What Kind Of Ethical Issues Related To IT We Are Facing Today: [Essay Example], 2328 words GradesFixer
exit-popup-close

Haven't found the right essay?

Get an expert to write your essay!

exit-popup-print

Professional writers and researchers

exit-popup-quotes

Sources and citation are provided

exit-popup-clock

3 hour delivery

exit-popup-persone
close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

What Kind of Ethical Issues Related to It We Are Facing Today

Download Print

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

blank-ico
Download PDF

IT is a modern technology which deals with the Retrieval & Processing of useful Data where Ethic means the principals of Right and Wrong that are accepted by an individual or a social group. It relates us to the question of what is good or bad in terms of human actions. Information technology is not so terrible itself, but the way humans use the tools given by IT has brought some genuine difficulties.

As much as information technology is critical to our lives, it is confronting some major ethical issues and it is up to the IT specialists and clients of IT to be prepared for these issues. As more emerging information technologies pop up on the market, most of the IT specialists and users don’t know how to approach the difficulties caused by these advancementsEthical Issues Related to IT:Information technology is facing major challenges which are:

  • Security
  • Privacy Issues
  • Computer Crime
  • Software Piracy
  • Job Displacement

Security: As the information technology is developing day by day and with the tools given like internet, it has become very easy for hackers to hack into any system as long as it is linked on internet. By using an IP address, they easily access user’s computer and data for their personal reasons. Whenever we are surfing internet, the internet cookies gather the data to expose IT users to high risks of fraud. Many big companies use these cookies to find out which products or services they can advertise to us. Security staff of IT often have access to the secret data and information about company, individuals and networks and frameworks which give them a lot of power. This power can be mishandled at any time. Daily life example: When we are using online banking or do online shopping and transfer money, our transaction can easily be interrupted by the hackers and our all money transfers to the hackers account and seriously affects the consumers and the banks. Privacy Issues:Information technology has enabled us to share and find relevant information online, but it has also misuse our privacy freedom like use of social networks, we try to connect with our old friends and relatives to share life with them but or shared data gets leaked like photos, people misuse our data and an share it anywhere and expose us to others with wrong intentions. The other example is the use of webcams, someone can easily get access to the webcams and have complete access on our personal life many celebrities have been victims of these online stalkers Daily life Example: Most of us use social networks like Facebook and when someone signed up, his/her personal information gets leaked to other applications and software via Facebook, he receives messages and advertisements as some apps relate to each other.

Computer Crime: Illegal activities performed using a computer through information technology is referred as computer crimes. It includes online harassment, cyber bullying, financial fraud, virus infection etc. a large of amount of money is lost in computer crimes every year and many business respondents become a victim of computer crime. Many people get bully through social media and get concuss. Virus attacks to companies and computer systems are very common.

Daily Life Example:These days there are many cases of cyber bullying and online harassment on internet. Boys bully girls and save their personal information, pictures and harass them concuss them to share their personal pictures which causes problems. Important data of company gets leaked by the employees themselves.

Software Piracy: Illegal copying of software knowingly or unknowingly is called piracy. Copyright agreements are violated by software piracy. Well-known companies like Microsoft can barely feel the loss as they have many ways to protect their software as compared to small scale manufacturers who would greatly be affected as they are most likely sustaining big losses. Their incentive to create new software is also reduced as they get fear in mind that their work would be pirated again. Information technology has made it very easy for the users to access and share the data with friends, music sharing, file downloading, books of authors are easily available and most of the original work has been started downloading for free. It is great for the users, but it is very harmful for the original creator of these files, books and software.

Daily life Example: Software piracy is very common nowadays, expansive software of companies is copied and sell in the markets at a very cheap rate. CDs DVDs of game, operating system software pdf of books which are manufactured with high cost are easily and cheaply available in markets which cause a great loss to the companies. Job Displacement: With the advancement of information technology day by day, companies might not need to deploy a great man power which has created an ethical issue by constraining different organizations go lessen their manpower. And allow other companies to give their employee more work than required which results in increase of their work pressure. Firing an employee from his job or giving him extra workload without an increment is unethical.

Daily Life Example: With the help of technology and developers, companies develop software’s which can perform the desired task for the companies, which allow them to fire their staff. Manpower is decreasing in the organizations Clauses of Cyber Crime Bill:

Unauthorized access to information system or data: Whoever with dishonest intention gains unauthorized access to any information system or data shall be punished with imprisonment for a term which may extend to three months or with fine which may extend to fifty thousand rupees or with both.

Unauthorized copying or transmission of data: Whoever with dishonest intention and without authorization copies or otherwise transmits or causes to be transmitted any data shall be punished with imprisonment for a term which may extend to six months, or with fine which may extend to one hundred thousand rupees or with both.

Interference with information system or data: Whoever with dishonest intention interferes with or damages or causes to be interfered with or damages any part or whole of an information system or data shall be punished with imprisonment which may extend to two years or with fine which may extend to fire hundred thousand rupees or with both.

Unauthorized access to critical infrastructure information system or data: Whoever with dishonest intention gains unauthorized access to any critical infrastructure information system or data shall be punished with imprisonment which may extend to three years or with fine which may extend to one million rupees or with both.

Unauthorized copying or transmission of critical infrastructure data: Whoever with dishonest intention and without authorization copies or otherwise transmits or causes to be transmitted any critical infrastructure data shall be punished with imprisonment for a term which may extend to five years, or with fine which may extend to five million rupees or with both

Interference with critical infrastructure information system or data: Whoever with dishonest intention interferes with or damages, or causes to be interfered with or damaged, any part or whole of a critical information system, or data, shall be punished with imprisonment which may extend to seven years or with fine which may extend to ten million rupees or with both.

Electronic fraud: Whoever with the intent for wrongful gain interferes with or uses any information system, device or data or induces any person to enter into a relationship or deceives any person which act or omission is likely to cause damage or harm to that person or any other person shall be punished with imprisonment for a term which may extend to two years or with fine which may extend to ten million rupees or with both.

Unauthorized use of identity information: (1) Whoever obtains, sells, possesses, transmits or uses another person’s identity information without authorization shall be punished with imprisonment for a term which may extend to three years or with fine which may extend to five million rupees, or with both(2) Any person whose identity information is obtained. sold, possessed, used or transmitted may apply to the Authority for securing, destroying, blocking access or preventing transmission of identity information referred to in sub-section(l) and the Authority on receipt of such application may take such measures as deemed appropriate for securing, destroying or preventing transmission of such identity information.

Unauthorized interception: Whoever with dishonest intention commits unauthorized interception by technical means of (a) any transmission that is not intended to be and is not open to the public, from or within an information system; or (b) electromagnetic emissions from an information system that are carrying data, shall be punished with imprisonment of either description for a term which may extend to two years or with fine which may extend to five hundred thousand rupees or with both.

Offences against modesty of a natural person and minor: (l) Whoever intentionally and publicly exhibits or displays or transmits any information which (a) superimposes a photograph of the face of a natural person over any sexually explicit image or video; or (b) includes a photograph or a video of a natural person in sexually explicit conduct; (c) intimidates a natural person with any sexual act, or any sexually explicit image or video of natural person; or (d) cultivates, entices or induces a natural person to engage in a sexually explicit act, through an information system to harm a natural person or his reputation, or to take revenge, or to create hatred or to blackmail, shall be punished with imprisonment for a term which may extend to five years or with fine which may extend to live million rupees or with both. (2) Whoever commits an offence under sub-section (1) with respect to a minor shall be punished with imprisonment for a term which may extend to ten years and with fine which may extend to ten million rupees: Provided that in case of a person who has been previously convicted of an offence under sub-section (1) with respect to a minor shall be punished with imprisonment for a term of fourteen years and with fine. (3) Whoever produces, offers or makes available, distributes or transmits through an information system or procures for himself or for another person or intentionally possesses material in an information system that visually depicts– (a) a minor engaged in sexually explicit conduct; (b) a person appearing to be a minor engaged in sexually explicit conduct; or (c) realistic images representing a minor engaged in sexually explicit conduct, shall be punished with imprisonment for a term which may extend to seven years, or with fine which may extend to five million rupees or with both. (4) Any aggrieved person or his guardian, where such person is a minor, may apply to the Authority for removal, destruction of or blocking 12 access to such information referred to in sub-sections (1) and (3) and the Authority, on receipt of such application, may pass such orders as deemed appropriate including an order for removal, destruction, preventing transmission of or blocking access to such information and the Authority may also direct any of its licensees to secure such information including traffic data.

Cyber stalking: (1) A person commits the offence of cyber stalking who, with the intent to coerce or intimidate or harass any person uses information system, information system network, the internet, website, electronic mail or any other similar means of communicating to- (a) follow a person or contacts or attempts to contact such person 10 foster personal interaction repeatedly despite a clear indication or disinterest by such person;(b) monitor the use by a person of the Internet, electronic mail, text message or any other form of electronic communication; (c) watch or spy upon a person in a manner that results in fear of violence or serious alarm or distress, in the mind of such person; or (d) take a photograph or make a video of any person and displays or distributes it without his consent in a manner that harms a person. (2) Whoever commits the offence specified in sub-section (l) shall be punished with imprisonment for a term which may extend to three years or with fine which may extend to one million rupees or with both: Provided that if victim of the cyber stalking under sub-section (l) is a minor the punishment may extend to five years or with fine which may extend to ten million rupees or with both. (3) Any aggrieved person or his guardian, where such person is a minor, may apply to the Authority for removal, destruction of or blocking access to such information referred to in sub-section (l) and the Authority, on receipt of such application, shall forthwith pass such orders as deemed reasonable in the circumstances including an order for removal, destruction, preventing transmission of or blocking access to such information and the Authority may also direct any of its licenses to secure such information including traffic data.

Spamming:(1) A person commits the offence of spamming, who with intent transmits harmful, fraudulent, misleading, illegal or unsolicited information to any person without permission of the recipient or who causes any information system to show any such information for wrongful gain. (2) A person including rm institution or an organization engaged in direct marketing shall provide the option to the recipient of direct marketing to unsubscribe from such marketing. (3) Whoever commits the offence of spamming as described in sub-section (l) by transmitting harmful, fraudulent, misleading or illegal information, shall be punished with imprisoned t for a term which may, extend to three months or with fine of rupees fifty thousand which may extend rupees five -million or with both. “. (4) Whoever commits the offence of spamming as described in sub-section (1) by transmitting unsolicited information or engages in direct marketing in violation of sub-section (2), for the first time, shall be punished with fine not exceeding fifty thousand rupees, and for every subsequent violation shall be punished with fine not less than fifty thousand rupees that may extend up to one million rupees.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism free

Sources and citations are provided

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

What Kind Of Ethical Issues Related To IT We Are Facing Today. (2020, February 27). GradesFixer. Retrieved October 22, 2020, from https://gradesfixer.com/free-essay-examples/what-kind-of-ethical-issues-related-to-it-we-are-facing-today/
“What Kind Of Ethical Issues Related To IT We Are Facing Today.” GradesFixer, 27 Feb. 2020, gradesfixer.com/free-essay-examples/what-kind-of-ethical-issues-related-to-it-we-are-facing-today/
What Kind Of Ethical Issues Related To IT We Are Facing Today. [online]. Available at: <https://gradesfixer.com/free-essay-examples/what-kind-of-ethical-issues-related-to-it-we-are-facing-today/> [Accessed 22 Oct. 2020].
What Kind Of Ethical Issues Related To IT We Are Facing Today [Internet]. GradesFixer. 2020 Feb 27 [cited 2020 Oct 22]. Available from: https://gradesfixer.com/free-essay-examples/what-kind-of-ethical-issues-related-to-it-we-are-facing-today/
copy to clipboard
close

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.

    close

    Attention! this essay is not unique. You can get 100% plagiarism FREE essay in 30sec

    Recieve 100% plagiarism-Free paper just for 4.99$ on email
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample
    close

    Sorry, we cannot unicalize this essay. You can order Unique paper and our professionals Rewrite it for you

    close

    Thanks!

    Your essay sample has been sent.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now
    boy

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer

    GradesFixer.com uses cookies. By continuing we’ll assume you board with our cookie policy.