SlideShare a Scribd company logo
1 of 15
Ethics and Privacy Charity Harvill 8-3 Young Junior High
Ethics and Privacy Is anything private anymore? Automated invaders. Virus protection, detection, and disinfection. Human invaders. Intellectual property. The future of ethics and privacy.
Ethics and Privacy 	Intellectual property is ideas put into action, such as writing, music, art, computer code, and inventions that can be protected under copyright or patent laws. Many people are victimized by the ability of organizations, corporations, the government, and private citizens to access, store, and retrieve vast amounts of information on individuals in databases. This power over computerized information brings up ethical questions and responsibilities for all computer users.
Ethics and Privacy 	Ethical questions deal with moral principles and values. Is it ethical for individuals, companies, or the government to store personal data about individuals without the individual knowing about it? We know when we have been physically robbed, but we may not know that someone has gained access to our private information.
Ethics and Privacy The types of automated invaders are: ,[object Object]
Worms—destructive code that “worms” its way through computers by boring through files.
Bombs—destructive code set to go off at a certain time or when a specific action is taken.
Trojan horse—destructive code disguised as something desirable, such as a shareware graphics program. Once inside, it wreaks havoc, erasing or scrambling files.,[object Object]
Ethics and Privacy 	Antivirus and virus disinfectant programs are used to protect your data from automated invaders. An antivirus program checks each floppy disk automatically as it is inserted into the disk drive and scans all data from telecommunications devices. A virus disinfectant program uncovers viruses lurking on your hard drive.
Ethics and Privacy 	Human invaders are called hackers. “Hacker” originally meant a person who was absorbed with computers. Today a hacker is one who secretly gains access to others’ computer files without permission.
Ethics and Privacy 	Hackers are usually between the ages of 12-25, and they take pride in finding phone numbers and then cracking the security codes that allow access into the network. Often no real damage is done, and most computer crime, such as theft of electronic funds and the stealing of confidential data, are committed by insiders, at the cost of billions of dollars per year.
Ethics and Privacy 	When can property be stolen from someone without his or her knowledge? With the theft of intellectual property, the original owner can still be in possession of the original property and have no knowledge that a theft has occurred. Software code is intellectual property. When software code is stolen, a copy is made the rightful owner still has the original. To protect software against unwanted or illegal duplication by writing computer code within the programs that prevents simple copying is called copy protect.
Ethics and Privacy 	Why is intellectual property so easy to steal? First it can be done in the privacy of one’s home, etiher by copying a friend’s program disk or by going into an illicit bulletin board and downloading a copy of a pirated program. Secondly, the theft itself may only take a few seconds-and the hacker is neither seen nor heard. Often people unwittingly steal intellectual property because they are unfamiliar with copyright laws. The unauthorized copying and use of a computer program is called software piracy.
Ethics and Privacy “Site licenses” grant the user the right to make a specified number of copies of a software program for use on multiple computers. At Young we have site licenses for our software. 	The Copyright Act of 1976 allows the user to make a backup copy of copyrighted software for his or her personal use, but makes it illegal for the user to make and distribute copies.
Ethics and Privacy There are four types of software: Commercial software (Copyrighted software available for purchase) Freeware (Copyrighted software that is given away free of charge but is still the property of the owner and the user doesn’t have the right to distribute copies.) Shareware (Copyrighted software that is distributed free of charge on a trial basis.) A nominal fee is charged if the user decides to keep it. Public Domain Software (Software donated for public use that can be freely copied and distributed.)

More Related Content

What's hot

Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
vinyas87
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
Ali Habeeb
 

What's hot (20)

Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Data security
Data securityData security
Data security
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Operating system security
Operating system securityOperating system security
Operating system security
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Network security
Network securityNetwork security
Network security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 

Viewers also liked

Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
Hajarul Cikyen
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
realpeterz
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
Samudin Kassan
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
sappingtonkr
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
Adjem
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
Matthew Momney
 
Violation of privacy
Violation of privacyViolation of privacy
Violation of privacy
Lauren2342
 

Viewers also liked (20)

Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
 
What Every IT Person Should Be Aware of.
What Every IT Person Should Be Aware of.What Every IT Person Should Be Aware of.
What Every IT Person Should Be Aware of.
 
OCLC Report: Sharing, Privacy and Trust
OCLC Report: Sharing, Privacy and TrustOCLC Report: Sharing, Privacy and Trust
OCLC Report: Sharing, Privacy and Trust
 
IRBsearch | GLBA data
IRBsearch | GLBA dataIRBsearch | GLBA data
IRBsearch | GLBA data
 
Big Data, Big Responsibilities
Big Data, Big ResponsibilitiesBig Data, Big Responsibilities
Big Data, Big Responsibilities
 
CSR Big data
CSR Big dataCSR Big data
CSR Big data
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringement
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Ethics
EthicsEthics
Ethics
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentiality
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Music Piracy
Music PiracyMusic Piracy
Music Piracy
 
Violation of privacy
Violation of privacyViolation of privacy
Violation of privacy
 
Ethics And Computing
Ethics And ComputingEthics And Computing
Ethics And Computing
 

Similar to Ethics and privacy ppt 3rd period

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
24sneha
 

Similar to Ethics and privacy ppt 3rd period (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Mobile security
Mobile securityMobile security
Mobile security
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptx
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Presentation1
Presentation1Presentation1
Presentation1
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Ethics and privacy ppt 3rd period

  • 1. Ethics and Privacy Charity Harvill 8-3 Young Junior High
  • 2. Ethics and Privacy Is anything private anymore? Automated invaders. Virus protection, detection, and disinfection. Human invaders. Intellectual property. The future of ethics and privacy.
  • 3. Ethics and Privacy Intellectual property is ideas put into action, such as writing, music, art, computer code, and inventions that can be protected under copyright or patent laws. Many people are victimized by the ability of organizations, corporations, the government, and private citizens to access, store, and retrieve vast amounts of information on individuals in databases. This power over computerized information brings up ethical questions and responsibilities for all computer users.
  • 4. Ethics and Privacy Ethical questions deal with moral principles and values. Is it ethical for individuals, companies, or the government to store personal data about individuals without the individual knowing about it? We know when we have been physically robbed, but we may not know that someone has gained access to our private information.
  • 5.
  • 6. Worms—destructive code that “worms” its way through computers by boring through files.
  • 7. Bombs—destructive code set to go off at a certain time or when a specific action is taken.
  • 8.
  • 9. Ethics and Privacy Antivirus and virus disinfectant programs are used to protect your data from automated invaders. An antivirus program checks each floppy disk automatically as it is inserted into the disk drive and scans all data from telecommunications devices. A virus disinfectant program uncovers viruses lurking on your hard drive.
  • 10. Ethics and Privacy Human invaders are called hackers. “Hacker” originally meant a person who was absorbed with computers. Today a hacker is one who secretly gains access to others’ computer files without permission.
  • 11. Ethics and Privacy Hackers are usually between the ages of 12-25, and they take pride in finding phone numbers and then cracking the security codes that allow access into the network. Often no real damage is done, and most computer crime, such as theft of electronic funds and the stealing of confidential data, are committed by insiders, at the cost of billions of dollars per year.
  • 12. Ethics and Privacy When can property be stolen from someone without his or her knowledge? With the theft of intellectual property, the original owner can still be in possession of the original property and have no knowledge that a theft has occurred. Software code is intellectual property. When software code is stolen, a copy is made the rightful owner still has the original. To protect software against unwanted or illegal duplication by writing computer code within the programs that prevents simple copying is called copy protect.
  • 13. Ethics and Privacy Why is intellectual property so easy to steal? First it can be done in the privacy of one’s home, etiher by copying a friend’s program disk or by going into an illicit bulletin board and downloading a copy of a pirated program. Secondly, the theft itself may only take a few seconds-and the hacker is neither seen nor heard. Often people unwittingly steal intellectual property because they are unfamiliar with copyright laws. The unauthorized copying and use of a computer program is called software piracy.
  • 14. Ethics and Privacy “Site licenses” grant the user the right to make a specified number of copies of a software program for use on multiple computers. At Young we have site licenses for our software. The Copyright Act of 1976 allows the user to make a backup copy of copyrighted software for his or her personal use, but makes it illegal for the user to make and distribute copies.
  • 15. Ethics and Privacy There are four types of software: Commercial software (Copyrighted software available for purchase) Freeware (Copyrighted software that is given away free of charge but is still the property of the owner and the user doesn’t have the right to distribute copies.) Shareware (Copyrighted software that is distributed free of charge on a trial basis.) A nominal fee is charged if the user decides to keep it. Public Domain Software (Software donated for public use that can be freely copied and distributed.)
  • 16. Ethics and Privacy Providing protection against the theft of intellectual property puts the government in a precarious position. There are trade-offs between regulating access to data and building a democracy based on freedom of information. As technology improves, we are provided with not only greater convenience but also with ethical choices involved in implementing that technology.
  • 17. Ethics and Privacy Presented by Click here to learn more about ethics in computing