Legal and Ethical Issues in ICT - BCALC

advertisement
Part 2

Table of Contents
◦ Part 1




What Are Ethics?
Solving Ethical Dilemmas
Corporate Social Responsibility
How Do Ethics Apply to ICT?







Legal and Ethical Issues in ICT
Access to Information
Ownership of Information
Company Resources and Company Time
Unauthorized Use of Computers and Information
Fraud
Protecting Yourself from Cyberscams
◦ Part 2
If I do the
wrong thing,
am I breaking
the law?
Why is it that the
relationship
between
something that is
legal and
something that is
ethical not
necessarily that
defined?
If I do the right
thing, then should my
actions be seen as
legal? And I’m not
going to get into
trouble?
Why don’t
clear
differences
between what
is legal and
what is ethical
exist?

The difference between legal and ethical:
Legal and ethical
actions do not
necessarily go
hand in hand.


The law is constantly evolving to address
issues in ICT.
Some legal and ethical issue include:
◦
◦
◦
◦
◦
Access to Information
Ownership of Information
Company Resources and Company Time
Unauthorized Use of Computers and Information
Fraud

A serious ethical issue raised by ICT concerns
the degree to which all Canadians have equal
access to information.
◦ In an information-literate society, citizens must
have the ability to read and write.
 According to Statistics Canada , there still is a digital
divide - a gap in the rate of Internet use among certain
groups of people.

Citizens should have access to computer
hardware and software.
◦ Hard-copy resources are widely and cheaply
available in places such as the libraries.
◦ However, information is increasingly converted to
digital-only formats and requires computers to
access it.
◦ These days, the cost for a computer has dropped
significantly and as a result technology is accessible
to more individuals and organizations.
 However, there are still people in our society who
cannot afford to purchase ICT.

Factors that influence access to
technology:
1. Income:
 Internet users by income (2005–2006)
 Wealthier Canadians have more access to
Internet
2. Gender:
 Men tend to use the Internet more than
women
3. Education:
 Internet users by education (2005–2006)
 More-educated Canadians have better access
to ICT
4. Age and the presence of children:
 People with teens in the home tend to have
more access.

Other factors that influence access to
technology:
5. Access to digital information (information that
people have to pay to use.)
 Even with access to ICT, this is another cost that is
often unmanageable .
 Example: access to medical information from online
medical articles
6. Lack of training to use hardware and software
wisely and safely

Information should be
thought of as material
goods
◦ You would not want someone
to borrow your stuff without
asking, so why would you
borrow information without
asking?
◦ You need to give people credit
for their work.

Ownership of information
raises many legal and
ethical issues.

While giving credit for written work and ideas
is one aspect of ownership of work, there are
many more forms of intellectual property.
◦ Definition: This term describes an idea, a concept,
or any other intellectual work that has commercial
value, meaning that it can generate income or
profit for its owner.

Examples of intellectual
property:
◦ written work (books, poems,
essays, articles, etc. )
◦ creative work (e.g., songs,
recordings, video, cartoons,
drawings, photographs,
choreography)
◦ code created by a computer
programmer (e.g., HTML code used
for a website, code used to make a
video game)
◦ company logos
◦ unique ways of doing or making
things, such as a recipe, a process
for manufacturing, a trade secret
(e.g., a secret recipe for a fast
food, etc.)
◦ a design for a product (e.g., iPod)
Use of these materials
has ethical and legal
aspects. From an ethical
perspective, fair dealing
allows us to think
through consequences
of use. As well, most
would say that
plagiarism is also
wrong.

So what laws do we have to protect intellectual
property?
 The Canadian Intellectual Property Office allows
people and organizations to protect their intellectual
property formally by filing it officially for
trademarks, and patents, or using the Copyright Act.

So why doesn't
everyone do it?
◦ It’s a time-consuming
process
◦ Registration can be very
expensive

So what does a copyright, patent, or
trademark do for the owner?
◦ When a person (or organization) uses protected
information without the owner’s permission, he or
she is breaking the law.
◦ The penalties vary depending on the offence, but
there are some exceptions where just citing the
work is legal-referring to fair dealing
 Fair Dealing is a set of principles or guidelines that
are used to interpret the law on copyright (not the
law).
 Fair Dealing is the use or reproduction of a work for
private study, research criticism, review, or news
reporting without permission from the copyright holder.
 They help you determine when it is OK to use other
people’s work. Basically if the work is for:
 Educational purposes
 For Factual reasons
 Use only a small portion of the original work.

The copyright law protects authors, of a
paper, book, song, or other piece of original
work, from having their work stolen.
◦ When a individual creates an original work,
legislation gives the creator of that work the
copyright that is the exclusive right to reproduce,
publish, or perform the work.
 You don’t need to register for it, it is automatic.

Law for copyright = The Copyright Act
◦ This law governs copyright infringement.
◦ It states that no one can reproduce or use the
work created by another person without
permission from the holder of the copyright.
◦ Duration: exists for the life of the creator plus
50 years after the end of the calendar year of the
creator’s death
 However there are some expectations, such as Crown
works (government publications), works by unknown
authors, etc. (page 329 of handout)
 Once the copyright expires, the work is said to be a
public domain and may be copied freely without
permission.



The Copyright Act allows for civil and criminal
charges to be laid against a person who
infringes copyright. Civil charges mean the
copyright owner, or someone on behalf of
owners, can sue the culprit.
If found guilty, the person infringing copyright
will be fined.
Criminal charges can also be laid against the
person by the Crown, and if convicted, the
person who infringed copyright can be fined or
imprisoned, or both.
Example:

◦
Read the article “Is It Sharing or Stealing?”


Divide into two groups in the class. Brainstorm
arguments on both sides of the Napster issue—to
share or not to share, to pay for copyrighted
material or not to pay. Create a list, and share your
arguments with the other group.
Based on what you learned about Ownership of
Information, what Canadian laws or statutes govern
a case like the Napster case?


Article “Is It Sharing or Stealing?”
Issue:
◦ to share Easy access
 free
◦ or not to share Illegal to share since artists don’t get money
◦ to pay for copyrighted material or not to pay Most students don’t want to pay for music


Trademarks and patents
provide protection of nonwritten work, similar to
copyright.
Trademarks protect
intellectual property in the
form of words, phrases, or
images.
◦ Unlike copyrights, which are
automatic, trademarks must be
registered with government and
are costly to acquire.
◦ Example : Nike


Trademarks are governed by Section 409(1)
of the Canadian Criminal Code. Under that
section, it is a criminal offence for a person
“to have in his possession, or to dispose of, a
die, block, machine or other instruments
designed or intended to be used in forging a
trademark.”
Like copyright infringement, trademark
infringement can be handled in civil court,
where a trademark holder sues the person
infringing.

Example dealing with ICT:
◦ Trademark cases: between Pro-C, a small Waterloo, Ontario,
software development firm and a large retailer, Computer City.
◦ Pro-C owned the trademark WINGEN. It was registered in both
Canada and the United States for software only.
◦ Computer City launched a line of its own PCs called WINGEN, sold
only in the United States.
◦ Pro-C sued Computer City.
◦ As it turned out, Pro-C’s website wound up getting Computer
City’s online traffic. So many people visited the site and sent
inquiries to Pro-C that its website crashed, so the company could
not serve its customers.
◦ Pro-C first won the case, but Computer City appealed. Computer
City won the appeal because its product was sold in the United
States (and, therefore, did not compete with the Canadian
WINGEN products from Pro-C), and because Pro-C did not
actually lose business from its website because of the problems.




Talking Trademarks
http://www.cbc.ca/marketplace/pre2007/files/money/words/index.html#
The CBC Marketplace segment examines how
brand names have entered our language as
common usage and the effect that this has on
companies.
After viewing the clip, make a list with a
partner of the top 10 brands you use.
◦ For each, discuss ways in which you might
inadvertently advertise the brand name.

Parents, similar to trademarks, can be
registered to protect intellectual property in
the form of processes, articles and inventions
◦ Must register a patent and therefore can be a
costly and lengthy process



In Canada, patents are governed by the
Patent Act.
Like trademarks, they can also be dealt with
criminally or civilly.
Example;
◦ Patent case in Canadian and U.S. law dealing with
ICT.
◦ In 2004, the Supreme Court of Canada ruled in
favour of Monsanto, an agricultural biotech
company that creates genetically modified seeds.
The ruling was that a Canadian farmer had violated
Monsanto’s patent by growing canola seeds
developed by Monsanto on his land without
permission.

Example:
◦ In 2006, a Waterloo, Ontario, company, Research in Motion
(RIM), which created the BlackBerry PDA, settled a patentinfringement case with a company called NTP.
◦ RIM had been using technology for BlackBerries that NTP
claims to hold a patent on.
◦ Through the U.S. court system, NTP tried to shut down RIM’s
service to consumers.
◦ The case was eventually settled out of court, with RIM paying
$612.5 million to NTP.
◦ Just when that case was settled, RIM was accused of a similar
patent infringement by mobile email provider, Visto.
 In 2009, RIM ended the three-year patent dispute with Visto
Corp. by agreeing to pay $267.5 million to settle, adding to a
costly series of intellectual-property purchases.

License is a contract through which the owner
of a piece of intellectual property permits
another individual or organization to make,
use, or sell that piece of intellectual property
in exchange for some form of compensation.
◦ The license allows the owner to maintain his/her
ownership of the intellectual property


There are three forms of licensing:
1. Content licensing
◦ Refers to the ownership and sharing of any type of information in digital
form through a contract
 Includes: databases, articles, Web content, videos, clipart, font, stock reports
and music
 Example: Napster: case regarding ownership and sharing of content

2. Technology licensing
◦ Refers to permission to use processes or actual software applications
 Example: individuals and corporations purchase Microsoft Office, therefore,
the license to use it.

3. Advertising and cross-branding
 Refers to agreements among businesses (or individuals) to use one another’s
names and logos to increase business
 Example: “Starbucks, Hershey to create new high-end chocolate products”
http://www.bizjournals.com/seattle/stories/2007/07/16/daily26.html?b=11
84558400%5e1493520&hbx=e_abd


Cross-branding. Good enough for Starbucks and Hershey. How ’bout you?
http://www.rescuemarketing.com/blog/2007/07/23/cross-branding-good-enoughfor-starbucks-and-hershey-how-bout-you/
 Problem: when intellectual property is used without a license (Website
displayed a company’s logo without that company’s permission) or logos are
not properly displayed as per a license agreement


Piracy is the illegal reproduction and distribution
of materials such as software applications,
whether for business or personal use.
Piracy is a form of copyright infringement, and it
can take several forms:
◦ End-user piracy
 users copy software without buying it.
◦ Pre-installed software
 takes one copy of software and installs it illegally on more than one
computer
◦ Internet piracy
 unauthorized copies are downloaded over the Internet
◦ Counterfeiting
 illegal copies of software are made and distributed in packaging
that reproduces the manufacturer’s packaging

A 2006 survey found that, in 2005, 35 percent of the
packaged software installed on computers worldwide was
illegal, amounting to over $34 billion in losses due to
piracy.

Canadians have a double standard for
software piracy. This graph shows that half of
Canadians believe that pirating software is OK
for personal use but not for companies.

Legal and ethical issues:
◦ theft from employers by employees.
 Examples of theft:
 Employees who bring home company stationery or use
equipment such as photocopiers for personal use are
stealing.
 While at work, employees are paid to carry out
the duties of the job.
 Employers often say that personal business
should be left for personal time.

Examples (continued)
◦ Using the Internet at work for personal reasons
 Since the employer pays for the Internet service, the
computer the employee is using, and the employee’s
time, many believe that the Internet should be used
only for work related purposes.
 A survey of Internet use while at work shows:
 Canadian workers spend nearly 800 million hours a
year surfing the Web for personal reasons not related
to their jobs at all!
 Similarly, a U.S. survey found that for every eight
hours at work (not including lunches and breaks),
employees spend about two hours surfing the Web for
non-work purposes, with an estimated cost of $759
billion to the U.S. economy.
◦ Many of the Canadian
workers surveyed stated that
their companies had no
policy governing use of the
Internet at work.
◦ Companies need to act (with
regards to the use of
company equipment for
faxing, e-mailing, and
accessing the Internet) or
suffer losses in productivity

Its unethical to surf the Internet for personal use
at work,
◦ BUT a recent ruling suggests that it just might be legal
 In 2006, one New York City employee who was fired for
surfing the Internet at work fought back—and won!
 A Department of Education employee was fired for using
the Internet at work. However, the judge ruled in his
favour because employers should apply the same standard
to personal Internet use as they do to other personal
activities, such as taking personal calls or reading the
paper, as long as a worker still does his or her job.

Do you think as more cases like this go to court,
this fuzzy issue, linking what is ethical and legal,
will be resolved?

Read the article “Which Company Am I?”
◦ In your group answer question #1 and 2



Intellectual property is one form of information
that is subject to Canadian law.
However, it is also illegal to use various other
forms of information and ICT without permission.
The Criminal Code of Canada’s Section 342.1
makes it a crime for people to use any computer
service (processing, storage, or retrieval of data)
fraudulently, intercept any function of a
computer system, and even use a computer with
intent to commit a crime.
◦ Examples: hacking, stealing your friend’s password
to use her or his computer at work without her or
his knowledge, spamming an organization’s server
so that it crashes, or using a computer to plan a
crime.

Example:
◦ A high-profile case in 2001 was the story of “Mafiaboy,”
the 17-year-old Canadian teenager who launched a
denial-of-service attack by bombarding companies with
thousands of simultaneous messages, which prevented
users from accessing the companies’ websites.
◦ The attack paralyzed many major Internet sites
(including Yahoo!, eBay, and Amazon) for one week in
February 2000. Mafiaboy was caught and charged under
the Criminal Code.
◦ He was sentenced to eight months in a youth detention
centre and a year of probation once released, and he
was ordered to pay $250 to charity.
◦ Mafiaboy on The Hour with Stromboulopoulos:
http://www.youtube.com/watch?v=M172NlX3H1Q&feat
ure=relmfu
◦ CBC Report About Mafiaboy Book:
◦ http://www.youtube.com/watch?NR=1&v=mWmcFsoV7I
Q
◦ Identity Theft with Mafiaboy:
◦ http://www.youtube.com/watch?v=BBOl_tM15Cg

Section 430(1.1) of the Criminal Code talks about
“mischief to data.”
◦ This section makes it a criminal
offence to destroy or alter data that
rightfully belongs to someone else
or to make data unavailable to its
owner.
◦ For example, suppose a student at your school is laid off
from her part-time job at a local retail shop. Because she
is angry at the situation, she decides to delete all the
financial data from the hard drive at the shop’s computer
so that the owner no longer has accounting records.
◦ This would be an offence under the “mischief to data”
clause.

The Criminal Code addresses
“theft of telecommunications”
in Section 326.
◦ This section makes it a crime to
use any telecommunication
service (e.g., wireless, radio,
visual, or other transmission)
fraudulently. Under this section,
you cannot steal wireless
Internet from a source such as
an ISP or organization that is
emitting a wireless connection
without the organization’s
permission.

Cyber Terror
◦ Terrorists are becoming expert Internet hackers,
using the Web to get what they want. North
American governments are scrambling to develop
ways to stop them.
◦ After viewing the clip, discuss the threats of
hacking. What should individuals, organizations,
and governments know about this topic?
◦ Cyber Terror Still Top Threat?
 http://video.cnbc.com/gallery/?video=3000043305
◦ Cyber Attack:
 http://www.youtube.com/watch?v=xgNlx8UUJ0o&feat
ure=related
Fraud is a crime in which individuals deceive others
or misrepresent themselves to gain something

◦
Forms of ICT fraud:

◦

Example: false businesses, identity theft, selling a
product or service as something it is not.
phishing, pharming, online auction scams, and other
forms.
ICT opens up the floodgates for all sorts of
fraudulent activities, because:
1. it is quite easy to mask one’s identity (or worse yet, to take
someone else’s identity); and
2. online crime is “borderless,” Internet fraud has grown
steadily over the past decade.
 Figure 11.6 on page 331 in handout


The RCMP
tracks the
number of
Canadian
victims of
various types
of online fraud.
This chart
shows the
results of only
those who
actually
reported being
victimized in
2004.

Most people think:
◦ Knowingly committing fraud is unethical
 Example: stealing another person’s identity or credit cards.
◦ It is illegal to commit fraud.

Most online fraud is dealt with under two pieces of
Canadian legislation:
◦ The Competition Act makes it a crime to have “false and
misleading” advertising. This Act allows the Crown to
charge an individual or business that is misleading
consumers.
◦ Canada’s Criminal Code supplements the Competition
Act by allowing the Crown to charge ISPs with a crime. By
allowing criminal web services, the ISP can be charged
with “aiding and abetting” a crime.

In addition the Government of Canada
enforces a law called the Personal Information
Protection and Electronic Documents Act
which aims to ensure that organizations in
Canada use information about individuals
responsibly.
◦ This Act helps to protect the use and misuse of you
personal information that many organizations have
(such as governments, credit card companies, etc.)
from problems such as telemarketers and identity
theft.
• Examples of
scams
targeting
businesses
and
institutions
 Most
aggressive
scams against
businesses
(identified by
the Council of
Better
Business
Bureaus)
◦ Bogus Billing
for Yellow
Pages
advertising
◦ Fake
Directories
◦ Questionable
Advertising
Specialty
Product
Promotions
•
•
•
•
Fraudulent Telemarketing Offers for Office Supplies
Advance Fee Loan Brokers
Phony Promotion/Prize Offers
Fundraising Appeals from Fake Charities and Non-profit
Organizations





Example:
◦ In Canada, one of the most important cases of online fraud was against Alan
and Elliot Benlolo.
◦ In 2000, they sent out letters to businesses that looked like bills from Bell
Canada or the Yellow Pages.
◦ These letters were actually for a separate online directory (similar to the
Yellow Pages) owned by the Benlolos.
◦ Their scam resulted in sales of over $1 million, and generated 4400
complaints to the Competition Bureau.
◦ Because of the complaints, law enforcement was able to catch the Benlolos.
◦ They were found guilty on 10 counts under the Competition Act, and were
sentenced to 34 months in prison and fined $400 000.
Yellow Pages advertisers are being targeted by a ...
◦ http://www.youtube.com/watch?v=v8rk9nIL1BU
Yellow Pages Scam Alert
◦ http://www.youtube.com/watch?v=0bHSx6-Cl_g
This case represented an important milestone, because three principles were
used to sentence these convicted criminals:
◦ Fines should equal the profits that the criminals made.
◦ Jail time should be required.
◦ Criminals can face both a fine and a jail term.
These principles be applied to all online fraud cases from now on.

One of the problems in Internet fraud is
catching the criminals.
◦ They can be operating from any part of the world,
and their identities might not be clear.
◦ However, Canadian law-enforcement agencies work
hard to catch these criminals based on complaints
they receive from consumers and targets.
Legal and Ethical Issues in ICT Questions

Compare copyright, patents, and trademarks. How are they similar? How are they
different?

If students at your school were to create a video yearbook, under what law (if any) would
it be protected? Why?

Discuss the legal and ethical aspects of taking HTML code from a website you like on the
Internet and using it for your own personal website.

What is piracy? Define it, and give an example.

What have individuals and companies done to ensure that people can download music
from the Internet legally?

Is the use of the Internet at work the same as stealing? Why or why not?

What is meant by unauthorized use of computers and information? What law governs
this in Canada?

Give three examples of types of fraud, and which Canadian law(s) they break.

Are ISPs legally responsible when a criminal uses the ISP’s services to commit fraud? Why
or why not?

If you are targeted for an online scam, what should you do?

Having learned about the legalities of online crime, do you feel that you are sufficiently
protected by the government and law-enforcement agencies? Why or why not?

Page 335 in Handout
◦ Question # 1-6

See the Windows Movie Maker Assignment
Word document
Download