Wednesday, 17 August 2016

MNC'S, ENVIRONMENT ETHICS, COMPUTER ETHICS, WEAPON ETHICS- PROFESSIONAL ETHICS AND HUMAN VALUES

GLOBALIZATION
Globalization means integration of countries through commerce, transfer of technology, and exchange of information and culture. In a way, it includes acting together and interacting economies through trade, investment, loan, development schemes and capital across countries. These involve flow of knowledge, science, technology, skills, culture, information, and entertainment, besides direct human resource, tele-work, and outsourcing. For the engineers, the issues such as multinational organizations, computer, internet functions, military development and environmental ethics have assumed greater importance for their very sustenance and progress.

MULTINATIONAL CORPORATIONS
Organizations who have established business in more than one country, are called multinational
corporation. The headquarters are in the home country and the business is extended in many host
countries. The Western organizations do business in less developing and under-developed countries to gain the advantage of inexpensive labor, availability of natural resources, conducive-tax atmosphere, and virgin market for the products.
At the same time, the developing countries are also benefited by fresh job opportunities, jobs with higher remuneration and challenges, transfer of technology, and several social benefits by the wealth developed. But this happens invariably with some social and cultural disturbance. Loss of jobs for the home country, and loss or exploitation of natural resources, political instability for the host countries are some of the threats of globalization.

1 International Human Rights
The MNCs have to follow minimal rights to smoothen the transactions when the engineers and employers of MNCs have to interact at official, social, economic and sometimes political levels. At international level, the organizations are expected to adopt the minimum levels of (a) values, such as mutual support, loyalty, and reciprocity, (b) the negative duty of refraining from harmful actions such as violence and fraud, and (c) basic fairness and practical justice in case of conflicts.

The ten international rights to be taken care of, in this context are:
1. Right of freedom of physical movement of people
2. Right of ownership of properties
3. Freedom from torture
4. Right to fair trial on the products
5. Freedom from discrimination on the basis of race or sex.
6. Physical security. Use of safety gadgets have to be supplied to the workers even if the laws of the host country do not suggest such measures.
7. Freedom of speech and forming association
8. Right to have a minimum education
9. Right to political participation
10. Right to live and exist (i.e., coexistence). The individual liberty and sanctity of the human life are to be respected by all societies.

2 Technology Transfer
It is a process of moving technology to a new setting and implementing it there. Technology includes hardware (machines and installations) and the techniques (technical, organizational, and managerial skills and procedures). It may mean moving the technology applications from laboratory to the field/factory or from one country to another. This transfer is affected by governments, organizations, universities, and MNCs.

3 Appropriate Technology
Identification, transfer, and implementation of most suitable technology for a set of new situations, is called appropriate technology. Technology includes both hardware (machines and installations) and software (technical, organizational and managerial skills and procedures). Factors such as economic, social, and engineering constraints are the causes for the modification of technology.
Depending on the availability of resources, physical conditions (such as temperature, humidity, salinity, geographical location, isolated land area, and availability of water), capital opportunity costs, and the human value system (social acceptability) which includes their traditions, beliefs, and religion, the appropriateness is to be determined.
For example, small farmers in our country prefer to own and use the power tillers, rather than the
high-powered tractors or sophisticated harvesting machines. On the other hand, the latest technological device, the cell phones and wireless local loop phones have found their way into remote villages and hamlets, than the landline telephone connections.
 The term appropriate is value based and it should ensure fulfillment of the human needs and protection of the environment.

4 How Appropriate is Aptech?
1. A case against the technology transfer is that the impact of borrowed or transferred technology
has been threatening the environment beyond its capacity and sustainable development of the host countries. Large plantations that orient their efforts to exports leave the small farmers out of jobs and at the mercy of the foreign country.
For example, genetically modified cotton have shown sufficient disturbance in Europe and Africa. This has made the European Union to oppose the entry of G.M. cotton into Europe.
2. The high technology has contributed to large-scale migration from villages to the cities where corporations are located, leading to the undesirable side-effects of overcrowding of cities, such as the scarcity of water, insanitation, poverty, and the increase in crimes.
3. The term ‘appropriate’ should emphasize the social acceptability and environmental protection
of the host countries, and this need to be addressed while transferring technology. Thus, we confirm the view that engineering is a continual social experimentation with nature.

5 MNCs and Morality
The economic and environmental conditions of the home and host countries may vary. But the multinational institutions have to adopt appropriate measures not to disturb or dislocate the social and living conditions and cultures of the home countries. A few principles are enlisted here:
1. MNC should respect the basic human rights of the people of the host countries.
2. The activities of the MNC should give economic and transfer technical benefits, and implement welfare measures of the workers of the host countries.
3. The business practices of the multinational organizations should improve and promote morally
justified institutions in the host countries.
4. The multinationals must respect the laws and political set up, besides cultures and promote cultures of the host countries.
5. The multinational organizations should provide a fair remuneration to the employees of the host countries. If the remuneration is high as that of home country, this may create tensions and if it is too low it will lead to exploitation.
6. Multinational institutions should provide necessary safety for the workers when they are engaged in hazardous activities and ‘informed consent’ should be obtained from them.
Adequate compensation should be paid to them for the additional risks undertaken.

Case Study: Bhopal Gas Tragedy
The Union Carbide had 51% and the Indian subsidiary UC India Ltd. had 49% of stock. In 1983, there were 14 plants in India manufacturing chemicals, pesticides, and other hazardous products. The Bhopal plant had a license to make Methyl isocyanate-based pesticides. In November 1984, they had decided to close down the plant. For quite some years before the production rate was going down.
The cumulative effects of the following factors caused the tragedy in Bhopal on December 3, 1984.
1. Maintenance was neglected and the trained maintenance personnel were reduced as economy
measure. Need for quick diagnosis aggravates the situation by causing considerable psychological stress on the plant personnel.
2. Training activities for the supervisory personnel were stopped. This led to inadequate training
of the personnel to handle emergencies.
3. Periodical Safety Inspection teams from U.S. which visited previously were also stopped.
From the initial U.S. Standards, the safety procedures were reduced to low level Indian standards. The procedures had been deteriorating at these sites for weeks or months, prior to the accident. There was clear lack of management systems and procedures to ensure safety.
4. Vital spares for equipments and machineries were not available
5. Absence of capital replacement led to the stagnant economy of the plant.
6. The high turnover of the experienced engineers and technicians, who were demoralized by the lack of development.
7. Lack of experienced personnel to operate and control the vital installations.
8. They have not conducted a thorough process hazards analysis that would have exposed the serious hazards which resulted in disaster later.
9. No emergency plan was put in practice, during the shut down and maintenance.
10. Above all, the commitment of top-level management to safety was lacking. They have been paying only lip service ( Oral words, no actions) to safety of people of the host country.

Technologically, the tragedy was caused by a series of events listed:
1. The safety manual of Union Carbide prescribed that the MIC tanks were to be filled only up
to 60% of the capacity. But the tanks were reported to have been filled up to 75%.
2. The safety policy prescribed that an empty tank should be available as a stand-bye in case of
emergency. But the emergency tank was also filled with to its full capacity (misappropriate technology).
 3. The storage tanks should be refrigerated to make the chemical less reactive. But here the refrigeration system was shut down as an economy measure. This raised the temperature of the gas stored.
4. The plant was shut down for maintenance two months earlier. The worker who cleaned the pipes and filters connected to the tanks and closed the valves, was not trained properly. He did not insert the safety disks to prevent any possible leakage of the gas. This led to the build up of temperature and pressure in the storage tanks.
5. When the gas started leaking out, the operators tried to use the vent gas-scrubber that was designed to reduce the exhausting gas. But that scrubber was also shut down.
6. There was a flare tower that was designed to burn-off the gas escaping from the scrubber. That was not also in working condition.
7. The workers finally tried to spray water up to 100 feet to quench the gas (which is water soluble). But the gas was escaping from the chimney of 120-feet high.
8. The workers were not trained on safety drills or emergency drills or any evacuation plans. The gas escaped into the air and spread over 40 sq. km. About 600 people died and left 7000 injured and the health of about 2 million people was affected adversely. Even after 22 years, influence of the Central Government and the courts, the compensation had not reached all the affected people.
6 Ethical Balance
There is a saying, “When in Rome do as Romans do”. Can this be applied in the case of MNCs?
This is called ethical relativism. The actions of corporation and individuals that are accepted by law, custom and other values of a society can be morally right in that society. It is morally false, if it is illogical. It means, the corporation (and the engineers) functioning in other countries must understand their law, customs, and beliefs and act in line with those prevailing in that country. This will lead to disaster if the country is a developing one where the safety standards are given a go-bye. Laws and conventions are not morally self-sustaining. In a overpopulated country, the loss of human lives may not physically affect them, but the tragedy cast shadow for over decades, as it happened in Bhopal in 1984. This will be criticized from the points of view of human rights, public welfare, and respect to people.

On the other hand, the organizations may practice laws of the home country, without adjustments
to the host culture. This stand is called ethical absolutism. This is again false, since the moral principles in a different culture come into conflicts, and implementation in the ‘hostile’ culture is almost impossible.
Hence, MNCs may adopt ethical relationalism (contexualism) as a compromise. Moral judgments are made in relation to the factors prevailing locally, without framing rigid rules. The judgments should be contextual and in line with the customs of other cultures. The ethical pluralism which views more than one justifiable moral solution is also adaptable. This principle accepts cultural diversity and respects the legitimate cultural differences among individuals and groups, of the host country.




ENVIRONMENTAL ETHICS
Environmental ethics is the study of (a) moral issues concerning the environment, and (b) moral
perspectives, beliefs, or attitudes concerning those issues. Engineers in the past are known for their negligence of environment, in their activities. It has become important now that engineers design eco-friendly tools, machines, sustainable products, processes, and projects.
These are essential now to (a) ensure protection (safety) of environment (b) prevent the degradation of environment, and (c) slow down the exploitation of the natural resources, so that the future generation can survive.
The American Society of Civil Engineers (ASCE) code of ethics, has specifically requires that “engineers shall hold paramount the safety, health, and welfare of the public and shall strive to comply with the principles of sustainable development in the performance of professional duties” The term sustainable development emphasizes on the investment, orientation of technology, development and functioning of organizations to meet the present needs of people and at the same time ensuring the future generations to meet their needs.
Compaq Computer Corporation (now merged with HP) was the leader, who exhibited their commitment to environmental health, through implementation of the concept of ‘Design for environment’ on their products, unified standards all over the world units, and giving priority to vendors with a record of environmental concern.
Engineers as experimenters have certain duties towards environmental ethics, namely:
1. Environmental impact assessment: One major but sure and unintended effect of technology is wastage and the resulting pollution of land, water, air and even space. Study how the industry and technology affects the environment.
2. Establish standards: Study and to fix the tolerable and actual pollution levels.
3. Counter measures: Study what the protective or eliminating measures are available for immediate implementation
4. Environmental awareness: Study on how to educate the people on environmental practices, issues, and possible remedies.

A)  Disasters
1. Plastic Waste Disposal
In our country, several crores of plastic bottles are used as containers for water and oil, and plastic bags are used to pack different materials ranging from vegetables to gold ornaments. Hardly any of these are recycled. They end up in gutters, roadsides, and agricultural fields. In all these destinations, they created havoc. The worse still is the burning of plastic materials in streets and camphor along with plastic cover in temples, since they release toxic fumes and threaten seriously the air quality. Cities and local administration have to act on this, collect and arrange for recycling through industries.





Recently Jenna R.Jambeck, a National Geographic explorer talked about the threat that is being created by plastic waste in ocean. already it has resulted in extinction of many species and according to her by 2025 around 17 million tonnes of plastic waste would be disposed into ocean per year and that can be a threat to more than 700 species. 

Image result for jenna r. jambeck

She proposes 5C approach. - Contain, Collect, Capture, Culture and Contact. Integration of these 5C's can alone help to fight plastic menace. 

2. e-Waste Disposal
The parts of computers and electronic devices which have served its useful life present a major environmental issue for all the developing countries including India. This scrap contains highly toxic elements such as lead, cadmium, and mercury.
Even the radioactive waste will lose 89% of its toxicity after 200 years, by which time it will be no more toxic than some natural minerals in the ground. It will lose 99% of its remaining toxicity over the next 30,000 years. The toxic chemical agents such as mercury, arsenic, and cadmium retain toxicity undiminished forever.
But these scraps are illegally imported by unscrupulous agencies to salvage some commercially valuable inputs. Instead of spending and managing on the scrap, unethical organizations sell them to countries such as India. This is strictly in violation of the Basel Convention of the United Nations Environment Program, which has banned the movement of hazardous waste.
A recent report of the British Environment Agency, 13 has revealed that the discarded computers, television sets, refrigerators, mobile phones, and electrical equipments have been dispatched to India and Pakistan in large quantity, for ultimate disposal in environmentally-unacceptable ways and at great risk to the health of the labour.
Even in the West, the electronic junk has been posing problems. Strong regulation including (a)
pressure on industries to set up disassembling facilities, (b) ban on disposal in landfill sites, (c) legislation for recycling requirements for these junk and (d) policy incentives for eco-friendly design are essential for our country. The European Union through the Waste Electrical and Electronic Equipment (WEEE) directive has curbed the e-waste dumping by member countries and require manufacturers to implement methods to recover and recycle the components.
Indian Government expressed its concern through a technical guide on environmental management for IT Industry in December, 2004. It is yet to ratify the ban on movement of hazardous waste according to the Basel Convention. A foreign news agency exposed a few years back, the existence of a thriving e-waste disposal hub in a suburb of New Delhi, operating in appallingly dangerous conditions. Our country needs regulations to define waste, measures to stop illegal imports, and institutional structures to handle safe disposal of domestic industrial scrap.



3. Industrial Waste Disposal
There has been a lot of complaints through the media, on (a) against the Sterlite Copper Smelting Plant in Thuthukkudi (1997) against its pollution (Sulphur dioxide emissions went beyond limits leading to burning sensation and breath shortening , choking), and (b) when Indian companies imported the discarded French Warship Clemenceau for disposal, the poisonous asbestos compounds were expected to pollute the atmosphere besides exposing the labor to a great risk, during the disposal. The government did not act immediately. Fortunately for Indians, the French Government intervened and withdrew the ship, and the serious threat was averted!

4. Depletion of Ozone Layer
The ozone layer protects the entire planet from the ill-effects of ultraviolet radiation and is vital for all living organisms in this world. But it is eaten away by the Chloro-fluro-carbons (CFC) such as Freon emanating from the refrigerators, air conditioners, and aerosol can spray. This has caused also skin cancer to sun-bathers in the Western countries. Further NO and NO2 gases were also found to react with the ozone. Apart from engineers, the organizations, laws of the country and local administration and market mechanisms are required to take up concerted efforts to protect the environment.

5. Global Warming
Over the past 30 years, the Earth has warmed by 0.6 °C. Over the last 100 years, it has warmed by 0.8 °C. It is likely to push up temperature by 3oC by 2100, according to NASA’s studies. The U.S. administration has accepted the reality of global climate change, which has been associated with stronger hurricanes, severe droughts, intense heat waves and the melting of polar ice. Greenhouse gases, notably carbon dioxide emitted by motor vehicles and coal-fired power plants, trap heat like the glass walls of a greenhouse, cause the Earth to warm up. Delegates from the six countries — Australia, China, India, Japan, South Korea and US met in California in April 2006 for the first working session of the Asia- Pacific Partnership on Clean Development and Climate. These six countries account for about half of the world’s emissions of climate-heating greenhouse gases. Only one of the six, Japan, is committed to reducing greenhouse gas emissions by at least 5.2 per cent below 1990 levels by 2012 under the Kyoto Agreement.

About 190 nations met in Germany in the middle of May 2006 and tried to bridge vast policy gaps between the United States and its main allies over how to combat climate change amid growing evidence that the world is warming that could wreak havoc by stoking more droughts, heat waves, floods, more powerful storms and raise global sea levels by almost a meter by 2100.

6. Acid Rain
Large emissions of sulphur oxides and nitrous oxides are being released in to the air from the thermal power stations using the fossil fuels, and several processing industries. These gases form compounds with water in the air and precipitates as rain or snow on to the earth. The acid rain in some parts of the world has caused sufficient damage to the fertility of the land and to the human beings.


Human-centered Environmental Ethics
This approach assumes that only human beings have inherent moral worth duly to be taken care of. Other living being and ecosystems are only instrumental in nature. Utilitarianism aims to maximize good consequences for human beings. Most of the goods are engineered products made out of natural resources. Human beings have also (a) recreational interests (enjoy leisure through mountaineering, sports, and pastimes), (b) aesthetic interests (enjoy nature as from seeing waterfalls and snow-clad mountains), (c) scientific interests to explore into nature or processes, and (d) a basic interest to survive, by preservation as well as conservation of nature and natural resources.
Rights ethicists favor the basic rights to live and right to liberty, to realize the right to a live in a
Supportive environment. Further, virtue ethics stresses importance of prudence, humility, appreciation of natural beauty, and gratitude to the Mother Nature that provides everything.
However, the nature-centered ethics, which ensures the worth of all living beings and organisms,
seems to be more appropriate in the present-day context. Many Asian religions stress the unity with nature, rather than domination and exploitation. The Zen Buddhism calls for a simple life with compassion towards humans and other animals. Hinduism enshrines the ideal of oneness (advaitha) in and principle of ahimsa to all living beings. It identifies all the human beings, animals, and plants as divine. The eco-balance is the need of the hour and the engineers are the right experimenters to achieve this.

Adopt recycling to manage waste


COMPUTER ETHICS
Computer ethics is defined as (a) study and analysis of nature and social impact of computer technology, (b) formulation and justification of policies, for ethical use of computers. This subject has become relevant to the professionals such as designers of computers, programmers, system analysts, system managers, and operators. The use of computers have raised a host of moral concerns such as free speech, privacy, intellectual property right, and physical as well as mental harm. There appears to be no conceptual framework available on ethics, to study and understand and resolve the problems in computer technology.

A) Types of Issues
Different types of problems are found in computer ethics.
1. Computer as the Instrument of Unethical Acts
(a) The usage of computer replaces the job positions. This has been overcome to a large extent
by readjusting work assignments, and training everyone on computer applications such as word processing, editing, and graphics.
(b) Breaking privacy. Information or data of the individuals accessed or erased or the ownership
changed.
(c) Defraud a bank or a client, by accessing and withdrawing money from other’s bank account.

2. Computer as the Object of Unethical Act
The data are accessed and deleted or changed.
(a) Hacking: The software is stolen or information is accessed from other computers. This may
cause financial loss to the business or violation of privacy rights of the individuals or business.
In case of defense information being hacked, this may endanger the security of the nation.
(b) Spreading virus: Through mail or otherwise, other computers are accessed and the files are erased or contents changed altogether. ‘Trojan horses’ are implanted to distort the messages and files beyond recovery. This again causes financial loss or mental torture to the individuals.
Some hackers feel that they have justified their right of free information or they do it for fun. However, these acts are certainly unethical.
(c) Health hazard: The computers pose threat during their use as well as during disposal.

3. Problems Related to the Autonomous Nature of Computer
(a) Security risk: Recently the Tokyo Stock Exchange faced a major embarrassment. A seemingly casual mistake by a junior trader of a large security house led to huge losses including that of reputation. The order through the exchange’s trading system was to sell one share for 600,000 Yen. Instead the trader keyed in a sale order for 600,000 shares at the rate of one Yen each.
Naturally the shares on offer at the ridiculously low price were lapped up. And only a few buyers agreed to reverse the deal! The loss to the securities firm was said to be huge, running into several hundred thousands. More important to note, such an obvious mistake could not be corrected by some of the advanced technology available. For advanced countries like Japan who have imbibed the latest technology, this would be a new kind of learning experience.
(b) Loss of human lives: Risk and loss of human lives lost by computer, in the operational control of military weapons. There is a dangerous instability in automated defense system.
An unexpected error in the software or hardware or a conflict during interfacing between the two, may trigger a serious attack and cause irreparable human loss before the error is traced. The Chinese embassy was bombed by U.S. military in Iraq a few years back, but enquiries revealed that the building was shown in a previous map as the building where insurgents stayed.
(c) In flexible manufacturing systems, the autonomous computer is beneficial in obtaining continuous monitoring and automatic control.

Various issues related to computer ethics are discussed as follows:
B) Computers In Workplace
The ethical problems initiated by computers in the workplace are:
1. Elimination of routine and manual jobs. This leads to unemployment, but the creation of skilled and IT-enabled service jobs are more advantageous for the people. Initially this may require some upgradation of their skills and knowledge, but a formal training will set this problem right. For example, in place of a typist, we have a programmer or an accountant.
2. Health and safety: The ill-effects due to electromagnetic radiation, especially on women and pregnant employees, mental stress, wrist problem known as Carpel Tunnel Syndrome, and backpain due to poor ergonomic seating designs, and eye strain due to poor lighting and flickers in the display and long exposure, have been reported worldwide. Over a period of long exposure, these are expected to affect the health and safety of the people. The computer designers should take care of these aspects and management should monitor the health and safety of the computer personnel.
3. Computer failure: Failure in computers may be due to errors in the hardware or software. Hardware errors are rare and they can be solved easily and quickly. But software errors are very serious as they can stop the entire network. Testing and quality systems for software have gained relevance and importance in the recent past, to avoid or minimize these errors.

C) Property Issues
The property issues concerned with the computers are:
1. Computers have been used to extort money through anonymous telephone calls.
2. Computers are used to cheat and steal by current as well as previous employees.
3. Cheating of and stealing from the customers and clients.
4. Violation of contracts on computer sales and services.
5. Conspiracy as a group, especially with the internet, to defraud the gullible, stealing the identity and to forge documents.
6. Violation of property rights: Is the software a property? The software could be either a Program (an algorithm, indicating the steps in solving a problem) or a Source code (the algorithm in a general computer language such as FORTAN, C and COBOL or an Object code (to translate the source code into the machine language). How do we apply the concept of property here? This demands a framework for ethical judgments.
Property is what the laws permits and defines as can be owned, exchanged, and used. The computer hardware (product) is protected by patents. The software (idea, expression) is protected by copyrights and trade secrets. But algorithms can not be copyrighted, because the mathematical formulas can be discovered but not owned. The object codes which are not intelligible to human beings can not be copyrighted.
Thus, we see that reproducing multiple copies from one copy of (licensed) software and distribution or sales are crimes. The open source concepts have, to a great extent, liberalized and promoted the use of computer programs for the betterment of society.

D) Computer Crime
The ethical features involved in computer crime are:
1. Physical Security
The computers are to be protected against theft, fire, and physical damage. This can be achieved by proper insurance on the assets.
2. Logical security
The aspects related are (a) the privacy of the individuals or organizations, (b) confidentiality, (c)
integrity, to ensure that the modification of data or program are done only by the authorized persons,(d) uninterrupted service. This is achieved by installing appropriate uninterrupted power supply or back-up provisions, and (e) protection against hacking that causes dislocation or distortion. Licensed anti-virus packages and firewalls are used by all computer users to ensure this protection. Passwords and data encryption have been incorporated in the computer software as security measures. But these have also been attacked and bye-passed. But this problem is not been solved completely.
Major weaknesses in this direction are: (a) the difficulty in tracing the evidence involved and (b)
absence of stringent punishment against the crime. The origin of a threat to the Central Government posted from an obscure browsing center, remained unsolved for quite a long time. Many times, such crimes have been traced, but there are no clear cyber laws to punish and deter the criminals.


E) Privacy and Anonymity
The data transmission and accessibility have improved tremendously by using the computers, but the right to privacy has been threatened to a great extent. Some issues concerned with the privacy are listed here under:
1. Records of Evidence
Service records or criminal records and the details of people can be stored and accessed to prove the innocence or guilty. Records on psychiatric treatment by medical practitioners or hospital, or records of membership of organizations may sometime embarrass the persons in later years.
2. Hacking
There are computer enthusiasts who willfully or for fun, plant virus or “Trojan horses” that may fill the disc space, falsify information, erase files, and even harm the hardware. They breakdown the functioning of computers and can be treated as violation of property rights. Some hackers opine that the information should be freely available for everybody. It is prudent that the right to individual privacy in limiting the access to the information on oneself, should not be violated. Further any unauthorized use of personal information (which is a property), is to be considered as theft. Besides the individual privacy, the national security, and freedom within the economy are to be respected. The proprietary information and data of the organizations are to be protected so that they can pursue the goals without hindrance.
3. Legal Response
In the Indian scene, the Right to Information Act 2005 14 provides the right to the citizens to secure access to information under the control of public authorities, including the departments of the central government, state governments, government bodies, public sector companies and public sector banks, to promote transparency and accountability of public authorities.
Right to information: Under the Act, section 2 (j), the right to information includes the right to
(1) Inspect works, documents, records, (2) take notes, extracts or certified copies of documents or records, (3) take certified samples of material, and (4) obtain information in the form of printouts, diskettes, floppies, tapes, video cassettes or in any other electronic mode.

WHAT IS NOT OPEN TO DISCLOSURE? The following are exempt from disclosure (Sections
8 and 11)
1. Information, disclosure of which would prejudicially affect the sovereignty and integrity of
India, the security, strategic, scientific or economic interests of the state, relation with, foreign state or lead to incitement of an offence.
2. Information which has been expressly forbidden to be published by any court of law or tribunal or the disclosure of which may constitute contempt of court.
3. Information, the disclosure of which would cause a breach of privilege of Parliament or the State Legislature.
4. Information including commercial confidence, trade secrets or intellectual property, the disclosure of which would harm the competitive position of a third party, unless the competent authority is satisfied that larger public *interest warrants the disclosure of such information.
5. Information available to a person in his fiduciary relationship( relation involving trust), unless the competent authority is satisfied that *the larger public interest warrants the disclosure of such information.
6. Information received in confidence from foreign government.
7. Information, the disclosure of which would endanger the life or physical safety of any person or identify the source of information or assistance given in confidence for law enforcement or security purposes.
8. Information which would impede the process of investigation or apprehension or prosecution of offenders.
9. Information which relates to personal information the disclosure of which has no relationship to any public activity or interest, or which would cause unwarranted invasion of the privacy of the individual.
10. Notwithstanding anything in the Official Secrets Act 1923 nor any of the exemptions listed above, a public authority may allow access to information, if public interest in disclosure outweighs the harm to the protected interests.
11. Where the Information Officer, intends to disclose any information or record, on a request, which relates to or has been supplied by a third party and has been treated as confidential by that third party, the officer shall give a written notice to such third party of the request and of the fact that the officer intends to disclose the information, and invites the third party to make a submission in writing or orally, regarding whether the information should be disclosed, and such submission of the third party shall be kept in view while taking a decision about disclosure of information: provided that except in the case of trade or commercial secrets protected by law, disclosure may be allowed if the public interest in disclosure outweighs in importance any possible harm or injury to the interests of such third party.
Laws to regulate the access to information are very expensive to enforce and inconvenient to
genuine users such as accessing records of people for medical research.

4. Anonymity
Anonymity in the computer communication has some merits as well as demerits. While seeking medical or psychological counseling or discussion (chat) on topics, such as AIDS, abortion, gay rights, the anonymity offers protection (against revealing their identity). But frequently, anonymity is misused by some people for money laundering, drug trafficking and preying upon the vulnerable.


Professional Responsibility
The computer professionals should be aware of different conflicts of interests as they transact with other at different levels. The IEEE and Association for Computing Machinery (ACM) have established the codes of ethics to manage such responsibilities.

The Big Net
Almost all the countries are now connected by the internet. But there are no international laws to regulate the issues of freedom of speech, intellectual property rights, privacy rights etc. Another development in this direction is, the universities offering degrees-on-line. Third World is certainly gaining knowledge and education. Even Google.com has announced plans to publish research papers through the World Wide Web. Knowledge is power. Knowledge is internationalised! Will this lead to empowerment of the Third World and promotion of World peace? Only the future can answer this question.


WEAPONS DEVELOPMENT
Military activities including the world wars have stimulated the growth of technology. The growth of Internet amply illustrates this fact. The development of warfare and the involvement of engineers bring out many ethical issues concerned with engineers, such as the issue of integrity in experiments as well as expenditure in defense research and development, issue of personal commitment and conscience, and the issues of social justice and social health.
Engineers involve in weapons development because of the following reasons:
1. It gives one job with high salary.
2. One takes pride and honor in participating in the activities towards the defense of the nation
(patriotic fervor).
3. One believes the he fights a war on terrorism and thereby contribute to peace and stability of the country. Ironically, the wars have never won peace, only peace can win peace!
4. By research and development, the engineer is reducing or eliminating the risk from enemy weapons, and saving one’s country from disaster.
5. By building-up arsenals and show of force, a country can force the rogue country, towards regulation. Engineers can participate effectively in arms control negotiations for surrender or peace, e.g., bombing of Nagasaki and Hiroshima led to surrender by the Japanese in 1945.
Many engineers had to fight and convince their personal conscience. The scene such as that of a
Vietnamese village girl running wild with burns on the body and horror in the face and curse in her mind has moved some engineers away from their jobs.




2 comments:

Visit to village

  Today , few rangers from St. Joseph's College for Women visited village near Govindapuram Ranger leader- Dr P. Mary Anupama Students- ...