PL Social and Professional Issues Module Le. With Copyright 3
PL Social and Professional Issues Module Le. With Copyright 3
PL Social and Professional Issues Module Le. With Copyright 3
9
0
4
TI TLE O F MODU LE
Authors: NOEMI P. REYES, MSIT FAUSTO S. HILARIO, PhD. JANE KRISTINE G. SUAREZ, MSIT LYN M.
DALISAYMO, MIT
Editors: GERRIPER BERNARDO DIGNA M. EVALE, DIT JAYSON M. BATOON NOEL FRANCO
This is a government work. No part of this publication may be reproduced for profit
without the written permission of the Bulacan State University through its Innovation and
Technology Support Office (ITSO). You may reach the ITSO at the following address:
[email protected].
4
OVERVIEW OF ETHICS
This unit provides a brief introduction to the concepts of ethics. It is intended to be used by
students to enhance their knowledge with conceptual clarity and expose them to dilemmas that
they may encounter and how they are going to handle them. Combining the concepts of ethics
with other various disciplines and the application to business applications provides a more
comprehensive perspective and allows students to move beyond discussions about the
difference between right and wrong. This unit focuses on proper etiquette and behavior students
must possess as a future IT professional.
The aim of this unit is to give students a basic understanding of ethics and its application in
various fields like individual human behavior, business, Information Technology and computing.
This unit helps students establish and prioritize moral standards and ethical values and principles
of the fields they belong to and understand the scope, concept and importance of Ethics, its
development and its relevance as applied in particular scenarios. It also aims to encourage
independent critical thinking and develop a particular code of conduct and ethical principles within
an organization or institution at large. A business or an institution founded based on strong ethical
principles and values is brighter, more successful and more enduring than an organization with
many compromises. In general, people in organizations must present moral behavior and make
a proper judgment on human behavior based on the standards set about human conduct and
integrity.
Throughout this unit, students will be guided with a variety of perspectives involving ethical
theories and will be engaged to explore emerging ethical behaviors that IT professionals and
ordinary individuals should have. Some examples of issues are given to students so that they
can have a deeper analysis of the differences between ethical and unethical behavior.
5
Thoughts to Ponder
“You don't teach morals and ethics and empathy and kindness in the
schools. You teach that at home, and children learn by example.”
-JudySheindlin
What is Ethics?
Ethics comes from the word “ethos” which suggests "custom" or "character" in Greek.
As originally employed by Aristotle, it referred to a man's character or personality,
especially in its balance between passion and caution. Today, ethos is used to identify
the practices or values that distinguish one person, organization, or society from
others.
At its simplest definition, what is your understanding of “ethics”? There can be as many
descriptions and explanations of what ethics is all about and some are as follows:
• Ethics may be a system of ethical principles.
• Ethics influences how people settle an issue and lead their lives.
• Ethics cares about what is good for people and society.
• Ethics covers the subsequent problems:
• the way to live an honest life
• our rights and responsibilities
• and the language of right and wrong moral decisions – what is good and
what is bad?
• Ethics Centre (2018) explained ethics using three words such as ‘values’,
‘principles, and ‘purpose’.
1. Values tell us what is good. They are the things we strive for, desire, and
seek to protect.
2. Principles tell us what is right – outlining how we may or might not achieve
our values.
3. The purpose is our reason for being. It gives life to our values and
principles.
• Ethics also means the continual effort of studying our own moral beliefs and our
moral conduct, and striving to make sure that we, and therefore the institutions
we help to shape, live up to appropriate standards.
• Ethics can be like a multidisciplinary field of study. Theologians study ethics
and morality in light of spiritual teachings and divine commands. Psychologists
seek to know how people's values influence their thinking, behavioral
motivations, and private development. Sociologists attempt to identify and
explain varying cultural norms and practices. Business educators try to help
companies, employees, and professionals avoid expensive and
counterproductive ethical misdeeds. However, the study of normative ethics
has historically been dominated by philosophers, who have applied rules of
reason and logic to seek out answers to humanity's perplexing moral questions.
Ethics does not always show the proper answer to moral problems.
Indeed, more and more people think that for several ethical issues there is not one
right answer - just a group of principles that will be applied to particular cases to give
those involved some clear choices. Some philosophers go further and say that what
ethics can do is eliminate confusion and clarify the problems. After that, it is up to every
individual to come up with their conclusions.
Importance of Ethics
Ethics are important because they permit society to still function, helping people to
interact and functionally live their daily lives. They are important because they will
govern an individual's code of behavior and stop moral wrongs from occurring. Ethics
keep people from doing what is wrong. If a person has no ethics, he will do anything
for as long as he believes it will benefit him and he can get away with it. Ethics are
different from laws and different from doing the proper thing as a result of fear of
consequences. While something unethical could be illegal, there is no overlap.
Furthermore, in some ways, ethics are often even more important than the law, since
the law will only deter an individual from displaying bad behavior because he fears a
penalty, while a person with a robust code of ethics will do the proper thing simply
because it is the proper thing. If an individual has no code of ethics, he can steal, as
long as nobody is watching. He could mislead his loved ones or others because the
lie is not as grave as criminal fraud. He can engage himself in doing bad things as long
as he does not get caught. Since the law can't possibly catch everyone whenever they
are doing something bad, and therefore the law can't make every "wrong" action
illegal, society will quickly disintegrate if there are no ethical principles or moral rights
or wrongs. Thus, ethics is vital due to the following:
1. Satisfying Basic Human Needs: Being fair, honest and ethical is one of the
essential human needs. Every employee wants to be part of a company that is
imposing fair and just practices not only to them but to other stakeholders.
2. Creating Credibility: A corporation that is believed to be driven by moral values
is respected within the society even by those who may have no information
about the organization. Infosys, for instance, is perceived as a corporation with
permanent corporate governance and social responsibility initiatives. This
perception is held far and wide even by those that do not even know what
business the organization is into.
3. Uniting People and Leadership: A corporation driven by values is revered by its
employees also. These values are the common thread that brings the workers
and the decision makers together on a standard platform. This goes an
extended way in aligning behaviors within the organization towards the
achievement of one common goal or mission.
4. Improving Decision Making: “Our life is the total of all the decisions we make
every day, and those decisions are determined by our priorities” (Munroe,
n.d.). The same holds for organizations. Decisions are driven by values. For
example, a corporation that does not value competition is going to be fierce in
8
its operations, getting to wipe out its competitors and establish a monopoly
within the market.
5. Long Term Gains: Organizations guided by ethics and values are profitable at
the end of the day, though in the short run they seem to lose money. Tata group,
one of the most important business conglomerates in India was seen on the
verge of decline at the start of the 1990’sbut later on succeeded.
6. Securing the Society: Oftentimes, ethics are used to protect society. The law
machinery is usually found acting as a mute spectator, unable to save lots of
the society and therefore the environment. Technology, for instance, is growing
at such a quick pace that by the time law comes up with a regulation we have
more modern technology with new threats replacing the older one. Lawyers and
public interest litigations might not help an excellent deal, but ethics can. Ethics
tries to make a way within the organizations and sometimes when the law fails,
it is the ethics that will stop organizations from harming the society or
environment. Ethics is a set of rules that governs how people treat one another.
Concerning that, the Bible (Luke 6:31) states "Do unto others as you'd have
them do unto you." That requires brooding about yourself first, to understand
how other men should be treated (“MSG Management Study Guide”, n.d.).
The Consequences of Our Actions. Our actions have consequences. People who
use social media to vent their complaints against others rarely first consider how their
actions and words may affect others before posting something on Facebook or Twitter.
Those who do consider the results do so intending to upset others instead of stating
one’s objective point of view or starting a productive dialogue.
Be Accountable for Your Actions. When we make an error in life, we should always
take responsibility for our actions, promise to never roll in the hay again, make amends
9
to the people we have harmed, and try to be and do better. We should learn from our
mistakes and move forward productively.
Truthfulness, alongside integrity (i.e., being a principled person; having the courage
about your convictions), structures the foremost fundamental standard of ethical
behavior (Mintz, 2018).
Figure 1 Lucernas, A. (n.d.). Honesty is only a Policy [Pinoy Meme]. Retrieved from http://9-
fail.blogspot.com/2012/07/honesty-is-only-policy.html
It is so amazing to see how little understanding people have about what truthfulness
is and what it requires to be an ethical person. The majority of us do not understand
that dishonesty is not only telling a lie. For instance, Figure 1 shows that some students
are cheating in the classroom when their teacher is not around. Maybe some of them
have a habit of doing unpleasant behavior in the classroom if they have the opportunity
to do so. they employ various strategies just to cheat with the help of some
classmates. However, not all students are like that, some still stick to their honesty
and are prepared to face whatever the result of the exam is. This is a good example
of why being truthful is an affirmative behavioral trait.
Moral realism: You might be making a press release about an ethical fact - "It is
wrong to murder."
Subjectivism: You might be making a press release about your very own feelings
- "I disapprove of murder."
Moral realism
Moral realism is predicated on the thought that there are real objective moral facts or
truths within the universe. Moral statements provide factual information about those
truths.
Subjectivism
Subjectivism instructs that moral judgments are nothing but statements of a person's
feelings or point of view, while moral statements don't contain genuine truths about
good or bad. For further elaboration, subjectivists say that moral statements are
statements about attitudes and emotions that a specific person or group has a few
specific concerns. If an individual says something is sweet or bad, they are telling us
about the positive or negative feelings that they need. So, if someone says 'murder is
wrong' they are telling us that they disapprove of murder. These statements are true if
the person does hold an acceptable attitude or has acceptable feelings. They are false
if the person doesn't.
11
Emotivism
Emotivism is the view that moral claims are not any reasonable expressions of
approval or disapproval. If an emotivist will tell you that "murder is wrong" it is the same
as telling you “Down with murder!" " Or simply saying "murder" while pulling a horrified
face, or making a thumbs-down gesture which is tantamount to saying "murder is
wrong". So, when someone makes an ethical judgment, they show their feelings about
something. Some theorists also suggest a person instructs others about how to react
toward a certain topic.
Prescriptivism
Prescriptivists think that ethical statements are order or advice. So, if I say something
is good, I'm recommending you to try it, and if I say something is bad, I'm telling you
to not do it. There is nearly always a prescriptive element in any real-world ethical
statement. For example, when you say "dishonesty is wrong", it can be rewritten as
"people should not be dishonest".
Branches of Ethics
One way of categorizing the sector of ethics (as a study of morality) is by distinguishing
between its three branches; one of them is applied ethics. By contrasting applied
ethics with the opposite branches, one can get a far better understanding of what
exactly applied ethics is about. These three branches are as follows:
Metaethics deals with whether or not morality exists. It focuses on the description and
origin of ethical principles.
Applied ethics, also usually assuming a positive answer to the existence question,
send the moral permissibility of particular actions and practices. Applied ethics is the
branch of ethics that consists of the analysis of specific, controversial, and moral
issues like giving to the poor, sex before marriage, the death penalty, gay/lesbian
marriage (or other rights), war tactics, censorship, so-called “white lies”, etc. (Internet
Encyclopedia of Philosophy, n.d.)
12
OBJECTIVES:
At the end of this lesson, students should be able to:
• define and determine the value of business ethics and its application to
business world.
• understand the purpose of the code of ethics in an organization
• discuss and determine the importance of fostering good ethics in business.
• understand the significance why business ethics matter in the modern
professional climate
• identify common ethical violations of an employee and determine ways on
facing them
• identify tips on improving corporate ethics
13
Thoughts to Ponder
“Ethics today in business is absolutely fundamental to the well being
of any business. If you want a business that is long time sustainable
you cannot compromise your ethics.”
-James Caan, CEO of Hamilton
Business Ethics
Ethics in business is simply the appliance of everyday moral or ethical norms in
business. Ethics in business originated from academic writings and meetings and is
within the development of a field of educational teaching, research, and publication.
The system of ethical beliefs that guides the values, behaviors, and decisions of a
business and thus the individual within that organization also refers to business ethics.
Businesses are codified into law; environmental regulations, wages, and restrictions
against trading and conspiracy are all samples of the government setting forth
minimum standards for business ethics. What qualifies as business ethics in history
has changed over time and thus, the various areas of ethics are important to every
business.
Business Ethics is the study of appropriate business policies and practices regarding
potentially controversial subjects including corporate governance, trading, bribery,
discrimination, corporate social responsibility, and fiduciary responsibilities (Twin,
2020).
Business and ethics should go together just like bread and butter. Business ethics is
a form of applied ethics. Business ethics are often both normative and descriptive;
most businesses should put more effort into rewarding ethical behavior in the
workplace. Businesses should continuously emphasize regularly the importance of
behaving ethically. If a practice is not illegal, it does not mean that it is not immoral.
More than ever, a company’s success depends on the talent it is ready to attract, but
attracting the best talent is not just about offering the simplest salary—or even the best
benefits.
Companies may have their way of giving a rewarding offer for a possible candidate,
and a culture where they are going to feel comfortable, but how do one’s corporate
ethics compare with those of its other competitors?
This may not appear to be the foremost important question to ask when you are trying
to hire someone for a position—but if you would like to stay up, you would like to
understand just how significant those ethical values are (Alton, 2017).
14
• Fraud and manipulation. This could be obvious, but ethical companies do not
engage in shady or manipulative financial practices, like fraud, bribery, or trading.
The matter here is that individual actions are often associated with the company
as a whole, so an individual within your company who behaves in an unethical way
could compromise the reputation of your company. Putting firm strict and
uncompromising application of the policies and taking the proper punishment
imposed for breaking policies can reduce these effects.
• Diversity and inclusion. Diversity and inclusion efforts also are seen as
responsible, ethical business practices. These include programs to employ people
from more diverse backgrounds, including different ethnicities, sexes, and abilities
(i.e., differently-abled people).
• Exploitation. Mostly big companies can make substantial gains by utilizing local
populations, especially in developing countries, or by utilizing the inadequacy of
the businesses around them. These practices may yield your business a short-
term benefit, but they are heavily frowned upon by the public and are usually seen
as unethical.
It is important that a company pays attention to, and potentially invests in the following
areas:
• The Age of Information. We have entered an age beyond the industrial; we’re
living in the modern era. And no, that is not just a buzzword used by digital
marketers—it is being studied and treated as a major leap forward in human
history. Today’s prospective employee has more information than ever before,
and businesses are more transparent now than they were before. A company’s
history, public messages, and even current staff are all publicly available
information, and all it takes is a Google search for a prospective employee to
find it. For that reason alone, company ethics are more important than they
were in past decades; one scandal or breach of ethics will stick for potentially
years, and conversely, any efforts made to conduct business ethically will be
made more apparent and publicly recognized.
• The Millennial Factor. It is also important to realize that millennials are the
next generation of talent entering the professional world—and they are the ones
dictating what is important for companies. According to a Bentley University
15
• Reputation. A code of ethics builds your reputation within your field. When
potential clients know that your employees adhere to a code of ethics, they
know that your employees attain a certain amount of value in their work.
• Risk. When employees adhere to your company's code of ethics, they minimize
operational and integrity risks in the workplace. With risk minimized, productivity
increases and creates a higher profit margin (“The Value of Ethics When
Related To Business”, n.d.).
16
1. To protect the organization and its employees from the action. An organization
that implements an ethics management program and cooperates with authorities
can lower the risk of receiving ethical complaints.
3. To produce good services. Good ethics mean good business in most cases.
Companies that manufacture secure and effective products keep away the
management from costly product recalls and legal actions. Companies that provide
excellent customer service maintain their existing customers rather than losing
them to competitors. Good ethics can improve the profitability of the organization.
Bad ethics can lead to bad business results. A bad ethical environment can destroy
an employee's commitment to organizational goals and objectives, create low
morale, foster poor performance, leads to low employee involvement in corporate
improvement initiatives, and builds employee indifference to the needs of the
organization.
5. To gain the goodwill of the community. The goodwill that socially responsible
activities create can make it easier for corporations to conduct their businesses.
Examples of goodwill are making contributions to charitable organizations and
nonprofit institutions, providing benefits for employees in excess of any legal
requirements, and choosing an economic opportunity that is judged to be more
socially desirable over a more profitable alternative (Course Hero, n.d.).
good. Ethics violations carry a wide variety of consequences, from policy and
procedure changes to firing. Maintaining an ethical workplace is advantageous for the
employee and the employer. Every employee should consider it his job to maintain
high ethical standards as a representative of his employer.
The following are said to be the common ethical violations of an employee inside the
sphere of his working area.
2. Ethical Standards are set by the board of directors. Boards of directors are
now much more involved in the creation of ethical standards. It shows that an
increased level of importance is placed on ethical standards.
4. Conduct social audits. Companies identify ethical lapses committed in the past
and take actions to avoid similar mistakes in the future.
OBJECTIVES:
• define and determine the value of business ethics and its application to
What isbusiness
Computer
world;Ethics?
• understand code of ethics that guides IT professionals to display proper
Computer behavior;
ethics is one of the essential areas of applied ethics. Problems such as the
lack •of laws andsources
identify security, and theguidance
of ethical fact thatfor
technical knowledge and hardware will
IT professionals;
continuously increase, demand for a new ethical theory to meet the challenges posed
by this cite some of the pressing ethical and legal issues confronting the industry
• revolution
When it today;
comesand to computing and business, morals and ethics are interchangeable,
with morals originating
• apply appropriate fromapproaches
the group intowhich a person
solving ethical matures,
dilemmas.and business ethics,
by implication, from the group in which your business matures
The mission statement of computer ethics involves restricting the presence of
selfishness or egoism in human nature and enabling harmonious human life in the
information technology domain.
20
Thoughts to Ponder
"If you're guided by a spirit of transparency, it forces you to operate
with a spirit of ethics. Success comes from simplifying complex
issues, addressing problems head on, being truthful and transparent.
If you open yourself up to scrutiny, it forces you to a higher standard.
I believe you should deliver on your promise. Promise responsibly."
-Rodney Davis
Just because you can do something does not mean you can do anything. Like any
other profession, information technology benefits from a typical, accepted code of
ethics that helps guide behavior in sometimes confusing contexts.
If any of these questions caused you to stop and think about what you would do, you’re
not alone. Ethical choices often seem murky. We live in a human society, subject to
less than complete information, societal pressures, and multiple interpretations of
facts. More often than not, we need to apply professional judgment, which is guided
by our own experiences as well as reliance on laws, policies, and culture.
As IT professionals, what should you do when you encounter potentially murky
situations like one of your superiors asking you to spy on the activity log of your other
coworkers, which is against the company’s policies? What will you do when you are in
that position? Sometimes, existing laws or institutional policies will guide ethical
behavior; sometimes, they won't. What many people often do not understand is that
what is legal is not always ethical. It is our responsibility as professionals to act
ethically in the performance of our work duties; otherwise, we risk losing the trust of
our students, faculty, staff, communities, coworkers, superiors, and, therefore, the
general public. Without such trust, it would be difficult to imagine how professionals
(like those in the IT sector) can continue to perform their duties effectively (Woo,
2017).
21
• Integrity
• Competence
• Professional responsibilities
• Work responsibilities
• Societal responsibilities
Specific guidance stems from these general principles. Codes of ethics help IT,
professionals, to:
There are interesting, though subtle, differences between the documents that may be
related to the specific character and mission of the organizations that developed the
different codes. For example, both SANS and IEEE include a commitment to honesty
about the limits of one’s capabilities, as well as a commitment to nondiscrimination.
On the other hand, both AITP and IEEE state specific commitments to acknowledging
a professional’s responsibility to society. Given IEEE’s stated mission to “foster
technological innovation and excellence for the benefit of humanity,” it is not surprising
that its code explicitly calls for a commitment to understanding the potential
consequences of the application of technology (Woo, 2017).
1. Privacy. Many people have their private information spread throughout the
digital media. Even things thought to be secure, like email or personal accounts,
are often accessed by unintended sources. Most employers actively check their
employees’ computer habits. Privacy has evolving legal implications, but there
are also ethical considerations. Do people know how their accounts are
monitored? To what extent is such monitoring occurring? As Computer World
22
points out in this text, privacy concerns can quickly become a slippery slope,
slowly eroding an individual’s right to privacy altogether.
3. Data Gathering. On some level, everyone knows that their online lives are
monitored. The United States has even passed legislation allowing the
government to actively monitor private citizens in the name of national security.
These measures have revived a debate about what information can be
gathered and why. This debate applies on a smaller scale also because
companies got to consider what information to gather from their employees.
This issue invokes a question of consent. Do people know what information is
being monitored? Do they have a right to know how their data is being used?
4. Security Liability. In the past, security issues were resolved by locking a door.
Digital security is much more complicated. Security systems for digital networks
are computerized in order to safeguard important information and major
assets. However, this increased security comes with increased surveillance.
All security systems have inherent risks, which means it is a question of what
risks are acceptable and what freedoms can be forfeited. Ultimately, IT
professionals got to balance risk with the freedom to make a security system
that is effective and ethical at the same time.
5. Access Costs. Net neutrality has become a classy issue because of legislative
efforts over the previous couple of years. The issue of net neutrality is
essentially a question of access. Proponents want the web to stay hospitable
for everyone while some businesses want to make tiered access for those that
are willing to pay. The issue even extends to non-public Internet usage since
the value of service in some areas could also be cost prohibitive. The larger
ethical question is whether or not digital exchange is now a universal right. The
cost of access can hinder business growth, entrepreneurial atmosphere, and
individual impression. These issues are essential for everyone, but they carry
extra weight for those who work with information technology. It is important to
remember that working with technology is not separated from ethical contexts
but can help define a legal and ethical code for generations to come (“Legal
and Ethical Issues in IT”, n.d.).
OBJECTIVES:
At the end of this lesson, students should be able to:
Thoughts to Ponder
“Believe passionately in what you do, and never knowingly
compromise your standards and values. Act like a true professional,
aiming for true excellence, and the money will follow.”
— David Maister
Wisegeek further explained that "IT professionals are people who maintain, build, or
repair hardware and software associated with computer systems or other components
related to information processing. This job is often difficult and can require a big level
of skill and knowledge, but a university degree is not always necessary."
3. Pragmatic. Today’s business reality demands pragmatic thinkers who can weigh
up sometimes conflicting demands and look at what they can achieve given the
time, money, and resource constraints involved. The pragmatic IT professional
focuses on delivering to the best of their abilities within those constraints and
communicating clearly with the business about what trade-offs are being made.
4. Persuasive. Persuasion might sound like something better left to the advertisers
and marketers of the world, but the ability to persuade people to influence
outcomes is a critical skill that IT professionals need to master. It means being
able to communicate effectively about the pros and cons of one approach versus
another and helping others to see your point of view (Process Excellence Network,
2018).
1. Patience is one of the key traits. The IT professional world is vast in nature,
IT professional tools require constant research, trial, and error efforts to
succeed in a specific solution. Therefore, one needs to be patient with the
people and equipment he works with. One should analyze the problem
thoroughly before reaching any conclusion and should avoid any type of hasty
decisions and judgments.
6. One of the most important traits that one should possess is that a tech
professional should be passionate about his work. He should enjoy his
work, be ready to learn more about the field, and should be able to put this
knowledge into practice (“IT Professional”, 2020).
The following job specifications are examples of the applications of the technological
knowledge of IT professionals:
Help desk. The unfortunate fact is that hardware and software programs do not
always work the way they are supposed to. And most of us do not have the
technological know-how to find the problem and fix it. As a result, someone places a
call to the IT specialist who is usually available 24/7.
• Computer support specialists give advice and help to anyone who uses a
computer in an organization. They receive phone calls for help and respond to
handle the problems. Most of the time, IT specialists can solve the matter remotely,
but they are also available to make on-site visits.
• IT support technicians have the skills to set up and install computer equipment
and make most repairs. They can train employees on how to use new computer
hardware and software. This includes using word-processing software, operating
printers and even providing instructions on how to send and receive emails.
• IT technicians select the required computer hardware and software for specific
applications and supervise the installation. These networks include wide area
networks, local area networks, intranets, and other systems for communication.
• Network administrators design systems to operate at the least cost and increase
productivity. Network administrators confirm that employees' workstations are
working properly while the organizations' servers and any mobile equipment are
functioning correctly. They do any required maintenance, fix any network problems,
and upgrade computer security systems.
29
Security. The world is full of people with criminal intentions, and the internet is a fertile
field for their unlawful acts. The number of threats from hackers is constantly
increasing and these threats are becoming more sophisticated. An IT specialist plays
an important role in designing software to stop cyberattacks.
• Cyberattacks can be costly. Hackers can steal personal identities and use the
information to open credit cards, apply for bank loans and even transfer home
mortgages to their names and take ownership of your house.
• Information security technicians design software, such as data encryption
programs and firewalls, to protect an organization's computer systems and
networks. They continuously check the organization's networks to detect security
breaches and investigate when an attack occurs.
Database analysis. IT specialists use special software to organize, manage and store
data. This includes information such as financial data, shipping records, purchase
orders, payroll records, and administrative expenses. Database administrators make
this information available to users in the organization and set up security procedures
that prevent unauthorized access.
IT experts monitor databases to make sure they are operating efficiently and error-
free. These technicians install backup software to restore data in the event of power
outages, software crashes, and virus attacks.
Cloud computing. Moving data storage to the cloud involves more than buying a few
megabytes of online capacity. It is not as simple as swapping an in-house computer
for an outside source. Transitioning to the use of cloud data storage requires an
analysis of the needs of an organization, then plotting and planning the installation.
Software engineers. After a software developer has written the codes and created a
program, the programmer tests and installs the systems onto the computers. These
engineers use their knowledge of hardware and software codes to implement the
programs and make them easy to use for non-IT employees.
30
• Systems Security Professional. Security is a top concern of every person and all
businesses. A CISSP certification is recognized worldwide because the best
credential for an IT specialist to possess is the ability to style and maintain security
programs. This certification may be a validation that the technician has the
extensive technological ability needed to engineer security protection.
• Be inclusive. We should appreciate and support people from all walks of life
and identities regardless of their sexual orientation, age, size, family status,
belief, religion, and mental ability.
• Be considerate. We all depend upon one another to perform the best work we
need to accomplish as a corporation. Your decisions will affect clients and
colleagues, and you ought to take those consequences under consideration
when making decisions.
• Be respectful. We would not all agree all the time, but disagreement is no
excuse for disrespectful behavior. We will all experience frustration from time
to time, but we cannot allow that frustration to become personal attacks. An
environment where people feel uncomfortable or threatened is not a productive
or creative one.
Threats of violence;
Insubordination;
Discriminatory jokes and language;
Personal insults, especially those using racist or sexist terms;
Unwelcome sexual attention;
Supporting for, or encouraging, any of the above-mentioned behavior.
holds a viewpoint does not mean that they are wrong. Do not forget that we all
make mistakes, and blaming each other does not get us anywhere. Instead,
focus on resolving issues and learning from mistakes (Betterteam, 2020).
The existence of these bodies is made necessary due to the lack of respect for ethics
in society in general, requiring not only the validation of these types of bodies but also
their power to enforce sanctions when ethical violations are made evident. It can be
argued that these ruling bodies should be unnecessary since ethical considerations
do not depend on one's profession. It could also be stated that this is a function of the
state and the legal system, that delegating these functions to non-governmental,
public organizations, is detrimental to the general public, and overall blocks
transparency of procedures. These bodies will also promote the exertion of corporate
influence toward their specific group’s interests. One such interest is reducing
competition by limiting or increasing the difficulty of access to functions (and a general
increase in prices since they permit a coordinated fixing of payments in a monopolistic
way) and promoting the practice of obtaining special treatment and recognition for
those that depend on their specific activities. Because there are various independent
groups for the IT Code of Ethics, there are different ideas about what guidelines should
be there and some are as follows.
It is a violation of this Ethics Policy for any Certified Person to participate in any incident
of cheating, breach of security, misconduct, submission of fraudulent information, or
any other behavior that could be considered compromising the integrity or
confidentiality of any CompTIA certification examination, any CompTIA certification or
the CompTIA Continuing Education Program, as determined by CompTIA. All Certified
Persons shall adhere to the following:
• All information submitted for participating in and earning units from the
CCEP must have been completed by the participating Certified Person.
• A Certified Person shall abide by all the terms and conditions outlined in
the CompTIA Candidate Agreement
• Certified Persons shall only submit continuing education units that they
have completed.
• A Certified Person shall only provide accurate and authentic information
for earning continuing education units.
• A Certified Person shall abide by the CompTIA Continuing Education
Audit Policies as set forth by CompTIA from time to time.
• A Certified Person shall offer and provide professional services with
integrity.
• A Certified Person shall perform professional services in a manner that is
fair and reasonable to clients, principals, partners, and employers, and
shall disclose conflict(s) of interest in providing such services.
• A Certified Person shall not disclose any confidential client information
without the specific consent of the client.
• A Certified Person will always conduct themselves in a manner that
enhances the image of the profession.
• A Certified Person shall provide services to clients competently and
maintain the necessary knowledge and skill to continue to do so in those
areas in which they are certified.
• A Certified Person shall not solicit clients through false or misleading
communications or advertisements.
• In the course of performing professional activities, a Certified Person shall
not engage in conduct involving dishonesty, fraud, deceit, or
misrepresentation, or knowingly make a false or misleading statement to
a client, employer, employee, professional colleague, governmental or
other regulatory body or official, or any other person or entity (Computing
Technology Industry Association, n.d.).
This Code of Ethics is concerned with how fundamental ethical principles are applied
to a computing professional's conduct. The Code is not an algorithm for solving ethical
problems, rather it is a basis for ethical decision-making. When going through a
particular issue, a computing professional may find that various principles should be
taken into consideration. Questions associated with different sorts of issues can best
be answered by thoughtful consideration of the elemental ethical principles,
34
understanding that the good of the general public is of paramount consideration. The
entire computing profession benefits when the moral decision-making process is
accountable and transparent to all or any stakeholders. Open discussions about
ethical issues promote accountability and transparency.
A computing professional should do the following:
9
4. Be fair and take action not to discriminate. The values of equality, resistance,
courtesy for others, and justice rule this principle. Impartiality requires that even
careful decision processes provide some avenue for remedy of injustice.
Computing professionals should promote the just participation of all people,
including those of less represented groups. They should respect individual status
regardless of their ages, ethnicity, a state in life, social status, nationality, race,
religion or belief, sexual preferences, and other factors. Any form of harassment
including bullying and other abuses of power and authority may be a sort of
discrimination. The use of data and technology may cause new, or aggravate
existing injustice.
5. Respect the work that is vital to store new ideas, inventions, creative works,
and artifacts related to technology and computing. Creating new ideas,
inventions, creations and artifacts related to technology and computing creates
value for society, and those who take this effort should expect to gain true value
from their work.
Cybercrime is a crime that involves the use of digital technologies directed to computing
and communication technologies. The modern techniques that are proliferating towards
the use of internet activity result in exploitation and vulnerability making a suitable way of
transferring confidential data to commit an offense through illegal activity. The activity
involves theft; child pornography; built images; online transaction fraud internet sale fraud;
deployment in malicious internet activities such as viruses, worm; and third party abuse
like phishing, e-mail scams, etc. The universal approach to prevent illegal activities online
and to stop cybercrimes is by enforcing different levels of security to monitor and prevent
crimes carried out in cyberspace.
This unit introduces the concept of Cybercrime, the different types of cybercrimes, their
implications and ways to prevent them. It also elaborates on the various security issues.
The discussion also focuses on the essential roles of Cybercrime Law in the Philippines.
38
CYBERCRIME
OBJECTIVES:
Define cybercrime
Know the history of cybercrimes
Identify why people commit cybercrime
Explore the different types of cybercrime
39
Thoughts to Ponder
“A cyber hacker is more than a bank robber using another weapon. His
motivation is robbery and theft.”
-Anonymous
What is Cybercrime?
Cybercrime denotes criminal activity where a computer or a network is the source,
tool, target, or crime place (Matameh et al., n.d). It involves an Information Technology
infrastructure, including illegal access, data interference, systems interference, misuse
of devices, forgery, and electronic fraud (Rouse, n.d).
History of Cybercrime
Here is a brief overview of the history of cybercrime:
1. The era of modern computers started with the analytical engine of Charles
Babbage. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France,
produced the loom device that permits the repetition of a series of steps in the
weaving of fabrics. This resulted in fear among Jacquard's employees that their
traditional employment and livelihood were being threatened. So, they committed
acts of sabotage to discourage Jacquard from further use of the new technology.
This is the first recorded cybercrime (III, S.,2011).
2. On May 3, 1978, the Web witnessed the birth of the first spam e-mail. A marketer
named Gary Thuerk, from the Digital Equipment Corporation, introduced his
message to 400 of the 2600 people on ARPAnet, the DARPA-funded spam called
"The first Internet." Initially, Thuerk was selling something (computers, or more
specifically, information about open houses where people could inspect the
computers). There annoyed tons of individuals, and he also had some success,
with a couple of recipients curious about what he was doing. And thus, spam was
born (Quigley & By, 2010).
3. The first virus to affect Apple computers was not written for the Macintosh computer
but is of historic interest nonetheless. In 1982, Rich Skrenta, a 15-year-old student,
wrote the Elk Cloner virus. That virus is capable of infecting the Apple II computer
boot sector. The Elk Cloner virus would display a short poem on every 50th boot
(Cluley, et al., 2020).
Common Cybercrimes
Different types of cybercrime are facilitated by a range of technologies and techniques,
including:
1. Hacking
Hacking refers to testing and exploring computer systems, highly skilled computer
programming, or the practice of accessing and altering other people's computers.
Hacking may be carried out with ultimate aims or with criminal intent (Urbas, &
Choo, 2008).
Example:
In 2019, in Baltimore, a type of ransomware named RobbinHood halted all
government e-mails for weeks. Robinhood attack has cost the city more
than $18 million, and costs continue to increase. In Atlanta, in 2018, the
same type of Malware was used, resulting in damages amounting to $17
million.
• Fileless Malware – This type of malware does not install anything; instead,
it changes files that are native to the operating system. It includes
PowerShell or WMI. Fileless attack is not trapped by anti-virus software
because the operating system recognizes the edited files as legitimate.
These attacks are stealthy; they are up to ten times more successful than
traditional malware attacks.
Example:
An example of fileless malware is Astaroth. It spammed users with links to
a.LNK shortcut file. When users downloaded the file, a WMIC tool was
launched, along with many other Windows tools. When these tools were
downloaded, additional code was executed in the computer’s memory,
leaving no indication that scanners could detect. The intruder then
41
downloaded and ran a Trojan that stole important information and uploaded
them to a remote server.
Example:
This spyware targeting business and government leaders using hotel WIFI
is called DarkHotel. This type of malware accesses systems belonging to
specific, influential people. Once that access is achieved, the attackers will
install keyloggers to capture their target passwords and other sensitive
information.
Example:
In 2017, adware called Fireball infected 250 million computers and devices.
This adware hijacks computer browsers and changes default search
engines, and it also tracks web activity. The malware had the potential to
become quite a mere nuisance. Three-quarters of it were ready to run code
remotely and download malicious files.
Example:
Emotet is a sophisticated banking trojan that has been around since 2014.
It is hard to fight Emotet because it evades signature-based detection, is
persistent, and includes spreader modules that help it propagate. Based on
the U.S. Department of Homeland Security alert, Emotet has cost up to $1
million per incident to remediate.
Example:
The U.S. and Israeli intelligence forces developed the Stuxnet worm to set
back Iran's nuclear program. It is introduced into Iran's environment through
a flash drive. Stuxnet spread violently, but it did little damage only since its
function was to inhibit controllers that managed the uranium enrichment
process.
• Virus – It is a code that inserts itself into an application and executes when
the application runs. In a network, a virus may be used to steal data, launch
DDoS, or even conduct ransomware.
Example:
At the beginning of the millennium, a virus once baffled the planet. With just an
e-mail, the ILOVEYOU virus or Love Bug has spread immediately, crashing
computers, deleting files, and causing about $10 billion of injury. On May 4,
2000, people worldwide received e-mails with "ILOVEYOU" on the topic. The
message read: "kindly check the attached LOVELETTER coming from me."
Unsuspecting victims then opened the document. Unfortunately, it had been
"an executable program" that allowed the virus to require control. It is a worm
that replicated itself and sent copies of itself to all within the victim's e-mail
address book. The said virus is created by Onel de Guzman, a former computer
science student at AMA Computer College. A member of Grammersoft, an
underground hacking group.
Example:
When users download a fake VPN app, Zacinto infects systems. Once
Zacinto is installed, it conducts a security sweep for opposing malware and
attempts to eliminate it. Afterward, it opens invisible browsers and interacts
with content like a human such as scrolling, highlighting, and clicking. The
said activity is meant to fool behavioral analysis software. When the
malware clicks on ads in invisible browsers, Zacinlo's payload occurs.
Example:
Olympic Vision, a keylogger, has been used to target U.S., Middle Eastern,
and Asian businessmen for Business E-mail Compromise (BEC) attacks. It
uses spear-phishing and social engineering techniques to infect its target
systems to steal sensitive information and infiltrate business transactions.
43
Example:
Echobot may be a variant of the well-known Mirai. Echobot attacks a good
range of IoT devices, manipulating more than 50, unlike vulnerabilities. It
also contains exploits for Oracle WebLogic Server and VMWare's SD-Wan
networking software. Besides, the malware looks for unpatched legacy
systems. Echobot might be employed by malicious actors to launch DDoS
attacks, interrupt supply chains, steal sensitive supply chain information,
and conduct corporate sabotage.
• Mobile Malware - Attacks targeting mobile devices have risen 50 percent since
2018. Mobile malware threats are as many as those targeting desktops and
include Trojans, ransomware, advertising click fraud, etc. They are distributed
through phishing and malicious downloads. They are a specific problem for
jailbroken phones, which tend to lack the default protections that were a part of
those devices' original operating systems.
Example:
Triada is a rooting Trojan injected into supply-chain when millions of Android
devices shipped with the Malware pre-installed. This mobile malware gains
access to delicate areas in the operating system and installs spam
applications. The spam application display ads, sometimes substituting
authentic ads. If the user clicks on the unauthorized advertisement, the
income from that click goes to Triada's developers.
3. Piracy
Internet piracy includes the downloading and distribution of copyrighted media
without paying for it. When people download or copy content such as music, books,
games, and other digital media, they may be infringing on copyright laws (About
Piracy, n.d.).
4. Spam
Spam refers to unsolicited e-mails or the electronic equivalent of 'junk mail.' Spam
is often spread in large amounts by sending out generic e-mails to large lists of e-
mail addresses (House of Representatives Committees: Chapter 2 Nature,
Prevalence and Economic Impact of Cyber Crime, n.d).
5. Phishing
Phishing is a criminally fraudulent way of acquiring sensitive information such as
usernames, passwords, and credit card details by masquerading as a trustworthy
entity in electronic communication (It is Phishing Season, 2020).
44
7. Cyber Pornography
This refers to the act of using cyberspace to create, display, import, distribute or
publish obscene materials, especially materials that illustrate children engaged in
sexual acts with adults. Cyber pornography is a criminal offense, that causes harm
to people (Cyber pornography, n.d).
8. Copyright Infringement
The unauthorized use of works under copyright is copyright infringement (which
includes infringing the copyright owner's rights, such as the right to duplicate or
perform the copyrighted work, or to do derivative works) (Copyright Basics, n.d)
9. Denial-of-Service (DoS)
In a Denial-of-Service (DoS) attack, an attacker tries to stop legitimate users from
accessing information or services. DoS is done by accessing your computer and
its network connection. An attacker may prevent you from accessing e-mail,
websites, online accounts, or other services that depend on the affected computer
(What does "Disable Port Scan and DoS Protection, n.d.).
45
OBJECTIVES:
At the end of this lesson, students will be able to:
Thoughts to Ponder
“As the world becomes increasingly interconnected, everyone shares
the responsibility of securing the cyberspace ”
-Newton Lee
PRIVACY ON CYBERSPACE
Information systems made many businesses successful today (such as Google,
Facebook, eBay, etc.) would not exist without information technology. However,
improper use of information technology can create problems for the organization and
employees ( Ethical & Security Issues in Information System, n.d.).
One of the legal issues arising in cyberspace is privacy. Just as in the real world,
privacy is essential to individuals, corporations, and governments. At present, the
privacy of individual netizens has acquired critical relevance. Criminals getting access
to credit card information can cause loss to the owners or the financial institute. Using
organizational information systems, such as posting inappropriate content on
Facebook or Twitter or employing a company account, can cause lawsuits and loss of
business (Ethical & Security Issues in Information System, n.d.).
• "Public" activities: Many online activities are open for public use. Engaging in
these sorts of activities does not normally create an expectation of privacy. In
fact, consistent with the Electronic Communications Privacy Act (ECPA), it is
not illegal for anyone to look at or disclose a transmission if the communication
is "readily accessible" to the public.
For example, if you posted a message post to the public, such as an online
forum, it is available to be viewed, copied, and stored by others. Furthermore,
your name, electronic mail address, and other information are usually available
for inspection as part of the message itself. Public postings made on the Web
are archived in searchable databases. On the Web, your public messages can
47
be retrieved by someone anytime or even years after the message was initially
written.
• Private activities: Almost all online services offer "private" activity, which
allows subscribers to send personal e-mail messages to others. The ECPA
(Electronic Communication Privacy Act) makes it unlawful for anyone to read
or disclose the contents of a transmission. This law applies to electronic mail
(e-mail) messages. Still, there are three important exceptions to the ECPA:
o The online service may view the private e-mail if it suspects the sender
of the message is attempting to wreck the system or destruction to
another user. Random monitoring of e-mail is still prohibited.
o Suppose either the sender/recipient of the message contends the
inspection or disclosure, the service may legally view and disclose
private e-mail. Some commercial services require a contract from new
members when signing up for the service.
o If the employer owns the e-mail system, the employer may inspect the
contents of the employee's e-mail on it. Hence, any e-mail sent from a
business is possibly not private. Several lawsuits have determined that
employers have a right to watch the e-mail messages of their employees.
To increase e-mail privacy, many people keep a private e-mail account for personal
matters separate from their business/other transaction accounts. Free accounts can
be obtained from some online providers, including Gmail, Yahoo, and others. Be sure
to read their privacy policies.
48
It is hard to find these kinds of intrusions. You must remember this potential privacy
abuse and investigate new services before signing in/up. Continually scan the privacy
policy and the service agreement of any online service you prefer to use (Privacy and
the Internet: Travelling in Cyberspace Safely, n.d).
What is Encryption?
A technique of scrambling an e-mail message or file so that it is meaningless to anyone
who does not know how to unscramble it is termed Encryption. The advantage of
encoding is that something encrypted is just about inaccessible to anyone except the
selected recipient. Thus, private information is also encrypted and so transmitted,
stored, or distributed without fear that it will be browsed by others. (Blog, 2013).
What is Netiquette?
A set of social agreements that facilitate interaction over networks is called Netiquette,
short for "network etiquette" or "Internet etiquette." It includes correct manners for
sending that provide rules of conduct in social things. Netiquette aims to assist,
construct, and maintain a pleasing, comfortable, and economic atmosphere for online
communication; and avoid inserting strain on the system and generating conflict
among users (Chen, 2019).
50
CYBERCRIME PREVENTIONS
OBJECTIVES:
Thoughts to Ponder
“Cybersecurity is a shared responsibility, and it boils down to this: in
cybersecurity, the more systems we secure, the more secure we are.”
-Jeh Johnson
1. The Basics:
• If In Doubt, Throw It Out: Malware and phishing are becoming subtler. Do not
attempt to open e-mails that look suspicious or uncommon, particularly if they
relate to your e-mail, social media, money services, or utility accounts. Delete
these messages.
• Stay Updated: Turn on automatic updates. Keep your computer’s operating
system, and security software up to date.
• Think Before You Act: Be particularly cautious and open-eyed if an offer
demands you to act in real-time, sounds too smart to be true, or asks for
personal information.
2. Privacy Settings
Updating privacy settings on websites and services, particularly on social media
and search sites like Facebook, Google, and Yahoo is the best way to begin
protecting yourself. This could sometimes be done through the “settings” menu
choice.
Since most sites default to data being shared in public, ever-changing settings can
help you confirm your data is seen by fewer folks. Ideally, you should share data
solely with people you recognize.
Why is this important? “Oversharing” of social media data ends up in various risks,
such as home break-ins by criminals who see that you simply are on vacation.
Also, restricted sharing and/or deleting tags on photos and pieces of writing on
your Timeline can prevent embarrassing materials from being seen by those that
do not know you well, such as your colleagues at work, acquaintances, distant
family members, or potential employers.
3. Blocking Cookies
Another good way to maintain anonymity while online is by Blocking third-party
cookies. Blocking cookies makes it harder for websites to track the last time you
visited, what username you use, and whether or not you should be signed in.
Blocking cookies can be less convenient in some ways. The increase in privacy is
worth the compromise.
52
4. Unlinking Accounts
Some websites are now giving the option to link accounts. For example, Google
allows you to link all your different Gmail accounts in a browser. Many websites
are now giving you the option to use your Google login to access their site. While
convenient, linking accounts will produce a lot of risks. If one in each of your
accounts is compromised, all the linked accounts will be in danger. So unlinking
accounts may be a great way to safeguard data.
6. Stronger Passwords
To maintain security, having different and stronger password combinations is
critically necessary. With every website needing a password, people tend to get
likely to create simple passwords or use the same passwords on different websites.
Use passwords with eight characters or more with mixed types of characters. But
even passwords with simple substitutions like “3nt3rta1nm3nt” can be vulnerable
to attackers’ increasingly sophisticated technology, and random combinations like
“a9s8d7%k” are difficult to remember.
7. Better Browsing
Internet or web user must delete cookies often. The user must have to be
compelled to log out to social media like Facebook and even Google accounts
when not using them and do not keep them open in tabs on your web browser. If
the user needs to require an ensuing step in improving privacy, attempt employing
a browser such as Tor that routes your information processing through a VPN or
Virtual non-public Network. A virtual non-public network routes all of your
information through a proxy server; thus, your information processing address and,
in several cases, your user information is protected.
53
When you use the information and If you take it without permission
other materials that you find on the or do not cite the source, you
internet for your homework or commit plagiarism.
research, make sure that you
indicate the information sources in
footnotes, just as you used books
to get the information.
Music, Do use the internet to learn about Don't use the internet to
video, music, video, and games. There download or share copyrighted
games, and are many websites where you can material. When something is
copyrights learn about music (by listening to copyrighted, it means that
sample tracks), can preview movie someone else owns it, and you
videos, and can learn about new cannot copy or distribute it
computer games. without their permission. It is
dishonest and illegal to
download copyrighted music,
video, games, or other
materials.
OBJECTIVES:
Thoughts to Ponder
“Cybercrime is the biggest challenge these days with development and
access to technology across the globe.”
-Rajnath Singh
A provision expanding the scope of the law of libel to cover Internet posts was opposed
by different groups, which asked the Supreme Court to issue a temporary restraining
order (TRO) and a status quo ante order. The law could see Internet users sentenced
to up to twelve (12) years in prison for posting defamatory comments on social media
such as Facebook or Twitter. The online libel was not part of the original bill proposed
by the Department of Justice (DOJ) but was one of the amendments inserted by the
Senate proposed by Sen. Vicente Sotto III. The Supreme Court issued a 4-month
injunction on October 9, 2012, while it scrutinized the law for possible violations of
constitutional provisions on freedom of expression. The high court extended the TRO
indefinitely on February 6, 2013 (Inquirer, 2014).
In R.A. 10175, individuals found guilty of cybersex face a jail term of prison mayor
which is six (6) years and one (1) day to twelve (12) years or a penalty of at least
P200,000 but not exceeding P1 million.
Child pornography via an electronic device such as a computer carries a penalty one
degree higher than that stated in the Anti-Child Pornography Act of 2009 (RA 9775).
Under this Act, those who produce, disseminate, or publish child pornography will be
fined from P50,000 to P5 million and a maximum jail term of reclusion Perpetua or 20
to 40 years.
Persons found guilty of unsolicited communication face arresto mayor or imprisonment
for one (1) month and one (1) day to six (6) months or a fine of a minimum of P50,000
but less than P250,000, or both.
The law also penalizes offenses against the confidentiality, integrity, and availability of
computer data and systems, like illegal access, illegal interference, data interference,
system interference, misuse of devices, and cybersquatting.
58
It defines cybersquatting as the acquisition of a website name on the Web in bad faith
or with the intent to profit, mislead, destroy one's reputation or deprive others of
registering an equivalent name. Computer-related forgery, fraud, and identity theft are
also covered by the law.
PNP Anti-Cybercrime Group (ACG) showed data that online libel cases climbed from
only 22 cases in the year 2013 to 661 from January to June 2019; online scams from
42 to 550 cases; photo and video voyeurism cases from 10 to 356; and computer-
related identity theft from 23 cases to 258. Other issues such as online threat, rose
from 29 to 217 during the said time; hacking from 12 to 193; unjust vexation from 1
reported case to 148; cases of illegal access from zero-incident to 133; ATM/credit
card fraud from one reported case to 59; and robbery with intimidation from three to
35 incidents. NP-ACG attributed the swelling figures to the increasing number of
internet users in the country. Cybercriminals take advantage of the utilization of the
Web since it is often easily accessed (Gonzales, 2019).
59
"Privacy" explains how information technology affects privacy rights and discusses
several critical pieces of legislation that have addressed privacy rights.
The chapter explains how the personal information that businesses gather using
information technology can be used to obtain or keep customers (or to monitor
employees). It also discusses the concerns of privacy advocates regarding how much
information can be gathered, with whom it can be shared, how the data is collected in
the first place, and how it is used. These concerns also extend to the information-
gathering practices of law enforcement and government.
60
OBJECTIVES:
define privacy
define anonymity
differentiate privacy from anonymity
61
Thoughts to Ponder
“No one can train you to be famous. How do you deal with the loss of
anonymity, the loss of privacy? You have to be disciplined.”
-Wesley Snipes
It is critical to notice that privacy and anonymity are not the same. The thought of
privacy on the Web is the expectation that entities with whom a user shares data won't
disclose that data to other entities, which is not originally intended to ascertain.
Protection of privacy implies protection against hackers and corporations alike--
anyone who might exploit a user's personal information. In this sense, indeed, an
anonymous user is inherently protected because his personal information is not readily
available; however, the converse does not hold. Privacy does not necessarily imply
anonymity; an internet site may, for instance, record visitors' behavior or
demographics, but recording users' names and private information for later use or
exploitation is an invasion of privacy (n.d.).
Privacy and anonymity are two different concepts. They are both increasingly
necessary as we get increasingly wiretapped and tracked, legally or not. It is important
to know why they are an integral part of our civil liberties – why they are not just
beneficial to the individual but critical to a free society.
62
WHAT IS PRIVACY?
What is privacy? (n.d.) states that, in general, privacy means to be free from secret
surveillance and determine whether, when, how, and to whom one's personal or
organizational information is revealed. Specifically, privacy could also be divided into
four categories:
1. Physical- restriction on others to experience a person or situation through one
or more of the human senses;
2. Informational - restriction on searching for or revealing facts that are unknown
to others;
3. Decisional - restriction on interfering in decisions that are exclusive to
an entity;
4. Dispositional – is a regulation on attempts to know an individual's state of
mind.
Privacy is the ability to keep some things to yourself regardless of their impact on
society. For example, I lock the door every time I go inside the men’s room – not
because I am doing something illegal or plotting to overthrow the government inside
the men’s room, but just because I would like to keep to myself whatever I do inside.
People have created private spaces for themselves. Even in the most oppressive
regimes, people have found how to try something outside of prying eyes (Washington,
2019).
When someone says that only criminals have something to cover, they are plain
wrong. Nobody would dream of creating a keyboard for people with three arms and
would support the exact incontrovertible detail that people do not have three arms.
Some investigation hawks and cohorts are pushing for society for people with no need
for privacy – even though such people do not exist.
So, privacy may be a concept describing activities that you simply keep entirely to
yourself or a limited group of individuals.
WHAT IS ANONYMITY?
Anonymity is from the Greek word ἀνωνυμία, anonymia, meaning "without a name"
or "namelessness." In everyday use, anonymity typically refers to the state of an
individual's identity, or personally identifiable information, being publicly unknown (
Qoara, 2017).
Anonymity is doing something without letting other people know that you are doing it.
A typical example would be if you would like to blow the whistle on abuse of power or
other sorts of crime in your organization without risking your career and social standing
in the group. This is why we typically have strong regulations that protect sources of
the press. You may also post such data anonymously online through a VPN, the TOR
anonymizing network, etc. This is often the equivalent of the anonymous tip-off letter,
which has been seen as a staple diet in our checks and balances (Washington, 2019).
Lacking anonymity in society, we have lost the ability to keep our government in check.
63
OBJECTIVES:
At the end of this lesson, the student will be able to:
Thoughts to Ponder
“All human beings have three lives: public, private, and secret.”
-Gabriel Garcia
Legal aspects
– Protection from unreasonable intrusion upon one’s isolation
– Protection from the appropriation of one's name or likeness
– Protection from unreasonable publicity given to one’s private life
– Protection from the publicity that unreasonably places one in a false light
before the public
of the digital economy and increasing international trade of knowledge, the Philippines
has strengthened its privacy and security protections (Wall, 2017).
Republic Act No. 10173, known as the Data Privacy Act (DPA) of 2012, is a law
protecting all forms of information in information and communications systems, be it
personal, government, or private sector (Republic Act 10173 – Data Privacy Act of
2012, 2016).
The DPA of 2012 proposes to protect personal information. Most of the information
nowadays is processed online or through the Internet. There is no reservation that the
Data Privacy Act compliance is now a necessity in the business sector. It was signed
into law last August 15, 2012 (Republic Act 10173 – Data Privacy Act of 2012, 2016).
Republic Act. No. 10173, Ch. 1, Sec. 2, states that this law aims "to protect the
fundamental human right of privacy, of communication while ensuring the free flow of
information to promote innovation and growth." This complete privacy law also
established a National Privacy Commission that implements and supervises it and is
endowed with rulemaking power. On September 9, 2016, the ultimate implementing
rules and regulations came into force, adding specificity to the Privacy Act (Wall,
2017).
based in the Philippines is used for processing. The rule further applies to the
processing of Philippine citizens' private information regardless of where they reside.
One exception within the Act provides that the law does not apply to the processing of
personal information within the Philippines that was lawfully collected from residents
of foreign jurisdictions — an exception helpful for Philippine companies that provide
cloud services.
Source: Summary: Philippines Data Privacy Act and implementing .... https://iapp.org/news/a/summary-
philippines-data-protection-act-and-implementing-regulations/
Approach
The Philippines law takes the approach that “the processing of private data shall be
allowed subject to adherence to the principles of transparency, legitimate purpose,
and proportionality.”
Source: Summary: Philippines Data Privacy Act and implementing .... https://iapp.org/news/a/summary-
philippines-data-protection-act-and-implementing-regulations/
Consent must be "freely given, specific, informed," Therefore, the definition further
requires that consent to collection and processing be evidenced by recorded means.
However, processing does not always need permission.
Consent is not required for processing where the info subject is a party to a contractual
agreement to fulfill that contract. The exceptions of compliance with a legal obligation
upon the info controller, protection of the info subject's vital interests, and response to
a national emergency are also available.
Source: Summary: Philippines Data Privacy Act and implementing .... https://iapp.org/news/a/summary-
philippines-data-protection-act-and-implementing-regulations/
Required agreements
The law requires that when sharing data, the sharing must be covered by an
agreement that provides adequate precautions for data subjects' rights, and that these
agreements are subject to review by the National Privacy Commission.
68
Source: Summary: Philippines Data Privacy Act and implementing .... https://iapp.org/news/a/summary-
philippines-data-protection-act-and-implementing-regulations/
• An individual's race, ethnic origin, legal status, age, color, and non-secular,
philosophical, or political affiliations;
• An individual's health, education, a genetic or sexual lifestyle of an individual,
or any offense committed or imagined to have committed;
• Issued by government agencies "peculiar" (unique) to a private individual, like
a Social Security number;
• They are marked as classified by executive order or Act of Congress.
Source: Summary: Philippines Data Privacy Act and implementing .... https://iapp.org/news/a/summary-
philippines-data-protection-act-and-implementing-regulations/
Surveillance
The Philippines law states that the country's Human Security Act of 2007, a severe
anti-terrorism law that permits surveillance, must suit the Privacy Act.
Source: Summary: Philippines Data Privacy Act and implementing .... https://iapp.org/news/a/summary-
philippines-data-protection-act-and-implementing-regulations/
Source: Summary: Philippines Data Privacy Act and implementing .... https://iapp.org/news/a/summary-
philippines-data-protection-act-and-implementing-regulations/
69
The Philippines law appears to contain a "right to be forgotten" within the sort of a right
to erasure or blocking, where the info subject may order the removal of his or her data
from the info controller's file system. Exercising this right requires "substantial proof,"
of the burden of manufacturing, placed on the info subject. The very fact expressly
limits this right that continued publication could also be justified by constitutional rights
to freedom of speech, expression, and other rights.
Notably, the law provides a personal right of action for damages for inaccurate,
incomplete, outdated, false, unlawfully obtained, or unauthorized use of private data.
Source: Summary: Philippines Data Privacy Act and implementing .... https://iapp.org/news/a/summary-
philippines-data-protection-act-and-implementing-regulations/
A "personal data breach," on the other hand, may be a subset of a security breach that
results in accidental or unlawful destruction, loss, alteration, unauthorized disclosure
of, or access to, personal data transmitted, stored, or otherwise processed.
Source: Summary: Philippines Data Privacy Act and implementing .... https://iapp.org/news/a/summary-
philippines-data-protection-act-and-implementing-regulations/
Requirement to notify
The law further provides that not all "personal data breaches" require notification,
which provides several bases for notifying data subjects or the info protection
authority. Section 38 of the IRRs provides the important things about breach
notification:
The law provides that the Commission may determine that notification to data subjects
is unwarranted after taking into consideration the entity's compliance with the Privacy
Act and whether the acquisition was properly done.
Source: Summary: Philippines Data Privacy Act and implementing .... https://iapp.org/news/a/summary-
philippines-data-protection-act-and-implementing-regulations/
Source: Summary: Philippines Data Privacy Act and implementing .... https://iapp.org/news/a/summary-
philippines-data-protection-act-and-implementing-regulations/
Notification contents
The contents of the notification must at least:
• Describe the character of the breach;
• Contain the personal data possibly involved;
• Provide the measures taken by the entity to deal with the breach;
• Explain the measures done to reduce the harm or negative consequence of the
breach;
• Identify the representatives of the private information controller, including their
contact details;
• Provide any assistance to the affected data subjects.
Source: Summary: Philippines Data Privacy Act and implementing .... https://iapp.org/news/a/summary-
philippines-data-protection-act-and-implementing-regulations/
Penalties
The law provides separate penalties for various violations, most of which also include
imprisonment. Different counts exist for unauthorized processing, negligent access,
improper disposal, unauthorized access or the intentional breach, concealment of a
breach involving sensitive personal information, unauthorized disclosure, and
malicious disclosure.
Any combination or series of acts may cause the entity to be subject to imprisonment
starting from three to 6 years and a fine between Php 100,000.00 and Php
5,000,000.00.
Notably, there is also the previously mentioned private right of action for damages,
which might apply.
71
OBJECTIVES:
Thoughts to Ponder
“Real integrity is doing the right thing, knowing that nobody's going to
know whether you did it or not."
-Oprah Winfrey
1. Notice/Awareness
Notice may be a concept that network professionals should be familiar with. Many
systems, including internet sites, are concerned with ownership, security, and
terms of use. Notice of terms of use could be a banner that appears during network
log-on, warning that access to the network is restricted to authorized users. It could
be a splash page for an internet site informing visitors that clicking to enter
constitutes agreement to the terms of use. Within the context of internet site
privacy, notice means you want to advise visitors about your policies concerning
the private data you process.
• choice/consent
• access/participation
• enforcement/redress
73
They are only meaningful when a consumer reads an entity's policies and thinks
about his/her rights concerning those policies.
The first privacy notice provided to internet site visitors is the privacy statement.
For accessible sites that set no cookies or receive no user input, such a press
release is straightforward. The more complex and interactive the location, the more
work it will do to craft a press release covering all the bases. Here are the points
that must be covered:
Logging Activity: You would like to let visitors to your site know if you employ
automated tools to record information about their visits (information like the kind of
browser and O.S. they used to access your site, the date and time they accessed
the location, the pages they viewed, and, therefore, the paths that they took
through the site.
Use of Web Bugs and Beacons: The use of these techniques should be
disclosed, alongside a transparent statement of how and why they are used, and
what information they track.
2. Choice/Consent
Same with Notice/Awareness, this second principle should be addressed with
honesty and sensitivity. Choice means giving consumers options on how any
personal information collected from them could be used. This relates to secondary
data uses, which the FTC describes as "uses beyond those necessary to finish the
contemplated transaction." The FTC notes that "such secondary uses are often
internal, like placing the buyer on the collecting company's list to plug additional
products or promotions, or external, like the transfer of data to 3rd parties."
As you would possibly expect, privacy advocates prefer the opt-in type of consent,
during which people specifically request to be included in a list, instead of opt-out,
which adds people to the list by default, until they ask to be removed.
3. Access/Participation
The point of access and participation is to let people whom you have got
information about determine what that information is, and contest its accuracy and
completeness if they believe it is wrong.
4. Integrity/Security
The fourth widely accepted principle is that data should be accurate and secure.
Data collectors, like internet sites, must take reasonable steps to assure data
integrity, like using only reputable sources of knowledge and cross-referencing
data against multiple sources, providing consumer access to data and destroying
74
5. Enforcement/Redress
The FTC has observed that "the core principles of privacy protection can only be
effective if there is a mechanism in a situation to enforce them." What that
mechanism is for your internet site will depend upon several factors. Your internet
site may need to suit specific privacy laws. Your organization may subscribe to an
industry code of practice or privacy seal program, both of which can include dispute
resolution mechanisms and consequences for failure to suit program requirements.
A personal action against your organization can be done if the organization is found
to be liable for a breach of privacy that caused harm to a private individual or entity.
Class-action lawsuits have also been brought, alleging privacy invasion.
Economic (such as credit card acquisitions) and social (such as telephone calls and
e-mails) dealings produce large amounts of stored data and records in current society.
In the past, this data would be documented in paper records and would go away as a
"paper trail" or just not be documented at all. The connection of paper-based records
was a complicated process. It required human operators to get through documents
manually, which was time-consuming and not complete (Surveillance, n.d.).
But today, many of those records are electronic, leading to an "electronic trail." Every
payment through a credit card, a call from home, verified library book, rented video, or
otherwise complete recorded transaction generates an electronic record. Public
records—such as birth, court, tax, and other documents—are increasingly digitized
and made available online.
Company and Consumers Profiling
75
Source: Center, E. (n.d.). EPIC - Privacy and Consumer Profiling. Retrieved September 09, 2020,
from https://www.epic.org/privacy/profiling/
WORKPLACE MONITORING
Source: Admin. (2012, September 24). Menu. Retrieved September 09, 2020, from
https://www.surveilstar.com/blog/workplace-privacy-and-employee-monitoring/
Employers need to ensure their employees do an honest job, but employees do not
need their every sneeze or trip to the device logged. That is the vital problem of
workplace monitoring.
Through new technologies, employers can watch many features of their employees'
work, especially on telephones, computer terminals, electronic and voice mail, and
when employees are using the Web. The said virtual monitoring is not regulated. Thus,
unless company policy specifically states otherwise (and even this is often not
assured), your employer may listen, watch and skim most of your workplace
communications.
One company offers technology that claims to supply insight into individual employee
behavior supported by the trail of "digital footprints" created every day within the
workplace. Behavioral modeling technology can piece together all electronic records
to supply behavior patterns that employers may utilize to gauge employee
performance and conduct. For instance, it can be a search for word patterns, changes
in language or style, and communication patterns between individuals.
Current surveys have found that most employers monitor their employees. They are
motivated by concern over litigation and, therefore, the increasing role of electronic
evidence in lawsuits and agency investigations.
In the year 2007 survey by the American Management Association, the ePolicy
Institute found that two-thirds of employers monitor their employees' internet site visits
to stop inappropriate surfing. And 65% use software to dam connections to internet
sites deemed off-limits for workers. This is often a 27% upsurge since 2001 when the
survey was first conducted. Employers are worried about employees visiting adult sites
with sexual content, games, social networking, entertainment, and the like. 43% of
companies that monitor e-mail use technology to repeatedly monitor e-mail and 28%
of employers have fired workers for e-mail misuse.
Partially, employers track content, keystrokes, and time spent at the keyboard. And
12% monitor blogs to ascertain what is being written about the corporate. Another 10%
monitor social networking sites.
77
Almost half of the businesses use video monitoring to counter theft, violence, and
sabotage. Of those businesses, only 7% state they use video surveillance to track
employees' on-the-job performance. Most employers notify employees of anti-theft
video surveillance (78%) and performance-related video monitoring (89%).
Privacy Tip: One of the best ways to ensure the privacy of your calls made at work
is to use your mobile phone, or another phone provided by your employer for
personal calls.
2. Computer Monitoring
If you have got a computer terminal at your job, it is going to be your employer's
window into your workspace. There are several types of computer monitoring.
Employers can use computer software that permits them to ascertain what is on the
screen or stored within the employees' computer terminals and hard disks.
Employers can monitor Internet usage like web surfing and electronic messages.
People involved in intensive word-processing and data entry jobs could also be
subject to keystroke monitoring. Such systems tell the manager what percentage of
keystrokes per hour each employee is performing. It also may inform employees if
they are above or below the quality number of keystrokes expected.
When I delete messages from my terminal, are they still within the system?
Yes. Electronic and voice mail systems retain messages in memory even after they
had been deleted. Although it appears they are erased, they are often permanently
"backed up" on mag tape, alongside other essential data from the pc system.
4. Video Monitoring
Can employers use video monitoring within the workplace?
For the foremost part, yes. Video monitoring may be a commonplace method of
deterring theft, maintaining security, and monitoring employees. For instance, a
bank may utilize video monitoring to stop or collect evidence of a robbery. a
corporation can also use video monitoring in a parking garage as a security
measure for employee safety.
79
Employers can also use cameras to watch employee productivity and stop internal
theft. Currently, federal law does not prohibit video monitoring even when the worker
does not know or consent to be monitored.
Federal law does not prohibit the sound recording of phone conversations as long
as both parties give their consent. Most states have extended this law to incorporate
recording in-person discussions.
OBJECTIVES:
Thoughts to Ponder
“There are no private lives. This is the most important aspect of
modern life. One of the biggest transformations we have seen in our
society is the diminution of the sphere of the private. We must
reasonably regard the fact that there are no secrets and nothing is
private. Everything is public.”
- Phillip K. Dick
Types of Surveillance
Source: Yann Picand, D. (n.d.). Definitions - Surveillance reports a problem. Retrieved September
11, 2020, from http://dictionary.sensagent.com/Surveillance/en-en/
1. Computer surveillance
The overwhelming majority of computer surveillance involves the monitoring of
information/data and traffic on the web.
Computers also are a surveillance target due to the private data stored on them.
The NSA also runs a database referred to as "Pinwale," which stores and indexes
large numbers of e-mails of both Americans and foreigners.
82
Mobile phones also are commonly used to collect location data. The geographical
location of a mobile phone (and the person carrying it) is often determined easily
(whether the phone is being used or not), employing a technique known as
multilateration to calculate the differences in time for a sign to travel from the
telephone to every cell tower near the owner of the phone. An issue has emerged
in the US over the legality of such techniques, particularly whether a court warrant
is required.
3. Surveillance cameras
Surveillance cameras are used for observing a neighborhood. They are often
connected to a recording device and I.P. network, and/or watched by a security
guard/law enforcement officer. Cameras and recorders are relatively expensive
and will require human personnel to watch/supervise the camera footage. Now with
cheaper production techniques, it is simple and cheap enough to be utilized in
home security systems and for everyday surveillance.
Managements often initially claim that cameras are meant to be used for control,
but many of them find themselves using them for general surveillance.
5. Biometric surveillance
Biometric surveillance refers to technologies that measure and examine human
physical and/or behavioral characteristics for authentication, identification, or
screening purposes. Examples of physical features include fingerprints, DNA, and
facial patterns while behavioral characteristics include gait or a person's manner of
walking or voice. Furthermore, this surveillance system incorporates the use of the
unique configuration of a person's facial features to accurately identify them,
usually from surveillance video.
• People feel untrustworthy and embarrassed. Moreover, people claim they are
being dehumanized.
• People fear being threatened by fraud and identity theft (i.e., having their
information accessed and misused by another person, like a disgruntled
worker, hacker, or thief, having their identity stolen).
6. Aerial surveillance
Aerial surveillance is the gathering of surveillance, usually visual imagery or video,
from an airborne vehicle—such as an unmanned aerial vehicle, helicopter, or spy
plane.
7. Corporate Surveillance
Corporate surveillance is the monitoring of an individual’s or group's behavior by
an organization. The information collected is most frequently used for marketing
purposes or sold to other corporations but is additionally regularly shared with
government agencies. It is often used as a sort of business intelligence, which
enables the corporation to tailor their products and/or services to be desirable to
their customers. Oftentimes, the info is sold to other corporations for the
aforementioned purpose or is often used for marketing purposes, like the targeted
advertisements on Google and Yahoo, where ads are targeted to the user of the
program by analyzing their search history and e-mails.
8. Human operatives
Organizations that have enemies who wish to collect information about the group
members or activities face the difficulty of infiltration.
9. Satellite Imagery
The U.S. Director of National Intelligence Michael McConnell on May 25, 2007,
authorized the National Applications Office (NAO) of the Department of Homeland
Security to permit local, state, and domestic Federal agencies to access imagery
from military intelligence satellites and aircraft sensors, which may now be used to
detect the activities of U.S. citizens. The satellites and aircraft sensors are going
to be ready to penetrate cloudiness, detect chemical traces, and identify objects in
84
buildings and underground bunkers and can provide real-time video at much higher
resolutions than the still-images produced by programs like Google Earth.
Many companies are previously "tagging" their workers, who are monitored while
at work. Workers within the U.K. went on a general strike in protest of getting
themselves tagged. They felt that it had been dehumanizing to possess all of their
movements tracked with RFID chips. Some critics have expressed fears that folks
will soon be tracked and scanned everywhere they go.
Another common argument is: "If you are not doing something wrong, then you do not
have anything to fear." Some critics state that this claim should be modified to read:
"As long as we do what we're told, we've nothing to fear."
For instance, an individual who is a member of a political group that opposes the
policies of the national government would not want the government to identify them so
that the government cannot easily subvert their organization, arrest them, or kill them.
Other critics state that while an individual won't have anything to cover immediately,
the government might later implement policies t which other groups oppose. Other
critics point to the very fact that the majority of people have things to cover. For
instance, if an individual is trying to find a replacement job, they would not want their
current employer to know this (Use of surveillance cameras Free Essay Example,
2020).
86
INTELLECTUAL PROPERTY
Intellectual property (IP) pertains to any original creation of the human intellect such as
artistic, literary, technical, or scientific creation. Thus IP, in this way aids the economic
development of a country by promoting healthy competition and encouraging industrial
development and economic growth.
This unit defines intellectual property and explains the varying degrees of ownership
protection offered by industrial property and copyright. Furthermore, it focuses on the
Intellectual Property Code of the Philippines.
87
INTELLECTUAL PROPERTY
OBJECTIVES:
Thoughts to Ponder
“The intellectual property situation is bad and getting worse. To be a
programmer, it requires that you understand as much law as you do
technology.”
—Eric Allman
INTELLECTUAL PROPERTY
Intellectual Property (IP) refers to inventions, literary and artistic works, symbols,
names, and images used in commerce (What is Intellectual Property? n.d.).
IP is a somewhat nuanced concept, encompassing several different types of ideas.
Intellectual property is categorized into two:
1. Industrial Property - consists of signs transmitting information to consumers,
as regards products and services offered in the market. It is typically created
and used for industrial or commercial purposes. It includes patents for
inventions, trademarks, industrial designs, and geographical indications
(Peralta, 2013).
2. Copyright - a set of rights that is inevitably vested to someone who creates an
ingenious work – almost like a literary composition, music, movie, or software.
These rights include the proper way to breed the work, organize derivative
works, distribute copies, and perform and display the work publicly (“What is
Copyright?”, 2020).
Industrial Property
The industrial property takes a variety of forms, the main types of which are the
following:
1. PATENT
The Government, through the Intellectual Property (IP) Code of the Philippines,
issues a patent which is a right granted for a product, process, or an improvement
of a product or process which is new, inventive, and useful. These rights give the
inventor the right to exclude others from making, using, or selling the merchandise
of his invention during the lifetime of the patent.
Twenty (20) years is the term of protection of a patented product, giving an inventor
substantial commercial gain. The patent owner must share the complete
description of the invention in return. This information is made available to the
general public through the Official Gazette and may be utilized as a basis for future
research and can, in turn, promote innovation and development (Nicleus, 2014).
According to IPOPHIL (2020), the IP Code of the Philippines sets three (3)
conditions for an invention to be considered patentable:
1. it is new
2. involves an inventive step
3. industrially applicable
89
In the IP Code, an invention is not considered new if it already forms a part of the
domain of prior art. Prior art is explained in the IP Code of the Philippines, Chapter
2, Section 24 – 24.2.
An invention that will be produced and utilized in any industry should be industrially
applicable.
2. UTILITY MODEL
According to IPOPHIL (2020), a Utility Model (UM) allows the right holder to
prevent others from commercially using the registered UM without his
authorization, provided that the UM is based on the Registrability Report.
Compared with invention patents, it is relatively inexpensive, faster to obtain, and
with less stringent patentability requirements.
Any technical explanation of a problem in any field of human activity which is new
and industrially applicable shall be registrable.
3. INDUSTRIAL DESIGN
According to IPOPHIL (2020), the ornamental or aesthetic aspect of an article is
an industrial design. Design, in this aspect, may be three-dimensional structures
the shape or surface of an article, or the two-dimensional features which are the
patterns or lines of color. The focus of industrial designs ranges from fashion to
industrial goods - handicrafts, jewelry, vehicles, and appliances.
A registered industrial design owner has the right to prevent third parties from
making, selling, or importing articles bearing or embodying a design that is
substantially a copy of the protected design, when such acts are undertaken for
commercial purposes.
4. TRADEMARK
According to IPOPHIL (2020), a word, a group of words, signs, symbols, logo, or a
combination thereof that identifies and differentiates the source of the goods or services
of one entity from those of others is called a trademark.
If you are a business, distinguishing your services or goods from others gives you
a viable edge. It protects a business’s brand identity in the market. Registration of
it gives the proprietor the exclusive rights to avoid others from using or exploiting
the mark in any way.
5. GEOGRAPHICAL INDICATIONS
According to WIPO, a symbol used on goods that have a selected geographical
origin and possess qualities or a reputation related to that place of origin may serve
as a geographical indication. Commonly, a geographical indication consists of the
place of origin of the products. Agrarian goods typically have qualities that derive
from their place of production and are influenced by specific local geographical
factors, like climate and soil. Whether a symbol functions as a geographical
indication may be a matter of national law and consumer perception. Geographical
indications could also be used for good sort of agricultural products, such as,
“Tuscany” for vegetable oil produced in a specific area of Italy, or “Roquefort” for
cheese produced in one region of France.
COPYRIGHT
According to IPOPHIL (2020), the legal protection extended to the owner of the rights
in an original work is called copyright. Original work refers to every creature in the
literary, scientific, and artistic domain.
91
Some of the literary and artistic works enumerated in the IP Code include books and
other writings, musical works, films, paintings and other works, and computer
programs.
Copyright laws grant artists, authors, and other creators automatic protection for their
literary and artistic creations, from the moment they created them.
Recordation or deposit of your works is not necessary. Still, authors and artists may
opt to execute an affidavit of ownership with the National Library or the IPOPHIL for
the issuance of recordation and deposit.
1. Economic rights allow the creator to get remuneration from the exploitation of
his works by third parties.
2. Moral rights make it possible for the creator to assume measures to require
care of and protect the private connection between himself and the work
(Philippines Board of Investments, n.d).
Copyright Infringement
Copyright Infringement consists of infringing any right secured or protected under the
Code. It also consists of aiding or abetting such infringement (Copyright Law in the
Philippines: Federis, n.d.). The law also provides for the liability of a person who, at
the time when copyright subsists in a work, has in his possession an article which he
knows, or ought to know, to be an infringing copy of the work for:
• Selling or letting for hire, or by trade offering or exposing for sale or hire, the
article (Inter-library loans, 2019);
• Distributing the article for trade, or for any other purpose to an extent that will
prejudice the rights of the copyright owner in the work (Inter-library loans, 2019);
or
• Article in public trade exhibit (Inter-library loans, 2019).
1. Indirect Infringement
Even if you do not directly infringe any of the exclusive rights in copyright, you may be
guilty of indirect copyright infringement as either a “contributory infringer” or a
“vicarious infringer” if you help somebody else infringe.
2. Direct Infringement
It occurs when someone exercises one of the exclusive rights granted by the Copyright
Act without seeking the permission of the copyright owner. As an example, if you make
a copy of a book or a CD without the copyright owner’s permission, you have violated
the exclusive right to reproduce and have therefore committed copyright infringement.
While unauthorized copying is the most common form of direct infringement, a
violation of any of the exclusive rights constitutes copyright infringement. Direct
infringement, therefore, also includes a performance or adaptation made without the
author’s permission.
1. The progress and well-being of humanity rest on its capacity to form and invent
new works within the areas of technology and culture.
2. The legal protection of the newest creations encourages the commitment of
additional resources for further innovation.
3. The promotion and protection of property spur economic processes, create new
jobs and industries and enhances the quality and delight of life.
An effective and equitable property system can help all countries to understand
intellectual property’s potential as a substance for economic growth and social and
cultural well-being.
The IP system helps strike a balance between the interests of innovators and the
public providing an environment during which creativity and invention can flourish, for
the advantage of all.
94
OBJECTIVES:
At the end of this lesson, the student will be able to:
Thoughts to Ponder
"Stealing music is not right, and I can understand people being very
upset about their intellectual property being stolen."
-Steve Jobs
Using someone’s ideas or words as one’s own is known as plagiarism. The expression
of original ideas is protected by copyright laws, a bit like original inventions. Most sorts
of expression fall under copyright protection as long as they are recorded (such as a
book or a computer file) (Eugene McDermott Library, n.d.).
Most cases of plagiarism are often avoided, however, by citing sources. Simply
acknowledging that certain material has been borrowed, and providing your audience
with the knowledge necessary to seek out that source, is typically enough to stop
plagiarism.
Reverse engineering
Reverse Engineering is the procedure of taking something apart to build a copy of it,
understand it, or improve it. It is originally applied to computer hardware but is now
applied to software as well. Reverse engineering of software involves analyzing it to
create a new representation of the system in a different form or at a higher level of
abstraction. Often, reverse engineering begins by using program code from which you
can extract design-stage details, which is a higher abstraction level in the life cycle. In
other words, design-level details about an information system are more conceptual
and less defined than the program code of the same system (Bonclaysama, 2011).
Reverse engineering can use the Code of the current database programming
language to recover the design of the information system application.
Other reverse engineering issues involve tools called compilers and decompilers. A
compiler is a language translator that converts computer program statements
expressed in a source language (such as COBOL, Pascal, or C) into machine
language (a series of binary codes of 0s and 1s) that the computer can execute.
96
Here are several reasons why firms or individual developers create open-source Code
if they do not receive money for it:
• Some people share Code to earn respect for fashionably solving a standard
problem.
• Some people have used an open ASCII text file that was developed by others
and feel the necessity to pay back.
• A firm may develop an open ASCII text file in anticipation of earning software
maintenance fees when end users need changes and switch to the first
developer to implement the changes.
Competitive Intelligence
Cybersquatting
Companies that want to establish an Internet presence know that the best way to
capitalize on the strength of their brand names is to make the names part of the domain
names for their websites. When the websites were first established, there was no
procedure for validating the legitimacy of requests for Web site names, which were
given out on a first-come, first-served basis. Some individuals cyber squat registered
domain names for famous trademarks or company names to which they had no
connection, with the hope that the trademark’s owner would buy the domain name for
a large sum of money.
97
OBJECTIVES:
Thoughts to Ponder
"It's very important to remember that it's your intellectual
property; it's not your computer. And in the pursuit of protection of
intellectual property, it's important not to defeat or undermine the
security measures that people need to adopt in these days."
-Stewart Baker
The State recognizes that an efficient intellectual and industrial property system is
significant to the event of domestic and artistic activity, attracts foreign investments,
facilitates the transfer of technology, and ensures market access for products. It shall
secure and protect the exclusive rights of inventors, scientists, artists, and other gifted
Filipino citizens to their property and creations, particularly when beneficial to the
people, for such periods as provided during this Act.
The use of intellectual property bears an affair. To the present end, the State shall
promote the diffusion of data and knowledge for the promotion of national development
and progress and the commonweal.
Republic Act No. 8293 rescinded all Acts and parts of Acts inconsistent with, more
particularly:
PART Inclusions
I The Intellectual Property Office
II The Law on Patents
III The Law on Trademarks, Service Marks, and Trade Names
IV The Law on Copyright
V Final Provisions
1. Examine applications for the grant of patents for inventions and register utility
models and industrial designs;
2. Examine applications for the geographic indication, registration of marks, and
integrated circuits;
3. Register technology transfer arrangements and settle disputes involving
technology transfer payments covered by the provisions of Part II, Chapter IX
on Voluntary Licensing and develop and implement strategies to market and
facilitate technology transfer;
4. Promote the utilization of patent information as a tool for technology
development;
5. Publish regularly in its publication the marks, utility models, patents, and
industrial designs, issued and approved, and the technology transfer
arrangements registered;
6. Administratively adjudicate contested proceedings affecting property rights;
and
7. Coordinate with other government agencies and the private sector efforts to
formulate and implement plans and policies to strengthen the protection of
property rights within the country.
101
Today's world has become a little village because of information technology. The
method of communication and transmission of data has become so fast that the
information has spread worldwide, and has greatly affected human life and
caused a complete change. The world now depends on technology. However,
knowing that this technology also carries a significant risk of destroying society,
some wonder what the new technologies of data and communication consist of
and what their effects on the daily lives of people are.
This chapter explains the impacts of ICT in various areas of life like society,
education, entertainment, workplace, health system and even government.
102
OBJECTIVES:
Thoughts to Ponder
“It is not about the technology; it’s about sharing knowledge and
information, communicating efficiently, building learning communities
and creating a culture of professionalism in schools. These are the
key responsibilities of all educational leaders.”
– Marion Ginapolis
Social Impact of Information Technology
History has observed that humanity went through several revolutions. The newest one is
the revolution of data and communication technology. This revolution caused a rupture of
everything old. Todays considered new may quickly become an old and obsolete trend
tomorrow. Due to these evolutions, the demand for data and communication technology
has increased.
Our world is witnessing a rapid evolution process with a need for information facilities in
terms of quantity, quality, and access to information to form the most straightforward
decision supported by the various changes and dynamics of the enterprise's environment.
This demonstrates the growing importance of data systems and their ability to satisfy the
requirements of enterprise information. This emphasizes the importance of developing
these systems and covering their effectiveness and efficiency. One of the critical elements
of those systems' success is that they need to become hooked into sophisticated
technology that has dramatically enabled access to information and reduced access costs.
The telecommunications area has undertaken a decisive transformation during a short
period because of the technological developments that underpin it. It has become the
infrastructure of what is known today because the knowledge economy depends on the
knowledge and its delivery methods within the shortest time and at rock bottom costs
possible. Thus, the Internet has put businesses ahead of a replacement challenge, which
is the acquisition of data and communication technology.
No one can doubt that information technology may be a fundamental and innovative
revolution that has touched human life considerably in the last century. Indeed, far from
being an effervescent phenomenon or a passing trend, information and communication
technology has just exploited various aspects of life.
Information technology (IT) uses any computers, storage, networking, and other physical
devices, infrastructure, and processes to make, process, store, secure, and exchange all
sorts of electronic data. It is utilized in the framework of enterprise operations as against
personal or entertainment technologies. The commercial use of IT encompasses both
technology and telephony.
several parts of the world has become a simple and fast process, via different ways: instant
messaging, phone calls, or video calls.
The way people perceive reality has been changed by information technology. Modern
technology has changed our perspective on many concepts. It also changed our dealings
with many traditions and customs that were once considered sacred and the pillars of
society. Although the modern means of communication made the world a small village that
facilitates communication, these means also created a kind of alienation and divergence
within the family. Communication between members of the same family is almost non-
existent; worse, communication between people, in general, has become virtual. We note
the disappearance of human relations.
Furthermore, another negative impact of IT on society is poor language proficiency as this
skill consists of an individual’s ability to talk or perform using a target language. This is a
serious matter to be concerned about regarding the development of information
technology and its impact on society. Because of modern technology, students can now
communicate with their families and associates instantly using computers or mobile
applications such as Line, WeChat, WhatsApp, and the like. This application will make it
easier to communicate, but this can also be a reason for some to ignore the spelling of
different words and the usage of correct grammar. With the increasing amount of
information on the web, Internet users may come across inaccurate information and be
misinformed (IESC, 2018).
ETHICAL ISSUES
This unit provides a thorough discussion of the software development process and the
importance of software quality. This unit covers issues on software manufacturers and
deciding “how good is good enough” with regard to their software products—particularly
when the software is safety-critical and has software glitches.
Topics include software product liability, risk analysis, and different approaches to quality
assurance testing.
This unit also examines Capability Maturity Model Integration (CMMI), the ISO 9000
family of standards, and the failure mode and effects analysis (FMEA) technique.
It also presents ethics in Business and Governance, Ethical Issues and Implications of
E-Commerce, Employee/Employer Issues, Use of Non-Traditional Workers, Contingent
Workers, H-1B Workers, Offshore Outsourcing, Whistle Blowing Protection for Whistle
Blowers and Dealing with a Whistle Blowing Situation.
.
108
OBJECTIVES:
Thoughts to Ponder
Any process that tries to reduce software development to a “no brainer” will
eventually produce just that: a product developed by people without brains.
-Andy Hunt and Dave Thomas, “Cook Until Done”
A defect in software is an error that if not removed can cause the software to fail to
satisfy the needs of the user. The impact of those defects is often trivial; for instance,
a computerized sensor during a refrigerator’s cube maker might fail to acknowledge
that the tray is full and still make ice. Other defects could lead to tragedy—the system
for an automobile’s antilock brakes could malfunction and send the car into an
uncontrollable spin. The defect could be subtle and undetectable, like a tax preparation
package that creates a minor miscalculation; or the defect could be glaringly obvious,
like a payroll program that generates checks with no deductions for taxes, loans, etc.
(Anonymous, 2016).
According to Ethics in Information Technology (n.d.) here are some notable software
bugs that have occurred:
• Nokia’s Lumina 900 smartphone had a software problem that could cause
the device to lose its high-speed data connection. The company had hoped
that the new smartphone would help raise its share of the U.S. market,
which had slipped below 1 percent. The software glitch was a major setback
for the firm and caused it to lower its profit forecasts. As a result, Nokia
shares hit a 15-year low.
• The IRS plans to invest $1.3 billion through 2024 to update its software for
handling the filing of tax returns; however, an early change designed to
speed up the processing of tax returns resulted in refunds that were delayed
by up to 10 days for millions of taxpayers in 2012.
• Some 4,000 owners of the 2013 Chevy Volt were informed that a software
bug could cause their plug-in hybrid car’s electric motor to shut down while
the vehicle is in motion.
• In late 2012, many people looking to take part in a Georgia Powerball game
were upset when a software error interrupted sales of tickets for the $425
110
The one that captures and records business transactions is a common type of
business system. An example is the manufacturer’s order-processing system that gets
order information, processes it, updates inventory and financial records, and ensures
that the order is complete and shipped on time to the customer.
But the question is how important it is for a business to have quality software. What
will be the impact of poorly developed software on a business?
Software is also used to control many company processes to eliminate human error,
improve quality, reduce costs, and shorten the time it takes to manufacture products.
For example, steel manufacturers use process-control software to capture data from
sensors, the equipment that rolls steel into bars, and the boiler that heats the steel
before it is rolled. Without process-control computers, employees could react to
defects only after the fact and would have to guess the alterations needed to correct
the process.
Process-control computers allow the process to be monitored for variations from
standards of operation and to eliminate product defects before they affect the quality
of the product. Any defect in software can lead to increased waste and costs,
decreased product quality, or even unsafe operating conditions for employees.
As a result of the massive use of computers and software in business, many
companies are now in the field of software business whether they like it or not. The
usability, timely development, and quality of software are critical to most industries.
The speed with which a corporation develops software can put it before or behind its
competitors. Software problems may have caused frustrations in the past, but
mishandled software can now be fatal to a business, causing it to miss product delivery
112
dates, incur increased development costs, and deliver products that have poor quality
(ConstableButterfly13529, n.d.).
Strict liability means that the offender is held accountable for injuring another person,
regardless of intent or negligence. The complainant must prove only that the software
product is unreasonably dangerous or defective and that the defect caused the injury.
There is no condition to prove that the manufacturer was careless or negligent or to
prove who caused the defect. All parties in a certain chain of distribution—the
manufacturer, subcontractors, and distributors—are strictly liable for injuries caused
by the product and may be sued.
• The goods or products must be fit for the ordinary purpose for which they
are used.
• The goods or products must be adequately contained, packaged, and
labeled.
• The goods or products must be of an even kind, quality, and quantity within
each unit.
• The goods or products must conform to any affirmation or promise of fact
made on the container or label.
• The quality of the goods or products must pass without opposition in the
trade.
• The goods or products must meet a fair average or middle range of quality.
If a good or product fails to meet its warranty, the lessee or buyer can sue for breach
of warranty. Most unsatisfied customers will first seek a substitute product, a
replacement, or even a refund before filing a lawsuit.
113
The complainant must have a valid contract that the supplier did not fulfill to win a
breach of the warranty claim. Most software manufacturers give limited warranties and
disclaimers to avoid any claim of misrepresentation.
It is easier and cheaper to avoid software problems from the beginning, rather than
attempt to fix the damages after.
According to Ethics in Information Technology (n.d), if a defect is exposed during a
later stage of development, some revision of the deliverables formed in previous
stages will be essential. The later the error is detected, the greater the number of
individuals who are going to be suffering from it. Thus, the greater the costs are going
to be to communicate and fix the error. Thus, software developers try to identify and
remove errors early in the development process not only as a cost-saving measure
but also as the most effective way to improve software quality.
114
A product containing integral defects that harm the user could even be the area of a
product liability suit. The use of an efficient methodology can protect software
manufacturers from legal liability in two ways. First, an efficient methodology reduces
the number of software that can occur. Second, if an organization follows widely
acknowledged development methods, negligence on its part is harder to prove.
However, even a successful defense against a product liability case can cost many
thousands of dollars in legal fees. Thus, failure to develop software carefully and
consistently is often serious in terms of liability exposure.
The methods within the development cycle are designed to ensure the reliable
operation of a product. These methods are applied at each stage of the event cycle
and are understood as Quality assurance (QA). However, some software
manufacturing organizations without a proper standard approach to QA consider
testing to be their only QA method. Rather than checking for errors throughout the
event process, some companies bank on testing just before the product ships to
ensure some extent of quality.
According to Ethics in Information Technology (n.d.), there are different types of tests
used in software development:
Dynamic Software Testing
Software is developed in units called subroutines or programs. These units are
combined to make large systems. One approach is to check the code for a completed
unit of software by actually entering test data and comparing the results with the
anticipated leads through a process called dynamic software testing. There are two
forms of dynamic software testing:
• Black-box testing - involves observing the software unit as a tool that has
expected input and output behaviors but whose internal mechanisms are
unknown (a black box). If the unit demonstrates the expected behaviors for all
the input data within the test suite, it passes the test. Black-box testing takes
place without the tester having any knowledge of the character or structure of
the actual code. For this reason, it is often done by someone apart from the one
that wrote the code.
• White-box testing - treats the software unit as a tool that has probable input
and output behaviors but whose internal workings, unlike the unit in BlackBox
testing, are known. White-box testing contains testing all possible logic paths
through the software unit with thorough knowledge of its logic. The test data
must be carefully constructed so that every program statement executes a
minimum of once. As an example, if a developer creates a program to calculate
an employee’s gross pay, the tester would develop data to see cases during
which the worker worked but 40 hours, exactly 40 hours, and quite 40 hours (to
check the calculation of overtime pay).
Other Types of Software Testing
• Static testing — Static analyzers are special software programs that are run
against new code. Instead of reviewing input and output, the static analyzer
looks for suspicious patterns in programs that may indicate a defect.
• Integration testing — After successful unit testing, the software units are
combined into an integrated subsystem that undergoes rigorous testing to
115
make sure that the linkages among the varied subsystems work
successfully.
• System testing — After successful integration testing, the varied
subsystems are combined to check the whole system as an entire entity.
• User acceptance testing — Independent testing is performed by trained
end-users to make sure that the system operates as they expect.
In 1988 the ISO issued its 9000 series of business management standards. The
standards require organizations to develop formal quality management systems that
specialize in identifying and meeting the wants, needs, and expectations of their
customers.
The ISO 9000 standard serves many various industries and organizations as a guide
to quality products, services, and management.
The various ISO 9000 series of standards address the following activities:
Many software development organizations are applying ISO 9001 to meet the special
needs and requirements associated with the purchase, development, operation,
maintenance, and supply of computer software.
Source: Jennifer. (n.d.). Ethical Issues in Software Development - PDF Free Download. Retrieved
September 24, 2020, from https://qdoc.tips/ethical-issues-in-software-development-pdf-free.html
1. Licensed Source Code: The source code may contain a General Public
License (GPL) or Library General Public License (LGPL) that details how the
software and the source code are to be distributed, copied, and modified.
3. Public Domain: The source code may be in the public domain, which means
that the author explicitly relinquishes all rights to the software. In other words,
the code is free to use without consequence.
The first two types do pose ethical issues to the programmer and therefore the third
type of source code does not cause any ethical issues because there is no obligation
to produce credit to be used. In the case where the open source code contains a GPL
or LGPL, the programmer must follow the principles as stated in the GPL or LGPL.
Some companies do follow the license. For instance, IBM’s Web sphere product relies
on the Apache Web Server, and up until the most recent re-write that no longer uses
Apache code, IBM included the GPL for Apache Web Server in their literature about
the software. However, some companies do not follow the GPL.
In some cases, the businesses claim the code as their own. To assist companies in
using the GPL properly, the Free Software Foundation launched the GPL Violations
Project. This watchdog organization monitors companies that are using open-source
projects in their software development to ensure that the GPL is referenced correctly.
In the case where the open source code has no license, but the author explicitly
requests that s/he is referenced within the developer’s code, some programmers do
not do that, mainly because the author is not a company entity. In most cases, it had
been difficult for the programmer to prove that a developer plagiarized his/her code.
With the passing of the Digital Media Copyright Act (DMCA), this will become a
significant issue for developers who frequently use code without crediting the original
author. Consistent with the DMCA, if someone publishes information on the web, that
information is automatically copyrighted as long as the author says so.
Some companies still illegally use software despite the very fact that software
companies lose $12 billion in revenues because of software piracy and license
violations.
Software companies and developers who are using reverse engineering to check
security problems or to seek out how the code works to form a program compatible
with other hardware platforms can reference many cases where US courts determined
that reverse engineering for that purpose is legal. However, both the businesses and
developers need to be prepared for the possibility of being sued by another company
or developer. Before attempting a project where reverse engineering is important,
software companies and developers should contact legal counsel for assistance
regarding this matter.
Microsoft is usually in the news regarding security flaws and bugs found in its operating
systems. For instance, in 2003, Microsoft released news of a critical flaw in its
operating systems that allowed hackers to access a person’s machine and take hold
of the machine by running any program the hackers wished.
Although a software company or developer cannot be sued for bugs that cause
damage as long as they state that they are not liable, a reputation of a software
company or developer might be ruined by releasing untested or bad code.
In 2006, the case of Microsoft vs. Google appeared in the Washington court. This case
addressed whether a non-compete agreement was violated. Based on the article
written by Elinor Mills on C-Netnews, Google hired Kai-Fu Lee, a former Microsoft
executive from China, to run the Chinese branch of Google. However, Microsoft
contends that the role that Mr. Lee would perform at Google (recruiting staff for the
developer center in China) was an immediate violation of the non-compete agreement
that Mr. Lee signed at Microsoft. The court ruled that recruiting workers in China was
not a violation of the non-compete agreement, but he was not allowed to figure out
technologies, set budgets or salaries, or choose what research Google can be
neutralized in China.
Although many users will pop a disk into their computer without much thought, there
are various legal issues surrounding software development and usage. Software
development may be a growing industry that employs workers from around the world.
In theory, almost anyone can engage in development because free tools are readily
available. Awareness of legal issues in software development is vital, however. Even
software that is supposedly offered for free features several legal factors surrounding
its use. Without familiarity with these issues, you will end up on the incorrect side of a
court case.
Licensing
The license under which a bit of software is released determines the legal rights of
those who use the software. Some licenses, just like the GNU General Public License
(the GNU GPL), allow users to switch the source code and redistribute the new
program under the condition that the new program is additionally licensed under the
GPL. Software licenses can impact the event of the latest software if licensed source
code or tools are being used in the development of that software. Violation of those
licenses allows the copyright holder to hunt reparation for any damages in court.
Liability
Software developers may need to consider liability issues for any damage caused by
their software. Users may sometimes attempt to sue if the software does not work
properly or leads to data loss or hardware damage. Developers plan to counter this by
issuing an end-user licensing agreement (EULA) with their applications. This
agreement must be accepted by the user before the installation of the software.
Whether or not these agreements are legally enforceable tends to vary from case to
119
case in court. End-user licensing agreements are often long, difficult to read, and
unavailable for review before the acquisition of a software package. Although this calls
their legal viability into question, courts have upheld the terms of those agreements on
multiple occasions.
OBJECTIVES:
At the end of this lesson, students will be able to:
Thoughts to Ponder
“If you build a great experience, customers tell each other about
that. Word of mouth is very powerful. ”
-Jeff Bezos, Amazon
What is E-Commerce?
The ability of a corporation to possess a dynamic presence on the web which allowed
the corporate to conduct its business electronically, in essence having an electronic
shop, is understood as E-Commerce or Electronic Commerce. Products are often
advertised, sold, and purchased electronically without the necessity for them to be
processed by a person. (E-commerce, n.d.).
According to Sanchez, et al. (2020) going digital is inevitable and plenty (if not all
services) are now accessible online. Accessing the web is now the most popular tool
122
for consumers in the Philippines. The product value of the internet economy helped
boost industries as a result of their existence online, making the marketing of the
products and services much easier. Booking travels, online media, transport, selling
products, and food deliveries are the blooming businesses within the Philippines
through digitalization.
With this increasing Internet usage among Filipino citizens, the digital market is
significantly emerging as part of the typical local stores.
Benefits of E-Commerce
E-Commerce offers many advantages to businesses of all types and sizes. The main
advantages are:
1. Access to a global Market - The web allows companies to access the global
market instead of just the potential customers within the surrounding area of their
physical location. Because the website site is open 24 hours daily, time differences
between countries are no longer a problem. You do not have to rise early to order
something in another country anymore (A web marketing campaign, n.d.).
2. Cutting out the Middleman - Businesses can sell directly to the buyer instead of
having to sell to a supplier. This implies that the company can usually offer the
merchandise at a discount compared to their retailers because only one company has
got to make a profit instead of two or more (A web marketing campaign, n.d).
3. A Level Playing Field - A small business can compete and show itself as a
professional company as much as a large one as finances for setting up a professional
website are relatively inexpensive to the amount of return you can get on them (E-
commerce n.d.).
4. Open 24 Hours a Day - With fully automated order processing and payment
systems, your site will never be closed even if your office or warehouse is. Orders can
be dispatched during opening hours while orders can be taken 24 hours a day. This
has great advantages for people who might be at work or busy during normal working
hours of some shops.
with internet advertisement being relatively cheap, you can reach many more people
at a cheaper cost than using conventional advertising methods.
7. Better Customer Information - Sellers can quickly and easily analyze their
customers or buyers by area and location as well as the products they are going to
buy as you will have to request the name of the customer and address when
processing a transaction. Sellers are also being more informed about their customers,
as well as customers are also more informed on E-Commerce sites. There is more
description and information on a product including reviews to help customers choose
the right product for them. This is in the best interest of the site as it cuts down on the
amount of returned goods (Better Customer Information You can quickly and easily
analyze your customers, n.d.).
Businesses entering the e-commerce world are going to face a set of ethical
challenges. It is easy for businesses to become sidetracked by the technical
challenges of operating in this way and to pay little attention to the ethical implications.
There are many ethical implications for businesses to run into that will normally be
addressed when doing business face to face. As an example, selling tobacco and
alcohol to an underage minor online is often impossible to manage easily and
effectively (Sunanda, 2018).
Legal Implications
According to E-commerce (n.d.), the central issues of E-Commerce and the law
includes the development of E-Commerce, the role of consumers, and the regulation
of e-commerce concerning consumer protection. Although E-Commerce has a big
effect on global trade, governments also have a large effect on the growth of E-
Commerce on the internet by regulating it accordingly. As governments set regulations
for E-Commerce, organizations’ managers are starting to worry if the regulations will
be too tight or may reduce the market for online trade.
Rules of E-commerce are very important for the cyberspace market as they can help
or stop the organizations working with E-Commerce and protect the consumers in the
online market.
124
Security Implications
Many security implications occur when setting up an E-Commerce website, especially
when handling sensitive information like credit card information and private details like
addresses. Many parts will need to be protected well in the communication between
the customer and the website server and the server itself from any hacker trying to
intercept information or retrieve existing information from databases (E-commerce,
n.d.).
• The user sends data to the server, before it leaves it is encrypted with a unique
key for the session.
• The server receives this information and then encrypts the information one
more time this time using its unique session. This is completely different from
the user’s unique key. It then sends back the data.
• The user’s computer now unlocks the data with the key it locked it with earlier.
The data is still encrypted but now only with the server’s key. The user’s
computer then sends the data back.
• The server then receives this information and unlocks it with its key and now
has the unencrypted data of what the user was sending to the server.
This type of encryption comes in different strengths depending on the SSL certificate
you purchase for your server. You can get certificates from 40-bit encryption up to 256-
bit encryption.
Server Security
as Aside from the security between the consumer and server, there is also security
needed on the server(s) as well, especially if sensitive information is stored under
customers’ accounts, such as credit card information and other personal information.
Servers will have to be protected to withstand any hack attempts to retrieve the
information that is stored. Prevention measures such as firewalls, checking for root
kits, antivirus systems, and others should be put in place, as well as encryption of the
data if possible so should a hacker gain entry, the information he sees is useless to
him or her.
Government Involvement
During the incidence of the “Love Bug Virus,” the Philippines had no law specifically
governing computer crimes; the applicable laws used in that instance were RA 8484
(Access Device Regulation Act) and Article 327 of the Revised Penal Code (Malicious
Mischief). The Access Device Act law was designed to penalize credit card fraud. The
“Love Bug” incident put pressure on the Philippine Congress to pass a bill regulating
125
the use of computers and penalizing hacking, launching of viruses, and other
cybercrimes (Borje, 2002).
Source: Republic Act No. 8792: GOVPH. (2000, June 14). Retrieved September 24, 2020, from
https://www.officialgazette.gov.ph/2000/06/14/republic-act-no-8792-s-2000/
The government agencies that are involved in the framework and their responsibilities
are listed below:
National Bureau of Investigation Anti-Fraud and Computer Crimes Division): in charge
of Investigations of all computer-related crimes and other offenses which make use of
advances in technology;
According to Inquirer (2019), President Rodrigo Roa Duterte’s net satisfaction rating
was up by 6 points in the first quarter of 2019.
Read more: https://newsinfo.inquirer.net/1105439/duterte-net-satisfaction-rating-up-by-6-points-in-q1-
2019#ixzz6YwNXEPn2
What is E-Governance?
• E-governance is the use of ICT by different actors of society to improve their
access to information and build their capacities.
• E-Governance is the public sector’s use of information and communication
technologies to improve information and service delivery, encouraging citizen
participation in the decision-making process; and making government more
accountable, transparent, and effective.
Implications of E-Governance
Privacy over Internet
A further important aspect of Internet civil rights is the question of privacy, particularly
concerning the vast extent of personal information held on the databases throughout
the world; and also the privacy of e-mail communication. With telephone
conversations, there is the assumption of implicit point-to-point privacy; that is, we
assume that the conversation cannot be overheard in any but the most extraordinary
of circumstances. This gives an obvious requirement to the encryption processes to
maintain the privacy of communication. Making such laws may be possible but
applying them in practice will be very difficult.
Digital Ownership
In the real world, it is relatively easy to know that one owns a particular physical object.
It can be traded, damaged, or stolen. It is usually easy to understand when and how
one can subsequently lose or relinquish it. In the context of the Internet, these
questions of ownership become complex. Goods traded within the Internet are digital
and can therefore be duplicated exactly and precisely, and ideas shared among a
group of friends or researchers can become globally visible; thereby passing into the
public domain of general awareness and hence become non-patentable. However, the
laws to deal with the issue have been successfully developed and exercised in many
countries.
Political Challenges
Much of the current usage of the Internet has resulted from the enthusiasm of the
governments in India and other developing nations in favor of e-governance initiatives.
The availability of the ICT infrastructure that can support e-learning, net banking, e-
commerce, e-trading, and e-governance has emerged as a great benefit. The political
challenges that result from this enthusiasm are, however, both varied and complex.
The political role in the Internet society encompasses aspects such as the
establishment of the legal framework to outlaw offensive practice and content; the
establishment of regulating bodies equipped and able to police those very same laws;
and the establishment of necessary international agreements to allow those legal and
regulatory frameworks to be effective in practice.
Pressure is mounting on the government to reduce the operating cost. At the same
time, citizens expect an improved service from the government with more flexibility
and efficiency, and without any premium rate for the additional services. Service
delivery mechanisms are undergoing fundamental change and moving toward citizen-
centered government.
Networking Technologies
Internet technology is available in more than 150 countries with an increased
bandwidth provision. This makes the citizens believe that anything is possible!
Consequently, the government’s traditional monopoly structure is threatened by the
virtual worlds and the industrial-age structure is currently changing because of the
networked technologies. Moreover, the technology is eliminating the boundaries
between and within the government branches.
For developing countries like the Philippines, lack of vision and cultural issues are
hindering the progress in e-governance. Despite the high level of technology
penetration, the gaps between digital haves and have-nots are growing exponentially.
The countries, which are slow in adapting to e-governance, have a lot of work to do in
getting services and transactions online.
129
OBJECTIVES:
At the end of this lesson, students will be able to:
Thoughts to Ponder
DURATION: 1.5 hour
“The truth of the matter is that you always know the right thing to
do. The hard part is doing it.”
-Gen. H. Norman Schwarzkopf
to networking and data communications analysis had the highest forecasted growth
rate at 50 percent. As a result, IT firms and organizations that use IT products and
services are concerned about a shortfall in the number of U.S. workers to fill these
positions.
Facing a likely long-term shortage of trained and experienced workers, employers are
increasingly turning to nontraditional sources to find IT workers with skills that meet
their needs; these sources include contingent workers, H-1B workers, and outsourced
offshore workers. Employers face ethical decisions about whether to recruit new and
more skilled workers from these sources or to develop their staff to meet the needs of
their business.
Contingent Workers
The Bureau of Labor Statistics defines contingent work as a job situation in which an
individual does not have an explicit or implicit contract for long-term employment. The
contingent workforce includes independent contractors, temporary workers hired
through employment agencies, on-call or day laborers, and on-site workers whose
services are provided by contract firms.
A firm is likely to use contingent IT workers if it experiences pronounced fluctuations
in its technical staffing needs. Workers are often hired on a contingent basis as
consultants on an organizational restructuring project, as technical experts on a
product development team, and as supplemental staff for many other short-term
projects, such as the design and installation of new information systems.
Typically, these workers join a team of full-time employees and other contingent
workers for the life of the project and then move on to their next assignment. Whether
they work, when they work, and how much they work depends on the company’s need
for them. They have neither an explicit nor an implicit contract for continuing
employment.
132
If a particular project requires only temporary help, and the workers will not be needed
for future projects, the use of contingent workers is a good approach. In such a
situation, using contingent workers avoids the need to hire new employees and then
fire them when staffing needs decrease.
Organizations should carefully consider whether or not to use contingent workers
when those workers are likely to learn corporate processes and strategies that are key
to the company’s success. It is next to impossible to prevent contingent workers from
passing on such information to subsequent employers. This can be damaging if the
worker’s next employer is a major competitor.
Although using contingent workers is often the most flexible and cost-effective way to
get a job done, their use can raise ethical and legal issues about the relationships
among the staffing firm, its employees, and its customers, including the potential
liability of customers for withholding payroll taxes, payment of employee retirement
benefits and health insurance premiums, and administration of workers’ compensation
to the staffing firm’s employees.
Depending on how closely workers are supervised and how the job is structured,
contingent workers may be viewed as permanent employees by the Internal Revenue
Service, the Labor Department, or a state’s workers’ compensation and
unemployment agencies.
For example, in 2001, Microsoft agreed to pay a $97 million settlement to some 10,000
“permatemps” — temporary workers who were employed for an extended length of
time as software testers, graphic designers, editors, technical writers, receptionists,
and office support staffers. Some had worked at Microsoft for several years. The
Vizcaino v. Microsoft class action was filed in 1992 by eight former workers who
claimed that they and thousands more permatemps had been illegally shut out of a
stock purchase plan that allowed employees to buy Microsoft stock at a 15 percent
discount. Microsoft shares skyrocketed in value throughout the 1990s. The sharp
appreciation in the stock price meant that had they been eligible, some temporary
workers in the lawsuit could have earned more money from stock gains than they
received in salary while at Microsoft.
The Vizcaino v. Microsoft lawsuit dramatically illustrated the cost of misclassifying
employees and violating laws that cover compensation, taxes, unemployment
insurance, and overtime. The key lesson of this case is that even if workers sign an
agreement indicating that they are contractors and not employees, the deciding factor
is not the agreement but the degree of control the company exercises over the
employees. The following questions can help determine whether someone is an
employee:
• Does the person have the right to control the manner and means of
accomplishing the desired result?
• How much work experience does the person have?
• Does the worker provide his tools and equipment?
• Is the person engaged in a distinct occupation or an independently established
business?
• Is the method of payment by the hour or by the job?
• What degree of skill is required to complete the job?
• Does the person hire employees to help?
135
The Microsoft ruling means that employers must exercise care in their treatment of
contingent workers. If a company wants to hire contingent workers through an agency,
then the agency must hire and fire the workers, promote and discipline them, do
performance reviews, decide wages, and tell them what to do daily.
Read the manager’s checklist in Table 6.2 for questions that pertain to the use of
contingent workers. The preferred answer to each question is yes.
Table 6.2. Manager’s checklist for the use of contingent employees
H-1B Workers
An H-1B is a temporary work visa granted by the U.S. Citizenship and Immigration
Services (USCIS) for people who work in specialty occupations — jobs that require at
least a four-year bachelor’s degree in a specific field, or equivalent experience. Many
companies turn to H-1B workers to meet critical business needs or to obtain essential
technical skills and knowledge that cannot be readily found in the United States. H-1B
workers may also be used when there are temporary shortages of needed skills.
Employers often need H-1B professionals to provide special expertise in overseas
markets or on projects that enable U.S. businesses to compete globally. A key
requirement is that employers must pay H-1B workers the prevailing wage for the work
being performed.
A person can work for a U.S. employer as an H-1B employee for a maximum
continuous period of six years. After a worker’s H-1B visa expires, the foreign worker
must remain outside the United States for one year before another H-1B petition will
136
be approved. Table 6.3 shows the employers who received approval for the most H-
1B visas in 2008.
Table 6.3. Top H-1B visa employers in 2008
H-1B temporary professionals make up less than 0.1 percent of the U.S. workforce,
but nearly 40 percent are employed as computer programmers. The top five
outsourcing countries for H-1B workers are India, China, Canada, the United Kingdom,
and the Philippines.
Each year the U.S. Congress sets a federal cap on the number of H-1B visas to be
granted, although the number of visas issued often varies greatly from this cap. Since
2004, the cap has been set at 65,000 with an additional 20,000 visas available for
foreign graduates of U.S. universities with advanced degrees. Of the 65,000 visas,
5,400 are reserved for nationals of Singapore and 1,400 for nationals of Chile under
certain trade agreements between the U.S. and these countries. The cap only applies
to certain IT professionals, such as programmers and engineers at private technology
companies. A large number of foreign workers are exempt from the cap, including
scientists hired to teach at American universities, work in government research labs,
or work for nonprofit organizations.
When considering the use of H-1B visa workers, companies should take into account
that even highly skilled and experienced H-1B workers may require help with their
English skills. Communication in many business settings is fast-paced and full of
idiomatic expressions; workers who are not fluent in English may find it difficult and
uncomfortable to participate. As a result, some H-1B workers might become isolated.
Even worse, H-1B workers who are not comfortable with English may gradually stop
trying to acclimate and may create cliques, which can hurt a project team’s morale and
lead to division. Managers and coworkers should make it a priority to assist H-1B
workers looking to improve their English skills and to develop beneficial working
relationships based on mutual respect for any cultural differences that may exist. H-
1B workers must feel at ease and be able to easily interact to feel like true members
of their team.
As concern increases about employment in the IT sector, displaced workers and other
critics challenge whether the United States needs to continue importing thousands of
137
H-1B workers every year. Many business managers, however, say such criticisms
conceal the real issue, which is the struggle to find qualified people, wherever they
are, for increasingly challenging work. Heads of U.S. companies continue to complain
that they have trouble finding enough qualified IT employees and have urged the
USCIS to loosen the reins on visas for qualified workers. They warn that reducing the
number of visas will encourage them to move the work to foreign countries, where they
can find the workforce they need. Some human resource managers and educators are
concerned that the continued use of H-1B workers may be a symptom of a larger,
more fundamental problem—that the United States is not developing a sufficient
number of IT employees with the right skills to meet its corporate needs.
Many IT workers in the United States have expressed concern that the use of H-1B
workers has a negative impact on their wages. Researchers from New York University
and the Wharton School of the University of Pennsylvania examined tens of thousands
of résumés as well as demographic and wage data on 156,000 IT workers employed
at 7,500 publicly held U.S. firms. Their conclusions were “that H-1B admissions at
current levels are associated with a 5% to 6% drop in wages for computer
programmers, systems analysts, and software engineers.”
of 2000 that allows current H-1B holders to start working for employers as soon as
their petitions are filed. Therefore, a company looking to hire a critical person who
already has H-1B status can do so in a matter of weeks.
Until Congress approved the Visa Reform Act of 2004, there were few investigations
into H-1B salary abuses. The act increased the H-1B application fee by $2,000, of
which $500 was earmarked for antifraud efforts; the act also defined a modified wage-
rate system, allowing for greater variances in pay to visa holders. Investigations are
typically triggered by complaints from H-1B holders, but the government can conduct
random audits or launch an investigation based on information from third-party
sources.
Companies using H-1B workers, as well as the workers themselves, must also
consider what will happen at the end of their six-year visa term. The stopgap nature of
the visa program can be challenging for both sponsoring companies and applicants. If
a worker is not granted a green card, the firm loses the worker without having
developed a permanent employee. Many of these foreign workers, finding themselves
suddenly unemployed, are forced to uproot their families and return home.
139
Outsourcing
Outsourcing is another approach to meeting staffing needs. Outsourcing is a long-term
business arrangement in which a company contracts for services with an outside
organization that has expertise in providing a specific function. A company may
contract with an organization to provide such services as operating a data center,
supporting a telecommunications network, or staffing a computer help desk.
Coemployment legal problems with outsourcing are minimal because the company
that contracts for the services does not generally supervise or control the contractor’s
employees. The primary rationale for outsourcing is to lower costs, but companies also
use it to obtain strategic flexibility and to keep their staff focused on the company’s
core competencies.
In the 1970s, IT executives started the trend toward outsourcing as they began to
supplement their IT staff with contractors and consultants. This trend eventually led to
outsourcing entire IT business units to such organizations as Accenture, Electronic
Data Systems, and IBM, which could take over the operation of a company’s data
center as well as perform other IT functions.
Offshore Outsourcing
Offshore outsourcing is a form of outsourcing in which the services are provided by an
organization whose employees are in a foreign country. Any work done at a relatively
high cost in the United States may become a candidate for offshore outsourcing—not
just IT work. However, IT professionals, in particular, can do much of their work
anywhere—on a company’s premises or thousands of miles away in a foreign country.
In addition, companies can reap large financial benefits by reducing labor costs
through offshore outsourcing. As a result, and because a large supply of experienced
IT professionals is readily available in certain foreign countries, the use of offshore
outsourcing in the IT field is increasing. American Express, Aetna, Compaq, General
Electric, IBM, Microsoft, Motorola, Shell, Sprint, and 3M are examples of big
companies that employ offshore outsourcing for functions such as help-desk support,
and network management, and information systems development.
As more businesses move their key processes offshore, U.S. IT service providers are
forced to lower prices. Many U.S. software firms set up development centers in low-
cost foreign countries where they have access to a large pool of well-trained
candidates. Intuit—maker of the Quicken tax preparation software—currently has
facilities in Canada, Great Britain, and India. Accenture, IBM, and Microsoft maintain
large development centers in India. Cognizant Technology Solutions is headquartered
in Teaneck, New Jersey, but operates primarily from technology centers in India.
Because of the high salaries earned by application developers in the United States
and the ease with which customers and suppliers can communicate, it is now quite
common to use offshore outsourcing for major programming projects. According to the
Gartner Group, the top four sources of contract programming include India, Ireland,
Canada, and Israel. Contract programming is also flourishing in Argentina, Australia,
Belarus, Brazil, Bulgaria, China, Malaysia, Malta, Mexico, Nepal, the Philippines,
Poland, Russia, Serbia, Singapore, Sri Lanka, and Vietnam. But India, with its rich
140
talent pool (a high percentage of whom speak English) and low labor costs, is widely
acknowledged as the best source of programming skills outside Europe and North
America.
NXP creates semiconductors, system solutions, and software for mobile phones, TVs,
and personal media players. It employs 37,000 people working in 20 countries, with
2007 sales reaching $6.3 billion. In 2008, NXP awarded Tata Consultancy Services a
five-year, $100 million outsourcing contract to provide its IT services. These services
include data center operations, networking, and application development out of
computing centers located in Bangalore, Bangkok, and Eindhoven in the Netherlands.
The purpose of the outsourcing was to provide operational cost savings and to enable
NXP’s managers and executives to focus on core business activities. The project has
gone so well that Tata won the Netherlands Outsourcing Award in 2009.
Table 6.4 shows the leading countries that provide offshore IT services to U.S. firms
while Table 6.5 lists several offshore IT outsourcing firms.
Table 6.4. Leading countries for providing offshore IT Services
Wages that an American worker might consider low represent an excellent salary in
many other parts of the world, and some companies feel they would be foolish not to
exploit such an opportunity. Why pay a U.S. IT worker a six-figure salary, they reason,
when they can use offshore outsourcing to hire three India-based workers for the same
cost? However, this attitude might represent a short-term point of view—offshore
demand is driving up salaries in India by roughly 15 percent per year. Because of this,
Indian offshore suppliers have begun to charge more for their services. The cost
advantage for offshore outsourcing to India used to be 6:1 or more—you could hire six
Indian IT workers for the cost of one U.S. IT worker. The cost advantage has now
shrunk to 3:1. Once it shrinks to 1.5:1, the cost savings would no longer be much of
an incentive for U.S. offshore outsourcing to India.
Another benefit of offshore outsourcing is its potential to dramatically speed up
development efforts. For example, the State of New Mexico contracted the
development of a tax system to Syntel, one of the first U.S. firms to successfully launch
a global delivery model that enables workers to make progress on a project around
the clock. With technical teams working from networked facilities in different time
zones, Syntel executes a virtual “24-hour workday” that saves its customers money,
speeds projects to completion, and provides continuous support for key software
applications.
Although it has its advocates, offshore outsourcing does not always pay off. For
example, a software developer in Cambridge, Massachusetts, went to India in search
of cheap labor but found lots of problems instead. Customs officials charged huge
tariffs when the company tried to ship the necessary development software and
manuals, and the programmers were not nearly as experienced as they claimed to be.
The code produced in India was inadequate. The company had to send a
representative to India for months to work with the programmers there and correct the
problems.
While offshore outsourcing can save a company in terms of labor costs, it will also
result in some new expenses. In determining how much money and time a company
will save with offshore outsourcing, the firm must take into account the additional time
that will be required to select an offshore vendor as well as the additional costs that
will be incurred for travel and communications. In addition, organizations often find that
it can take years of ongoing effort and a large up-front investment to develop a good
working relationship with an offshore outsourcing firm. Finding a reputable vendor can
be especially difficult for a small or midsized firm that lacks experience in identifying
and vetting contractors.
Many of the ethical issues that arise when considering whether to use H-1B and
contingent workers also apply to offshore outsourcing. For example, managers must
consider the trade-offs between using offshore outsourcing firms and devoting money
and time to retaining and developing their staff. Offshore outsourcing tends to upset
domestic staff, especially when a company begins to lay off employees in favor of low-
wage workers outside the United States. The remaining members of a department can
become bitter and nonproductive, and morale can become extremely low.
Cultural and language differences can cause misunderstandings among project
members in different countries. Indian programmers, for instance, are known for
keeping quiet even when they notice problems. And the difficulty of communicating
142
directly with people over long distances can make offshore outsourcing perilous,
especially when key team members speak English as their second language.
The compromising of customer data is yet another potential outsourcing issue. For
example, the Australian Broadcasting Corporation uncovered evidence that the
personal details of Australian citizens (including names, addresses, telephone, and
other ID numbers, and employment information) were taken from customer databases
in India and offered for sale on the black market. Most countries have laws designed
to protect the privacy of their citizens. Firms that outsource must take precautions to
protect private data, regardless of where it is stored or processed or who handles it.
Another downside to offshore outsourcing is that a company loses the knowledge and
experience gained by outsourced workers when those workers are reassigned after a
project’s completion. Finally, offshore outsourcing does not advance the development
of permanent IT workers in the United States, which increases its dependency on
foreign workers to build the IT infrastructure of the future. Many of the jobs that go
overseas are entry-level positions that help develop employees for future, more
responsible positions.
Whistle Blowing
Like the subject of contingent workers, whistle-blowing is a significant topic in any
discussion of ethics in IT. Both issues raise ethical questions and have social and
economic implications. How these issues are addressed can have a long-lasting
impact not only on the people and employers involved but also on the entire IT
industry.
As noted above, whistle-blowing is an effort to attract public attention to a negligent,
illegal, unethical, abusive, or dangerous act by a company or some other organization.
In some cases, whistle-blowers are employees who act as informants on their
company, revealing information to enrich themselves or to gain revenge for a
perceived wrong. In most cases, however, whistle-blowers act ethically in an attempt
to correct what they think is major wrongdoing, often at great personal risk.
A whistle-blower usually has personal knowledge of what is happening inside the
offending organization because of his or her role as an employee of the organization.
Sometimes the whistle-blower is not an employee but a person with special knowledge
gained from a position as an auditor or business partner.
In going public with the information they have, whistle-blowers often risk their careers
and sometimes even affect the lives of their friends and family. In extreme situations,
whistle-blowers must choose between protecting society and remaining silent.
In December 2005, the New York Times broke the alarming story that just months after
the 9/11 attacks in 2002, President Bush had secretly authorized the National Security
Agency (NSA) to listen in on the calls of hundreds, perhaps thousands, of American
citizens to obtain evidence of terrorist activity without the court-approved warrants
required for domestic spying. (The White House had asked the New York Times not
to publish the article on the basis that it could jeopardize ongoing investigations and
provide an alert to terrorists.) Whistle-blower Russell Tice, who had worked for both
the Defense Intelligence Agency and the NSA, later disclosed that he was one of the
sources for the story. Tice said that “as far as I’m concerned, as long as I don’t say
anything that’s classified, I’m not worried. We need to clean up the intelligence
community. We’ve had abuses, and they need to be addressed.”
144
Definition
• Whistleblowing can be an employee’s effort to attract the attention of others
outside of the employee’s company to negligent, illegal, unethical, abusive, or
dangerous act by the company that threatens the public interest.
• Whistle blowers are acting as no more than informers on their company,
revealing information to enrich themselves or to gain revenge for some
perceived wrong.
• They are acting ethically out of a conviction to correct major wrongdoing, often
at great personal risk.
The slow or lack of progress in the Philippines’ anticorruption efforts is attributed to the
following issues that need to be addressed:
Dr. Amorado is the National Coordinator of the Aha! Ehem!, a joint anti-corruption
project of the Philippine Province of the Society of Jesus and the Office of the
Ombudsman. An anti-corruption expert who has done extensive studies in some of
the most corrupt government agencies, he teaches at the Ateneo de Davao University
and the University of the Philippines-Mindanao.
The results of the 20 Focus Group Discussions (FGDs) conducted nationwide by the
Philippine Province of the Society of Jesus and the Office of the Ombudsman from
October to December 2005 provide rich insights on the conditions for ensuring the
success of whistleblowing against corrupt practices in the Philippine context. They are
valuable for policymakers and researchers interested in knowing the:
In 2003, the Office of the Ombudsman and the Philippine Province of the Society of
Jesus signed a Memorandum of Collaboration to design and implement anti-corruption
145
The "watchdogs" role underscores the idea that whistleblowing can be more than an
individual act or decision; groups and offices can blow the whistle, too. Among the
actual or potential whistleblowers identified in the FGDs are the following:
Individuals
• concerned citizens and taxpayers;
• parishioners, students, youth;
• government officials and employees;
• professionals;
• eminent persons;
• resident Ombudsmen;
• Internal Affairs auditor and personnel.
Offices/groups
• anti-corruption NGOs/civil society organizations
• watchdogs or monitoring groups;
• professional associations;
• Junior Graftwatch Units (JGUs);
• accredited Corruption Prevention Units (CPUs);
• associations of Resident Ombudsmen (AROGAs);
Drivers of whistleblowing. The strong support of the various sectors in society can
drive the development of whistleblowing culture and practice. Whistleblowing is likely
to flourish in the Philippines if a support system built on the following elements is
present, to wit:
The lack of financial, legal, and social support is a major impediment to whistleblowing.
Unfavorable conditions such as discouragement by family and friends, having no
access to legal aid, financial and logistical constraints, and negative reception by
media, decrease the chances of actual whistleblowing.
Lack of evidence or access to documents that will prove wrongdoing is also a critical
factor that contributes to the individual's propensity to stay silent than blow the whistle
amidst observed wrongdoing.
Preparation and steps in whistleblowing. The high risk and cost of whistleblowing
should be taken into account when planning to blow the whistle. One should be
prepared mentally, financially, physically, and emotionally, to deal with the stress
associated with being a whistleblower.
In addition, the whistleblower needs to undertake the following preparations and steps:
148
2. Attempt to address the situation internally. Ideally, the employee can get the
problem out into the open and deal with it from inside the organization, creating as
few bad feelings as possible.
people who elect to take no further action continue to wrestle with their
consciences; they can develop ulcers, drug or alcohol problems, and/or lose their
peace of mind. Others may feel so strongly about the situation that they must take
further action. This is often the case when a very determined and conscientious
individual faces a truly serious problem. Thus, the employee who is still concerned
is forced to choose between escalating the problem and going over his or her
manager’s head or going outside the organization to deal with the problem. At this
point, the employee may become a whistle-blower if he or she feels compelled
because there appears to be no choice but to solve the problem internally.
7. Execute the action plan. Choose to continue with the matter legally, the claim
should be pursued based on the research and decisions previously made with legal
counsel. The consequences of every action should be understood. The problem
with this approach is that people often do not take such anonymous claims
seriously.
“Section 27, Article II of the 1987 Constitution provides that as a State Policy,
"The State shall maintain honesty and integrity in public service and take
positive and effective measure against graft and corruption."
It is the intent of this bill to encourage citizens to stand up and report alleged
violations of law, improper use of governmental office, gross waste of funds, or
any other abuse or gross neglect of duty on the part of an agency, public officer
or employee, and private entity. Furthermore, by protecting citizens who
151