S E M I N A R O N I N F O R M A T I O N E T H I C S
930 am - 945 am
945 am- 955 am
1000 am-1045 am
1045 am - 1100 am
1100 am - 1145 am
1145 am -1245 pm
1245 pm
115 pm
Date 29th August 2011 V e n u e Auditorium
Programme
Registration
Welcome speech Dr Sarath Abayawaniana Director National Science Foundation
Ethical Issues for Library amp Information Professionals Prof RBMarasinghe Director Staff Development Centre University of Sri Jayawardenapura
Tea Break
Scienc
Ethical Practices for Information Providers in the field of Science amp Technology Mr Ranil Peris University of Sri Jayawardenapura
Copyright Issues and Information Ethics Mr PB Gallaba Librarian University of Sri Jayawardenapura
Discussion
Vote of Thanks
i n n O K P A T O T I
H I P P O C R A T I S IV51VRAND VM-f i H i A
wllCKt w
E t h i c a H s s u e s
f o r
I n f o r m a t i o n
O f f i c e r s
b y
D r R o h a n a B M a r a s i n g h e Director Staff Development Centre University of Sri Jayewardenepura directorsdcsjpaclk or rohanabm yahoocom
Introduction
bull Ethics - a friend or enemy
bull Different forms of ethics bull Business ethics bull Professional ethics bull Military ethics bull Machine ethics etc
Objectivesoutcomes At the end of this presentat ion we wi l l be
able to
1define what the Ethics means 2 understand why ethics important for us 3 identify what situations IT officers needs to be
aware of 4 Identify possible approaches to ensure ethical
conduct
Learning strategy
Interactive discussion
Dr RBMarasinghe
L e a r n i n g P y r a m i d
National Training Laboratories Bethel Maine 1-800-777-5227
Dale Edgar Audio-Visual Methods In Teaching third edition Holt Rinehart Winston 1969 j
At0
Average Retention Rate
Dr RBMarasinghe
Activity 1
First think yourself (1min)
Then d i scuss with neighbor (2 min)
on bull What do you understand by the term
Ethics
Ethics -Definitions
A set of principles of right conduct or a theory or a system of moral values
(cisnetbaruchcunyeduholowczakclasses3400cis3400_bds_pp13pp
Ethical behaviour can be considered as doing what is right according to the standards of society
of whose society
Difference between ethical and legal behavior bull Laws -enforcing certain ethical
behaviors -what is ethical is legal and what is
unethical is illegal 9 Consider -
- Is all unethical behavior illegal - Is all ethical behavior legal
How are ethics and law related
in summary
bull Ethical codes of practice help determine whether specific laws should be introduced
bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced
Activity 2
First think yourself (1min) Then discuss with neighbor (2
min)
to 1identify situations IT officer needs
ethics
As a professional with responsibilities to employer clients
Managerleader with responsibilities to the subordinates
Responsibility to fellow citizens as a private citizen
Responsibility to Individual Persons
bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society
bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information
bull v
Activity 3
First think yourself (1 min) Then discuss with neighbor (2
min)
to 1 Identify possible approaches to
ensure ethical conduct
Points to discuss
Establishing culture Rules code act Use of protective mechanisms
etc
bull 6) Thou shaft not use or copy software for which you have not paid
t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^
jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))
fwltylhm sectM consideration and respect bull - S c ^
Establishing a culture of legal and ethical data stewardship
- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws
- Steps to consider include -bull Develop an organization-wide policy for legal
and ethical behavior bull Professional organizations and codes of ethics
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
i n n O K P A T O T I
H I P P O C R A T I S IV51VRAND VM-f i H i A
wllCKt w
E t h i c a H s s u e s
f o r
I n f o r m a t i o n
O f f i c e r s
b y
D r R o h a n a B M a r a s i n g h e Director Staff Development Centre University of Sri Jayewardenepura directorsdcsjpaclk or rohanabm yahoocom
Introduction
bull Ethics - a friend or enemy
bull Different forms of ethics bull Business ethics bull Professional ethics bull Military ethics bull Machine ethics etc
Objectivesoutcomes At the end of this presentat ion we wi l l be
able to
1define what the Ethics means 2 understand why ethics important for us 3 identify what situations IT officers needs to be
aware of 4 Identify possible approaches to ensure ethical
conduct
Learning strategy
Interactive discussion
Dr RBMarasinghe
L e a r n i n g P y r a m i d
National Training Laboratories Bethel Maine 1-800-777-5227
Dale Edgar Audio-Visual Methods In Teaching third edition Holt Rinehart Winston 1969 j
At0
Average Retention Rate
Dr RBMarasinghe
Activity 1
First think yourself (1min)
Then d i scuss with neighbor (2 min)
on bull What do you understand by the term
Ethics
Ethics -Definitions
A set of principles of right conduct or a theory or a system of moral values
(cisnetbaruchcunyeduholowczakclasses3400cis3400_bds_pp13pp
Ethical behaviour can be considered as doing what is right according to the standards of society
of whose society
Difference between ethical and legal behavior bull Laws -enforcing certain ethical
behaviors -what is ethical is legal and what is
unethical is illegal 9 Consider -
- Is all unethical behavior illegal - Is all ethical behavior legal
How are ethics and law related
in summary
bull Ethical codes of practice help determine whether specific laws should be introduced
bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced
Activity 2
First think yourself (1min) Then discuss with neighbor (2
min)
to 1identify situations IT officer needs
ethics
As a professional with responsibilities to employer clients
Managerleader with responsibilities to the subordinates
Responsibility to fellow citizens as a private citizen
Responsibility to Individual Persons
bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society
bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information
bull v
Activity 3
First think yourself (1 min) Then discuss with neighbor (2
min)
to 1 Identify possible approaches to
ensure ethical conduct
Points to discuss
Establishing culture Rules code act Use of protective mechanisms
etc
bull 6) Thou shaft not use or copy software for which you have not paid
t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^
jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))
fwltylhm sectM consideration and respect bull - S c ^
Establishing a culture of legal and ethical data stewardship
- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws
- Steps to consider include -bull Develop an organization-wide policy for legal
and ethical behavior bull Professional organizations and codes of ethics
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Introduction
bull Ethics - a friend or enemy
bull Different forms of ethics bull Business ethics bull Professional ethics bull Military ethics bull Machine ethics etc
Objectivesoutcomes At the end of this presentat ion we wi l l be
able to
1define what the Ethics means 2 understand why ethics important for us 3 identify what situations IT officers needs to be
aware of 4 Identify possible approaches to ensure ethical
conduct
Learning strategy
Interactive discussion
Dr RBMarasinghe
L e a r n i n g P y r a m i d
National Training Laboratories Bethel Maine 1-800-777-5227
Dale Edgar Audio-Visual Methods In Teaching third edition Holt Rinehart Winston 1969 j
At0
Average Retention Rate
Dr RBMarasinghe
Activity 1
First think yourself (1min)
Then d i scuss with neighbor (2 min)
on bull What do you understand by the term
Ethics
Ethics -Definitions
A set of principles of right conduct or a theory or a system of moral values
(cisnetbaruchcunyeduholowczakclasses3400cis3400_bds_pp13pp
Ethical behaviour can be considered as doing what is right according to the standards of society
of whose society
Difference between ethical and legal behavior bull Laws -enforcing certain ethical
behaviors -what is ethical is legal and what is
unethical is illegal 9 Consider -
- Is all unethical behavior illegal - Is all ethical behavior legal
How are ethics and law related
in summary
bull Ethical codes of practice help determine whether specific laws should be introduced
bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced
Activity 2
First think yourself (1min) Then discuss with neighbor (2
min)
to 1identify situations IT officer needs
ethics
As a professional with responsibilities to employer clients
Managerleader with responsibilities to the subordinates
Responsibility to fellow citizens as a private citizen
Responsibility to Individual Persons
bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society
bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information
bull v
Activity 3
First think yourself (1 min) Then discuss with neighbor (2
min)
to 1 Identify possible approaches to
ensure ethical conduct
Points to discuss
Establishing culture Rules code act Use of protective mechanisms
etc
bull 6) Thou shaft not use or copy software for which you have not paid
t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^
jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))
fwltylhm sectM consideration and respect bull - S c ^
Establishing a culture of legal and ethical data stewardship
- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws
- Steps to consider include -bull Develop an organization-wide policy for legal
and ethical behavior bull Professional organizations and codes of ethics
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Objectivesoutcomes At the end of this presentat ion we wi l l be
able to
1define what the Ethics means 2 understand why ethics important for us 3 identify what situations IT officers needs to be
aware of 4 Identify possible approaches to ensure ethical
conduct
Learning strategy
Interactive discussion
Dr RBMarasinghe
L e a r n i n g P y r a m i d
National Training Laboratories Bethel Maine 1-800-777-5227
Dale Edgar Audio-Visual Methods In Teaching third edition Holt Rinehart Winston 1969 j
At0
Average Retention Rate
Dr RBMarasinghe
Activity 1
First think yourself (1min)
Then d i scuss with neighbor (2 min)
on bull What do you understand by the term
Ethics
Ethics -Definitions
A set of principles of right conduct or a theory or a system of moral values
(cisnetbaruchcunyeduholowczakclasses3400cis3400_bds_pp13pp
Ethical behaviour can be considered as doing what is right according to the standards of society
of whose society
Difference between ethical and legal behavior bull Laws -enforcing certain ethical
behaviors -what is ethical is legal and what is
unethical is illegal 9 Consider -
- Is all unethical behavior illegal - Is all ethical behavior legal
How are ethics and law related
in summary
bull Ethical codes of practice help determine whether specific laws should be introduced
bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced
Activity 2
First think yourself (1min) Then discuss with neighbor (2
min)
to 1identify situations IT officer needs
ethics
As a professional with responsibilities to employer clients
Managerleader with responsibilities to the subordinates
Responsibility to fellow citizens as a private citizen
Responsibility to Individual Persons
bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society
bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information
bull v
Activity 3
First think yourself (1 min) Then discuss with neighbor (2
min)
to 1 Identify possible approaches to
ensure ethical conduct
Points to discuss
Establishing culture Rules code act Use of protective mechanisms
etc
bull 6) Thou shaft not use or copy software for which you have not paid
t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^
jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))
fwltylhm sectM consideration and respect bull - S c ^
Establishing a culture of legal and ethical data stewardship
- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws
- Steps to consider include -bull Develop an organization-wide policy for legal
and ethical behavior bull Professional organizations and codes of ethics
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Learning strategy
Interactive discussion
Dr RBMarasinghe
L e a r n i n g P y r a m i d
National Training Laboratories Bethel Maine 1-800-777-5227
Dale Edgar Audio-Visual Methods In Teaching third edition Holt Rinehart Winston 1969 j
At0
Average Retention Rate
Dr RBMarasinghe
Activity 1
First think yourself (1min)
Then d i scuss with neighbor (2 min)
on bull What do you understand by the term
Ethics
Ethics -Definitions
A set of principles of right conduct or a theory or a system of moral values
(cisnetbaruchcunyeduholowczakclasses3400cis3400_bds_pp13pp
Ethical behaviour can be considered as doing what is right according to the standards of society
of whose society
Difference between ethical and legal behavior bull Laws -enforcing certain ethical
behaviors -what is ethical is legal and what is
unethical is illegal 9 Consider -
- Is all unethical behavior illegal - Is all ethical behavior legal
How are ethics and law related
in summary
bull Ethical codes of practice help determine whether specific laws should be introduced
bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced
Activity 2
First think yourself (1min) Then discuss with neighbor (2
min)
to 1identify situations IT officer needs
ethics
As a professional with responsibilities to employer clients
Managerleader with responsibilities to the subordinates
Responsibility to fellow citizens as a private citizen
Responsibility to Individual Persons
bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society
bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information
bull v
Activity 3
First think yourself (1 min) Then discuss with neighbor (2
min)
to 1 Identify possible approaches to
ensure ethical conduct
Points to discuss
Establishing culture Rules code act Use of protective mechanisms
etc
bull 6) Thou shaft not use or copy software for which you have not paid
t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^
jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))
fwltylhm sectM consideration and respect bull - S c ^
Establishing a culture of legal and ethical data stewardship
- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws
- Steps to consider include -bull Develop an organization-wide policy for legal
and ethical behavior bull Professional organizations and codes of ethics
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
L e a r n i n g P y r a m i d
National Training Laboratories Bethel Maine 1-800-777-5227
Dale Edgar Audio-Visual Methods In Teaching third edition Holt Rinehart Winston 1969 j
At0
Average Retention Rate
Dr RBMarasinghe
Activity 1
First think yourself (1min)
Then d i scuss with neighbor (2 min)
on bull What do you understand by the term
Ethics
Ethics -Definitions
A set of principles of right conduct or a theory or a system of moral values
(cisnetbaruchcunyeduholowczakclasses3400cis3400_bds_pp13pp
Ethical behaviour can be considered as doing what is right according to the standards of society
of whose society
Difference between ethical and legal behavior bull Laws -enforcing certain ethical
behaviors -what is ethical is legal and what is
unethical is illegal 9 Consider -
- Is all unethical behavior illegal - Is all ethical behavior legal
How are ethics and law related
in summary
bull Ethical codes of practice help determine whether specific laws should be introduced
bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced
Activity 2
First think yourself (1min) Then discuss with neighbor (2
min)
to 1identify situations IT officer needs
ethics
As a professional with responsibilities to employer clients
Managerleader with responsibilities to the subordinates
Responsibility to fellow citizens as a private citizen
Responsibility to Individual Persons
bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society
bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information
bull v
Activity 3
First think yourself (1 min) Then discuss with neighbor (2
min)
to 1 Identify possible approaches to
ensure ethical conduct
Points to discuss
Establishing culture Rules code act Use of protective mechanisms
etc
bull 6) Thou shaft not use or copy software for which you have not paid
t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^
jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))
fwltylhm sectM consideration and respect bull - S c ^
Establishing a culture of legal and ethical data stewardship
- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws
- Steps to consider include -bull Develop an organization-wide policy for legal
and ethical behavior bull Professional organizations and codes of ethics
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Activity 1
First think yourself (1min)
Then d i scuss with neighbor (2 min)
on bull What do you understand by the term
Ethics
Ethics -Definitions
A set of principles of right conduct or a theory or a system of moral values
(cisnetbaruchcunyeduholowczakclasses3400cis3400_bds_pp13pp
Ethical behaviour can be considered as doing what is right according to the standards of society
of whose society
Difference between ethical and legal behavior bull Laws -enforcing certain ethical
behaviors -what is ethical is legal and what is
unethical is illegal 9 Consider -
- Is all unethical behavior illegal - Is all ethical behavior legal
How are ethics and law related
in summary
bull Ethical codes of practice help determine whether specific laws should be introduced
bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced
Activity 2
First think yourself (1min) Then discuss with neighbor (2
min)
to 1identify situations IT officer needs
ethics
As a professional with responsibilities to employer clients
Managerleader with responsibilities to the subordinates
Responsibility to fellow citizens as a private citizen
Responsibility to Individual Persons
bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society
bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information
bull v
Activity 3
First think yourself (1 min) Then discuss with neighbor (2
min)
to 1 Identify possible approaches to
ensure ethical conduct
Points to discuss
Establishing culture Rules code act Use of protective mechanisms
etc
bull 6) Thou shaft not use or copy software for which you have not paid
t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^
jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))
fwltylhm sectM consideration and respect bull - S c ^
Establishing a culture of legal and ethical data stewardship
- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws
- Steps to consider include -bull Develop an organization-wide policy for legal
and ethical behavior bull Professional organizations and codes of ethics
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Ethics -Definitions
A set of principles of right conduct or a theory or a system of moral values
(cisnetbaruchcunyeduholowczakclasses3400cis3400_bds_pp13pp
Ethical behaviour can be considered as doing what is right according to the standards of society
of whose society
Difference between ethical and legal behavior bull Laws -enforcing certain ethical
behaviors -what is ethical is legal and what is
unethical is illegal 9 Consider -
- Is all unethical behavior illegal - Is all ethical behavior legal
How are ethics and law related
in summary
bull Ethical codes of practice help determine whether specific laws should be introduced
bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced
Activity 2
First think yourself (1min) Then discuss with neighbor (2
min)
to 1identify situations IT officer needs
ethics
As a professional with responsibilities to employer clients
Managerleader with responsibilities to the subordinates
Responsibility to fellow citizens as a private citizen
Responsibility to Individual Persons
bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society
bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information
bull v
Activity 3
First think yourself (1 min) Then discuss with neighbor (2
min)
to 1 Identify possible approaches to
ensure ethical conduct
Points to discuss
Establishing culture Rules code act Use of protective mechanisms
etc
bull 6) Thou shaft not use or copy software for which you have not paid
t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^
jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))
fwltylhm sectM consideration and respect bull - S c ^
Establishing a culture of legal and ethical data stewardship
- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws
- Steps to consider include -bull Develop an organization-wide policy for legal
and ethical behavior bull Professional organizations and codes of ethics
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Difference between ethical and legal behavior bull Laws -enforcing certain ethical
behaviors -what is ethical is legal and what is
unethical is illegal 9 Consider -
- Is all unethical behavior illegal - Is all ethical behavior legal
How are ethics and law related
in summary
bull Ethical codes of practice help determine whether specific laws should be introduced
bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced
Activity 2
First think yourself (1min) Then discuss with neighbor (2
min)
to 1identify situations IT officer needs
ethics
As a professional with responsibilities to employer clients
Managerleader with responsibilities to the subordinates
Responsibility to fellow citizens as a private citizen
Responsibility to Individual Persons
bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society
bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information
bull v
Activity 3
First think yourself (1 min) Then discuss with neighbor (2
min)
to 1 Identify possible approaches to
ensure ethical conduct
Points to discuss
Establishing culture Rules code act Use of protective mechanisms
etc
bull 6) Thou shaft not use or copy software for which you have not paid
t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^
jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))
fwltylhm sectM consideration and respect bull - S c ^
Establishing a culture of legal and ethical data stewardship
- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws
- Steps to consider include -bull Develop an organization-wide policy for legal
and ethical behavior bull Professional organizations and codes of ethics
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
How are ethics and law related
in summary
bull Ethical codes of practice help determine whether specific laws should be introduced
bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced
Activity 2
First think yourself (1min) Then discuss with neighbor (2
min)
to 1identify situations IT officer needs
ethics
As a professional with responsibilities to employer clients
Managerleader with responsibilities to the subordinates
Responsibility to fellow citizens as a private citizen
Responsibility to Individual Persons
bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society
bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information
bull v
Activity 3
First think yourself (1 min) Then discuss with neighbor (2
min)
to 1 Identify possible approaches to
ensure ethical conduct
Points to discuss
Establishing culture Rules code act Use of protective mechanisms
etc
bull 6) Thou shaft not use or copy software for which you have not paid
t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^
jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))
fwltylhm sectM consideration and respect bull - S c ^
Establishing a culture of legal and ethical data stewardship
- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws
- Steps to consider include -bull Develop an organization-wide policy for legal
and ethical behavior bull Professional organizations and codes of ethics
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
in summary
bull Ethical codes of practice help determine whether specific laws should be introduced
bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced
Activity 2
First think yourself (1min) Then discuss with neighbor (2
min)
to 1identify situations IT officer needs
ethics
As a professional with responsibilities to employer clients
Managerleader with responsibilities to the subordinates
Responsibility to fellow citizens as a private citizen
Responsibility to Individual Persons
bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society
bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information
bull v
Activity 3
First think yourself (1 min) Then discuss with neighbor (2
min)
to 1 Identify possible approaches to
ensure ethical conduct
Points to discuss
Establishing culture Rules code act Use of protective mechanisms
etc
bull 6) Thou shaft not use or copy software for which you have not paid
t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^
jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))
fwltylhm sectM consideration and respect bull - S c ^
Establishing a culture of legal and ethical data stewardship
- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws
- Steps to consider include -bull Develop an organization-wide policy for legal
and ethical behavior bull Professional organizations and codes of ethics
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Activity 2
First think yourself (1min) Then discuss with neighbor (2
min)
to 1identify situations IT officer needs
ethics
As a professional with responsibilities to employer clients
Managerleader with responsibilities to the subordinates
Responsibility to fellow citizens as a private citizen
Responsibility to Individual Persons
bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society
bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information
bull v
Activity 3
First think yourself (1 min) Then discuss with neighbor (2
min)
to 1 Identify possible approaches to
ensure ethical conduct
Points to discuss
Establishing culture Rules code act Use of protective mechanisms
etc
bull 6) Thou shaft not use or copy software for which you have not paid
t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^
jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))
fwltylhm sectM consideration and respect bull - S c ^
Establishing a culture of legal and ethical data stewardship
- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws
- Steps to consider include -bull Develop an organization-wide policy for legal
and ethical behavior bull Professional organizations and codes of ethics
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
As a professional with responsibilities to employer clients
Managerleader with responsibilities to the subordinates
Responsibility to fellow citizens as a private citizen
Responsibility to Individual Persons
bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society
bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information
bull v
Activity 3
First think yourself (1 min) Then discuss with neighbor (2
min)
to 1 Identify possible approaches to
ensure ethical conduct
Points to discuss
Establishing culture Rules code act Use of protective mechanisms
etc
bull 6) Thou shaft not use or copy software for which you have not paid
t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^
jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))
fwltylhm sectM consideration and respect bull - S c ^
Establishing a culture of legal and ethical data stewardship
- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws
- Steps to consider include -bull Develop an organization-wide policy for legal
and ethical behavior bull Professional organizations and codes of ethics
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Responsibility to Individual Persons
bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society
bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information
bull v
Activity 3
First think yourself (1 min) Then discuss with neighbor (2
min)
to 1 Identify possible approaches to
ensure ethical conduct
Points to discuss
Establishing culture Rules code act Use of protective mechanisms
etc
bull 6) Thou shaft not use or copy software for which you have not paid
t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^
jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))
fwltylhm sectM consideration and respect bull - S c ^
Establishing a culture of legal and ethical data stewardship
- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws
- Steps to consider include -bull Develop an organization-wide policy for legal
and ethical behavior bull Professional organizations and codes of ethics
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
bull v
Activity 3
First think yourself (1 min) Then discuss with neighbor (2
min)
to 1 Identify possible approaches to
ensure ethical conduct
Points to discuss
Establishing culture Rules code act Use of protective mechanisms
etc
bull 6) Thou shaft not use or copy software for which you have not paid
t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^
jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))
fwltylhm sectM consideration and respect bull - S c ^
Establishing a culture of legal and ethical data stewardship
- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws
- Steps to consider include -bull Develop an organization-wide policy for legal
and ethical behavior bull Professional organizations and codes of ethics
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Points to discuss
Establishing culture Rules code act Use of protective mechanisms
etc
bull 6) Thou shaft not use or copy software for which you have not paid
t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^
jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))
fwltylhm sectM consideration and respect bull - S c ^
Establishing a culture of legal and ethical data stewardship
- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws
- Steps to consider include -bull Develop an organization-wide policy for legal
and ethical behavior bull Professional organizations and codes of ethics
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
bull 6) Thou shaft not use or copy software for which you have not paid
t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^
jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))
fwltylhm sectM consideration and respect bull - S c ^
Establishing a culture of legal and ethical data stewardship
- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws
- Steps to consider include -bull Develop an organization-wide policy for legal
and ethical behavior bull Professional organizations and codes of ethics
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Establishing a culture of legal and ethical data stewardship
- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws
- Steps to consider include -bull Develop an organization-wide policy for legal
and ethical behavior bull Professional organizations and codes of ethics
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Intellectual Property (IP)
bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed
bull IP is the product of human creativity in the industrial scientific literary and artistic fields
Intellectual Property Rights (IPR)
bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners
In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization
Ethics and Practicing Engineering Engineering C o d e of Ethics
bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics
bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good
In summary
bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there
bull IT professionals have many different relationships - Each with its own set of ethical issues and
potential problems
bull Professional code of ethics - States the principles and core values
essential to the work of an occupational group
Furthr Read ings
bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi
bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
The United Kingdoms Data Protection Act of 1998
bull Presents eight data protection principles -
j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt
Ethics -Principles in medicine
1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life
Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices
Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient
Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment
Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner
A C o d e of Ethics for Information S c i e n t i s t s
mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25
Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d
bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights
Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M
bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information
bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull
bullHowto prevent wv^^-5v - o specific software
bull(egTernttin) -V- bull o Other methods proper citations)
bull Referencing software bull
Place of software in preventing plagiarism
Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f
bull Other software use Referencing software)
o EndNote r- bull bullbull k bull o RefWorks Jampgt
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Key Divisions
Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures
Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories
Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
E t h i c a l P r a c t i c e s f o r
F i e l d o f S c i e n c e amp T e c h n o l o g y
E t h i c s
a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics
Mr Ranil Peris
Senior Lecturer
Dept of IT
University of Sri Jayewardenepura bullagfci
T h e W o r k o f l i b r a r i a n s -
n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries
^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and
form of information representation and face to face interactions with clients
D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace
a Tomorrow -
8lgfii
I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )
D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications
deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review
0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations
(httpwwwentrepreneurcomencyctopediater m82268html)
BI911
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed
deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs
y i 9hcassettes videotapes DVDs video games 7 65 $111
E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull
D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer
n9hcontain them (Jonas 198434)
n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase
the profits of the business without violating the law or engaging in fraudulent practices
n Social Contract Theory bull Companies have ethical responsibilities to all members of
society who allow corporations to exist
T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media
As we move towards the millennium library and information professionals are facing at least three major paradigm shifts
n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources
1
81911 81911
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
The Environment increasing demand for accountability D The second shift relates to the increasing
demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking
t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work
organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering
D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)
Ethical Behaviors Is your 80 gigabyte hard drive full
bull Music and videos bull That sure is a great music where did you get it
bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project
software bull Software Piracy
bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse
bull Did you gain access to the network and invade other workers emails and files bull Computer abuse
You formatted your hard drive prior to leaving your company because you were angry about leaving
W raquo u Destructionofproperty 1 5
Challenges Code of Ethics
n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the
computing field bull There is movement within the industry to create a licensing
process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m
bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e
D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml
Dimensions pf ethical practice
L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y
bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e
bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion
J O p e r a t i o n a l S t a g e
bull Concern of security and privacy of r e c o u r s e s
Planning Stage v ^r^ Ji Competency in the field of technology
n Information providers should be aware of the new form information technology resources
n From printed papers to 3D videos D Virtual Libraries D Trends in information technology
1 17
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj
CoHpefe^ technology V
deg Think of the Virtual universities and their libraries
a How are going to serve forthe virtual students
a Is it possible to say come and use our physical library
D Cloud computing a Freeware (open source) vs Commercial
software
a 3 9 u
n Management or other subjects are getting help from information systems
D Concern of the organizational objectives deg Constructive feedback forthe planning team
8 1 9 n
A practical requirement Principles of Technology Ethics
0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f
t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y
bull So lut ions
P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r
8 1 9 1 1 1
a Proportionality The good achieved by the technology must outweigh the
harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk
D Informed Consent bull Those affected by the technology should understand and
accept the risks
8 1 9 u u
Principlesof Technology Ethics Developing stage
u J u s t i c e bull The benefits and burdens of the technology should be
distributed fairly bull Those who benefit should bear their fair share
of the risks and those who do not benefit should not suffer a significant increase in risk
D Minimized Risk bull Even if judged acceptable by the other three guidelines
the technology must be implemented so as to avoid all unnecessary risk
n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s
D e v e l o p m e n t is pure technical p r o c e s s
bull Deve lopers should re spons ib l e or fai lures
We are only u s e r s
T h e s e ideas a r e total ly wrong
bull Although It is not a legal m a t t e r
It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s
8 1 9 u 1 3 B19n
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Developing stage OperationalStage r
Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas
bull Concern of securi ty of r e c o u r s e s
bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries
bull Internet a n d other c o m p u t e r network a r e vulnerable
- It is your responsibi l i ty t o pro tec t r e s o u r c e s
BJigii
Computer Crime Cyberscams and Cybercriminals
D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of
hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware
software data or network resources bull Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported
a security incident bull The US FederalTrade Commission says
identity theft is its top complaint bull eBay has 60 people combating fraud
Microsoft has 65 bull Stolen credit card account numbers are
regularly sold online
Hacking Common Hacking Tactics a Hacking is
bull The obsessive use of computers bull The unauthorized access and use of networked computer
systems deg Electronic Breaking and Entering
bull Hacking into a computer system and reading flies but neither stealing nor damaging anything
a Cracker bull A malicious or criminal hacker who maintains knowledge
of the vulnerabilities found for private advantage
deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs
8 degpoundu f fe r Overflow
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Cyber Theft x--rx^--y^[
Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized
network entry and alternation of computer databases to cover the tracks of the employees involved
deg Many attacks occur through the Internet deg Most companies dont reveal that they have
been targets or victims of cybercrime
D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks
D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use
8191 81911
Internet Abuses in the Workplace
bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting
Theft of Intellectual Property
Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and
software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made
it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is
down and continues to drop
a 3 9 u 81911
Viruses and Worms
A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware
D Violation of Privacy bull Accessing individuals private email conversations and
computer records bull Collecting and sharing information about individuals
gained from their visits to Internet websites
D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely
associated with people than with places
81911 s19u
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Privacy Issues Security Management D C o m p u t e r Matching
Using customer information gained from many sources to market additional business services
a Unauthor i zed A c c e s s of Persona Files
bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles
a The goal of security management is the accuracy integrity and safety of all information system processes and resources
PrfvWe bull B Saamty PrfvWe bull m B Saamty
81911
^Protecting Your Privacy on the Internet
96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-
n There are multiple ways to protect your privacy
Encrypt email
bull Send newsgroup postings through anonymous remailers
Ask your ISP not to sell your name and information to mailing list providers and other marketers
bull Dont reveal personal data and interests on online service and website user profiles
Password Class of Attack Length 2 3 A 5 6 7
Combinati ons 9216 884736 85 Million 8 Billion
Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs
782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875
Class C Class D Class E Class F Instant Instant
Mins 2 W Hours 9 Days 2 W Years
Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days
Quadrillion Years 2287Years 22gYears ^Years
Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years
Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days
a191
10 Characters 0123456789 Solution Password Class of
Attack Length Combinatio
ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA
Mins 10 Seconds Instant Instant Instant Instant
7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U
Hours 17 Mins lWMins 10 Seconds instant Instant
g 1000 Million a1911
28 Hours iK Hours 17 Mins iW Mins 10
Seconds Instant
D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s
G191U
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o
laquo n r o w toa mwcaooti^
pound f t W1fgt jtujr bullncrypoon u l l t w i
u ogtUuraquo a ta c c n t w m f l r
n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f
copy S i
rrmC^ga
jnternetwprke^ Defenses - ^ - - v - v K v ^ ^
D Firewalls A gatekeeper system that protects a companys intranets
and other computer networks from intrusion Provides a filter and safe transfer point for
access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with
DSL or cable modems bull Can deter hacking but cannot prevent it
Internet and Intranet Firewalls
L laquo H i r i laquo w i t t i t n i p laquo i i
bull
Defending Against Denial of Service - f
n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies
n At the ISP bull Monitor and block traffic sp ikes
D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s
8191 81911
Internetworked Security Defenses
a Email Monitoring Use of content monitoring software that scans
for troublesome words that might compromise corporate security
D Virus D e f e n s e s Centralize the updating and distribution of antivirus
software bull Use a security suite that integrates virus protection with
firewalls Web security and content blocking features
Other Security Measures
D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors
D Backup Files bull Duplicate files of data or programs
D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud
and destruction
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Other Security Measures
a B i o m e t r i c s
Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan
deg C o m p u t e r Failure Controls
Prevents computer failures or minimizes its effects
bull Preventive maintenance
bull Arrange backups with a disaster recovery organization
deg In the event of a s y s t e m failure f a u l t - t o l e r a n t
s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s
and so f tware tha t provide
bull Fail-over capability shifts to back up components
bull Fail-save capability the system continues
to operate at the same level
Fail-soft capability the system continues to operate at a reduced but acceptable level
8aghi
Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized
p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities
will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases
839(11
Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy
validity and propriety of information s y s t e m activities
eta
I n n r C i M
Auditing IT Security
D IT Security Audits bull P e r f o r m e d by internal or external aud i tors
Review and evaluat ion of securi ty m e a s u r e s
a n d m a n a g e m e n t policies
bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place
Protecting Yourself from Cybercrime I
- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer
2 DonraUoir online merchant to MOie jwr credit card information for future purchaser
3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently
4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing
5 Install aU upetatingriystem patches ami upgrades
euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs
7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser
8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites
9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net
10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Legislation having art im bull51CTdeve16bmeht-in Sri Lanka
E r g q r i b m j ^
3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS
RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT
NO27 OF 2003
PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005
r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006
PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006
y COMPUTER CRIMES ACT NO 24 OF 2007
D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S
bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE
TO WORK IN
INCREASES EMPLOYEE MORALE AND PRODUCTIVITY
ALSO CALLED human factors engineering
Biomechanics Biomechanics
IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS
THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY
AJGRII S B
Information Technology Ethics Useful web links
DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL
A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE
A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS
- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR
bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME
bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE
- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN
Q http wwwmoyakcompapersdigital-future-libraries
s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg
Thank you
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Copyright and its implications to libraries and information services in Sri Lanka
Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka
What is copyright
Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright
Copyright exists to
bull Protect works of authors
bull protect Works of performers
For a specified period of t ime
Copyright is a property right (economic right) bull may be traded
bull may b e b o u g h t
bull may be sold
bull may be ass igned
bull may be licensed
for a specified period
Owner has opportunity to profit
bull from selling bull from assigning bull from licensing
Economic rights
bull Reproduct ion right
bull Publishing right
bull Rental right
bull Lending right
bull Performing right
bull C o m m u n i c a t e to the public-right
bull Adaptat ion right
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Moral rights Copyright protection
bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution
bull Right to disclosure
HIMn bdquo
Protected works
bull Original literary
bull Dramatic
bull Musical
bull Artistic
bull Sound recording
bull Fi lmsv ideo bull Broadcasts
bull Typographic output bull Electronic format
bull f e t t e r s e-mail messages
Not protected
bull Bibliographic c i tat ions
bull Facts
bull Headlines
bull Expired works
Owners of copyright
bull First owner- literary Dramatic Musical Artistic author
bull S o u n d recording - producer bull Film - d i r e c t o r producer
bull Typographical arrangement - publ isher bull Photograph - photographer
bull Government publ icat ion- government
bull Employment contract - the authority
Length of the copyright
bull Unknown authorship bull Joint authorship
bull Non EEA works
bull Unpublished works
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Copyright encourage creativity
bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas
bull Research and educat ion are valid reasons for copying
bull Exceptions and l imitations
Statutory permission to copy (copyright balance) Balance between
bull Legit imate interests of creation of works
bull Needs of users to have access to such works
Permittecha ctsstatxrtoi provisions
Fair dealing fair use bull Copying for educat ion purposes
bull Copying by l ibrarians a n d archivists
bull Performing rights
bull Temporary copies
bull For private study
bull For research (non commercia l purposes )
bull For criticism review
bull For news report ing
Copying by librarians and archivists
Library regulations
Library privileges -
bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works
Thank you
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4
bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned
new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g
Sri Lanka Library Association
Code of Professional Conduct and Ethics
The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct
I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs
I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference
Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997
Foreword
Harrison Perera President SLLA June 1998
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4
Introduction
The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)
Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to
bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession
Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations
Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute
Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged
The principles of conduct towards which Librarians should strive have been embodied in the following broad categories
bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)
Responsibility to the Community and Users
1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek
opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to
protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law
4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship
5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information
Science in order to provide the best possible service
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4
7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others
8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity
Responsibilities to the Profession and Practices
Members shall
9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to
injure maliciously or falsely the professional reputation practice or employment of other professionals
13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional
14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development
15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with
the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the
advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge
the contributions of others
Responsibilities to the Professional Body - Sri Lanka Library Association
19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association
by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of
the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or
information on a complaint
(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations
(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so
23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association
httparchiveiflaorgfaifeethicssllacodehtm 82520 ll
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011
Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4
Guidelines
1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association
2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are
3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration
4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply
5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing
6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct
7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association
Sri Lanka Library Association
Main Page T o t op
httparchiveiflaorgfaifeethicssllacodehtm 8252011