Sunday, March 29, 2009

"Why I choose IT as my course?"

I choose IT as my course because we use now computers in our generation, then I want to be more literate in holding computers.

"Why I choose Academi de Davao College as my school?"

I choose Academia de Davao College as my school because it so affordable,then its TESDA Accredited

Information Technology Ethics

About Ethics in Information TechnologyEvery advancement in information technology is accompanied by at least one ethical quandary. From Facebook to email updates, computer users are unaware of the fine balance between ethics and profit struck by providers. Software developers, businesses and individuals must think about the rights and wrongs of using information technology every day. The fundamental issues underlying the world of information technology are the end user's expectation of privacy and the provider's ethical duty to use applications or email responsibly.
Data Mining
Data mining covers a wide range of activities that turn numbers, words and other data into distinguishable patterns. In the hands of a responsible agency or business, data mining can determine a probable next step for a terrorist cell or determine buying patterns within demographic groups. This practice has been assailed in the post 9/11 world as part of a widespread pattern of invasions of privacy carried out by America's intelligence experts. The practices of the Total Information Awareness Progress in particular were thought to pry into the day-to-day lives of innocent people by IT ethics experts and civil libertarians.
Social Networking
The social networking craze may allow people around the world to speak with each other but it has also brought up several IT ethics issues. Facebook initiated a program called Beacon in 2007 to turn each user's personal information into an advertisement, allowing a greater amount of connectivity between the website's members. Facebook's developers failed to create an opt-in system that gave willing users the chance to participate of their own accord. Beacon came under fire for pulling information from Facebook profiles and breaking down privacy boundaries common in the real world. Another ethical issue for social networking websites is the amount of security they should use when registering members. Several abductions in recent years have been connected to MySpace, bringing up concerns that social networking sites aren't doing enough to protect young users.
E-Mail Spam
Spam is defined broadly as emails with commercial or profane messages that are sent blindly to hundreds and thousands of users. Aside from the content of spam email, the major ethical issues for service providers and individuals alike involve identifying spammers. Email programs through AOL and Yahoo! may identify some spammers who are brazen enough to send out millions of emails but their spam programs rely largely on user feedback. While some users will identify legitimate spammers carrying viruses and pornographic messages, there is the potential for users to identify legitimate companies as spammers.
Intellectual Property and Information Technology
The merger of intellectual property rights and
information technology has been rough going since the 1990s. The advent of Napster, Limewire and other peer-to-peer downloading networks brought the issue of infringing on artistic property to the fore. NBC's exclusive rights to the 2008 Olympic Games were challenged by bloggers and online pirates who placed footage on YouTube. The ethical issue that arises when dealing with intellectual property in the virtual world is the length to which content producers should pursue permission to reprint images and articles. While lifting entire articles for a term paper is clearly unacceptable, there are questions from ethicists about the practicality of seeking out unknown artists and writers for something as minor as a blog.
Filtering Online Content
Comcast has come under fire in the past two years for blocking downloads from Bit Torrent. The
Internet service provider (ISP) has claimed that "throttling down" downloads via Bit Torrent is a reasonable element of maintaining high-speed service. Religious groups, adult websites and others have banned together in an unusual alliance to fight Comcast's effort to filter content. The major ethical debate raged between ISP, the Federal Communications Commission (FCC) and end users is whether Internet service should be content-neutral.

Thursday, March 26, 2009

" E - Commerce Law "

eCommerce Law (RA No. 8792)
Republic Act No. 8792
AN ACT PROVIDING FOR THE RECOGNITION AND USE OF ELECTRONIC COMMERCIAL AND NON-COMMERCIAL TRANSACTIONS AND DOCUMENTS, PENALTIES FOR UNLAWFUL USE THEREOF AND FOR OTHER PURPOSES
Be it enacted by the Senate and House of Representatives of the Republic of the Philippines in Congress assembled:
PART I
SHORT TITLE AND DECLARATION OF POLICY
Section 1. Short Title. - This Act shall be known as the
“Electronic Commerce Act of 2000″.
Sec. 2. Declaration of Policy. - The State recognizes the vital role
of information and communications technology (ICT) in nation-
building; the need to create an information-friendly environment which supports and ensures the availability, diversity and affordability of ICT products and services; the primary responsibility of the private sector in contributing investments and services in telecommunications and information technology; the need to develop, with appropriate training programs and institutional policy changes, human resources for the information technology age, a labor force skilled in the use of ICT and a population capable of operating and utilizing electronic appliances and computers; its obligation to facilitate the transfer and promotion of adaptation technology, to ensure network security, connectivity and neutrality of technology for the national benefit; and the need to marshal, organize and deploy national information infrastructures, comprising in both telecommunications network and strategic information services, including their interconnection to the global information networks, with the necessary and appropriate legal, financial, diplomatic and technical framework, systems and facilities.
PART II
ELECTRONIC COMMERCE IN GENERAL
Sec. 3. Objective. - This Act aims to facilitate domestic and international dealings, transactions, arrangements, agreements, contracts and exchanges and storage of information through the utilization of electronic, optical and similar medium, mode, instrumentality and technology to recognize the authenticity and reliability of electronic documents related to such activities and
to promote the universal use of electronic transaction in the government and general public.
Sec. 4. Sphere of Application. - This Act shall apply to any kind
of data message and electronic document used in the context of commercial and non-commercial activities to include domestic and international dealings, transactions, arrangements, agreements, contracts and exchanges and storage of information.
Sec. 5. Definition of Terms. - For the purposes of this Act, the following terms are defined, as follows:
a. “Addressee” refers to a person who is intended by the originator to receive the electronic data message or electronic document. The term does not include a person acting as an intermediary with respect to that electronic data message or electronic document.
b. “Computer” refers to any device or apparatus which, by electronic,electro-mechanical or magnetic impulse, or by other means, is capable of receiving, recording, transmitting, storing, processing, retrieving, or producing information, data, figures, symbols or other modes of written expression according to mathematical and logical rules or of performing any one or more of those functions.
c. “Electronic Data Message” refers to information generated, sent, received or stored by electronic, optical or similar means.
d. “Information and Communication System” refers to a system intended for and capable of generating, sending, receiving, storing or otherwise processing electronic data messages or electronic documents and includes the computer system or other similar device by or in which data is recorded or stored and any procedures related to the recording or storage of electronic data message or electronic document.
e. “Electronic Signature” refers to any distinctive mark, characteristic and/or sound in electronic form, representing the identity of a person and attached to or logically associated with the electronic data message or electronic document or any methodology or procedures employed or adopted by a person and executed or adopted by such person with the intention of authenticating or approving an electronic data message or electronic document.
f. “Electronic Document” refers to information or the representation of information, data, figures, symbols or other modes of written expression, described or however represented, by which a right is established or an obligation extinguished, or by which a fact may be proved and affirmed, which is received, recorded, transmitted, stored, processed, retrieved or produced electronically.
g. “Electronic Key” refers to a secret code which secures and defendssensitive information that crosses over public channels into a form decipherable only with a matching electronic key.
h. “Intermediary” refers to a person who in behalf of another person and with respect to a particular electronic document sends, receives and/or stores or provides other services in respect of that electronic document.
i. “Originator” refers to a person by whom, or on whose behalf, the electronic document purports to have been created, generated and/or sent . The term does not include
a person acting as an intermediary with respect to that electronic document.
j. “Service Provider” refers to a provider of -
(i) On-line services or network access, or the operator of facilities therefor, including entities offering the transmission, routing, or providing of connections for online communications, digital or otherwise, between or among points specified by a user, of electronic documents of the user’s choosing; or
(ii) The necessary technical means by which electronic documents of an originator may be stored and made accessible to a designated or undesignated third party;
Such service providers shall have no authority to modify or alter the content of the electronic data message or electronic document received or to make any entry therein on behalf of the originator, addressee or any third party unless specifically authorized to do so, and who shall retain the electronic document
in accordance with the specific request or as necessary for the purpose of performing the services it was engaged to perform.