0% found this document useful (0 votes)
13 views5 pages

Legal & Professional Ethics

Uploaded by

zdjddhdhhggshttt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views5 pages

Legal & Professional Ethics

Uploaded by

zdjddhdhhggshttt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

BUGEMA UNIVERSITY

DEPARTMENT OF COMPUTING & INFORMATICS


COURSE OUTLINE
Lecturer: LOWU F X
Email: [email protected]

Course Title: Legal & Professional Ethics in Computing


Course Code: BAIT 2103
Credit Units: 3
Contact Hours: 45
Level: Year 2
Semester: 1

Course Description

This course introduces learners to ethical and legal dimensions of computing and information
technology, with a focus on decision-making in real-world professional scenarios. It explores key
principles of IT governance, privacy, intellectual property, and responsible computing within
organizational and societal contexts. Learners will engage in ethical dilemma analysis, legal case
reviews, and simulated decision-making environments to build critical thinking and moral
reasoning. The course also promotes awareness of global standards, codes of conduct, and the
impact of IT practices on individuals, institutions, and communities.

Learning Objectives

By the end of this course, learners should be able to:

 Evaluate legal and ethical issues that arise in computing environments using established
frameworks.
 Interpret key laws and regulations governing IT operations locally and globally.
 Apply ethical decision-making strategies to professional computing challenges and
dilemmas.
 Analyze the implications of digital actions on privacy, intellectual property, and public
interest.
 Collaborate to assess ethical risks and recommend policy or behavioral adjustments in
computing contexts.

Learning Outcomes

Upon successful completion of this course, learners will be able to:

 Explain core concepts of professional ethics and legal compliance in IT practices.


 Assess the ethical dimensions of real-life IT situations involving privacy, surveillance,
and data use.
 Apply professional codes of conduct (e.g., ACM, IEEE) to specific technology-related
dilemmas.
 Evaluate the social and legal responsibilities of IT professionals through role-based
discussions.
 Design policy recommendations or ethical guidelines for responsible digital behavior in
an organization.

Competencies to be Developed

 Ethical reasoning and critical analysis

 Legal interpretation of IT-related statutes and regulations


 Application of professional codes of ethics
 Decision-making under ethical uncertainty
 Communication of ethical viewpoints and defense of reasoning
 Awareness of cultural, societal, and global ethical perspectives
 Team-based problem-solving of legal/ethical cases
 Self-regulation in professional computing practice

Course Content

Competency Focus Learning


# Topic (What students will be Tasks / CH
able to do) Projects
1 Foundations of IT Ethics
• Defining ethics and
morality
Group discussion:
Understand the role of
• Ethics in technology Analyze real-world
ethics in computing and 5
contexts unethical computing
articulate moral reasoning
scenarios
Professional Codes of
2
Conduct
• ACM, IEEE codes
Apply professional ethical Case study: Compare
• Role of professional
guidelines to resolve how different codes guide 5
bodies
workplace dilemmas decision-making
3 Legal Frameworks in IT
• Cybercrime laws
Policy review: Critique
• Contracts, licensing, Interpret and apply key laws
and improve a basic IT 5
and data protection relevant to IT operations
compliance policy
4 Privacy and Surveillance
• Data protection
rights
• Ethical implications Evaluate conflicts between Scenario task: Resolve a 5
Competency Focus Learning
# Topic (What students will be Tasks / CH
able to do) Projects
user rights and workplace dispute on
of monitoring
organizational needs employee monitoring
Intellectual Property in the
5
Digital Age
• Copyright and
software licensing
Identify and avoid Practical exercise: Audit
• Plagiarism and open
violations of intellectual a small IT project for IP 5
source
property law compliance
Ethical Hacking and
6
Responsible Disclosure
• White hat vs black
hat behavior
Distinguish between ethical Debate: Present cases of
• Security research
and unethical security controversial ethical 5
ethics
practices hacking
Bias, Inclusion, and Digital
7
Justice
• Algorithmic bias
Recognize and address bias Peer activity: Analyze a
• Accessibility and
in digital systems and biased system and 5
equity
software propose ethical redesign
Emerging Technologies and
8
Moral Risk
• AI ethics
Anticipate ethical Group project: Create a
• Autonomous
challenges of evolving policy brief for an 5
systems and IoT
technologies emerging tech product
Organizational Ethics and
9
Policy
• Creating ethical
work cultures
Final project: Develop an
• Whistleblowing and Promote ethical culture and
ethical conduct guideline 5
accountability respond to ethical breaches
for an IT firm

Mode of Delivery

• Case-based discussions and ethical scenario simulations


• Group debates and collaborative dilemma solving
• Legal framework analysis and compliance planning
• Policy critique and drafting exercises
• Role-play (e.g., whistleblower reporting or code review simulations)

Assessment Strategy

Weight
Assessment Type Description
(%)
Ethical Case Projects / Learners analyze real-world dilemmas and propose ethical
20%
Assignments responses guided by professional codes and laws.
Continuous Class Ongoing evaluation through role-plays, scenario analysis,
20%
Participation / Simulations and group-based ethical discussions.
Reflective Portfolio / Learners document ethical reflections, legal
10%
Journal interpretations, and decision-making challenges.
Oral Debate / Position Structured debates on controversial topics requiring
10%
Defense evidence-based ethical argumentation.
Mixed-format exam testing ethical reasoning, legal
Final Written Exam 40% understanding, and ability to apply principles to complex
situations.
Total 100%

References

Books

 Reynolds, G. W. (2014). Ethics in Information Technology (5th ed.). Cengage Learning.


ISBN: 9781285197159
 Spinello, R. A. (2011). CyberEthics: Morality and Law in Cyberspace (4th ed.). Jones &
Bartlett. ISBN: 9780763795115

Online Sources

 ACM Code of Ethics – https://ethics.acm.org


 IEEE Code of Ethics – https://www.ieee.org/about/corporate/governance/p7-8.html
 Computer Ethics Institute – https://www.computerethicsinstitute.org
 International Association of Privacy Professionals (IAPP) – https://iapp.org
 UNESCO’s Ethical AI Guidelines –
https://unesdoc.unesco.org/ark:/48223/pf0000380455

YouTube Videos

 Ethics in Technology – CrashCourse: https://www.youtube.com/watch?


v=l5xFGwCBKpY
 Data Privacy Explained – TED-Ed: https://www.youtube.com/watch?v=8PCWg_7gCBo
 Case Study: Facebook and Cambridge Analytica – CNBC:
https://www.youtube.com/watch?v=V9K8Mv9iTvc

You might also like