4.2) Ethics and technology Flashcards
What is ethics? (2)
*Set of principles about right and wrong
*Used to make choices guiding decisions
What is ethical behaviour?
Conforms to generally accepted norms
What factors affect ethical behaviour?
Age, cultural group, ethnic background, religion, life experiences, education, gender
What is the difference between ethics and law?
- Law is a system of rules that defines what we can and cannot do
- Ethics what an individual believes to be
the right thing to do - Legal activity does not mean it is ethical
What is the ethical and legal debate?
A spectrum
What does gaining the goodwill of the community enable? (2)
*Corporate social responsibility (CSR) goals
*Perform socially responsible activities
What does creating an organization that operates consistently do?
*Defines employee expectations
*Provides consistent company behavior
What does fostering good business practices enable? (2)
*Good ethics leads to good business and improved profits
*Bad ethics leads to bad business results
Protecting the organization and its employees from ____ action
legal
What motivations build a strong ethics program? (4)
- Stock value
- Consumer perception of products and services
- Degree of oversight from government agencies
- Support and cooperation from business partners
How is ethical considerations factored into decision making?
How are ethical considerations included in decion making? (5)
- Develop a problem statement
- Identify alternatives
- Choose an alternative
- Implement the decision
- Evaluate the results
What is the professional code of ethics?
*States the principles and core values that an
organization wishes to develop in its leaders
and members
*Primary intent is to define desired _________
behavior
What are the key benefits of professional code of ethics? (4)
- Improve ethical decision making
- Set high standards of practice and ethical behavior
- Engender trust and respect from the general public
- Provide an evaluation benchmark
What do information systems do?
- Information system use requires balance
- Information about people
- Systems collect and store key data on every customer interaction
- Data collection by governments and businesses
What information is collected about you?
What are steps to protect personal data? (4)
*Find out what is stored about you in existing
databases
*Be careful sharing information about yourself
*Be proactive in protecting your privacy
*Take extra care when purchasing anything from
a Web site
- Since POPIA was formulated under the __ directive, it
is ____________ to the General Data Protection Regulation (GDPR)
EU
similar
What are the elements of website privacy policy? (5)
*Notice - Describe personal information being
collected
*Choice - Describe options customer has
*Access - How a customer can see data
collected and change/correct it if necessary
*Security - State how any data that is collected
is stored/protected
*Redress - What customer can do if privacy
policy is not met
What is POPIA and what does it do?
- POPIA provides the mandatory mechanisms and
procedures for handling and processing personal
information in SA. - POPIA provides eight main principles to govern the
processing of personal information regarding direct marketing, automated decision making, and how the
cross-border flow of data is regulated.
What are the principles of POPIA? (8)
- Lawful collection: The collection of personal information should be done in a manner that is lawful and fair to the subject.
- Limited use: The information collected should only be used for the purpose for which it was originally intended, and for which the subject has given consent.
-
Limited processing: Further processing of personal information is limited by POPIA.
Processing more information than that which the data subject agreed to is thereby
prohibited. -
Information quality: It is the responsibility of the party collecting information to ensure it is of quality by taking steps to ensure the data they get is not misleading, complete,
accurate, and up to date. - Transparency:There should be openness where the processing of personal information is involved. As such, both the Information Regulator and the data subject should be aware – and agree – to the collection of the data.
-
Security: The party collecting the information should take measures to prevent the loss, destruction, damage, and unauthorised access or processing of the data. To prevent data from falling into unauthorised hands, organisations should embrace information
technology asset disposition (ITAD) as part of their data security measures. The ITAD protocols set in place are aimed at ensuring that organisations protect their information technology assets to prevent the breach or exposure of personal information and to
ensure regulatory compliance. - Participation: The data subject should have a way of accessing the data stored on them and be able to correct the information if need be.
- Compliance with regulation: It is the responsibility of the party processing personal information to take measures to ensure their activities comply with the principles of
What is the right to privacy recognized as? (2)
- The right to privacy is recognized as a fundamental
human right in the Bill of Rights of the Constitution
of the Republic of South Africa and is protected in
terms of the Constitution and the common law. - This right to privacy is not absolute and may be
limited where it is reasonable and justifiable to do
so.
What are the viewpoints on surveillance? (2)
- Our basic rights of freedom of expression and
association are violated when the government conducts
widespread electronic surveillance - The SA government is obligated to do all that it can do
to provide for the security of its citizens
what does the internet allow for? (3)
*Enables a worldwide exchange of news, ideas,
opinions, rumors, and information
*Provides for open discussions and anonymity
* Creates a remarkable communications medium
* Ethical decisions required on using
Internet’s freedom and power
How is freedom of speech protected? (2)
- Bill of rights/constitution
- Anonymity on internet
What is internet censorship?
*The control or suppression of the publishing or
accessing of information on the Internet
What does internet censorship focus on?
*Censorship efforts may focus on Domain Name
System (DNS) servers
* Officials can “deregister” a domain that hosts content
deemed inappropriate or illegal
What is the process of internet censorhip?