SlideShare a Scribd company logo
1 of 15
Professional Practices
SS-301
Ehtesham Raza,
Assistant Professor,
Govt. Murray College,
Sialkot.
Topic: data protection,
defamation and Hacktivism
– Introduction
– Need of Capital
– Sources of Funds
– Budgeting and Monitoring
– Working Capital & Cash Flow
Regulation and control of personal
information: data protection, defamation
and related issues
Introduction:
• We can not deny the dramatic impact
which increasing computerization has had
on the storage, processing, retention and
release of information and data.
Introduction(Continued…)
• Computerization has revolutionized the
handling and processing of information to
such an extent that the data itself has now
become a commodity which possesses
commercial value and can be traded on the
market in the same way as any other
commodity
• The value to businesses is also enhanced by
the fact that how easily and safely data can
be transferred around the globe
Data Protection and Privacy
• Data protection refers to how your
personal information is used by the
organization or being an organization, how
you would make sure to protect data of
your customers, employees etc
• Privacy refers to the privilege provided to
an individual by law or by the
organizational policy where the individual
can keep the information secret to or from
a specific group
The impact of the Internet
• The original challenge of data protection law was to
provide a suitable mechanism for dealing with the
perceived threat to individual privacy of large
centralized data banks
• The development of global information networks has
changed and intensified the character of the privacy
protection problem
• The question which is inevitably being asked is
whether the original formulation of data protection
law is capable of controlling the amorphous
decentralized activities which occur through the
medium of the Internet and World Wide Web
Factors affecting the
regulation of data processing
• There is by no means a straightforward answer to
this question, complicated as the issues are by
rapidly advancing technology, the global nature of
the activities to be regulated and the variety of
possible regulatory approaches to be found in the
various legal traditions within the world
• Formidable problems of policy and implementation
are presented by the attempt to regulate systems
and practices that are technologically advanced,
widely professional issues in software engineering
dispersed, rapidly changing and employed by
powerful economic and government interests
Convergence of Data
Protection Practices
• It is an observed fact that, at the level of
international agreements and national
legislation, the requirements imposed by this
particular type of technology have resulted in
a convergence of the rules made to ensure
good data management
• An example in this respect is the emergence
of data protection principles or fair use
guidelines which have created a harmonizing
effect on national legislation on data
protection
Defamation and Protection of
Reputation
• Even without the cover of anonymity, the
various methods available for the
dissemination of information on computer
networks provide fertile ground for the
propagation of information about others
• What redress is available for those who
feel that untrue and unwarranted
statements have been circulated about
them
• Publication of such material might attract
an action for defamation. Such actions are
not uncommon against newspapers and
other sections of the media
• Although there may be some differences
of degree and substance, most
jurisdictions provide some form of remedy
for injury to a person’s integrity or
reputation
Defamation and Protection of
Reputation
Hacktivism
• Hacktivism is a social or political activist
plan that is carried out by breaking into
and wreaking havoc on a secure computer
system. Hacktivism is usually directed at
corporate or government targets.
• Hacktivism is a mix of “hacking” and
“activism” and is said to have been coined
by the hacktivist group Cult of the Dead
Cow (CdC).
Goals of Hacktivism
• Circumventing government censorship by helping citizens get
around national firewalls or helping protestors to organize online
• Using social media platforms to promote human rights or help
censored citizens of oppressive regimes communicate with the
outside world
• Taking down government websites that pose a danger to
politically active citizens
• Protecting free speech online
• Promoting access to information
• Supporting citizen uprisings
• Disrupting corporate or government power
• Helping illegal immigrants cross borders safely
• Supporting democracy
• Protesting globalization and capitalism
• Protesting acts of war
Methods of Hacktivism
• Hacktivists’ methods may include distributed
denial of service (DDoS) attacks, which flood a
website or email address with so much traffic
that it temporarily shuts down;
• data theft;
• website defacement;
• computer viruses and worms that spread
protest messages;
• taking over social media accounts;
• stealing and disclosing sensitive data.
The 10 Most Inspiring Cases
of Hacktivism
• https://cybersecuritydegrees.com/faq/the-
most-inspiring-cases-of-hacktivism/
Thank you!

More Related Content

What's hot

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Metamorphosis
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityAFRINIC
 
Librarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research dataLibrarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research dataRobin Rice
 
Governing Privacy Commons at Pitt Science 2017 - Madison
Governing Privacy Commons at Pitt Science 2017 - MadisonGoverning Privacy Commons at Pitt Science 2017 - Madison
Governing Privacy Commons at Pitt Science 2017 - Madisonprofessormadison
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Internet Governance Model in Taiwan
Internet Governance Model in TaiwanInternet Governance Model in Taiwan
Internet Governance Model in TaiwanKenny Huang Ph.D.
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
The Future Agenda: Digitising Democracy and the Fake News Saga
The Future Agenda: Digitising Democracy and the Fake News SagaThe Future Agenda: Digitising Democracy and the Fake News Saga
The Future Agenda: Digitising Democracy and the Fake News SagaSharala Axryd
 
Taiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsTaiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsKenny Huang Ph.D.
 
Consumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsConsumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsArthit Suriyawongkul
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Dione McBride, CISSP, CIPP/E
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
 
The state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandThe state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandArthit Suriyawongkul
 

What's hot (19)

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurity
 
Librarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research dataLibrarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research data
 
Governing Privacy Commons at Pitt Science 2017 - Madison
Governing Privacy Commons at Pitt Science 2017 - MadisonGoverning Privacy Commons at Pitt Science 2017 - Madison
Governing Privacy Commons at Pitt Science 2017 - Madison
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Internet Governance Model in Taiwan
Internet Governance Model in TaiwanInternet Governance Model in Taiwan
Internet Governance Model in Taiwan
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Open Data in Half a Day
Open Data in Half a DayOpen Data in Half a Day
Open Data in Half a Day
 
The Future Agenda: Digitising Democracy and the Fake News Saga
The Future Agenda: Digitising Democracy and the Fake News SagaThe Future Agenda: Digitising Democracy and the Fake News Saga
The Future Agenda: Digitising Democracy and the Fake News Saga
 
Taiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsTaiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber Norms
 
Consumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsConsumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil Rights
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1
 
After 9 11
After 9 11After 9 11
After 9 11
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
 
The state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandThe state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in Thailand
 

Similar to hackivism

GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxMuhammadAbdullah311866
 
Information policy sunil sir
Information policy sunil sirInformation policy sunil sir
Information policy sunil sirbgshalini
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietySarah Granger
 
Data Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdfData Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdfKarpagam Institute
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptxJohnLagman3
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime caseOnline
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxbalewayalew
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramFinancial Poise
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdfstirlingvwriters
 
online-disinformation-human-rights
online-disinformation-human-rightsonline-disinformation-human-rights
online-disinformation-human-rightsarchiejones4
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
Surveillance and security.pptx
Surveillance and security.pptxSurveillance and security.pptx
Surveillance and security.pptxjohn6938
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 

Similar to hackivism (20)

GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
Information policy sunil sir
Information policy sunil sirInformation policy sunil sir
Information policy sunil sir
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil Society
 
Data Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdfData Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdf
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptx
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security Program
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
Digital Ethics
Digital EthicsDigital Ethics
Digital Ethics
 
online-disinformation-human-rights
online-disinformation-human-rightsonline-disinformation-human-rights
online-disinformation-human-rights
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Data and ethics Training
Data and ethics TrainingData and ethics Training
Data and ethics Training
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
Information Security
Information SecurityInformation Security
Information Security
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Surveillance and security.pptx
Surveillance and security.pptxSurveillance and security.pptx
Surveillance and security.pptx
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 

More from Hamza Cheema

professional ethics
professional ethicsprofessional ethics
professional ethicsHamza Cheema
 
managing teams and their conflicts
managing teams and their conflictsmanaging teams and their conflicts
managing teams and their conflictsHamza Cheema
 
professional ethics in_computing
professional ethics in_computingprofessional ethics in_computing
professional ethics in_computingHamza Cheema
 
ethics and professionalism
ethics and professionalismethics and professionalism
ethics and professionalismHamza Cheema
 
effective time-management-important-vs-urgent
effective time-management-important-vs-urgenteffective time-management-important-vs-urgent
effective time-management-important-vs-urgentHamza Cheema
 
time management islamic way
time management islamic waytime management islamic way
time management islamic wayHamza Cheema
 
habbits of highly effective people
habbits of highly effective peoplehabbits of highly effective people
habbits of highly effective peopleHamza Cheema
 
be the tranformer (overall characteristics)
 be the tranformer (overall characteristics) be the tranformer (overall characteristics)
be the tranformer (overall characteristics)Hamza Cheema
 
characteristics of a professional organization
characteristics of a professional organizationcharacteristics of a professional organization
characteristics of a professional organizationHamza Cheema
 
finance and accounting
finance and accountingfinance and accounting
finance and accountingHamza Cheema
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal lawHamza Cheema
 
intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rightsHamza Cheema
 

More from Hamza Cheema (20)

seven habits
seven habitsseven habits
seven habits
 
leadership
leadershipleadership
leadership
 
time management
time managementtime management
time management
 
professional ethics
professional ethicsprofessional ethics
professional ethics
 
the profession
 the profession the profession
the profession
 
managing teams and their conflicts
managing teams and their conflictsmanaging teams and their conflicts
managing teams and their conflicts
 
swot-analysis
swot-analysisswot-analysis
swot-analysis
 
professional ethics in_computing
professional ethics in_computingprofessional ethics in_computing
professional ethics in_computing
 
ethics and professionalism
ethics and professionalismethics and professionalism
ethics and professionalism
 
effective time-management-important-vs-urgent
effective time-management-important-vs-urgenteffective time-management-important-vs-urgent
effective time-management-important-vs-urgent
 
time management islamic way
time management islamic waytime management islamic way
time management islamic way
 
time management
time managementtime management
time management
 
professionalism
professionalismprofessionalism
professionalism
 
habbits of highly effective people
habbits of highly effective peoplehabbits of highly effective people
habbits of highly effective people
 
leardeship
leardeshipleardeship
leardeship
 
be the tranformer (overall characteristics)
 be the tranformer (overall characteristics) be the tranformer (overall characteristics)
be the tranformer (overall characteristics)
 
characteristics of a professional organization
characteristics of a professional organizationcharacteristics of a professional organization
characteristics of a professional organization
 
finance and accounting
finance and accountingfinance and accounting
finance and accounting
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 
intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rights
 

Recently uploaded

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 

hackivism

  • 1. Professional Practices SS-301 Ehtesham Raza, Assistant Professor, Govt. Murray College, Sialkot.
  • 2. Topic: data protection, defamation and Hacktivism – Introduction – Need of Capital – Sources of Funds – Budgeting and Monitoring – Working Capital & Cash Flow
  • 3. Regulation and control of personal information: data protection, defamation and related issues Introduction: • We can not deny the dramatic impact which increasing computerization has had on the storage, processing, retention and release of information and data.
  • 4. Introduction(Continued…) • Computerization has revolutionized the handling and processing of information to such an extent that the data itself has now become a commodity which possesses commercial value and can be traded on the market in the same way as any other commodity • The value to businesses is also enhanced by the fact that how easily and safely data can be transferred around the globe
  • 5. Data Protection and Privacy • Data protection refers to how your personal information is used by the organization or being an organization, how you would make sure to protect data of your customers, employees etc • Privacy refers to the privilege provided to an individual by law or by the organizational policy where the individual can keep the information secret to or from a specific group
  • 6. The impact of the Internet • The original challenge of data protection law was to provide a suitable mechanism for dealing with the perceived threat to individual privacy of large centralized data banks • The development of global information networks has changed and intensified the character of the privacy protection problem • The question which is inevitably being asked is whether the original formulation of data protection law is capable of controlling the amorphous decentralized activities which occur through the medium of the Internet and World Wide Web
  • 7. Factors affecting the regulation of data processing • There is by no means a straightforward answer to this question, complicated as the issues are by rapidly advancing technology, the global nature of the activities to be regulated and the variety of possible regulatory approaches to be found in the various legal traditions within the world • Formidable problems of policy and implementation are presented by the attempt to regulate systems and practices that are technologically advanced, widely professional issues in software engineering dispersed, rapidly changing and employed by powerful economic and government interests
  • 8. Convergence of Data Protection Practices • It is an observed fact that, at the level of international agreements and national legislation, the requirements imposed by this particular type of technology have resulted in a convergence of the rules made to ensure good data management • An example in this respect is the emergence of data protection principles or fair use guidelines which have created a harmonizing effect on national legislation on data protection
  • 9. Defamation and Protection of Reputation • Even without the cover of anonymity, the various methods available for the dissemination of information on computer networks provide fertile ground for the propagation of information about others • What redress is available for those who feel that untrue and unwarranted statements have been circulated about them
  • 10. • Publication of such material might attract an action for defamation. Such actions are not uncommon against newspapers and other sections of the media • Although there may be some differences of degree and substance, most jurisdictions provide some form of remedy for injury to a person’s integrity or reputation Defamation and Protection of Reputation
  • 11. Hacktivism • Hacktivism is a social or political activist plan that is carried out by breaking into and wreaking havoc on a secure computer system. Hacktivism is usually directed at corporate or government targets. • Hacktivism is a mix of “hacking” and “activism” and is said to have been coined by the hacktivist group Cult of the Dead Cow (CdC).
  • 12. Goals of Hacktivism • Circumventing government censorship by helping citizens get around national firewalls or helping protestors to organize online • Using social media platforms to promote human rights or help censored citizens of oppressive regimes communicate with the outside world • Taking down government websites that pose a danger to politically active citizens • Protecting free speech online • Promoting access to information • Supporting citizen uprisings • Disrupting corporate or government power • Helping illegal immigrants cross borders safely • Supporting democracy • Protesting globalization and capitalism • Protesting acts of war
  • 13. Methods of Hacktivism • Hacktivists’ methods may include distributed denial of service (DDoS) attacks, which flood a website or email address with so much traffic that it temporarily shuts down; • data theft; • website defacement; • computer viruses and worms that spread protest messages; • taking over social media accounts; • stealing and disclosing sensitive data.
  • 14. The 10 Most Inspiring Cases of Hacktivism • https://cybersecuritydegrees.com/faq/the- most-inspiring-cases-of-hacktivism/