+ All Categories
Home > Documents > SEMINAR ON INFORMATION ETHICS - Thakshana e …thakshana.nsf.ac.lk/slstic/NA-328/NA328.pdf ·...

SEMINAR ON INFORMATION ETHICS - Thakshana e …thakshana.nsf.ac.lk/slstic/NA-328/NA328.pdf ·...

Date post: 03-Jul-2018
Category:
Upload: trankhanh
View: 213 times
Download: 0 times
Share this document with a friend
39
SEMINAR ON INFORMATION ETHICS 9.30 a.m. - 9.45 a.m. 9.45 a.m.- 9.55 a.m. 10.00 a.m.-10.45 a.m. 10.45 a.m. - 11.00 a.m. 11.00 a.m. - 11.45 a.m. 11.45 a.m. -12.45 p.m. 12.45 p.m. 1.15 p.m. Date : 29th August 2011 Venue: Auditorium Programme Registration Welcome speech Dr. Sarath Abayawaniana Director, National Science Foundation Ethical Issues for Library & Information Professionals Prof. R.B.Marasinghe Director, Staff Development Centre University of Sri Jayawardenapura Tea Break Scienc Ethical Practices for Information Providers in the field of Science & Technology Mr. Ranil Peris University of Sri Jayawardenapura Copyright Issues and Information Ethics Mr. P.B. Gallaba Librarian, University of Sri Jayawardenapura Discussion Vote of Thanks
Transcript

S E M I N A R O N I N F O R M A T I O N E T H I C S

930 am - 945 am

945 am- 955 am

1000 am-1045 am

1045 am - 1100 am

1100 am - 1145 am

1145 am -1245 pm

1245 pm

115 pm

Date 29th August 2011 V e n u e Auditorium

Programme

Registration

Welcome speech Dr Sarath Abayawaniana Director National Science Foundation

Ethical Issues for Library amp Information Professionals Prof RBMarasinghe Director Staff Development Centre University of Sri Jayawardenapura

Tea Break

Scienc

Ethical Practices for Information Providers in the field of Science amp Technology Mr Ranil Peris University of Sri Jayawardenapura

Copyright Issues and Information Ethics Mr PB Gallaba Librarian University of Sri Jayawardenapura

Discussion

Vote of Thanks

i n n O K P A T O T I

H I P P O C R A T I S IV51VRAND VM-f i H i A

wllCKt w

E t h i c a H s s u e s

f o r

I n f o r m a t i o n

O f f i c e r s

b y

D r R o h a n a B M a r a s i n g h e Director Staff Development Centre University of Sri Jayewardenepura directorsdcsjpaclk or rohanabm yahoocom

Introduction

bull Ethics - a friend or enemy

bull Different forms of ethics bull Business ethics bull Professional ethics bull Military ethics bull Machine ethics etc

Objectivesoutcomes At the end of this presentat ion we wi l l be

able to

1define what the Ethics means 2 understand why ethics important for us 3 identify what situations IT officers needs to be

aware of 4 Identify possible approaches to ensure ethical

conduct

Learning strategy

Interactive discussion

Dr RBMarasinghe

L e a r n i n g P y r a m i d

National Training Laboratories Bethel Maine 1-800-777-5227

Dale Edgar Audio-Visual Methods In Teaching third edition Holt Rinehart Winston 1969 j

At0

Average Retention Rate

Dr RBMarasinghe

Activity 1

First think yourself (1min)

Then d i scuss with neighbor (2 min)

on bull What do you understand by the term

Ethics

Ethics -Definitions

A set of principles of right conduct or a theory or a system of moral values

(cisnetbaruchcunyeduholowczakclasses3400cis3400_bds_pp13pp

Ethical behaviour can be considered as doing what is right according to the standards of society

of whose society

Difference between ethical and legal behavior bull Laws -enforcing certain ethical

behaviors -what is ethical is legal and what is

unethical is illegal 9 Consider -

- Is all unethical behavior illegal - Is all ethical behavior legal

How are ethics and law related

in summary

bull Ethical codes of practice help determine whether specific laws should be introduced

bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced

Activity 2

First think yourself (1min) Then discuss with neighbor (2

min)

to 1identify situations IT officer needs

ethics

As a professional with responsibilities to employer clients

Managerleader with responsibilities to the subordinates

Responsibility to fellow citizens as a private citizen

Responsibility to Individual Persons

bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society

bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information

bull v

Activity 3

First think yourself (1 min) Then discuss with neighbor (2

min)

to 1 Identify possible approaches to

ensure ethical conduct

Points to discuss

Establishing culture Rules code act Use of protective mechanisms

etc

bull 6) Thou shaft not use or copy software for which you have not paid

t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^

jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))

fwltylhm sectM consideration and respect bull - S c ^

Establishing a culture of legal and ethical data stewardship

- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws

- Steps to consider include -bull Develop an organization-wide policy for legal

and ethical behavior bull Professional organizations and codes of ethics

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

i n n O K P A T O T I

H I P P O C R A T I S IV51VRAND VM-f i H i A

wllCKt w

E t h i c a H s s u e s

f o r

I n f o r m a t i o n

O f f i c e r s

b y

D r R o h a n a B M a r a s i n g h e Director Staff Development Centre University of Sri Jayewardenepura directorsdcsjpaclk or rohanabm yahoocom

Introduction

bull Ethics - a friend or enemy

bull Different forms of ethics bull Business ethics bull Professional ethics bull Military ethics bull Machine ethics etc

Objectivesoutcomes At the end of this presentat ion we wi l l be

able to

1define what the Ethics means 2 understand why ethics important for us 3 identify what situations IT officers needs to be

aware of 4 Identify possible approaches to ensure ethical

conduct

Learning strategy

Interactive discussion

Dr RBMarasinghe

L e a r n i n g P y r a m i d

National Training Laboratories Bethel Maine 1-800-777-5227

Dale Edgar Audio-Visual Methods In Teaching third edition Holt Rinehart Winston 1969 j

At0

Average Retention Rate

Dr RBMarasinghe

Activity 1

First think yourself (1min)

Then d i scuss with neighbor (2 min)

on bull What do you understand by the term

Ethics

Ethics -Definitions

A set of principles of right conduct or a theory or a system of moral values

(cisnetbaruchcunyeduholowczakclasses3400cis3400_bds_pp13pp

Ethical behaviour can be considered as doing what is right according to the standards of society

of whose society

Difference between ethical and legal behavior bull Laws -enforcing certain ethical

behaviors -what is ethical is legal and what is

unethical is illegal 9 Consider -

- Is all unethical behavior illegal - Is all ethical behavior legal

How are ethics and law related

in summary

bull Ethical codes of practice help determine whether specific laws should be introduced

bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced

Activity 2

First think yourself (1min) Then discuss with neighbor (2

min)

to 1identify situations IT officer needs

ethics

As a professional with responsibilities to employer clients

Managerleader with responsibilities to the subordinates

Responsibility to fellow citizens as a private citizen

Responsibility to Individual Persons

bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society

bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information

bull v

Activity 3

First think yourself (1 min) Then discuss with neighbor (2

min)

to 1 Identify possible approaches to

ensure ethical conduct

Points to discuss

Establishing culture Rules code act Use of protective mechanisms

etc

bull 6) Thou shaft not use or copy software for which you have not paid

t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^

jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))

fwltylhm sectM consideration and respect bull - S c ^

Establishing a culture of legal and ethical data stewardship

- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws

- Steps to consider include -bull Develop an organization-wide policy for legal

and ethical behavior bull Professional organizations and codes of ethics

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Introduction

bull Ethics - a friend or enemy

bull Different forms of ethics bull Business ethics bull Professional ethics bull Military ethics bull Machine ethics etc

Objectivesoutcomes At the end of this presentat ion we wi l l be

able to

1define what the Ethics means 2 understand why ethics important for us 3 identify what situations IT officers needs to be

aware of 4 Identify possible approaches to ensure ethical

conduct

Learning strategy

Interactive discussion

Dr RBMarasinghe

L e a r n i n g P y r a m i d

National Training Laboratories Bethel Maine 1-800-777-5227

Dale Edgar Audio-Visual Methods In Teaching third edition Holt Rinehart Winston 1969 j

At0

Average Retention Rate

Dr RBMarasinghe

Activity 1

First think yourself (1min)

Then d i scuss with neighbor (2 min)

on bull What do you understand by the term

Ethics

Ethics -Definitions

A set of principles of right conduct or a theory or a system of moral values

(cisnetbaruchcunyeduholowczakclasses3400cis3400_bds_pp13pp

Ethical behaviour can be considered as doing what is right according to the standards of society

of whose society

Difference between ethical and legal behavior bull Laws -enforcing certain ethical

behaviors -what is ethical is legal and what is

unethical is illegal 9 Consider -

- Is all unethical behavior illegal - Is all ethical behavior legal

How are ethics and law related

in summary

bull Ethical codes of practice help determine whether specific laws should be introduced

bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced

Activity 2

First think yourself (1min) Then discuss with neighbor (2

min)

to 1identify situations IT officer needs

ethics

As a professional with responsibilities to employer clients

Managerleader with responsibilities to the subordinates

Responsibility to fellow citizens as a private citizen

Responsibility to Individual Persons

bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society

bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information

bull v

Activity 3

First think yourself (1 min) Then discuss with neighbor (2

min)

to 1 Identify possible approaches to

ensure ethical conduct

Points to discuss

Establishing culture Rules code act Use of protective mechanisms

etc

bull 6) Thou shaft not use or copy software for which you have not paid

t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^

jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))

fwltylhm sectM consideration and respect bull - S c ^

Establishing a culture of legal and ethical data stewardship

- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws

- Steps to consider include -bull Develop an organization-wide policy for legal

and ethical behavior bull Professional organizations and codes of ethics

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Objectivesoutcomes At the end of this presentat ion we wi l l be

able to

1define what the Ethics means 2 understand why ethics important for us 3 identify what situations IT officers needs to be

aware of 4 Identify possible approaches to ensure ethical

conduct

Learning strategy

Interactive discussion

Dr RBMarasinghe

L e a r n i n g P y r a m i d

National Training Laboratories Bethel Maine 1-800-777-5227

Dale Edgar Audio-Visual Methods In Teaching third edition Holt Rinehart Winston 1969 j

At0

Average Retention Rate

Dr RBMarasinghe

Activity 1

First think yourself (1min)

Then d i scuss with neighbor (2 min)

on bull What do you understand by the term

Ethics

Ethics -Definitions

A set of principles of right conduct or a theory or a system of moral values

(cisnetbaruchcunyeduholowczakclasses3400cis3400_bds_pp13pp

Ethical behaviour can be considered as doing what is right according to the standards of society

of whose society

Difference between ethical and legal behavior bull Laws -enforcing certain ethical

behaviors -what is ethical is legal and what is

unethical is illegal 9 Consider -

- Is all unethical behavior illegal - Is all ethical behavior legal

How are ethics and law related

in summary

bull Ethical codes of practice help determine whether specific laws should be introduced

bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced

Activity 2

First think yourself (1min) Then discuss with neighbor (2

min)

to 1identify situations IT officer needs

ethics

As a professional with responsibilities to employer clients

Managerleader with responsibilities to the subordinates

Responsibility to fellow citizens as a private citizen

Responsibility to Individual Persons

bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society

bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information

bull v

Activity 3

First think yourself (1 min) Then discuss with neighbor (2

min)

to 1 Identify possible approaches to

ensure ethical conduct

Points to discuss

Establishing culture Rules code act Use of protective mechanisms

etc

bull 6) Thou shaft not use or copy software for which you have not paid

t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^

jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))

fwltylhm sectM consideration and respect bull - S c ^

Establishing a culture of legal and ethical data stewardship

- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws

- Steps to consider include -bull Develop an organization-wide policy for legal

and ethical behavior bull Professional organizations and codes of ethics

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Learning strategy

Interactive discussion

Dr RBMarasinghe

L e a r n i n g P y r a m i d

National Training Laboratories Bethel Maine 1-800-777-5227

Dale Edgar Audio-Visual Methods In Teaching third edition Holt Rinehart Winston 1969 j

At0

Average Retention Rate

Dr RBMarasinghe

Activity 1

First think yourself (1min)

Then d i scuss with neighbor (2 min)

on bull What do you understand by the term

Ethics

Ethics -Definitions

A set of principles of right conduct or a theory or a system of moral values

(cisnetbaruchcunyeduholowczakclasses3400cis3400_bds_pp13pp

Ethical behaviour can be considered as doing what is right according to the standards of society

of whose society

Difference between ethical and legal behavior bull Laws -enforcing certain ethical

behaviors -what is ethical is legal and what is

unethical is illegal 9 Consider -

- Is all unethical behavior illegal - Is all ethical behavior legal

How are ethics and law related

in summary

bull Ethical codes of practice help determine whether specific laws should be introduced

bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced

Activity 2

First think yourself (1min) Then discuss with neighbor (2

min)

to 1identify situations IT officer needs

ethics

As a professional with responsibilities to employer clients

Managerleader with responsibilities to the subordinates

Responsibility to fellow citizens as a private citizen

Responsibility to Individual Persons

bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society

bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information

bull v

Activity 3

First think yourself (1 min) Then discuss with neighbor (2

min)

to 1 Identify possible approaches to

ensure ethical conduct

Points to discuss

Establishing culture Rules code act Use of protective mechanisms

etc

bull 6) Thou shaft not use or copy software for which you have not paid

t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^

jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))

fwltylhm sectM consideration and respect bull - S c ^

Establishing a culture of legal and ethical data stewardship

- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws

- Steps to consider include -bull Develop an organization-wide policy for legal

and ethical behavior bull Professional organizations and codes of ethics

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

L e a r n i n g P y r a m i d

National Training Laboratories Bethel Maine 1-800-777-5227

Dale Edgar Audio-Visual Methods In Teaching third edition Holt Rinehart Winston 1969 j

At0

Average Retention Rate

Dr RBMarasinghe

Activity 1

First think yourself (1min)

Then d i scuss with neighbor (2 min)

on bull What do you understand by the term

Ethics

Ethics -Definitions

A set of principles of right conduct or a theory or a system of moral values

(cisnetbaruchcunyeduholowczakclasses3400cis3400_bds_pp13pp

Ethical behaviour can be considered as doing what is right according to the standards of society

of whose society

Difference between ethical and legal behavior bull Laws -enforcing certain ethical

behaviors -what is ethical is legal and what is

unethical is illegal 9 Consider -

- Is all unethical behavior illegal - Is all ethical behavior legal

How are ethics and law related

in summary

bull Ethical codes of practice help determine whether specific laws should be introduced

bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced

Activity 2

First think yourself (1min) Then discuss with neighbor (2

min)

to 1identify situations IT officer needs

ethics

As a professional with responsibilities to employer clients

Managerleader with responsibilities to the subordinates

Responsibility to fellow citizens as a private citizen

Responsibility to Individual Persons

bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society

bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information

bull v

Activity 3

First think yourself (1 min) Then discuss with neighbor (2

min)

to 1 Identify possible approaches to

ensure ethical conduct

Points to discuss

Establishing culture Rules code act Use of protective mechanisms

etc

bull 6) Thou shaft not use or copy software for which you have not paid

t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^

jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))

fwltylhm sectM consideration and respect bull - S c ^

Establishing a culture of legal and ethical data stewardship

- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws

- Steps to consider include -bull Develop an organization-wide policy for legal

and ethical behavior bull Professional organizations and codes of ethics

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Activity 1

First think yourself (1min)

Then d i scuss with neighbor (2 min)

on bull What do you understand by the term

Ethics

Ethics -Definitions

A set of principles of right conduct or a theory or a system of moral values

(cisnetbaruchcunyeduholowczakclasses3400cis3400_bds_pp13pp

Ethical behaviour can be considered as doing what is right according to the standards of society

of whose society

Difference between ethical and legal behavior bull Laws -enforcing certain ethical

behaviors -what is ethical is legal and what is

unethical is illegal 9 Consider -

- Is all unethical behavior illegal - Is all ethical behavior legal

How are ethics and law related

in summary

bull Ethical codes of practice help determine whether specific laws should be introduced

bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced

Activity 2

First think yourself (1min) Then discuss with neighbor (2

min)

to 1identify situations IT officer needs

ethics

As a professional with responsibilities to employer clients

Managerleader with responsibilities to the subordinates

Responsibility to fellow citizens as a private citizen

Responsibility to Individual Persons

bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society

bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information

bull v

Activity 3

First think yourself (1 min) Then discuss with neighbor (2

min)

to 1 Identify possible approaches to

ensure ethical conduct

Points to discuss

Establishing culture Rules code act Use of protective mechanisms

etc

bull 6) Thou shaft not use or copy software for which you have not paid

t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^

jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))

fwltylhm sectM consideration and respect bull - S c ^

Establishing a culture of legal and ethical data stewardship

- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws

- Steps to consider include -bull Develop an organization-wide policy for legal

and ethical behavior bull Professional organizations and codes of ethics

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Ethics -Definitions

A set of principles of right conduct or a theory or a system of moral values

(cisnetbaruchcunyeduholowczakclasses3400cis3400_bds_pp13pp

Ethical behaviour can be considered as doing what is right according to the standards of society

of whose society

Difference between ethical and legal behavior bull Laws -enforcing certain ethical

behaviors -what is ethical is legal and what is

unethical is illegal 9 Consider -

- Is all unethical behavior illegal - Is all ethical behavior legal

How are ethics and law related

in summary

bull Ethical codes of practice help determine whether specific laws should be introduced

bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced

Activity 2

First think yourself (1min) Then discuss with neighbor (2

min)

to 1identify situations IT officer needs

ethics

As a professional with responsibilities to employer clients

Managerleader with responsibilities to the subordinates

Responsibility to fellow citizens as a private citizen

Responsibility to Individual Persons

bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society

bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information

bull v

Activity 3

First think yourself (1 min) Then discuss with neighbor (2

min)

to 1 Identify possible approaches to

ensure ethical conduct

Points to discuss

Establishing culture Rules code act Use of protective mechanisms

etc

bull 6) Thou shaft not use or copy software for which you have not paid

t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^

jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))

fwltylhm sectM consideration and respect bull - S c ^

Establishing a culture of legal and ethical data stewardship

- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws

- Steps to consider include -bull Develop an organization-wide policy for legal

and ethical behavior bull Professional organizations and codes of ethics

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Difference between ethical and legal behavior bull Laws -enforcing certain ethical

behaviors -what is ethical is legal and what is

unethical is illegal 9 Consider -

- Is all unethical behavior illegal - Is all ethical behavior legal

How are ethics and law related

in summary

bull Ethical codes of practice help determine whether specific laws should be introduced

bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced

Activity 2

First think yourself (1min) Then discuss with neighbor (2

min)

to 1identify situations IT officer needs

ethics

As a professional with responsibilities to employer clients

Managerleader with responsibilities to the subordinates

Responsibility to fellow citizens as a private citizen

Responsibility to Individual Persons

bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society

bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information

bull v

Activity 3

First think yourself (1 min) Then discuss with neighbor (2

min)

to 1 Identify possible approaches to

ensure ethical conduct

Points to discuss

Establishing culture Rules code act Use of protective mechanisms

etc

bull 6) Thou shaft not use or copy software for which you have not paid

t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^

jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))

fwltylhm sectM consideration and respect bull - S c ^

Establishing a culture of legal and ethical data stewardship

- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws

- Steps to consider include -bull Develop an organization-wide policy for legal

and ethical behavior bull Professional organizations and codes of ethics

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

How are ethics and law related

in summary

bull Ethical codes of practice help determine whether specific laws should be introduced

bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced

Activity 2

First think yourself (1min) Then discuss with neighbor (2

min)

to 1identify situations IT officer needs

ethics

As a professional with responsibilities to employer clients

Managerleader with responsibilities to the subordinates

Responsibility to fellow citizens as a private citizen

Responsibility to Individual Persons

bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society

bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information

bull v

Activity 3

First think yourself (1 min) Then discuss with neighbor (2

min)

to 1 Identify possible approaches to

ensure ethical conduct

Points to discuss

Establishing culture Rules code act Use of protective mechanisms

etc

bull 6) Thou shaft not use or copy software for which you have not paid

t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^

jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))

fwltylhm sectM consideration and respect bull - S c ^

Establishing a culture of legal and ethical data stewardship

- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws

- Steps to consider include -bull Develop an organization-wide policy for legal

and ethical behavior bull Professional organizations and codes of ethics

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

in summary

bull Ethical codes of practice help determine whether specific laws should be introduced

bull Ethics fills the gap between the time when technology creates new problems and the time when laws are introduced

Activity 2

First think yourself (1min) Then discuss with neighbor (2

min)

to 1identify situations IT officer needs

ethics

As a professional with responsibilities to employer clients

Managerleader with responsibilities to the subordinates

Responsibility to fellow citizens as a private citizen

Responsibility to Individual Persons

bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society

bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information

bull v

Activity 3

First think yourself (1 min) Then discuss with neighbor (2

min)

to 1 Identify possible approaches to

ensure ethical conduct

Points to discuss

Establishing culture Rules code act Use of protective mechanisms

etc

bull 6) Thou shaft not use or copy software for which you have not paid

t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^

jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))

fwltylhm sectM consideration and respect bull - S c ^

Establishing a culture of legal and ethical data stewardship

- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws

- Steps to consider include -bull Develop an organization-wide policy for legal

and ethical behavior bull Professional organizations and codes of ethics

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Activity 2

First think yourself (1min) Then discuss with neighbor (2

min)

to 1identify situations IT officer needs

ethics

As a professional with responsibilities to employer clients

Managerleader with responsibilities to the subordinates

Responsibility to fellow citizens as a private citizen

Responsibility to Individual Persons

bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society

bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information

bull v

Activity 3

First think yourself (1 min) Then discuss with neighbor (2

min)

to 1 Identify possible approaches to

ensure ethical conduct

Points to discuss

Establishing culture Rules code act Use of protective mechanisms

etc

bull 6) Thou shaft not use or copy software for which you have not paid

t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^

jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))

fwltylhm sectM consideration and respect bull - S c ^

Establishing a culture of legal and ethical data stewardship

- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws

- Steps to consider include -bull Develop an organization-wide policy for legal

and ethical behavior bull Professional organizations and codes of ethics

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

As a professional with responsibilities to employer clients

Managerleader with responsibilities to the subordinates

Responsibility to fellow citizens as a private citizen

Responsibility to Individual Persons

bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society

bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information

bull v

Activity 3

First think yourself (1 min) Then discuss with neighbor (2

min)

to 1 Identify possible approaches to

ensure ethical conduct

Points to discuss

Establishing culture Rules code act Use of protective mechanisms

etc

bull 6) Thou shaft not use or copy software for which you have not paid

t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^

jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))

fwltylhm sectM consideration and respect bull - S c ^

Establishing a culture of legal and ethical data stewardship

- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws

- Steps to consider include -bull Develop an organization-wide policy for legal

and ethical behavior bull Professional organizations and codes of ethics

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Responsibility to Individual Persons

bullstrive to make information available to individuals who need it bullstrive both to ensure accuracy and not to infringe upon privacy or confidentiality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society

bullserve the legitimate information needs of a large and complex society while at the same time being mindful of individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity for access to information

bull v

Activity 3

First think yourself (1 min) Then discuss with neighbor (2

min)

to 1 Identify possible approaches to

ensure ethical conduct

Points to discuss

Establishing culture Rules code act Use of protective mechanisms

etc

bull 6) Thou shaft not use or copy software for which you have not paid

t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^

jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))

fwltylhm sectM consideration and respect bull - S c ^

Establishing a culture of legal and ethical data stewardship

- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws

- Steps to consider include -bull Develop an organization-wide policy for legal

and ethical behavior bull Professional organizations and codes of ethics

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

bull v

Activity 3

First think yourself (1 min) Then discuss with neighbor (2

min)

to 1 Identify possible approaches to

ensure ethical conduct

Points to discuss

Establishing culture Rules code act Use of protective mechanisms

etc

bull 6) Thou shaft not use or copy software for which you have not paid

t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^

jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))

fwltylhm sectM consideration and respect bull - S c ^

Establishing a culture of legal and ethical data stewardship

- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws

- Steps to consider include -bull Develop an organization-wide policy for legal

and ethical behavior bull Professional organizations and codes of ethics

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Points to discuss

Establishing culture Rules code act Use of protective mechanisms

etc

bull 6) Thou shaft not use or copy software for which you have not paid

t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^

jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))

fwltylhm sectM consideration and respect bull - S c ^

Establishing a culture of legal and ethical data stewardship

- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws

- Steps to consider include -bull Develop an organization-wide policy for legal

and ethical behavior bull Professional organizations and codes of ethics

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

bull 6) Thou shaft not use or copy software for which you have not paid

t m 7)nJtou shaft hot use other peoples computer sect0ii-wsourees without authorisation r^ampM ^^fytffam shaft not appropriate p ^ amp 7 ^ ( ^ ^ y V J ^ ^

jJ^li P) Thou shaft thinhjdbout ifwsocidf consequences of I | the program you write ))

fwltylhm sectM consideration and respect bull - S c ^

Establishing a culture of legal and ethical data stewardship

- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws

- Steps to consider include -bull Develop an organization-wide policy for legal

and ethical behavior bull Professional organizations and codes of ethics

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Establishing a culture of legal and ethical data stewardship

- Senior managers such as board members presidents Chief Information Officers (ClOs) and data administrators are increasingly finding themselves liable for any violations of these laws

- Steps to consider include -bull Develop an organization-wide policy for legal

and ethical behavior bull Professional organizations and codes of ethics

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Intellectual Property (IP)

bull Important that data and database administrators as well as business analysts and software developers recognize and understand the issues surrounding IP both to ensure that their ideas can be protected and to ensure that other peoples rights are not infringed

bull IP is the product of human creativity in the industrial scientific literary and artistic fields

Intellectual Property Rights (IPR)

bull Consideration must also be paid to data that an organization collects processes and possibly shares with its trading partners

In conjunction with senior management and legal counsel data administrators must define and enforce policies that govern when data can be shared and in what ways it can be used within the organization

Ethics and Practicing Engineering Engineering C o d e of Ethics

bull Some professional organizations have addressed the complexity of moral issues in their fields by developing codes of ethics

bull Professional codes of ethics consist primarily of principles of responsibility that delineate how to promote the public good

In summary

bull A professional from a legal standpoint - Has passed the state licensing requirements - Has earned the right to practice there

bull IT professionals have many different relationships - Each with its own set of ethical issues and

potential problems

bull Professional code of ethics - States the principles and core values

essential to the work of an occupational group

Furthr Read ings

bull The Cambridge Handbook of Information and Computer Ethics Edited by Luciano Floridi

bull Manfred Kochen Ethics and Information Science JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE 383)206-210 1987

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

The United Kingdoms Data Protection Act of 1998

bull Presents eight data protection principles -

j r raquo laquo u M i | i i i i x i r i i w m w i i M lt A i i H i k gt k i i i b l H | l l l H B a H B I U r H p u T gt

Ethics -Principles in medicine

1 Autonomy 2 Beneficence 3 N on-Maleficence 4 Justice 5 Truth telling 6 Confidentiality 7 Preservation of Life

Ethics -Principles in medicine Respect for autonomy respecting the decision-making capacities of autonomous persons enabling individuals to make reasoned informed choices

Beneficence this considers the balancing of benefits of treatment against the risks and costs the healthcare professional should act in a way that benefits the patient

Non maleficence avoiding the causation of harm the healthcare professional should not harm the patient All treatment involves some harm even if minimal but the harm should not be disproportionate to the benefits of treatment

Justice distributing benefits risks and costs fairly the notion that patients in similar positions should be treated in a similar manner

A C o d e of Ethics for Information S c i e n t i s t s

mdash Buttelai ol Hie Amancan Society lot Information Scmnca I AugustSeptember 1990) 25

Responsibility to Individual Persons I n f o r m a t i o n p r o f e s s i o n a l s s t i o u l d

bullstrive to make information available to Individuals who need ii bullstrive both to ensure accuracy and not to infringe upon privacy or conndenliality in providing information about individuals bullprotect each information users and providers right to privacy and confidentiality bullrespect an information providers proprietary rights

Responsibility to Society I n l o r m a t u m p r o f e s s i o n a l s t h a t i M

bullserve the legitimate information needs of a large and complex society while at the same lime being mindful of Individuals rights bullresist efforts to censor publications bullplay active roles in educating society to understand and appreciate the importance of information promoting equal opportunity (or access to information

bull^Vhat is plagiarism o intentional bullbull lt --rvV o unintentionaj ](bull bull

bullHowto prevent wv^^-5v - o specific software

bull(egTernttin) -V- bull o Other methods proper citations)

bull Referencing software bull

Place of software in preventing plagiarism

Specific software r V - r S gt o Turnitin bull ^ ( - - - t r x ^ V l f

bull Other software use Referencing software)

o EndNote r- bull bullbull k bull o RefWorks Jampgt

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Key Divisions

Descriptive Morality - Refers to the actual beliefs customs principles and practices of people and cultures

Moral Philosophy (ethical theory) - refers to the systematic effort to understand moral concepts and justify moral principles and theories

Applied Ethics - deals with controversial subjects such a s abortion premarital sex capital punishment euthanasia and civil disobedience

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

E t h i c a l P r a c t i c e s f o r

F i e l d o f S c i e n c e amp T e c h n o l o g y

E t h i c s

a A set of principles of right conduct b The rules or standards governing the conduct of a person orthe members of a profession ex medical ethics

Mr Ranil Peris

Senior Lecturer

Dept of IT

University of Sri Jayewardenepura bullagfci

T h e W o r k o f l i b r a r i a n s -

n The work of librarians involves providing people with the information they need but of course the duties and responsibilities of librarians will be quite different in the different types of libraries which serve very different clients such as public academic or special libraries

^ P d b i - P r e s e n t - f u t u r e D Past- Printed Media is the key material and

form of information representation and face to face interactions with clients

D Present -Combination of printed and electronic materials and transforming from physical locations into the cyberspace

a Tomorrow -

8lgfii

I n f o r m a t i o n T e c h n o l o g y ( I T ) I n f o r m a t i o n T e c h n o l o g y ( I T )

D Information technology (IT) is the acquisition processing storage and dissemination of vocal pictorial textual and numerical information by a microelectronics-based combination of computing and telecommunications

deg The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review

0 A term that encompasses ail forms of technology used to create store exchange and utilize information in its various forms including business data conversations stilt images motion pictures and multimedia presentations

(httpwwwentrepreneurcomencyctopediater m82268html)

BI911

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

deg In a traditional sense a library is a large collection of books and can refer to the place in which the collection is housed

deg Today the term can refer to any collection including digital sources resources and services The collections can be of print audio and visual materials in numerous formats including maps prints documents microform (microfilmmicrofiche) CDs

y i 9hcassettes videotapes DVDs video games 7 65 $111

E t h i c a l P r a c t i c e T o d a y C o r p o r a t e S o c i a l R e s p o n s i b i l i t y ^ T h e o r i e s ^ bull -y- ~gt v y bull bull

D With the rise of modern technology the logistics of the workplace changed forever New rules are needed to govern behavior and to develop procedures for librarians on the frontlines As Hans Jonas states in The Imperative of Responsibility modern technology has introduced actions of such novel scale objects and consequences that the framework of former ethics can no longer

n9hcontain them (Jonas 198434)

n S t o c k h o l d e r T h e o r y bull Managers are agents of the stockholders Their only ethical responsibility is to increase

the profits of the business without violating the law or engaging in fraudulent practices

n Social Contract Theory bull Companies have ethical responsibilities to all members of

society who allow corporations to exist

T h r e e B i g C h a n g e s The E n v i r o n m e n t w ^ ^ v v transition from paper to electronic media

As we move towards the millennium library and information professionals are facing at least three major paradigm shifts

n The first shift is the transition from paper to electronic media as the dominant form of information storage and retrieval Linked to this transition is the convergence of previously separate media such as text graphics and sound into multimedia resources

1

81911 81911

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

The Environment increasing demand for accountability D The second shift relates to the increasing

demand for accountability including a focus on customers performance measurement bench marking and continuous improvement All of this is taking place in an era when the financial resources available for providing library and information services are shrinking

t h e E nvi ro n m e^t^^Y^^f^fS^ new forms of workdraahizaiioh D The third shift comes from new forms of work

organization such as end-user computing work teams management delivering job sharing telework outsourcing downsizing and re-engineering

D (httpwwwslaorgcontentSLAprofessiona lmeaningcompetencycfm)

Ethical Behaviors Is your 80 gigabyte hard drive full

bull Music and videos bull That sure is a great music where did you get it

bull Downloading of music from the web bull Have you given a friend a copy of your Microsoft Project

software bull Software Piracy

bull Did you read the confidential company file that was accidentally attached to your email bull Computer abuse

bull Did you gain access to the network and invade other workers emails and files bull Computer abuse

You formatted your hard drive prior to leaving your company because you were angry about leaving

W raquo u Destructionofproperty 1 5

Challenges Code of Ethics

n No Form of licensing for computer professionals bull Results in no real way to enforce ethical standards within the

computing field bull There is movement within the industry to create a licensing

process but there are many issues to be resolved - W h a t w i l l b e i n c l u d e d o n t h e e x a m

bull H o w o f t e n w i l l a n I T p r o f e s s i o n a l b e r e q u i r e d t o r e n e w t h e l i c e n s e

D Developed by several organizations bull Adoption bull Implementation bull Monitoring bull Example httpwwwacmorgconstitutioncodehtml

Dimensions pf ethical practice

L~ P l a n n i n g S t a g e 0 C o m p e t e n c y in the field of t e c h n o l o g y

bull Objec t ive ly identify requ irement s t o improve r i D e v e l o p i n g s t a g e

bull You should s u p p o r t t o t h e d e v e l o p e r s 0 Act ive part ic ipat ion

J O p e r a t i o n a l S t a g e

bull Concern of security and privacy of r e c o u r s e s

Planning Stage v ^r^ Ji Competency in the field of technology

n Information providers should be aware of the new form information technology resources

n From printed papers to 3D videos D Virtual Libraries D Trends in information technology

1 17

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

C aP I a n n i n g St age 4 ^ bull bullbullbullbullvvj

CoHpefe^ technology V

deg Think of the Virtual universities and their libraries

a How are going to serve forthe virtual students

a Is it possible to say come and use our physical library

D Cloud computing a Freeware (open source) vs Commercial

software

a 3 9 u

n Management or other subjects are getting help from information systems

D Concern of the organizational objectives deg Constructive feedback forthe planning team

8 1 9 n

A practical requirement Principles of Technology Ethics

0 if a l e c t u r e r w a n t t o g e t d e t a i l s o f u s a g e o f

t h e l i b r a r y r e s o u r c e s b y t h e s t u d e n t s a C a n y o u s u p p o r t f o r i t D If n o w h y

bull So lut ions

P r o b l e m in our main s y s t e m s are we are using c o m p u t e r s a s bas ic s t a n d a l o n e too l s not a s s y s t e m s t o g e t h e r

8 1 9 1 1 1

a Proportionality The good achieved by the technology must outweigh the

harm or risk there must be no alternative that achieves the same or comparable benefits with less harm or risk

D Informed Consent bull Those affected by the technology should understand and

accept the risks

8 1 9 u u

Principlesof Technology Ethics Developing stage

u J u s t i c e bull The benefits and burdens of the technology should be

distributed fairly bull Those who benefit should bear their fair share

of the risks and those who do not benefit should not suffer a significant increase in risk

D Minimized Risk bull Even if judged acceptable by the other three guidelines

the technology must be implemented so as to avoid all unnecessary risk

n Y o u s h o u l d s u p p o r t t o t h e d e v e l o p e r s

D e v e l o p m e n t is pure technical p r o c e s s

bull Deve lopers should re spons ib l e or fai lures

We are only u s e r s

T h e s e ideas a r e total ly wrong

bull Although It is not a legal m a t t e r

It is an Ethical pract ice in m o d e r n o r g a n i z a t i o n s

8 1 9 u 1 3 B19n

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Developing stage OperationalStage r

Active part ic ipat ion bull Supporting for clarification bull Involve in testing bull Constructive criticism bull New ideas

bull Concern of securi ty of r e c o u r s e s

bull Modern IT h a s c h a n g e d the env i ronment f rom p a p e r b a s e d s y s t e m s t o virtual l ibraries

bull Internet a n d other c o m p u t e r network a r e vulnerable

- It is your responsibi l i ty t o pro tec t r e s o u r c e s

BJigii

Computer Crime Cyberscams and Cybercriminals

D C o m p u t e r cr ime includes Unauthorized use access modification or destruction of

hardware software data or network resources bull The unauthorized release of information The unauthorized copying of software Denying an end user access to hisher own hardware

software data or network resources bull Using or conspiring to use computer or network resources

illegally to obtain information or tangible property

deg Cyber s c a m s a r e t o d a y s f a s t e s t - g r o w i n g criminal niche 87 percent of companies surveyed reported

a security incident bull The US FederalTrade Commission says

identity theft is its top complaint bull eBay has 60 people combating fraud

Microsoft has 65 bull Stolen credit card account numbers are

regularly sold online

Hacking Common Hacking Tactics a Hacking is

bull The obsessive use of computers bull The unauthorized access and use of networked computer

systems deg Electronic Breaking and Entering

bull Hacking into a computer system and reading flies but neither stealing nor damaging anything

a Cracker bull A malicious or criminal hacker who maintains knowledge

of the vulnerabilities found for private advantage

deg Denial of Service D Scans D Sniffer deg Spoofing a Trojan House D Back Doors D Malicious Applets D War Dialing D Logic Bombs

8 degpoundu f fe r Overflow

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Cyber Theft x--rx^--y^[

Unauthorized Use a t W o r k ^ ^ ^ i D Many computer crimes involve the theft of money 0 The majority are inside jobs that involve unauthorized

network entry and alternation of computer databases to cover the tracks of the employees involved

deg Many attacks occur through the Internet deg Most companies dont reveal that they have

been targets or victims of cybercrime

D Unauthorized use of c o m p u t e r s y s t e m s and networks is time and resource theft Doing private consulting Doing personal finances bull Playing video games Unauthorized use of the Internet or company networks

D Sniffers bull Used to monitor network traffic or capacity bull Find evidence of improper use

8191 81911

Internet Abuses in the Workplace

bull General email abuses bull Unauthorized usage and access bull Copyright infringementplagiarism bull Newsgroup postings bull Transmission of confidential data bull Pornography Hacking bull Non-work-related downloadupload bull Leisure use of the Internet bull Use of external ISPs bull Moonlighting

Theft of Intellectual Property

Intellectual Property bull Copyrighted material Includes such things as music videos images articles books and

software Copyright Infringement is Illegal bull Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

a 3 9 u 81911

Viruses and Worms

A virus is a program that cannot work without being inserted into another program A worm can run unaided These programs copy annoying or destructive routines into networked computers Copy routines spread the virus Commonly transmitted through bull The internet and online services bull Email and file attachments bull Disks from contaminated computers Shareware

D Violation of Privacy bull Accessing individuals private email conversations and

computer records bull Collecting and sharing information about individuals

gained from their visits to Internet websites

D C o m p u t e r Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places

81911 s19u

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Privacy Issues Security Management D C o m p u t e r Matching

Using customer information gained from many sources to market additional business services

a Unauthor i zed A c c e s s of Persona Files

bull Collecting telephone numbers email addresses credit card numbers and other information to build customer profiles

a The goal of security management is the accuracy integrity and safety of all information system processes and resources

PrfvWe bull B Saamty PrfvWe bull m B Saamty

81911

^Protecting Your Privacy on the Internet

96 Characters - bull bull -gtgt[bull bull - bull 0ii34567S9Aa6bCcDdEeFiGgHh1IJjKkUMmrJn -5Pirraquo4p6-()lt=gtreg[]V[|l-

n There are multiple ways to protect your privacy

Encrypt email

bull Send newsgroup postings through anonymous remailers

Ask your ISP not to sell your name and information to mailing list providers and other marketers

bull Dont reveal personal data and interests on online service and website user profiles

Password Class of Attack Length 2 3 A 5 6 7

Combinati ons 9216 884736 85 Million 8 Billion

Class A Class B Instant Instant 88V Sets 9 Sees iW Hours 14 Mins 9V2 Days 22V Hrs

782 Billion 2V2 Years 90 Days 75Trillion 238Years nYears 72 22875

Class C Class D Class E Class F Instant Instant

Mins 2 W Hours 9 Days 2 W Years

Instant Instant 8V7 Sees 13V2 Mins 22 Hours 87 Days

Quadrillion Years 2287Years 22gYears ^Years

Instant Instant Instant 1W Mins 2 Hours 8Vi Days 2 W Years

Instant Instant Instant 8 Sees 13 Mins 20 Hours 83M Days

a191

10 Characters 0123456789 Solution Password Class of

Attack Length Combinatio

ns Class A Class B ClassC bullassD Class E Class F 2 100 Instant Instant Instant Instant Instant Instant 3 1000 Instant Instant Instant Instant Instant Instant u 10000 Instant Instant Instant Instant Instant Instant S 100000 10 Sees Instant Instant instant Instant Instant 6 1 Million IA

Mins 10 Seconds Instant Instant Instant Instant

7 10 Million 17 Mins Vi Mins iViMins Instant Instant Instant 8 100 Million ]U

Hours 17 Mins lWMins 10 Seconds instant Instant

g 1000 Million a1911

28 Hours iK Hours 17 Mins iW Mins 10

Seconds Instant

D A s y m m e t r i c e n c r y p t i o n 0 Public key and Private key c o m b i n a t i o n 0 Digital s i g n a t u r e s

G191U

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

PublicPrivate Key Encryption r u raquo U n d o i lt G z raquo i t o

laquo n r o w toa mwcaooti^

pound f t W1fgt jtujr bullncrypoon u l l t w i

u ogtUuraquo a ta c c n t w m f l r

n a r d m o o n m i laquo a 1 wtttt O i y t laquo laquo H 4 ( 4 U p H v l tA f

copy S i

rrmC^ga

jnternetwprke^ Defenses - ^ - - v - v K v ^ ^

D Firewalls A gatekeeper system that protects a companys intranets

and other computer networks from intrusion Provides a filter and safe transfer point for

access tofrom the Internet and other networks bull Important for individuals who connect to the Internet with

DSL or cable modems bull Can deter hacking but cannot prevent it

Internet and Intranet Firewalls

L laquo H i r i laquo w i t t i t n i p laquo i i

bull

Defending Against Denial of Service - f

n A t Z o m b i e M a c h i n e s S e t and enforce security policies S c a n for vulnerabil it ies

n At the ISP bull Monitor and block traffic sp ikes

D A t t h e V i c t i m s W e b s i t e C r e a t e b a c k u p servers and network c o n n e c t i o n s

8191 81911

Internetworked Security Defenses

a Email Monitoring Use of content monitoring software that scans

for troublesome words that might compromise corporate security

D Virus D e f e n s e s Centralize the updating and distribution of antivirus

software bull Use a security suite that integrates virus protection with

firewalls Web security and content blocking features

Other Security Measures

D Security C o d e s Multilevel password system Encrypted passwords bull Smart cards with microprocessors

D Backup Files bull Duplicate files of data or programs

D Security Monitors Monitor the use of computers and networks bull Protects them from unauthorized use fraud

and destruction

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Other Security Measures

a B i o m e t r i c s

Computer devices measure physical traits that make each individual unique bull Voice recognition fingerprints retina scan

deg C o m p u t e r Failure Controls

Prevents computer failures or minimizes its effects

bull Preventive maintenance

bull Arrange backups with a disaster recovery organization

deg In the event of a s y s t e m failure f a u l t - t o l e r a n t

s y s t e m s have r e d u n d a n t p r o c e s s o r s per iphera l s

and so f tware tha t provide

bull Fail-over capability shifts to back up components

bull Fail-save capability the system continues

to operate at the same level

Fail-soft capability the system continues to operate at a reduced but acceptable level

8aghi

Other Security Measures D A d i s a s t e r r e c o v e r y p lan conta ins formal ized

p r o c e d u r e s t o follow in the event of a d i s a s t e r Which employees will participate What their duties will be What hardware software and facilities

will be used bull Priority of applications that will be processed bull Use of alternative facilities bull Offsite storage of databases

839(11

Information System Cbntrols J D M e t h o d s and dev ices tha t a t t e m p t t o e n s u r e the accuracy

validity and propriety of information s y s t e m activities

eta

I n n r C i M

Auditing IT Security

D IT Security Audits bull P e r f o r m e d by internal or external aud i tors

Review and evaluat ion of securi ty m e a s u r e s

a n d m a n a g e m e n t policies

bull Goal is t o e n s u r e t h a t t h a t proper and a d e q u a t e m e a s u r e s and pol ic ies a r e in place

Protecting Yourself from Cybercrime I

- Security Management fur Internet Users-1 Use antivirus and fowail software and update k often to keep (icrtrucmt programs off your computer

2 DonraUoir online merchant to MOie jwr credit card information for future purchaser

3 Use a hard-to-ptCM passtrord that contains raquo mix of numbers ttvl Icttert and change k frequently

4 Use different pa worrfs for different nxbsiic applications 10 keep fuckers guessing

5 Install aU upetatingriystem patches ami upgrades

euro Use the must up-to-lttlaquote version of vuur Weh browser i-tnail software ami other programs

7 Scnti credit can mnnhcrs only to secure bullrites look for a padlock or key icon at die bottom of the browser

8 Uve amp security program diAt gives you control ovtr cookies that Send irtfor-ntdtkm back to websites

9 Install firewall software to screen traffic if you use DSL or 3 caltlr nuwlem to connect to the Net

10 Dont open e-mail attachments tmlesi yau biolaquo the gtource of die incoming row age ^

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Legislation having art im bull51CTdeve16bmeht-in Sri Lanka

E r g q r i b m j ^

3 EVIDENCE (SPECIAL PROVISIONS) ACT NO34 OF 1995 INTELLECTUAL PROPERTY ACT NO 36 OF 2003 (SECTIONS

RELATED TOCOPYRIGHT) - INFORMATION AND COMMUNICATION TECHNOLOGY ACT

NO27 OF 2003

PAYMENT AND SETTLEMENT SYSTEMS ACT NO 28 OF 2005

r ELECTRONIC TRANSACTIONS ACT NO 1 9 OF 2006

PAYMENT DEVICES FRAUDS ACT NO-30 OF 2006

y COMPUTER CRIMES ACT NO 24 OF 2007

D D E S I G N I N G HEALTHY WORK E N V I R O N M E N T S

bull SAFE COMFORTABLE AND PLEASANT FOR PEOPLE

TO WORK IN

INCREASES EMPLOYEE MORALE AND PRODUCTIVITY

ALSO CALLED human factors engineering

Biomechanics Biomechanics

IS YOUR SO GIGABYTE HARD DRIVE FULL - MUSK AND VIDEOS

THAT SURE IS A GREAT MUSIC WHERE DID YOU GET IT DOWNLOADING OF MUSIC FROM THE WEB HAVE YOU GIVEN A FRIEND A COPY OF YOUR MICROSOFT PROJECT SOFTWARE bull SOFTWARE PIRACY DID YOU READ THE CONFIDENTIAL COMPANY FILE THAT WAS ACCIDENTALLY ATTACHED TO YOUR EMAIL bull COMPUTER ABUSE DID YOU GAIN ACCESS TO THE NETWORK AND INVADE OTHER WORKERS EMAILS AND FLICS ~ COMPUTER ABUSE YOU FORMATTED YOUR HARD DRIVE PRIOR TO LEAVING YOTJR COMPANY BECAUSE YOU WERE ANGRY ABOUT LEAVING bull DESLRUC T ION OF PROPE RTY

AJGRII S B

Information Technology Ethics Useful web links

DEAL WITH PROPER USE OF TECHNOLOGY DEVICES DATA SERVICES AND SOFTWARE PRIOR TO TECHNOLOGY IT MAY HAVE B E E N EASIER TO KNOW WHETHER THE ACTIVITY WAS RIGHT OR WRONG VIRTUAL WORLD JUDGING BEHAVIORS IS NO LONGER STRAIGHT FORWARD bull ETHICAL OR UNETHICAL

A STUDENT DOWRIOADSA SEXUALLY EXPLICIT PICTURE FROM THE INTERNET ON A COMPUTER N THE SCHOOL LIBRARY OTHER STUDENTS ARE ABLE TO WE THE PECTURE

A STUDENT FINDS THE TEACHERS PASSWORD TO THE SCHOOLS INFORMATION SYSTEM AND USES IT TO CHANGE HIT GRADES AND VI THE GRADES OF OTHER STUDENTS

- A STUDENT USES THE COPY AND PASTE COMMAND TO PLACE LARGE PANS OF AN EIECLRONIC ARTICLE INTO AN ASSIGNED PAPER SHE TURNS THE PAPER IN AS HER OWN WONR

bull A ITUDENT MAKES A COPY OF A SOFTWARE PROGRAM BORROWED FROM ANOTHER GUDEM LO USE ON HIS COMPUTER AT HOME

bull AILUDEM DOWRJC^SAGRAPHICFILEFRCENTHEWTBTOR^ACECNHISO^WRTIP) HOWEVER HE DOES PROVIDE A LgtR TO CHE AUTHORS SUE

- A STUDENT USES ANOTHER STUDENTS PROJECT WEBSITE AS A GUIDELINE - A STUDENT COPIESA PREVIOUS PUBLISHED STORY IN HII OWN HANDWRITING AND SUBMITS IT AT HIS OWN

Q http wwwmoyakcompapersdigital-future-libraries

s httpwwwacmorgconstitutioncodehtml a httpwwwepolicyinstitutecom Q httppressamanetorg

Thank you

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Copyright and its implications to libraries and information services in Sri Lanka

Cliit to edit Master subtitle style GMPGallaba Attorney at Law Acting Librarian University of Sri Jayewardenepura Nugegoda Sri Lanka

What is copyright

Intellectual Property rights bull Designs right bull Patent right bull Trademarks right bull Database right bull Copyright

Copyright exists to

bull Protect works of authors

bull protect Works of performers

For a specified period of t ime

Copyright is a property right (economic right) bull may be traded

bull may b e b o u g h t

bull may be sold

bull may be ass igned

bull may be licensed

for a specified period

Owner has opportunity to profit

bull from selling bull from assigning bull from licensing

Economic rights

bull Reproduct ion right

bull Publishing right

bull Rental right

bull Lending right

bull Performing right

bull C o m m u n i c a t e to the public-right

bull Adaptat ion right

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Moral rights Copyright protection

bull Right of paternity bull No legal requirement to register bull Right of integrity bull No legal requirement of symbol copy bull False attribution

bull Right to disclosure

HIMn bdquo

Protected works

bull Original literary

bull Dramatic

bull Musical

bull Artistic

bull Sound recording

bull Fi lmsv ideo bull Broadcasts

bull Typographic output bull Electronic format

bull f e t t e r s e-mail messages

Not protected

bull Bibliographic c i tat ions

bull Facts

bull Headlines

bull Expired works

Owners of copyright

bull First owner- literary Dramatic Musical Artistic author

bull S o u n d recording - producer bull Film - d i r e c t o r producer

bull Typographical arrangement - publ isher bull Photograph - photographer

bull Government publ icat ion- government

bull Employment contract - the authority

Length of the copyright

bull Unknown authorship bull Joint authorship

bull Non EEA works

bull Unpublished works

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Copyright encourage creativity

bull Potential creators must be able to access the works of others without fear of prosecution in order to develop new ideas

bull Research and educat ion are valid reasons for copying

bull Exceptions and l imitations

Statutory permission to copy (copyright balance) Balance between

bull Legit imate interests of creation of works

bull Needs of users to have access to such works

Permittecha ctsstatxrtoi provisions

Fair dealing fair use bull Copying for educat ion purposes

bull Copying by l ibrarians a n d archivists

bull Performing rights

bull Temporary copies

bull For private study

bull For research (non commercia l purposes )

bull For criticism review

bull For news report ing

Copying by librarians and archivists

Library regulations

Library privileges -

bull Prescribed libraries bull Profit basis bull Declaration forms bull Charge for copying Copying services bull Copy for slock bull Copy for replacementpreservation bull Copying unpublished works

Thank you

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 1 of4

bull A M I DQDE3H As of 22 April 2 0 0 9 IFLA has a totally redesigned

new website This old website and all of its content will stay on as archive -h t t p a r c h i v e i f l a o r g

Sri Lanka Library Association

Code of Professional Conduct and Ethics

The Code of Conduct and Ethics was adopted by Sri Lanka Library Association (SLLA) a few years back but 199798 SLAA Council felt that it has not been properly publicized promoted and officially implemented Hence a Committee was appointed to study the Code and if necessary recommend relevant changes On 6 December 1997 after lengthy discussion the revised Code was adopted and we proudly present it as a document which clearly and concisely portrays SLLAs professional Code of Conduct

I record my appreciation to the Committee members who contributed their professional Input and time to finalise the revised Code to be presented to the members by June 1998 I am also indebted to Sri Lanka Library Services Board for generously funding the major part of the printing costs

I hope the Code will promote the standing of our profession provide a clear message to the public about the work we are involved with and help to raise an awareness of what it means to be a library and information professional Please read it carefully adhere to it and keep it for reference

Adopted by the Council of Sri Lanka Library Association (SLLA) December 6 1997

Foreword

Harrison Perera President SLLA June 1998

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 2 of 4

Introduction

The Code of Professional Conduct and Ethics has been approved by the Council of the Sri Lanka Library Association (SLLA)

Librarians including Information Scientists are professionals (Librarians include Information Scientists wherever the word occurs) As members of a profession librarians have a duty to

bull observe the highest standard of conduct and integrity bull act honestly in performing professional services bull carry out professional services in accordance with professional standards and bull refrain from any conduct which might bring discredit to the profession

Members of the Sri Lanka Library Association are required to observe the principles laid down in the Code of Professional Conduct and Ethics as a condition of membership and also to retain the membership To do otherwise is for members to lay themselves open to complaints and consideration of the complaints under the relevant rules and regulations of the Disciplinary Committee established by the Council under the Rules and Regulations

Members must report the facts to the Secretary of the Sri Lanka Library Association if convicted of any offence involving dishonesty or one which brings the profession into disrepute

Members of the Association must conduct themselves in such a way that their conduct would not be reasonably regarded by their professional colleagues within the field of librarianship as serious professional misconduct It is by this overall test that their conduct will be judged

The principles of conduct towards which Librarians should strive have been embodied in the following broad categories

bull Responsibility to the employing organization community and users bull Responsibility to the profession and practices bull Responsibility to the professional body (SLLA)

Responsibility to the Community and Users

1 Shall give highest priority to users when acting in the capacity of a Librarian 2 Shall render professional services for the benefit of the community and shall seek

opportunities to be of constructive service 3 Shall have an obligation towards facilitating the free flow of information and ideas and to

protect and promote the rights of every individual to have free and equal access to sources of information without discrimination and within the limits of the law

4 Shall encourage the free flow of information and protect against the unlawful withholding of information and the imposition of censorship

5 Shall provide best possible service to all persons without discrimination 6 Shall endeavour to keep abreast of the latest developments in Library and Information

Science in order to provide the best possible service

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 3 of 4

7 Shall always be courteous in ones relationships with others and be careful in the choice of words and action so that one may not be interpreted as being derogatory or offensive to others

8 Shall preserve ones objectivity and judgement and shall not be influenced by ones self-interest or other factors always maintaining the highest standards of personal integrity

Responsibilities to the Profession and Practices

Members shall

9 respect fellow members of the profession 10 guide and assist junior members and students of the profession to develop themselves 11 encourage younger professionals by exemplary service and conduct 12 not seek undue publicity to show that one is superior to fellow professionals or attempt to

injure maliciously or falsely the professional reputation practice or employment of other professionals

13 refrain from undertaking services which fall outside the areas of ones competence and shall refer the persons seeking such services to another competent professional

14 endeavour to keep abreast of the advancement of knowledge and skills and participate in all activities which contribute to the ongoing development of professionalism and then to national development

15 build his reputation on merit and shall not compete unfairly 16 take every opportunity to enhance the image status and reputation of the profession with

the clients and the general public 17 not attempt to supplant another professional by unfair means and shall not use the

advantage of a privileged position to compete unfairly with other professionals 18 give proper credit for professional work to those to whom credit is due and acknowledge

the contributions of others

Responsibilities to the Professional Body - Sri Lanka Library Association

19 be bound by the rules and regulations of the Sri Lanka Library Association 20 cooperate in extending developing and encouraging the effectiveness of the Association

by interchanging information and experiences with other professionals 21 interact with and encourage ones fellow members for the advancement and success of

the Association 22 (a) respond to any requirements from the Disciplinary Committee for comments or

information on a complaint

(b) attend the Committee proceedings when required to do so with such representations as is provided for in the Rules and Regulations

(c) attend upon a nominated person for the purposes of receiving guidance as to future conduct if required to do so

23 In all cases where Members of the Association are in doubt as to the proper interpretation of the Code they are requested to seek advice from the General Secretary of the Association

httparchiveiflaorgfaifeethicssllacodehtm 82520 ll

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011

Sri Lanka Library Association Code of Professional Conduct and Ethics Page 4 of 4

Guidelines

1 The purpose of this Code of Professional Conduct and Ethics is to make clear both to professionals and the public alike the standards of professional conduct required of members of the Sri Lanka Library Association andor indicate what matters may be regarded (by the Disciplinary Committee) as being contrary to aims objectives and interest of the Association andor contrary to the profession of librarianship This Code shall apply to all individual members of the Sri Lanka Library Association

2 Conviction for any offence which could bring the profession into disrepute is to be notified to the Association This would particularly apply to offences which directly relate to the Librarians discharge of his or her duties Although minor offences are not normally notifiable theft fraud and offences involving deceit certainly are

3 In all professional considerations the interests of the users with their prescribed or legitimate requirements take precedence over all other interests However circumstances may arise when the public interests or the reputation of the profession itself may be at variance with the narrow interests of an employer If it is found to be impossible to reconcile such differences then the public interests and the maintenance of professional standards must be the primary consideration

4 SLLA recognises that different considerations will apply in particular circumstances such as when members are working in an environment where the public is excluded and when an element of confidentiality will apply

5 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics including the requirements relating to competence may if proved before the Disciplinary Committee be regarded by it as serious professional misconduct and if so shall render the member concerned liable to be expelled or suspended (either unconditionally or subject to conditions) to be ordered to repay or forego fees and expenses as appropriate or to be reprimanded andor to be ordered to pay the costs of the hearing

6 Failure to comply with the requirements set out in the Code of Professional Conduct and Ethics which in the opinion of the Disciplinary Committee falls short of serious professional misconduct may if proved render the member liable to be admonished or to be given appropriate guidance as to his or her future conduct

7 In cases of doubt regarding professional conduct clarification and directions may be obtained from the Disciplinary Committee of the Council of the Sri Lanka Library Association

Sri Lanka Library Association

Main Page T o t op

httparchiveiflaorgfaifeethicssllacodehtm 8252011


Recommended