Online Ethics

Booklet 1
Issue
Peer to Peer file sharing of copyrighted materials
Description
Improved capabilities of the internet now enable people to share files with one another. This raises the issue as to whether it is right to engage in such activities given the fact that much of the sharing involve the reproduction of materials that would normally attract copyright infringement if the authorization of the copyright holder is not sought.
Laws pertaining to the issue
Under copyright law, the reproduction of copyrighted material gives rise to a liability. The claimant only needs to show that the infringing material is fixed in some medium. This test is relatively easy to establish given that the files people share online are fixed in the hard disks as well as the random access memory (RAM) of the computer.  
How the issue could affect me
I am a regular user of various file sharing software platforms. For instance, I subscribe to 4shared.com which allows me to view and share files with many other people. It is possible that the activities we engage in could be infringing on the copyright of others.
Example of a situation
I have once received a book in pdf format indicating that any distribution should be done only with the permission of the author.
Possible legal or ethical solution
It would be appropriate to just respect the notice not to distribute the document to third parties or seek the permission of the authors if I have to make a distribution.
Booklet 2
Issue
Hackers who steal credit card information
Brief description
This involves people who use a variety of methods to get confidential information on credit cards of other people. Such information may include the passwords of cardholders which enables them to transact with those cards.
Laws pertaining to the issue
 Under Title 18 of the United States Code, the interception and disclosure of wire, oral or electronic communication is prohibited. It also criminalizes unlawful access to stored communication.
How the issue could affect me
 As a regular user of credit cards for making payments, I am open to the risk that someone can get access to confidential information on my card details. That person could be my trusted friends, a con artist or even an employee of the credit card company.
Example of a situation
 I once lost my credit card and was so apprehensive that someone could use it to make payments. This was, however, not the case.
Possible legal or ethical solution
Report the loss as soon as possible to the credit card company given that any investigations by the authorities will have to involve the company.
Booklet 3
Issue
Employee email monitoring
Brief Description
With the use of computers in the workplace, employers are torn between the need to monitor the email communication of their employees while in the workplace and the equally important need to respect the privacy of those employees.
Laws pertaining to the issue
The position of the law is that employees do not have any expectation of privacy when using the computer networks of their employers. It authorizes employers to monitor email and other communications of employees.
How the issue affects me
I find it intimidating knowing that someone has the right to access my email communications so long as those communications are made through the computer network of the employer.
Example of a situation
I often use the computer network at the workplace for personal email communications. It is now that I realize how this innocent practice can make my privacy vulnerable to any review by the employer.
Possible solution
Given that the law is mostly on the side of the employer when it comes to this issue, I would be content to just avoid making personal email communications through the employer’s network.
Booklet 4
Issue
Use and distribution of customer information
Description
Online commerce businesses often hold a lot of data on their customers. For instance, a company like Facebook has so much information on all its users. An issue arises when these companies decide to sell or distribute such sensitive information to third parties. Google has occasionally been accused of selling information to advertising companies.
Laws pertaining to the issue
The legal protection for consumer privacy in the internet is rather weak in the United States. For instance, the Electronic Communication Privacy Act of 1986 allows the government to demand data held by companies such as Google and Facebook. The Federal Computer Fraud and Abuse Act even makes it more difficult for consumers as it requires those claiming infringement of their privacy to show that they have suffered some injury as a result of the violation.
How the issue affects me
Being a regular user of e-commerce platforms makes me vulnerable to these schemes.
Example of a situation
I have been receiving numerous unsolicited messages on in my email and a suspect that those sending the messages got my address from the email hosting companies.
Possible solution
 It would just be appropriate to use these services as minimal as possible since the law is unlikely to offer any help.


SHARE

College Assignment Samples

  • Image
  • Image
  • Image
  • Image
  • Image
    Blogger Comment
    Facebook Comment

0 comments:

Post a Comment