60 likes | 125 Views
Hacking IT systems to become a criminal offense. By: Gregory Swinson ACM TechNews : (3/27/12)
E N D
Hacking IT systems to become a criminal offense By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr. 2012. <http://www.europarl.europa.eu/news/sl/pressroom/content/20120326IPR41843/html/Hacking-IT-systems-to-become-a-criminal-offence>.
Summary • Cyber attacks on IT systems would become a criminal offence punishable by at least two years in prison throughout the EU. • Possessing or distributing hacking software and tools would also be an offence, and companies would be liable for cyber attacks committed for their benefit. • IP Spoofing, Cyber-Attack tools, Liability of Legal Persons
Ethical ecision-making process • 1. Ethical Issue - Is it right to make Hacking IT systems a criminal offense 2. Stakeholders in case and what they want • Government wants to penalize hackers with up to two years in prison • Hackers believe this is not a criminal act • Companies that were attacked want this to be stopped. 3. Three Possible Solutions - Hacking is a crime punishable up to 2 years - this is the one I would choose • They do nothing about it and let it happen • Compromise, make it less of a crime
Ethical Decision Making cont. 4. Evaluate Solution -Cyber attacks should be a criminal offense. This can hurt many people and ruin lives. 5. Nature of Solution • This solution is for the safety of the people and Government. This could be made a universal law. 6.Would the majority agree with the solution • Yes for the majority this would be poplular solutions. • Some businesses may not like it because they were gaining information based of these attacks.
Ethical Decision Making cont. 7. Solution Commitment - I would commit to this solution because of how harmful this can be. This solution is chosen for privacy of the people.. 8. Philosophy of Decision - I feel this relates to all philosophical views. Although it could lean a bit more towards realism.
Code of Ethics • Hackers Violate • ACM 1.2: Avoid harm to others • ACM 1.3: Be honest and trustworthy • ACM 1.7: Respect the privacy of others • ACM 2.8: Access computing and communication resources only when authorized to do so. • ACM 3.3: Acknowledge and support proper and authorized uses of an organizations computing and communication resources.