.