or… being a decent person. it is all too easy to forget that what you type in the privacy of your...

14
Morals and Ethics in IT Or… being a decent person

Upload: claire-gilbert

Post on 25-Dec-2015

218 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: Or… being a decent person.  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere

Morals and Ethics in IT

Or… being a decent person

Page 2: Or… being a decent person.  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere

It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere in the world – and can cause serious harm.

As IT professionals, you will be able to study the examples here, and produce a publicity item showing people how to behave ethically and morally using IT – and you’ll be able to be sure you’re doing that yourself, too…

Morals and Ethics

Page 3: Or… being a decent person.  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere

Exactly what you produce is pretty much up to you – it could be another presentation, or an information leaflet. As long as it is clear enough for you to use for revision, and it covers everything you need in the detail you need, then the medium is your choice. OK?

You need to explain – what each element means, and what can happen when things go wrong – to the customer, the employee, the organisation, the victim, and in the eyes of the law.

Morals and Ethics

Page 4: Or… being a decent person.  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere

Stuff you type into your phone or tablet or pc goes just where you want it – doesn’t it?

Ah. No. Not always. And while you might think you have no secrets from anyone, well… think again. EVERYONE has some things that other people don’t know. It’s often called minding their own business! So check out the links on the next slide, and put together your guide on what can happen if your data is poached…

Use and abuse of personal and private data

Page 5: Or… being a decent person.  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere

http://ukliberty.wordpress.com/data-abuse/ (a bit of a fiery group this, but their info is useful as long as you’re careful)

http://www.computerworld.com/s/article/9220633/Facebook_API_abuse_can_expose_private_user_data_say_hackers (any Facebook users here?)

http://news.bbc.co.uk/1/hi/uk/8239596.stm (old but useful) http://www.zdnet.com/blog/london/uk-government-staff-caught

-snooping-on-citizen-data/4716

http://www.zdnet.com/blog/london/queens-speech-unveils-uks-8216patriot-act-web-monitoring-plan/4663?tag=content;siu-container (bothers me, this one…)

And then – recently in the news – cookie control through http://www.aboutcookies.org/ and http://www.bbc.co.uk/webwise/guides/about-cookies and http://www.allaboutcookies.org/cookies/

And any search for ‘keylogger’ is just too darn scary: look how easy it is to get this software! Check what it does!

Use and abuse of personal and private data

Page 7: Or… being a decent person.  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere

PAUSE!Add your info into your work – a leaflet/presentation/audio recording?

Page 8: Or… being a decent person.  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere

Hopefully you know not to text, email or comment in ways that are just too pathetic to copy here. Hopefully you’re not one of those… well, what do you call them? There’s a current Net trend of ‘trolling’ (more on the next slide) which is pretty disgusting too.

Use the resources on the next slide to help you guide people on how to avoid being a victim, and what to do if they are bullied in this fashion…

cyberbullying

Page 9: Or… being a decent person.  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere

http://stopcyberbullying.org/ http://www.direct.gov.uk/en/YoungPeople/He

althAndRelationships/Bullying/DG_070501 http://www.cyberbullying.info/ (an

interactive resource that I think is pretty good – what do you think?)

http://old.digizen.org/cyberbullying/default.aspx

http://www.cyberbullying.org/ http://www.ncpc.org/cyberbullying http://www.childline.org.uk/Explore/Bullying/

Pages/CyberBullying.aspx

cyberbullying

Page 10: Or… being a decent person.  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere

PAUSE!Add your info into your work – a leaflet/presentation/audio recording?

Page 11: Or… being a decent person.  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere

With the increasing use of ICT, employees are increasingly checked on and monitored. ◦ Staff here are checked in and out with their electronic tags, for

example. ◦ Ambulance drivers are checked to make sure they don’t stop off

at home without asking first◦ Call centre staff are recorded to check they stick to the script

and have no personal calls◦ Just about every organisation – this school included – has an

Acceptable User Policy for the kit which tells you that your Internet use is checked and that there are things you are just not allowed to do.

Check out the sources on the next slide to help you provide your thoughts and advice on dealing with being monitored

Worker monitoring

Page 12: Or… being a decent person.  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere

http://www.employeeprivacyrights.co.uk/monitoring-your-workers.html

http://www.businesslink.gov.uk/bdotg/action/detail?itemId=1074414934&type=RESOURCES

http://www.dailymail.co.uk/sciencetech/article-2153100/Theyre-watching-By-2015-60-employers-monitor-workers-Facebook-pages.html (hmph! Beware of sources like this – but still, they’re worth using – carefully!)

http://www.usatoday.com/money/workplace/2010-03-17-workplaceprivacy15_CV_N.htm (same with this bunch!)

Worker monitoring

Page 13: Or… being a decent person.  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere

STOP!Add your info into your work – a leaflet/presentation/audio recording?

Page 14: Or… being a decent person.  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere

So what have you discovered? What sources did you use that were NOT on

the slides? (extra credit for any paper-based resources)

SPELLCHECK and get someone else to proof read it for you, to make sure it all makes sense to someone else…

Then send it in!

Review what you’ve done