09
  • Learning Outcomes

    On completion of this module, students should be able to:
    Compare and apply techniques and tools for estimating, scheduling and monitoring a software project
    Explain basic project management concepts (including project planning, scheduling, control and configuration management; and techniques for cost estimation

    Weeks 9-10 Reading

    Schwalbe p 34,35
    Cadle & Yeates chapters p 411,412
    Bott, Coleman, Eaton, Rowland (2000) Professional Issues in Software Engineering,
    Adams and McCrindle, Adams and McCrindle (2008)
    Pandora’s Box, Social and Professional Issues of the Information Age,
    Ayres(1999) The Essence of Professional Issues in Computing, chapters 6,7,8,9,12
    Sommerville, E. 2011, Software Engineering, 9th Edition. Pearson, Ch 1 pp. 14-16. ISBN:0-13-705346-0
    Bott, Coleman, Eaton, Rowland (2000) Professional Issues in Software Engineering 3rd edition, Taylor and Francis

    Content

    The relationship between the law, ethics and computer technology

    Ethical issues

    Application of the law and professional codes of conduct to the IT computing industry

    Introduction to Professionalism in IT projects
    Professionalism means more than just using IT techniques and project management techniques competently
    Includes an understanding of the law and ethics
    Also follows codes of professional conduct and practice governed by both law and ethics

    Computer Ethics

    The analysis of the nature and the social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology
    James Moor What is Computer Ethics, 1985

    3 properties that make computers a special case (Moor, 1985)

    Logical malleability
    Logic of computers can be shaped in infinite ways through changes in hardware and software and usage
    flexibility

    Impact on society
    Invisibility factor
    3 kinds of invisibility that can have ethical significance
    Invisible abuse
    Invisible programming
    Invisible complex calculation

    Invisibility factors (Moor, 1995)

    Invisible abuse
    ‘the intentional use of the invisible operations of a computer to engage in unethical conduct’
    e.g. programmer stealing excess interest at a bank
    Invasion of the property & privacy of others
    e.g. programming to remove/alter confidential information

    Invisible programming values
    Values may be embedded in the final program and invisible to someone who runs the program

    Invisible complex calculation
    Can we trust these calculations?
    e.g. military/medical applications

    Gotterbarn, Johnson & Nissenbaum (1995)

    Another viewpoint
    Computer ethics is no different from other branches of professional ethics (medical ethics)

    Advises that the digital environment simply requires a different approach to resolving problems (e.g. privacy)

    Key issues directly related to computer ethics

    Stealing (hacking)
    Intellectual property
    The right to privacy
    The right to equality
    Keeping promises (eg professionals meeting a deadline)
    Not lying
  • Ethics and the law

    Legal and ethical
    Not legal but ethical
    Not ethical but legal
    Not ethical and not legal

    Ethics in Project Management

    Ethics, loosely defined, is a set of principles that guide our decision making based on personal values of what is “right” and “wrong”

    Project managers often face ethical dilemmas

    In order to earn PMP certification, applicants must agree to PMI’s Code of Ethics and Professional Conduct

    1. http://onlineethics.org
    2. http://ieeessit.org for IEEE Society on Social Implications of Technology
    3. http://computingcases.org

    PMI Code of Ethics and Professional Conduct – includes:

    As practitioners in the global project management community:
    We made decisions and take actions based on the best interests of society, public safety, and the environment
    We accept only those assignments that are consistent with our background, experience, skills, and qualifications
    We fulfill the commitments that we undertake – we do what we say we will do …
    We inform ourselves about the norms and customs of others and avoid engaging in behaviour they might consider disrespectful

    PMI Code of Ethics and Professional Conduct

    We listen to other’s point of view, seeking to understand them

    We approach directly those persons with whom we have a conflict or disagreement

    We demonstrate transparency in our decision making process

    We constantly re-examine our impartiality and objectivity, taking corrective action as appropriate

    We proactively and fully disclose any real or potential conflicts of interest to appropriate stakeholders

    We earnestly seek to understand the truth

    We are truthful in our communications and in our conduct

    Intro’ to Professionalism and IT Project Management

    3 general characteristics of professionalism

    Being knowledgeable about your field
    Keep up to date in your specialist areas
    Obligation to take CPD (continuous professional development)

    Being competent to practice
    Able to apply your knowledge competently
    Competent decision (technical and ethical)

    Taking responsibility for one’s actions
    When things go wrong
    Open and honest in your dealings
    Practice responsibility

    Professional Bodies

    Role of a professional body

    Regulates a profession
    British Computer Society (BCS)
    Responsibilities include
    To advance knowledge
    To uphold and improve standards
    To set education and training standards
    To advise the government

    British Computer Society

    The BCS code of conduct covers:
    Public interest
    Duty to relevant authority
    Duty to profession
    Professional competence and integrity

    The BCS code of practice covers:
    Common practices
    Key IT practice areas
    Practice specific to education and research

    PMI

    Project Management Institute code of ethics and professional conduct
    http://www.pmi.org/about/ethics/code
  • Legislation And Regulations That Could Affect You

    Data Protection Act 1998

    Regulation of Investigatory Powers Act 2000

    Draft Investigatory Powers Bill - requires web and phone companies to store records of websites visited by every citizen for 12 months for access by police, security services and other public bodies.

    Computer Misuse Act 1990 (Amendment) Act 2005. This Act does not extend to Scotland.

    E-commerce Regulations 2002

    Freedom of Information Act 2000

    Freedom of Information (SCOTLAND) Act 2002

    BS7799 certification

    Anti-money laundering (Criminal Justice Act 1988, Drug Trafficking Act 1994, Terrorism Act 2000)

    Financial Services Authority Operational Risk Systems and Controls guidelines

    The Financial Services and Markets Act 2000

    International Financial Reporting Standards

    Information Commissioner’s Code on Employer’s Monitoring Practices

    Basel II Accord

    EU Directive on Privacy and Electronic Communications

    EU Insurance Mediation Directive

    EU Directive on Data Protection

    US Sarbanes-Oxley Act

    US Patriot Act

    US Reduction in Distribution of Spam Act (proposed)

    Human Rights Act 1998

    Copyright Patents and Designs Act 1988

    IT Project Management and Related Law

    A professional must be aware of relevant law:
    Software Ownership and Copyright
    Contract Law
    Data Protection and Privacy Legislation
    Computer Misuse
    Health and Safety
    Regulation of Investigatory Powers Act (RIP)

    Software Ownership
    Intellectual Property Rights apply to software
    Patent law – covers commercial inventions
    Can be a product or a process
    Usually used for hardware
    Trademarks

    Software Copyright – what is it?
    Copyright is the ‘expression of an idea’
    It must be original and recorded
    All software is subject to copyright

    Who owns the copyright?
    The creator of the work

    Only the owner of the copyright can use the work
    Software license
    Software Contracts

    ‘Expression of Idea’
    Code
    design

    Free software
    Not copyright free, but given with some restrictions waived
    Freeware
    Open source software
    Public domain software
    Shareware
  • DATA PROTECTION ACTS 1998

    EC Directive on Data Protection (95/46/EC)

    1984 Act
    Covers the storage and use of certain categories and usage of personal data in electronic form

    1998 Act
    Extended to cover manually held data
    Extended the range of data considered personal data

    Reasons for Data Protection Act

    1. To protect private individuals from the threat of the use of erroneous information about them and also the misuse of correct information about them
    2. To ensure compliance with the council of Europe’s Convention on Data Protection

    Data Protection legislation (1984 & 1998)

    Enforces 8 data protection principles

    Probably the most important computer based legislation

    Initially brought in via 1984 Data Protection Act
    To cover computer based storage and processing of personal data
    To allow UK to comply with international data interchange regulations

    Re-enforced by 1998 legislation
    Responding to a 1995 EU directive
    Now covers both computers and non computer based data

    Definitions

    DATA
    Information recorded in a form in which it can be processed by equipment operating automatically in response to instructions given for that purpose

    PERSONAL DATA
    Information relating to a living individual who can be identified from that information or that and other information in the possession, or likely to come into the possession, of the Data Controller. It includes any expression of opinion about the individual and any indication of intention of the Data Controller or any other person in respect of that individual

    Status Of New Act

    The Act received Royal Assent 16 July 1998

    Implementation of Act 24 October 1998

    Act came into force 1 March 2000

    Data Protection Act 1984 (Old)

    Main Issues
    Relevant to all personal data processed on a computer
    Personal data held and its use must be registered
    1st Data subject has right to request copy of data held and the right to have it corrected
    Illegal disclosure

    Data Protection Act 1998

    Additional Issues
    Includes manual records
    Personal data held, its use and security measures must be notified
    2nd Right to object to other processing likely to cause substantial damage or substantial stress
    3rd Right to object to direct marketing
    Transmission of personal data outside EEA (28 EU States, Iceland, Norway, Liechtenstein)

    Data Protection (1998) – 8 Principles

    Personal data shall be:
    1. Processed fairly and lawfully
    2. Obtained & processed for specified purposes
    3. Adequate, relevant and not excessive
    4. Accurate and up to date
    5. Held no longer than necessary
    6. Processed in accordance with the rights of the data subject
    7. Kept secure
    8. Transferred outside of the EEA only if adequate safeguards exist

    7. Kept secure
    Principle 7 is important because it makes it clear that security is an important aspect of data protection, and is perhaps the most important of all principles. It also means anything that travels over the internet.

    If you have good security then that’s a unique selling point and one benefit that could seal the deal.

    8. Transferred outside of the EEA only if adequate safeguards exist
    You may reasonably decide there is adequate protection without a detailed analysis, depending on: the nature of the information; the circumstances of the transfer; your knowledge of the country; and the company you are transferring to. Some examples are discussed below.

    Example 1

    A university wishes to transfer the academic biographies of its lecturers and research staff to other universities and potential students outside the EEA. Nothing of a private nature is included.

    This is a well-known practice in the university. The personal data, such as the staff’s qualifications and publications, is already publicly available. Any member of staff can have their information withheld if they have a reason to do so – such as concerns about their safety. In this case, it is difficult to see a problem with adequacy as the potential for staff to object has been addressed and there is little further risk of misuse.

    Example 2

    Company A in the UK sends its customer list to company B outside the EEA so that company B, acting as a processor, can send a mailing to company A’s customers. It is likely that adequate protection exists if:

    the information transferred is only names and addresses

    there is nothing particularly sensitive about company A’s line of business;

    the names and addresses are for one-time use and must be returned or destroyed within a short timescale;

    company A knows company B is reliable; and

    there is a contract between them governing how the information will be used.
  • Conditions for Processing

    One of the following conditions must be satisfied:
    Individual has given consent
    Necessary for performance of contract with individual
    Required under a legal obligation
    Necessary to protect vital interest of the individual
    To carry out public functions
    Necessary in order to pursue the legitimate interest of the data controller or certain third parties

    Conditions for Processing Sensitive Data

    In addition to one of the previous conditions, at least one of the following must also be satisfied:
    Data subject has given explicit consent
    Processing is necessary for
    Performance of legal duty in relation to employment
    Protection of subject’s or third party’s vital interests
    Legitimate activities of some non-profit organisations
    In connection with legal proceedings
    Administration of Justice
    Crown/Public functions
    Medical purposes

    Data Subjects Rights of Access

    Copy of any data processed by reference to individual

    Description of the data being processed

    Description of the purposes for which it is being processed

    Description of any potential recipients of individual’s data

    Any information as to the source of the data on the individual

    Logic involved in any automated decision making

    Direct Marketing

    Individuals must be given the opportunity to opt-out

    For sensitive data must be given right to opt -in

    Mailing lists are exempt for First Transitional period only if
    the personal data consists only of names, addresses or other particulars affecting distribution
    where processing is carried out only for purposes of distribution or recording the distribution of articles or information to the data subject
    the data subject must have been asked whether he objects to his personal data being processed in this way

    Transitional Arrangements

    Processing already underway

    First transitional period 24/10/1998 to 23/10/2001
    Total exemption for manual filing systems. Also automated data used for payroll and accounts, unincorporated members clubs, mailing lists, backup data
    Partial exemption -For data held prior to 24/10/1998 from Notification, Enhanced Access rights, new Data Protection Principles, new Data Subjects Rights

    Second transitional period 24/10/2001 to 23/10/2007
    Partial exemption for manual data which gives until 2007 to conform totally with Data Protection Principles 1-5

    Data Protection Act 1998

    On Wednesday 24th October 2001 the full provisions of the Data Protection Act 1998 came into force. Briefly this means that
    all personal information held on paper, emails, computer files, audio and visual tapes from collection to disclosure and storage now come under the auspices of the Act.
    all companies must now advise internet site visitors of their intention to use COOKIES to collect data and the intended purpose of the data gathered

    personal information includes any facts or opinions about any living person
    all personal information is required to be kept accurate, up to date (e.g. ensure changes of programmes, modules, addresses, etc are undertaken quickly and the Central Student Record System updated) and secure (i.e. don't leave personal information lying around)
    personal information must not be disclosed to third parties (i.e. parents, organisations, referees, etc.) see http://www.gcu.ac.uk/dataprotection/enquiries/
    all personal information (including minutes of meetings, exam/assessment comments, locally and centrally kept files on paper or computer) must be provided by the University in response to a Subject Access Request.
    University Data Protection Guidelines can be found at http://www.caledonian.ac.uk/datap
  • Computer Misuse Act 1990

    29 August 1990

    Status Of New Act

    Received Royal Assent 29 June 1990

    Act came into force 29 August 1990

    The Act created 3 new criminal offences
    Unauthorised access to computer material (that is, a program or data).
    Unauthorised access to computer material with the intent to commit or facilitate the commission of a serious crime.
    Unauthorised modification of computer material

    The Act defines (1) (the basic offence) as a summary offence punishable on conviction with a maximum prison sentence of six months or a maximum fine of £10,000 or both.

    The Act goes on to describe offences (2) and (3) as triable either summarily or on indictment, and punishable with imprisonment for a term not exceeding 10 years or a fine or both.

    These sentences clearly reflect the perceived gravity of the offence and would imply that universities should take an equally serious view of hacking or virus proliferation.

    Example 1, Unauthorised Access to Computer Material

    This would include: using another person's identifier (ID) and password without proper authority in order to use data or a program, or to alter, delete, copy or move a program or data, or simply to output a program or data (for example, to a screen or printer); laying a trap to obtain a password; reading examination papers or examination results.

    The response to some actions will depend on the specific conditions of use in force. Take, for example, unauthorised borrowing of an identifier from another student in order to obtain more time for a computer project the student was required to complete. In this case both the student who borrowed the ID and the student who lent it would be deemed to have committed an offence.

    Example 2, Unauthorised Access to a Computer with intent.

    This would include: gaining access to financial or administrative records, but intent would have to be proved.

    Example 3, Unauthorised Modification of Computer Material.

    This would include: destroying another user's files; modifying system files; creation of a virus; introduction of a local virus; introduction of a networked virus; changing examination results; and deliberately generating information to cause a complete system malfunction.

    Richard Clayton, a researcher at Cambridge University’s computer laboratory, said that remote searches had been possible since 1994, although they were very rare. An amendment to the Computer Misuse Act 1990 made hacking legal if it was authorised and carried out by the state.

    Police set to step up hacking of home PCs

    David Leppard
    THE Home Office has quietly adopted a new plan to allow police across Britain routinely to hack into people’s personal computers without a warrant.

    The move, which follows a decision by the European Union’s council of ministers in Brussels, has angered civil liberties groups and opposition MPs. They described it as a sinister extension of the surveillance state which drives “a coach and horses” through privacy laws.

    The hacking is known as “remote searching”. It allows police or MI5 officers who may be hundreds of miles away to examine covertly the hard drive of someone’s PC at his home, office or hotel room.

    Material gathered in this way includes the content of all e-mails, web-browsing habits and instant messaging.
  • Regulation Of Investigatory Powers Act 2000

    24 October 2000

    Status Of New Act

    Implementation of Act 24 October 1998

    Act came into force 24 October 2000

    The Regulation of Investigatory Powers Act (RIP), 2000

    RIP Act enables the government to demand that a public telecommunications service provides access to a customer’s communications in secret.

    Telecommunications service - includes
    Internet services providers
    Phone companies
    Someone running a website

    Under certain circumstances the government can order the external communications of a telecommunications service can be intercepted
    National security, preventing serious crime, safeguarding economic well being, interests of public safety, protecting public health, tax assessment/collection, preventing death/injury

    Includes mass surveillance warrants for ISPs to fit equipment

    ISP must comply and keep this secret

    Government can demand decryption keys (to access protected information)

    It is an offence not to hand over a decryption key (2 years in prison)

    If notice to hand over the key demands secrecy, it is an offence to reveal this (5 years in prison)

    Employers’ Rights-1

    Regulations authorise companies and non-commercial organisations to monitor communications transmitted over their systems when:
    establishing facts
    ascertaining compliance with rules of regulators
    ascertaining standards of service which ought to be achieved

    Employers’ Rights-2

    preventing or detecting crime

    investigating unauthorised use of the telecommunications system

    ensuring the effective operation of the system

    checking communications are relevant

    monitoring calls to free counselling helplines

    Employees’ Rights-1

    employees’ communications cannot be monitored without consent except for the reasons given in Employers’ Rights

    if an employer breaks the law the sender or recipient may be able to sue for damages

    although Human Rights Act guarantees a right to privacy, experts say it is unlikely to help if employer sticks to monitoring calls within terms of the RIP Act

    Employees’ Rights-2

    Interceptions must be in accordance with the Data Protection Act 1998

    Critics of RIP Act argue

    RIP Act allows government to access a person’s electronic communications in a highly unrestricted manner – infringement of privacy

    Terms ‘warranted interception’ are sufficiently vague to permit electronic surveillance of anyone under any circumstance

    Government can therefore gather information on
    What websites you visit and when, who you email, who emails you, what newsgroups you read, all the phone numbers you call, what software you download, documents you download, where and when you log on to a machine

    Specific concerns have been raised about the government’s powers to require ISPs to fit surveillance equipment
    Could allow ‘back door’ into the system for the purposes of monitoring
    Could be a security issue

    Legal requirement to hand over decryption keys undermine the use of public key systems

    Have to either
    disclose their private keys (thus compromising all of the information sent to them)
    Risk going to prison for destroying, forgetting or losing a key

    TU spokesman, “Employers should not be allowed to routinely screen e-mail and phone calls-certainly not without consent. What is needed is a Code of Practice so that everyone knows where they stand”.

    Civil Liberties, “Employees had a right to privacy in the workplace but could risk losing their jobs if they challenged their bosses”.

    Government Minister, “Regulations struck a balance between protecting privacy and enabling industry to get the maximum benefit from technology. RIP Act placed limits on employers and would prevent them from intercepting personal calls for unjustified or scurrilous interest”.

    Computer Security Expert, “Companies should be able to monitor their communications facilities, especially if they feared workers were downloading pornography”.

    Many workers experience stress because their activities are now monitored closely by an “invisible supervisor”, i.e. the computer using “packet sniffing” software such as the FBI’s Carnivore and MI5’s Black box, which can monitor data communicated between networked computers by capturing data (packets) across a computer network.

    75.3% of major US firms admit to recording and reviewing employee communication and activities on the job, including their phone calls, e-mail, computer files, phone logs or CCTV and videotaping for security purposes . Not surprisingly, these kinds of surveillance and monitoring techniques often cause employee stress.

    Experiments with rats show that observing them long enough made them neurotic

    Thus computerised monitoring of employees raises a number of ethical issues. The central issue involves the privacy rights and expectations of individuals, especially as they pertain to the workplace. Employee privacy issues include the use of e-mail in the workplace: do employees, for example, have a right to send and receive private e-mail on an employer’s system? Many organisations have developed explicit policies regarding the use of e-mail as well as other employer-owned computer-system resources, while other institutions and companies have not.

    As a result, it is not always clear what kinds of personal privacy protection employees can expect.

    The debate should be an argument for competing but equally legitimate claims for “privacy and transparency.” If individuals (employees) are given an absolute right to privacy, they may act only in their own interest and thereby defraud the employer.

    It is also worth noting that if the employer is given a complete right to transparency, it may strip the employee of autonomy and self-determination by making inappropriate judgements that only serve the interest of the employer. We can thus conclude that we need a framework that would “distribute” the right to privacy of the employee and the right to transparency of the employer.

    Arguments Used to Support Computer Monitoring Arguments Used to Oppose Computer Monitoring
    Helps to reduce employee theft Increases employee stress
    Helps to eliminate waste Undermines employee trust
    Helps employers to train new employees Reduces individual autonomy
    Provides employers with a motivational tool Invades worker privacy
    Improves competitiveness Focuses on quantity rather than quality of work
    Saves the company money Creates an “electronic sweatshop”
    Guards against industrial espionage Provides employers with an “electronic whip”
    Improves worker productivity and profits Reduces employee morale and overall productivity
  • Freedom of Information:

    Minutes of Assessment Boards

    Freedom of Information

    Implications of FoI

    FoI and Minutes of Assessment Boards

    Further information

    Freedom of Information Act 2000

    Freedom of Information (Scotland) Act 2002
    Act passed 24 April 2002
    Received Royal Assent 28 May 2002
    Fully in force 1 January 2005

    Section 1(1)
    “A person who requests information from a Scottish Public authority which holds it is entitled to be given it by the Authority.”

    How are these objectives to be achieved

    Publication Schemes
    (proactive available as a matter of course)

    Information Requests
    (reactive, respond to requests not covered by PS)

    Records Management Systems
    (how Act to be carried out)

    FoI and Minutes of Assessment Boards

    Personal Information

    Confidential sections

    Timings

    Data protection responsibilities with respect to Assessment Boards and the reporting of student results. 

    Student results and performance – the only person that you should release marks to or discuss their performance or progression, or what next is the student themselves. It is acceptable to outline University regulations to parents, or others, but the actual situation of the student must not be unless you have the permission of the student.

    Giving out results over the telephone – results should not be given out over the telephone even to someone purporting to be the student. How do you know the identity of the individual at the other end of the phone?

    Assessment board minutes – these can be requested under both data protection and freedom of information legislation hence it is important that they are produced in a specific manner which separates out personal information. A sample layout is attached along with a powerpoint presentation which you may find useful. 

    FoI and Minutes of Assessment Board

    Unconfirmed Minutes

    Minutes of Assessment Boards should be confirmed within 12 weeks of the meeting
  • BCS Code of Conduct

    Any breach of the Code of Conduct brought to the attention of the Society will be considered under the Society’s Disciplinary procedures. You should also ensure that you notify the Society of any significant violation of this Code by another BCS member.

    1. The Public Interest
    2. Professional Competence and Integrity
    3. Duty to Relevant Authority
    4. Duty to the Profession

    1. The Public Interest

    In your professional role you shall:

    a. have due regard for public health, privacy, security and wellbeing of others safety and the environment.
    This is a general responsibility, which may be governed by legislation, convention or protocol.
    If in doubt over the appropriate course of action to take in particular circumstances, you should seek the counsel of a peer or colleague.

    b. have due regard to the legitimate rights of Third Parties.
    The term 'Third Party' includes professional colleagues, or possibly competitors, or members of 'the public' who might be affected by an IT System without their being directly aware of its existence.

    c. conduct your professional activities without discrimination on the grounds of sex, sexual orientation, marital status, nationality, colour, race, ethnic origin, religion, age or disability, or of any other condition or requirement

    d. promote equal access to the benefits of IT and seek to promote the inclusion of all sectors in society wherever opportunities arise.

    2. Professional Competence and Integrity

    You shall:

    a. only undertake to do work or provide a service that is within your professional competence.

    b. NOT claim any level of competence that you do not possess.
    only offer to do work or provide a service that is within your professional competence.

    c. develop your professional knowledge, skills and competence on a continuing basis, maintaining awareness of technological developments, procedures, and standards that are relevant to your field.

    d. ensure that you have the knowledge and understanding of Legislation and that you comply with such Legislation, in carrying out your professional responsibilities.

    e. respect and value alternative viewpoints and, seek, accept and offer honest criticisms of work.

    f. avoid injuring others, their property, reputation, or employment by false or malicious or negligent action or inaction.

    g. reject and will not make any offer of bribery or unethical inducement

    3. Duty to Relevant Authority

    You shall:

    a. carry out your professional responsibilities with due care and diligence in accordance with the Relevant Authority’s requirements whilst exercising your professional judgement at all times.

    b. seek to avoid any situation that may give rise to a conflict of interest between you and your Relevant Authority.
    You shall make full and immediate disclosure to them if any conflict is likely to occur or be seen by a third party as likely to occur. You shall endeavour to complete work undertaken on time to budget and shall advise the relevant authority as soon as practicable if any overrun is foreseen.

    c. accept professional responsibility for your work and for the work of colleagues who are defined in a given context as working under your supervision.

    d. NOT disclose or authorise to be disclosed, or use for personal gain or to benefit a third party, confidential information except with the permission of your Relevant Authority, or as required by Legislation.

    e. NOT misrepresent or withhold information on the performance of products, systems or services, (unless lawfully bound by a duty of confidentiality not to disclose such information), or take advantage of the lack of relevant knowledge or inexperience of others.

    4. Duty to the Profession

    You shall:

    a. accept your responsibility to uphold the reputation of the profession and not take any action which could bring the profession into disrepute.

    b. seek to improve professional standards through participation in their development, use and enforcement.

    c. uphold the reputation and good standing of BCS, the Chartered Institute for IT.

    d. act with integrity and respect in your professional relationships with all members of BCS and with members of other professions with whom you work in a professional capacity.

    e. notify BCS if convicted of a criminal offence or upon becoming bankrupt or disqualified as a Company Director and in each case give details of the relevant jurisdiction.

    f. encourage and support fellow members in their professional development.

    http://www.bcs.org/
  • ACM/IEEE Software Engineering Code of Ethics and Professional Practice

    Software engineers shall commit themselves to making the analysis, specification, design, development, testing and maintenance of software a beneficial and respected profession. In accordance with their commitment to the health, safety and welfare of the public, software engineers shall adhere to the following Eight Principles:

    1. PUBLIC - Software engineers shall act consistently with the public interest.
    2. CLIENT AND EMPLOYER - Software engineers shall act in a manner that is in the best interests of their client and employer consistent with the public interest.
    3. PRODUCT - Software engineers shall ensure that their products and related modifications meet the highest professional standards possible.
    4. JUDGMENT - Software engineers shall maintain integrity and independence in their professional judgment.
    5. MANAGEMENT - Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance.
    6. PROFESSION - Software engineers shall advance the integrity and reputation of the profession consistent with the public interest.
    7. COLLEAGUES - Software engineers shall be fair to and supportive of their colleagues.
    8. SELF - Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of the profession.

    Virtues of Codes of Conduct and Ethics Shortcomings of Codes of Conduct and Ethics
    Lay down common standards of behaviour Ethical issues are complex and have to be resolved by individuals. It is not possible to resolve such dilemmas simply by producing a set of rules to follow.
    Important in supporting any refusal by a professional to behave unethically. There is no justification for any code, since the kinds of ethical dilemmas or problems that professionals face are no different from those which people encounter in general, regardless of whether they belong to a profession or not.
    Take public interest or human rights into account. There may be secondary motives such as the desire to enhance the status of the profession.
    Inspire members of a profession to behave ethically Rise to complacency: practitioners may think that so long as they observe the code they need not concern themselves with any ethical issues.
    Discipline members when they violate one or more of the code’s directives. Codes help to draw attention away from significant issues, such as how technology should be introduced or controlled, to smaller more immediate issues, such as the conduct of individuals.
    Enhance the profession in the eyes of the public Concern of professionals often seems as much to avoid being held responsible for problems or disasters as to prevent them.

    Ethics Tests

    1. Harm/Beneficence Test
    Determine whether the impact of this action is harmful (Does it produce physical or mental suffering, impose financial or non-financial costs, deprive others of important or essential goods?) or beneficial (does it increase safety, quality of life, health, security, etc.)

    2. Publicity Test (Virtue ethics)
    Would others view you as a good person for what you are about to do?

    3. Reversibility Test
    If you were in their place, would you still find the action treated you with respect?

    4. Code of Ethics Test

    5. Feasibility Test
    Brings in a series of practical constraints by asking whether the selected alternative can be implemented given time, financial, legal, personal, and social constraints.

    Harm/Beneficence Test
    Publicity Test
    Reversibility Test
    Code of Ethics Test
    Feasibility Test

    The ethics tests help us learn that ethical decision making is not simply a matter of applying rules.

    The rules, in the guise of these ethics tests, often don't establish a definitive answer (or even a set of definitive answers).

    The most help they can provide is to guide thinking on the issues and to rule out some clearly inappropriate choices.

    These tests provide reasons that can be appealed to in making ethical arguments. for example, it would produce harm (violate the harm test), place others at risk (which is not reversible), and expose an operator as a cowardly person who callously exposes others to severely diminished personal privacy and rights (publicity test).

    Should Internet service providers be liable for the material on their bulletin boards?

    Service providers are, according to the Defamation Act 1996, not held responsible for libellous statements posted at sites they maintain provided they can show that they do not edit or vet the material that their users post. But the legal position of service providers is confused by the fact that they are supposed to take reasonable care in preventing libellous material from appearing.

    This situation leaves Estate Agents in something of a dilemma. They must strike a balance between the extremes of allowing any material to appear on their site (thus failing to take reasonable care) and vetting material excessively, so putting themselves into an editorial role and becoming liable as editors.

    Service providers can also find themselves legally exposed in other areas, such as when obscene material is posted to a site they maintain. The Obscene Publications Act 1959 as later amended by the Criminal Justice and Public Order Act 1994 makes it an offence to publish an obscene article or to possess such an article for gain (for example, with the intention to sell or later publish it).

    Recent amendments to the law make it clear that publication includes electronic transmission of data that is obscene when viewed. This means that sending e-mails containing obscene material is an offence (even if the contents of the e-mail are encrypted). More stringent controls are applied to certain kinds of obscene material; for instance, possession of indecent photographs of minors with intent to show them is a separate, more serious, offence.

    Recent amendments to the law make it clear that publication includes electronic transmission of data that is obscene when viewed. This means that sending e-mails containing obscene material is an offence (even if the contents of the e-mail are encrypted). More stringent controls are applied to certain kinds of obscene material; for instance, possession of indecent photographs of minors with intent to show them is a separate, more serious, offence.

    The particular problem posed for service providers by obscene material is that should they unwittingly provide such material (for example, by maintaining a bulletin board or FTP site where someone has uploaded obscene material) they may be held legally responsible as the publishers of the material.

    The only defence available to such providers is to show that they both did not look at obscene material that they unwittingly published and that they had no cause to inspect it.
  • Discussion question:

    Explain how the universal use of the Web has changed software system?
  • Key Terms

    Software Engineering: It is an engineering discipline that is concerned with all aspects of software production.
    Professional societies publish codes of conduct: It is that set out the standards of behaviour. expected of their members.
    ACM/IEEE Software Engineering Code of Ethics and Professional Practice: Software engineers shall commit themselves to making the analysis, specification, design, development, testing and maintenance of software a beneficial and respected profession. In accordance with their commitment to the health, safety and welfare of the public.
    Computer Ethics: The analysis of the nature and the social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology.
    Ethics: It is a set of principles that guide our decision making based on personal values of what is “right” and “wrong”
    Harm/Beneficence Test: Determine whether the impact of this action is harmful (Does it produce physical or mental suffering, impose financial or non-financial costs, deprive others of important or essential goods?) or beneficial (does it increase safety, quality of life, health, security, etc.)
    Feasibility Test: Brings in a series of practical constraints by asking whether the selected alternative can be implemented given time, financial, legal, personal, and social constraints.
    BCS Code of Conduct: Any breach of the Code of Conduct brought to the attention of the Society will be considered under the Society’s Disciplinary procedures. You should also ensure that you notify the Society of any significant violation of this Code by another BCS member.
    The Regulation of Investigatory Powers Act (RIP), 2000: RIP Act enables the government to demand that a public telecommunications service provides access to a customer’s communications in secret.