L - E4 Prof
L - E4 Prof
Case Study 1
PROFESSIONAL ETHICS IN
COMPUTING
1
10/24/2023
◻ Whichever school of thought you ◻ SocialSpace trusts him with the data, and he
has a duty to honour that trust.
subscribe to in terms of moral
◻ While the benefits to his friend or the ad
philosophies/ethical theories ... agency may seem worthwhile, the risks of
. . . O t i s h o u l d n o t s h a r e t h e harming users and violating ethics codes
confidential data. outweigh them.
◻ Even if Oti anonymises the data, sharing it for
◻ Protecting user privacy should take
unautho rise d purpose s goe s against h is
priority over helping a friend ... professional principles.
computing professional.
and determining the right way to act.
2
10/24/2023
3
10/24/2023
4
10/24/2023
Practical Strategies
Risk-benefit analysis
Weighing the risks and benefits of actions.
Codes Of Ethics
Whistleblowing policy
Reporting unethical conduct through proper channels.
Ethics training
Taking courses on ethics and human values.
Discuss dilemmas
Consulting others when facing an ethical predicament.
Applying codes of ethics
Following industry codes of conduct ...
5
10/24/2023
6
10/24/2023
The computing profession also has Internationally we have several, with the two
largest ones being:
professional societies. The Association for Computing Machinery (ACM);
Locally we have the Computer The Institute for Electrical and Electronics Engineers –
Computer Society (IEEE-CS).
Society of Kenya.
We also have CompTIA IT Pro and Student
Its members are expected to Membership (formerly known as AITP).
operate within the CSK Professional These US based organisations (with
Code of Ethics and practice. inte rnatio nal re ac h) have also adopt ed
professional codes of ethics.
7
10/24/2023
8
10/24/2023
◻ Client and Employer (Principle 2): ◻ E.g., a software engineer working for a
"Software engineers shall act in a manner tech company must balance the interests
that is in the best interests of their client and of the customer with those of the company
employer." when handling a software defect that
◻ Professionals should be loyal to their
affects customers.
◻ Strive for accurate and honest reporting
clients and employers, but
◻ they should also maintain integrity and
of software development progress and
avoid conflicts of interest ... costs.
◻ Avoid misleading clients or employers.
Product (Principle 3): "Software engineers shall Judgment (Principle 4): "Software engineers
ensure that their products and related shall maintain integrity and independence in their
modifications meet the highest professional professional judgment."
standards possible." Make informed and impartial judgments based on
Ensure the products and systems you develop are available data, without bias or prejudice.
reliable and of high quality. E.g.: you may be asked to manipulate data to
Prioritise the best interests of the end-users. favour a particular outcome in a financial analysis
E.g.: A software development team responsible for tool you are building.
creating a medical records system must adhere to strict Upholding professional integrity and say NO.
quality and security standards to protect patient data.
9
10/24/2023
10
10/24/2023
11
10/24/2023
Why Ethical Behaviour Is Crucial in the Tech Industry Why Ethical Behaviour Is Crucial in the Tech Industry
Why Ethical Behaviour Is Crucial in the Tech Industry Why Ethical Behaviour Is Crucial in the Tech Industry
12
10/24/2023
◻ One of the largest and most notable cybersecurity incidents in Protecting Privacy
recent history.
◻ Occurred in 2017 when Equifax, one of the major credit reporting The breach of personal information at Equifax
agencies in the United States, suffered a massive data breach that was a direct violation of the IEEE-CS/ACM
exposed sensitive personal information of approximately 147 Code of Ethics’ principle of respecting and
million consumers.
◻ The breach included names, Social Security numbers, birth dates,
protecting individuals’ privacy.
addresses, and in some cases, even drivers’ license numbers. The company failed to adequately
◻ The breach was attributed to a vulnerability in Equifax's website safeguard sensitive data, leading to a
software, which the company failed to patch in a timely manner.
massive privacy breach affecting millions of
◻ Cybercriminals exploited this vulnerability to gain unauthorised
access to Equifax's systems, where they were able to extract and individuals.
steal vast amounts of personal data.
13
10/24/2023
Equifax Data Breach (2017) vs the Equifax Data Breach (2017) vs the
IEEE-CS/ACM Code of Ethics Principles IEEE-CS/ACM Code of Ethics Principles
Avoiding Harm Professional Competence:
Equifax's failure to secure its systems It is our responsibility to maintain our competence
and knowledge in our respective fields.
resulted in substantial harm to consumers.
The Equifax breach raises questions about the
The breach resulted in significant harm professional competence of the company's IT and
to individuals whose data was exposed. security teams.
potential for identity theft, financial The failure to promptly patch a known
fraud, and other negative consequences. vulnerability suggests a lack of professional
competence in cybersecurity practices.
Equifax Data Breach (2017) vs the Equifax Data Breach (2017) vs the
IEEE-CS/ACM Code of Ethics Principles IEEE-CS/ACM Code of Ethics Principles
Honesty and Integrity Responsible Computing
Equifax faced criticism for its handling of the
Equifax failed to patch a known
breach, including delays in disclosing the
incident to the public. vulnerability in a timely manner.
Timely and honest communication is crucial when This demonstrates a lack of
a data breach occurs. responsibility in ensuring the security
Any attempts to downplay or hide the severity of their systems and the protection of
of the breach can be seen as a breach of
honesty and integrity.
customer data.
14
10/24/2023
15
10/24/2023
Example Example
Example Example
This process typically involves: Bug Bounty Rewards
Reporting the vulnerability to the company's In return for their efforts and responsible
designated security team through a secure channel.
disclosure, the company offers monetary
Providing detailed information about the
vulnerability, including how it was discovered and rewards to ethical hackers who discover
potential risks. and report valid vulnerabilities.
Allowing the company a reasonable amount of time The amount of the reward varies
to verify and address the vulnerability before depending on the severity of the
disclosing it publicly.
vulnerability and its potential impact on
Coordinating with the company to ensure that the
the company and its users.
issue is patched and resolved.
16
10/24/2023
Ethical Hacking, Responsible Disclosure, and Bug Bounty The 3 vs the IEEE-CS/ACM Code of
Programs vs the IEEE-CS/ACM Code of Ethics Principles Ethics Principles
Protecting Privacy Avoiding Harm
Ethical hacking, responsible disclosure, and Ethical hackers work to identify and mitigate
bug bounty programs align with the principle potential harm by identifying vulnerabilities
of protecting privacy. before malicious actors can exploit them.
They aim to identify and mitigate Responsible disclosure ensures that
vulnerabilities and weaknesses to prevent vulnerabilities are promptly reported to
unauthorised access and data breaches. organisations
Ultimately safeguarding individuals' This minimises the risk of harm to users.
privacy.
17
10/24/2023
18
10/24/2023
19