Wednesday, January 25, 2012

Code of Ethics for IT Professionals:



A professional member of the computer Society of India (CSI) shall:

.     Organize the resources available to him and optimize these in attending the objectives of his organization,

.  Use the code of practice conveyed by the CSI from time to time in carrying out his task,

.  not misuse his authority or office for personal gains.

.  Comply with the Indian lawyer relating to the management of his organization particularly with regard to privacy and piracy, and operate within the spirit of these laws.

.  Conduct his affairs so as to uphold project and further the image and reputation of the CSI.

.  Maintain integrity in research and publication.

Codes of Practice

As regard ORGANIZATION an IT professional should:

. Act with integrity in carrying out the lawful policy and instructions of his organization and uphold its image and reputation,

. Plan, establish and review objectives and tasks for himself and his subordinates which are compatible with the code of practice of other
Practice of other professionals in enterprise, and direct all available effort towards the success of the enterprises rather than of him,

. Fully respect the confidentiality of information which comes to him in the course of his duities, and not use confidential information for personal
Information for personal gain or in a manner which may be detrimental to his organization or his clients,

. not snoop around in other people's computer files,

. in his contacts and dealings with other people, demonstrate his personal integrity and humanity and when called to give an opinion in his professional
Capacity, shall, to the best of his ability, give an opinion that is objective and reliable.

As regards the EMPLOYEES, an IT professional should:

.set an example to his subordinates through his own work and performance, through his leadership and by taking account of the needs and problems of his subordinates.

. develop people under him to become qualified for higher duties,

. pay proper regard to the safety and well-being of the personal for whom he is responsible,

. share his experience with fellow professionals.

As regards the CLIENTS, an IT professional should:

. ensure that the terms of all contracts and terms of business be stated clearly and ambiguously and honored,

. in no circumstance supply inherently unsafe goods or services,

. not use the computer to harm other people or to bear false witness,

. be objective and impartial when giving independent advice.

As regards COMMUNITY, an IT professional should:

. make a most effective us of all natural resources employed,

. be ready to give professional assistance in community affairs,

. not appropriate other people's intellectual output,

. always use a computer in ways that insure consideration and respect for fellow humans.



Source: Computer Society of India(C.S.I)

Thursday, January 19, 2012

Computer Hacking!!!!!!!

The term " Computer Hacking" traditionally describes the penetration of sabotage or espionage but for the pleasure of the overcoming the technical security measures.In practice.this kind offense can be frequently found.As far as the damage of these cases is concerned, a differentiation is essential:In numerous cases,the penetrated computer user is not actually harmed,but only endangered.However, in these case,too,the " formal sphere of secrecy" or the integrity of the concerned computer systems is violated.Contrary to this,considerable damages occur in other cases especially in other cases especially when the perpetrators later use their knowledge for committing espionage,sabotage or fraud.


Due to recent developments in the field of telephone and telecommunications technology( such as ISDN hacking does not only affects classic computer system but also increasing telephone lines, answer phones and voices-mail-system."Telephone hackers " dial themselves in to the telephone companies local phone exchanges and are thus able to eavesdrop on the digitally led conversations in a respective part of town.In US,besides other confidential information,especially the numbers of telephone access cards (calling cards) are eavesdropped on,which are then resold.