Professional Documents
Culture Documents
Introduction
Ethics refers to principles of human conduct, or morals, and to the systematic study of such
human values, often called moral philosophy, the study of theories of conduct and goodness,
and of the meanings of moral terms.
An act is considered to be 'ethical' if it is in accordance with approved moral behavior or
norms. Ethics implies civic responsibility on the part of citizens and responsibility by society's
institutions, including governments. Ethics is concerned with questions such as when is an
action 'right' or 'wrong' and what standard separates 'good' from 'bad'. We propose to accept one
of the basic tenets of modern moral philosophy that the authority invoked for 'good' conduct is
the rule of reason and that moral behavior results from rational thought that does not harm the
individual and leads ultimately to the greatest good for all individuals in a society. This
definition and assumption equates well with the main issue of another debate driven partially
by ethics, i.e. relating to public domain information, or more specifically public sector
information that may not be in the public domain, as stated in recent UNESCO-backed
guidelines regarding public sector information.
"One of the ultimate goals of any society is the empowerment of all its citizens through access
and use of information and knowledge. Every person and every nation must have equal
opportunity to benefit from cultural diversity and scientific progress as a basic human right in
the current information revolution and the emerging knowledge society"
CODE OF ETHICS
5
IT professionals are obligated to protect the integrity of intellectual property. Specifically, one
must not take credit for other's ideas or work, even in cases where the work has not been
explicitly protected by copyright, patent, etc.
8. Honor confidentiality.
The principle of honesty extends to issues of confidentiality of information whenever one has
made an explicit promise to honor confidentiality or, implicitly, when private information not
directly related to the performance of one's duties becomes available. The ethical concern is to
respect all obligations of confidentiality to employers, clients, and users unless discharged from
such obligations by requirements of the law or other principles of this Code.
6
SPECIFIED PROFESSIONAL RESPONSIBILITIES.
1. Strive to achieve the highest quality, effectiveness and dignity in both process and
products of professional work.
Excellence is perhaps the most important obligation of a profession. An IT practitioner must
strive to achieve quality and to be cognizant of the serious negative consequences that may
result from poor quality in a system.
5 Give comprehensive and thorough evaluations of computer systems and their impacts,
including analysis of possible risks.
IT practitioners must strive to be perceptive, thorough, and objective when evaluating,
recommending, and presenting system descriptions and alternatives. IT practitioner are in a
7
position of special trust, and therefore have a special responsibility to provide objective,
credible evaluations to employers, clients, users, and the public. When providing evaluations
the practitioner must also identify any relevant conflicts of interest, as stated in imperative 1.3.
As noted in the discussion of principle 1.2 on avoiding harm, any signs of danger from systems
must be reported to those who have opportunity and/or responsibility to resolve them..
8
8. Access computing and communication resources only when authorized to do so.
Theft or destruction of tangible and electronic property is prohibited by imperative "Avoid
harm to others." Trespassing and unauthorized use of a computer or communication system is
addressed by this imperative. Trespassing includes accessing communication networks and
computer systems, or accounts and/or files associated with those systems, without explicit
authorization to do so. Individuals and organizations have the right to restrict access to their
systems so long as they do not violate the discrimination principle. No one should enter or use
another's computer system, software, or data files without permission. One must always have
appropriate approval before using system resources, including communication ports, file space,
other system peripherals, and computer time.
This section draws extensively from the draft IFIP Code of Ethics, especially its sections on
organizational ethics and international concerns. The ethical obligations of organizations tend
to be neglected in most codes of professional conduct, perhaps because these codes are written
from the perspective of the individual member. This dilemma is addressed by stating these
imperatives from the perspective of the organizational leader. In this context "leader" is viewed
as any organizational member who has leadership or educational responsibilities. These
imperatives generally may apply to organizations as well as their leaders. In this context
"organizations" are corporations, government agencies, and other "employers," as well as
volunteer professional organizations.
9
2. Manage personnel and resources to design and build information systems that enhance
the quality of working life.
Organizational leaders are responsible for ensuring that computer systems enhance, not
degrade, the quality of working life. When implementing a computer system, organizations
must consider the personal and professional development, physical safety, and human dignity
of all workers. Appropriate human-computer ergonomic standards should be considered in
system design and in the workplace.
4. Ensure that users and those who will be affected by a system have their needs clearly
articulated during the assessment and design of requirements; later the system must be
validated to meet requirements.
Current system users, potential users and other persons whose lives may be affected by a
system must have their needs assessed and incorporated in the statement of requirements.
System validation should ensure compliance with those requirements.
5. Articulate and support policies that protect the dignity of users and others affected by
a computing system.
Designing or implementing systems that deliberately or inadvertently demean individuals or
groups is ethically unacceptable. Computer professionals who are in decision making positions
should verify that systems are designed and implemented to protect personal privacy and
enhance personal dignity.
6. Create opportunities for members of the organization to learn the principles and
limitations of computer systems.
This complements the imperative on public understanding. Educational opportunities are
essential to facilitate optimal participation of all organizational members. Opportunities must
be available to all members to help them improve their knowledge and skills in computing,
10
including courses that familiarize them with the consequences and limitations of particular
types of systems. In particular, professionals must be made aware of the dangers of building
systems around oversimplified models, the improbability of anticipating and designing for
every possible operating condition, and other issues related to the complexity of this
profession.
Upholding and promoting the principles of this code, the future of the IT practitioner depends
on both technical and ethical excellence. Not only important for professionals to adhere to the
principle expressed in this Code, but each member should encourage and support adherence by
other members
i. All practitioners providing central IT support, are required to read and sign the
Employee Code of Ethics
ii. All supervisors will ensure that they have reviewed the Code of Ethics with their
employees and maintain one signed copy in their personnel files and provide one copy
to employees or practitioners
iii. The Information Technology Employee or practitioner Code of Ethics should then be
reviewed on an annual basis with employees or practitioners.
In order to fulfill its mission of providing technological support to IT professionals, they must
grant privileged access to the equipment to appropriate Information Technology (IT)
employees or practitioners. This access imposes upon the practitioners the responsibility and
obligation to use systems in an ethical, professional, and legal manner that is strictly within her
or his authorized job functions.
IT professional is committed to advancing the ethical and responsible use of all information
technology resources. The goals of the IT Practitioner Code of Ethics are to create a culture
that fosters trust and a commitment to responsibility, excellence, and institutional and personal
integrity, while avoiding conflicts of interest and appearances of impropriety. IT professionals
will not tolerate illegal, dishonest, improper, or irresponsible use of privileged access.
11
1) In exchange for the privileges granted and as a condition of profession, IT practitioner
agree to abide by all professional IT policies with the understanding that professional
administration may change, rescind or add policies with or without prior notice. I also
subscribe to the following statements.
6) I will not share, record, copy, transmit, delete, or in any way alter information in these
systems except when required to perform my duties.
8) I will transfer to another authorized IT employee any support request that might give
me privileged access to my own academic records or to an electronic course in which I
am enrolled, in order to avoid a conflict of interest.
12
10) If I am a practitioner, I will observe the practitioner’s policies on conduct and/or
academic honesty.
The British Computer Society sets the professional standards of competence, conduct and
ethical practice for computing in the United Kingdom. The Society was incorporated by Royal
Charter in July 1984, with the following:
i. The Code of Practice is directed to all members of The British Computer Society.
ii. It consist of essential series of statements which prescribe the minimum standards of
practice, to be observed by all members.
iii. The Code is also concerned with professional responsibility. Responsibilities to clients,
to users, to the State and society at large.
iv. Those members who are employees also have responsibilities to their employers'
customers and, often, to a Trade Union.
v. In the event of apparent clash in responsibilities, obligations or prescribed practice, the
Society's Secretary-General should be consulted at the earliest opportunity.
vi. The Code is to be viewed as a whole: individual parts are not intended to be used in
isolation to justify errors or omissions or commission.
vii. The Code is intended to be observed in the spirit and not merely the word.
viii. The BCS membership covers all occupations relevant to the use of computers (as
computer practitioner, professionals etc)
13
NIGERIA CODE OF PRACTICE
On the same code of practice on legal and ethical issues for IT practitioner, Nigeria is not left
out. The body and the authoritative organization for IT Practitioner is the computer
professional council of Nigeria (CPCN), established and operating under the Act NO.49 of
1993 constitution of the federal republic of Nigeria, gazetted august 9th of the same year.
(3) Other functions bestowed upon the council by the Act are as follow
To perform any other functions as bestowed on it (council) by the provision of the Act.
Consequent upon the foregoing, the council has responsibilities for the following, among
others;
i. Organization of IT practice in the country
ii. Control of computing in the country
iii. Screening individual seeking to be registered as computer IT Practitioner and
Professional in Nigeria
iv. Screening corporate bodies seeking to be registered to engage in the sale or use of
computing facilities and/or the provision of professional services in computing in the
country.
14
v. Ensuring high computing professional ethics and professionalism-standards.
vi. Local and international contacts (with relevant associations and bodies)
vii. Reduced charges for some specific professional services and facilities.
viii. Determining academic standards in computer science, computer engineering,
information science, etc.
ix. Accreditation of institution, courses and programs and the evaluation of certificate in
computing.
x. Conducting professional examinations in computing by liaising with
associations/bodies external to the council.
xi. Publicizing the activities of the council.
(xii) Publication of the register of computer professional and other computing professional
works-journals, books, magazines, newsletters.
REGISTRATION
The Act 49 of 1993 referred to above makes it mandatory for all persons and organizations
seeking to engaged in the sale and/or use of computing facilities, and/or provision of
professional services in computing in the country to be registered by the council and licensed
to carry out such activities.
It is definitely illegal to engaged in computing professional practice without satisfying the
above condition-registration and possession of a current valid license.
If application is successful, an applicant is requested to pay a once-for-all registration fee and
the license fee for the current year, to have the applicant’s name inserted in the register and for
the applicant to commence professional activities, respectfully.
BENEFITS.
Persons and corporate bodies that are registered and hold current valid licenses, apart from
being eligible to carry out their business, stand to enjoy benefits including but not limited to:
i. Raised professional standing / status (from recognition as a registered computing
practitioner ).
ii. Protection from the public (from exploitation, harassment, etc, in the course of
performing bonafide, legitimate professional activities).
iii. Right to use the council’s Insignia (e.g. individualized seal, crest/plaque, ties, clips etc.)
15
iv. Meet and network new professional friends at our regular network meetings.
v. Corporate business network and harnessing of business opportunities.
vi. On-line business/professional discussions and exchange of ideas.
vii. Non-stop training and development.
viii. Access to and attendance at regular professional programs (conferences, seminars,
symposia, workshop, continuing of professional education, training, etc.)
ix. Entrepreneur development and workshops for startups.
x. Enjoy reciprocal registration with foreign computer professional bodies.
xi. Awards and recognitions.
1. Personal Requirements
i. Keep yourself, and subordinates informed of such new technologies, practices, legal
requirements and standards as are relevant to his duties.
ii. Ensure subordinates are trained in order to be effective in their duties and to qualify
for increased responsibilities.
iii. Accept only such work as he believes, he is competent to perform and not hesitate to
obtain additional expertise from appropriately qualified individuals where advisable.
16
iv. Actively seek opportunities for increasing efficiency and effectiveness to the benefit of
the user and of the ultimate recipient.
3. Contracting
i. Ascertain and evaluate all potential risks in a particular project with regard to the cost,
effectiveness and practability of proposed levels of security.
ii. Recommend appropriate levels of security, commensurate with the anticipated risks,
and appropriate to the needs of the client.
iii. Apply, monitor and report upon the effectiveness of the agreed levels of security.
iv. Ensure that all staff are trained to take effective action to protect life, data and
equipment (in that order) in the event of disaster.
v. Take all reasonable measures to protect confidential information from inadvertent or
deliberate improper access or use.
vi. Ensure that competent people are assigned to be responsible for the accuracy and
integrity of the data in the data file and each part of an organization’s database.
17
CONCLUSION
These General Moral Imperatives, Legal and Ethical Issues for IT Practitioners are summarized
with these Ten Commandments.
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization.
18
REFFERENCES
19
20