Privacy of Information & Software Depending On the Privacy in Islam as a Right for Human Faculty of Science & Technology University Sains Islam Malaysia (USIM) Bandar Baru Nilai, 71800 Nilai, Negeri Sembilan, Malaysia
MOHAMED MUNSER1 , ISSAM SHA'ABAN2 , GUMMAABDELSALAM3 [email protected]
Abstract The development of our modern society depends on the information and communication technology (ICT), which must comply with the implementation of ethical restrictions to protect the moral rights of users. These ethical restrictions are to diminish the illegal uses of ICT applications. Many computer associations have existed to protect the Ethics, rules, and put guidelines to manage the using of technology. The societies have been brought up these ethics to maintain the human rights, the privacy and the confidentiality, the instructions of the Quran urged people to keep these ethics long time ago. Allah mentioned in the Holy Quran four rules which are the main protection rules of the rights and the properties of others long time ago, there rules are security, privacy, authority, and ethics. The implementation of these four rules is the main role of the associations which trying to save the others rights in ICT fields. Keywords: Technology, ethics, privacy, confidentiality, rights. 1
Introduction Allah creates the mankind to build the earth and there are two kinds of relations:
the first one is the relation between man and Allah. And on the other hand the relation between the human with one another. Humankind is the vicegerent of Allah in the earth, according to this relation the man should place his relation with Allah as the highest rank of priority. So the human should observing Allah in the secret and in the public, and he must fear of Allah in all of his actions. In ICT the human should make his decisions on the rule of taking in his account the rights of Allah and the rights of people. The right of Allah including God Consciousness, sincerity, whereas the right of people includes trustworthiness, equality, mutual consent, respect, ,honesty, caring, sacrifice, and mutual consent.
Guiding Principles in ICT Based on Islamic Teachings. Every human is responsible about his actions, so they must manage their life
according to the Islamic law. The implementation of information system in organizations must adhere to the Islamic law, so the employees must observe Allah in their actions to save the rights of others. According to the Islam instructions, Muslims should lead the nations to discover new things especially in ICT. This technology must be based on Islamic philosophy which can be summarized in three rules: ethics, security, and privacy. 2.1
2.1.1 Ethics from Islamic view: As Prophet Mohammed said the purpose of his message to the nations is to improve the ethics. The ethics must be incorporated in every point of ICT, so from the Islamic view ICT should have beside the hardware and the software something they call it ethics-ware. The man must consider the ethics when he makes any decision for everyday life; this concept is similar to ICT principles. In ICT there are many issues looking for real solutions including security, rights, privacy, and so on, there are so many solutions but the cybercrimes still growing up. The solution for all these issues is related to the ethics, this is the Islamic view. 2.1.2 The internet. The internet allowed the people to access a vast amount of information around the world, this information can be positive or negative, and there is no control on it. The best filter for this information is observing Allah in everyday life actions. The internet help the humans to express their freedom, Islam only prevents the illegal ways which are using as an exercise to this freedom. Some hackers they have poor ethics, but in the other side there are white hackers are applying the morals . 2.2
Security The security in Islam is how the Muslims can protect themselves from the
enemies, and the procedures they should apply to do that, is the same in ICT security is important to protect our data from the expected and unexpected enemies, in ICT we use the firewalls which act as a soldiers fighting to defend about our systems. Allah said in Quran we must take warning and prepare ourselves to face any danger that might hurt us. The same ideas can we apply it in ICT .
Privacy There are many issues related to the privacy, many of cybercrimes happened in
ICT world, the personal data, credit cards numbers and passwords, could exposed to theft. There are many of fake websites created to steal the personal data of others (scams). The data’s thieves aim uses this information for bad purposes which will harm to others. They steal this data to disclose the personal data of others, which cause embarrassing for them. The privacy from the Islamic view urges us to respect the others rights even the privacy of children are respected, the privacy are important in Islam and the Quran mentioned that many times. The wide growth of information technology and the vast amount of information exchange between the users over the internet changed the meaning of the privacy and the view of the public people of the privacy. The purpose of using the internet and emails in the organization is to allow the employees to make their work efficient and effective. The employees may they use the internet for other purposes which related to their privacy. The companies are monitoring their employees to know how they use the technology, so they will break their privacy, so the companies must inform their employees about they are monitoring, to make them avoid the using of company's network for personal purposes. We should respect the Intellectual properties such as articles, songs, pictures and any things owned by others, this is a kind of the respect of the privacy. From this article we can get this result if we apply the Islamic rules and ethics in ICT we will have a good society. 3
Compare between the privacy in Islam and the privacy in ICT With the advances in ICT the data privacy breakthrough several pictures
including search engines which allow the users to get information about anyone they are looking for, e-commerce which make it easy for the user to make shopping online that mean he will send his credit card number online which sometime be not secure, Email encryption when you send e-mail any one can intercepts your connection and read the email specially when it send in plain text. 4
Data protection procedures in ICT It necessary for the companies protects the data which transfer over the internet,
they need to protect e-mails and the messages, to achieve that they use encryption methods which fulfil the purpose. There are companies using a software or hardware to record the clicks on the keyboard; they use this method to monitor their staff if they
sold the company’s goods for private purposes. The protection of the privacy on the individual level can be by using new ways which allow them to browse the internet without disclosing their identity. Websites are using many techniques to protect the privacy and the information for the users such as firewalls, and procedures for access control and encryption. ICT’s TIPS for protection.
In order to protect our information and our privacy, we should follow these tips when we are treating with the technology:
Check if the website uses an encryption technique, can be sure of that if the site name in the browser start with https not http.
Don’t search about your personal information on the internet, so doesn’t be a prey for hackers.
Don’t make a search about the sensitive data by using the computers which are in public places such as libraries or internet shops.
Be more careful when we use the engine of searching google, this engine is using cookies to monitor the search operation which we do, to prevent Google’s cookies we can register a website address " Google " within sites that do not allow the browser to receive files from them.
Don’t log on by your account to the search engine you are going to use, as example when you user google don’t log on by your account in Gmail.
Read the privacy policies and the agreements before installing new software.
Always try to change your IP address by turning off your modem from time to time to renew the IP address, which can make you away from tracking .
The concept of privacy in Islam In the era of ICT, the privacy is so important for the government and for the
companies where is thousands or millions of customer records are stored, which includes their personal information. The hackers never stop, is penetrated the data privacy, there are many applications created to protect the data privacy, but they are still finding ways to hack. There are three classifications of privacy, first one is the physical privacy which includes the secret materials and cannot inform it to others, the second one is privacy of information includes the secret information about others, the last is a privacy which concerned to protect the sensitive information including information about activities and facilities.
The human rights in Islam are granted by God, so nobody has the authority to make changes or amend these rights, and every Muslim, he must accept these rules and rights as it is, so the Quran called the government or the people they don’t judge by what God said they are disbelievers . 7
The Sanctity and Security of Private Life in Islam Every citizen of the Islamic state has his rights and the Islam defined these rights
no undue interference or encroachment on the privacy of the others. Allah said in Quran for all believers to don’t spy on one another; do not enter the people’s houses without their permissions, even the man he should nock his house’s door before he enter the home to save the privacy of the people inside. The Islam prevents the people from reading the letters of others, in the modern life Islam prevents them from saving copies of others photos to use it in blackmails, that mean everything related to the privacy of the others, Islam prevents us from violating it . 8
Conclusion If the governments and the people follow the rules and the instructions of the
Islam we will never find anyone to violate the privacy of the others and all these problems which related to the security and privacy in ICT doesn’t exist because everyone should fear from the God and observing him in every event he will do. 9
 Hewa Majee Zangana, Imad Fakhri Al-Shaikhli, Yuliana Isma Graha, (2013).The Ethical Dilemma of Software Piracy: An Inquiry from an Islamic Perspective.  Muhammad Aslam Hayat, (2007). Privacy and Islam: From the Quran to data protection in Pakistan. Information & Communications Technology Law.  Mohamad Fauzan Noordin, (2013). Application of Privacy, Security and Ethics in Islamic Concerned ICT. Middle-East Journal of Scientific Research 14 (11): 15481554, 2013.  Syed Abul A'la Maududi, (2014). Human Rights in Islam. http://www.islamtreasure.com/uploads/5/0/2/9/5029153/human_rights_in_islamsyed_abul_ala_maududi-www.islamchest.com.pdf. (Accessed 10 May 2014).  Talal Asad, (2005). Boundaries and Rights in Islamic Law: Introduction. Social Research: An International Quarterly.