SlideShare a Scribd company logo
LEARNING AREA 1 :
INFORMATION AND
COMMUNICATION
TECHNOLOGY
INTRODUCTION TO ICT

COMPUTER
ETHICS AND
LEGAL ISSUES
LEARNING OUTCOME :
ā€¢ State the definition of computer ethics, code
of ethics, intellectual property, privacy,
computer crime and cyber law.

ā€¢ Differentiate between ethics and law.
COMPUTER ETHICS
System of moral standards or moral values used as a
guideline for computer users.

CODE OF ETHICS
Guidelines in ICT that help determine whether a
specific computer action is ethical or unethical.

INTELLECTUAL PROPERTY
Works created by inventors, authors and artists.

PRIVACY
Right of individuals and companies to deny or restrict
the collection and use of information about them.
COMPUTER ETHICS
COMPUTER CRIME
System of moral standards or moral values used as a
guideline for computer users.
Any illegal acts involving computers.

CODE OF ETHICS
Guidelines in ICT that help determine whether a
specific computer action is ethical or unethical.
CYBER LAW

INTELLECTUAL to protect the Internet and other
Any laws relating PROPERTY
communicationby inventors, authors and artists.
Works created technologies.

PRIVACY
Right of individuals and companies to deny or restrict
the collection and use of information about them.
DIFFERENTIATE BETWEEN ETHICS AND LAW

LAW

ETHICS
As a guideline
Free to follow
Universal
Ethical computers
users
Immoral

As a rule
Must follow
Depend on country
Prevent misuse
Crime
CONCLUSION
ā€¢ Thera are 6 definition you should know which
are : computer ethics (moral standards) , code
of ethics (guideline) , intellectual property
(works created) , privacy (rights or restrict the
collection), computer crime (illegal) and cyber
law (to protect).
ā€¢ 5 differences between ethics and law.
EXERCISES
1.
2.
3.
4.
5.

State the definition of privacy.
State the definition of computer crime.
State the definition of intellectual property.
State the definition of computer ethics.
Give three differences between ethics and
law.

More Related Content

What's hot

Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
Atul Kumar Pandey
Ā 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
kelly kusmulyono
Ā 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
UMaine
Ā 
Ethical Implications of IT
Ethical Implications of ITEthical Implications of IT
Ethical Implications of IT
university of education,Lahore
Ā 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
vitor94
Ā 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
AnkitTripathi159
Ā 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
Maria Stella Solon
Ā 
9 Elements of Digital Citizenship and the 5 fluencies.
9 Elements of Digital Citizenship and the 5 fluencies.9 Elements of Digital Citizenship and the 5 fluencies.
9 Elements of Digital Citizenship and the 5 fluencies.
Robert Tsiliiyiannis
Ā 
Ethics in ict
Ethics in ictEthics in ict
Ethics in ict
Huda Mutalib
Ā 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
Kashif Sohail
Ā 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
stanbridge
Ā 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
Rownel Cerezo Gagani
Ā 
Iot amey p naik
Iot amey p naikIot amey p naik
Iot amey p naik
Amey Naik
Ā 
Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
krishnakumarkrishnak3
Ā 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
Kashif Sohail
Ā 
PPIT Lecture 06
PPIT Lecture 06PPIT Lecture 06
PPIT Lecture 06
Kashif Sohail
Ā 
INTERNET OF THINGS PPT
INTERNET OF THINGS PPTINTERNET OF THINGS PPT
INTERNET OF THINGS PPT
Harsh Kumar
Ā 
E commerce
E commerce E commerce
E commerce
DrSelvamohanaK
Ā 
9 elements
9 elements9 elements
9 elements
Jeordias
Ā 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
Kashif Sohail
Ā 

What's hot (20)

Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
Ā 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
Ā 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
Ā 
Ethical Implications of IT
Ethical Implications of ITEthical Implications of IT
Ethical Implications of IT
Ā 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
Ā 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Ā 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
Ā 
9 Elements of Digital Citizenship and the 5 fluencies.
9 Elements of Digital Citizenship and the 5 fluencies.9 Elements of Digital Citizenship and the 5 fluencies.
9 Elements of Digital Citizenship and the 5 fluencies.
Ā 
Ethics in ict
Ethics in ictEthics in ict
Ethics in ict
Ā 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
Ā 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
Ā 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
Ā 
Iot amey p naik
Iot amey p naikIot amey p naik
Iot amey p naik
Ā 
Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
Ā 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
Ā 
PPIT Lecture 06
PPIT Lecture 06PPIT Lecture 06
PPIT Lecture 06
Ā 
INTERNET OF THINGS PPT
INTERNET OF THINGS PPTINTERNET OF THINGS PPT
INTERNET OF THINGS PPT
Ā 
E commerce
E commerce E commerce
E commerce
Ā 
9 elements
9 elements9 elements
9 elements
Ā 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
Ā 

Similar to 2011 4-define-ethics-and-law

3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
pixvilx
Ā 
Chapter 1
Chapter 1Chapter 1
Chapter 1
meisaina
Ā 
Chapter 1
Chapter 1Chapter 1
Chapter 1
meisaina
Ā 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
Aten Kecik
Ā 
Ict
IctIct
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
Ā 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
PravinGhosekar
Ā 
Cyber Crime with basics and knowledge to cyber sphere
Cyber Crime with basics and knowledge to cyber sphereCyber Crime with basics and knowledge to cyber sphere
Cyber Crime with basics and knowledge to cyber sphere
RISHIKCHAUDHARY2
Ā 
Shak taha
Shak tahaShak taha
Shak taha
Shakir Taha
Ā 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
salehnia
Ā 
Cyber law
Cyber lawCyber law
Cyber law
premarhea
Ā 
Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
MohammedAish
Ā 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Faraz Ahmed
Ā 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
sajida zafar
Ā 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
Ā 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Hajar Len
Ā 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Hajar Len
Ā 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.ppt
ssuseraaf866
Ā 
Nfwordle
NfwordleNfwordle
Nfwordle
Nadine Fray
Ā 
Legal, Ethical, and Societal Issues in Media and Information
Legal, Ethical, and Societal Issues in Media and Information Legal, Ethical, and Societal Issues in Media and Information
Legal, Ethical, and Societal Issues in Media and Information
Katherine Villaluna
Ā 

Similar to 2011 4-define-ethics-and-law (20)

3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
Ā 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Ā 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Ā 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
Ā 
Ict
IctIct
Ict
Ā 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Ā 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
Ā 
Cyber Crime with basics and knowledge to cyber sphere
Cyber Crime with basics and knowledge to cyber sphereCyber Crime with basics and knowledge to cyber sphere
Cyber Crime with basics and knowledge to cyber sphere
Ā 
Shak taha
Shak tahaShak taha
Shak taha
Ā 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
Ā 
Cyber law
Cyber lawCyber law
Cyber law
Ā 
Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
Ā 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Ā 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
Ā 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
Ā 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Ā 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Ā 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.ppt
Ā 
Nfwordle
NfwordleNfwordle
Nfwordle
Ā 
Legal, Ethical, and Societal Issues in Media and Information
Legal, Ethical, and Societal Issues in Media and Information Legal, Ethical, and Societal Issues in Media and Information
Legal, Ethical, and Societal Issues in Media and Information
Ā 

More from cikgushaharizan

Acf
AcfAcf
La1 131209040938-phpapp02
La1 131209040938-phpapp02La1 131209040938-phpapp02
La1 131209040938-phpapp02
cikgushaharizan
Ā 
Privacy
PrivacyPrivacy
Privacy
cikgushaharizan
Ā 
Impact of-ict-on-society
Impact of-ict-on-societyImpact of-ict-on-society
Impact of-ict-on-societycikgushaharizan
Ā 
Ict on-society
Ict on-societyIct on-society
Ict on-society
cikgushaharizan
Ā 
Computer security
Computer securityComputer security
Computer security
cikgushaharizan
Ā 
Computerized and-non
Computerized and-nonComputerized and-non
Computerized and-noncikgushaharizan
Ā 
Computer generation
Computer generationComputer generation
Computer generation
cikgushaharizan
Ā 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
cikgushaharizan
Ā 
La2 templates
La2 templatesLa2 templates
La2 templates
cikgushaharizan
Ā 
La1 templates
La1 templatesLa1 templates
La1 templates
cikgushaharizan
Ā 
La3 templates
La3 templatesLa3 templates
La3 templates
cikgushaharizan
Ā 
New assessment-document
New assessment-documentNew assessment-document
New assessment-document
cikgushaharizan
Ā 
Bidang pembelajaran-6-3
Bidang pembelajaran-6-3Bidang pembelajaran-6-3
Bidang pembelajaran-6-3cikgushaharizan
Ā 
Bidang pembelajaran-6-2 2
Bidang pembelajaran-6-2 2Bidang pembelajaran-6-2 2
Bidang pembelajaran-6-2 2cikgushaharizan
Ā 
Bidang pembelajaran-6-2
Bidang pembelajaran-6-2Bidang pembelajaran-6-2
Bidang pembelajaran-6-2
cikgushaharizan
Ā 
Bidang pembelajaran-6-1
Bidang pembelajaran-6-1Bidang pembelajaran-6-1
Bidang pembelajaran-6-1cikgushaharizan
Ā 
Bidang pembelajaran-5-3
Bidang pembelajaran-5-3Bidang pembelajaran-5-3
Bidang pembelajaran-5-3
cikgushaharizan
Ā 

More from cikgushaharizan (20)

Presentation1
Presentation1Presentation1
Presentation1
Ā 
Acf
AcfAcf
Acf
Ā 
La1 131209040938-phpapp02
La1 131209040938-phpapp02La1 131209040938-phpapp02
La1 131209040938-phpapp02
Ā 
Privacy
PrivacyPrivacy
Privacy
Ā 
Impact of-ict-on-society
Impact of-ict-on-societyImpact of-ict-on-society
Impact of-ict-on-society
Ā 
Ict on-society
Ict on-societyIct on-society
Ict on-society
Ā 
Ethics law
Ethics lawEthics law
Ethics law
Ā 
Computer security
Computer securityComputer security
Computer security
Ā 
Computerized and-non
Computerized and-nonComputerized and-non
Computerized and-non
Ā 
Computer generation
Computer generationComputer generation
Computer generation
Ā 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Ā 
La2 templates
La2 templatesLa2 templates
La2 templates
Ā 
La1 templates
La1 templatesLa1 templates
La1 templates
Ā 
La3 templates
La3 templatesLa3 templates
La3 templates
Ā 
New assessment-document
New assessment-documentNew assessment-document
New assessment-document
Ā 
Bidang pembelajaran-6-3
Bidang pembelajaran-6-3Bidang pembelajaran-6-3
Bidang pembelajaran-6-3
Ā 
Bidang pembelajaran-6-2 2
Bidang pembelajaran-6-2 2Bidang pembelajaran-6-2 2
Bidang pembelajaran-6-2 2
Ā 
Bidang pembelajaran-6-2
Bidang pembelajaran-6-2Bidang pembelajaran-6-2
Bidang pembelajaran-6-2
Ā 
Bidang pembelajaran-6-1
Bidang pembelajaran-6-1Bidang pembelajaran-6-1
Bidang pembelajaran-6-1
Ā 
Bidang pembelajaran-5-3
Bidang pembelajaran-5-3Bidang pembelajaran-5-3
Bidang pembelajaran-5-3
Ā 

Recently uploaded

Call Girls ChandigarhšŸ”„7023059433šŸ”„Agency Profile Escorts in Chandigarh Availab...
Call Girls ChandigarhšŸ”„7023059433šŸ”„Agency Profile Escorts in Chandigarh Availab...Call Girls ChandigarhšŸ”„7023059433šŸ”„Agency Profile Escorts in Chandigarh Availab...
Call Girls ChandigarhšŸ”„7023059433šŸ”„Agency Profile Escorts in Chandigarh Availab...
manji sharman06
Ā 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
Ā 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
Ā 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
Ā 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
Ā 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
Ā 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
Ā 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
Ā 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
Ā 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
Ā 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
Ā 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
Ā 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
Ā 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
Ā 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
Ā 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
Ā 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
Ā 
PoznanĢ ACE event - 19.06.2024 Team 24 Wrapup slidedeck
PoznanĢ ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznanĢ ACE event - 19.06.2024 Team 24 Wrapup slidedeck
PoznanĢ ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
Ā 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
Ā 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
Ā 

Recently uploaded (20)

Call Girls ChandigarhšŸ”„7023059433šŸ”„Agency Profile Escorts in Chandigarh Availab...
Call Girls ChandigarhšŸ”„7023059433šŸ”„Agency Profile Escorts in Chandigarh Availab...Call Girls ChandigarhšŸ”„7023059433šŸ”„Agency Profile Escorts in Chandigarh Availab...
Call Girls ChandigarhšŸ”„7023059433šŸ”„Agency Profile Escorts in Chandigarh Availab...
Ā 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Ā 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Ā 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Ā 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
Ā 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Ā 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Ā 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Ā 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Ā 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ā 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Ā 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Ā 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Ā 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Ā 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Ā 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
Ā 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Ā 
PoznanĢ ACE event - 19.06.2024 Team 24 Wrapup slidedeck
PoznanĢ ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznanĢ ACE event - 19.06.2024 Team 24 Wrapup slidedeck
PoznanĢ ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Ā 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Ā 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
Ā 

2011 4-define-ethics-and-law

  • 1.
  • 2. LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES
  • 3. LEARNING OUTCOME : ā€¢ State the definition of computer ethics, code of ethics, intellectual property, privacy, computer crime and cyber law. ā€¢ Differentiate between ethics and law.
  • 4. COMPUTER ETHICS System of moral standards or moral values used as a guideline for computer users. CODE OF ETHICS Guidelines in ICT that help determine whether a specific computer action is ethical or unethical. INTELLECTUAL PROPERTY Works created by inventors, authors and artists. PRIVACY Right of individuals and companies to deny or restrict the collection and use of information about them.
  • 5. COMPUTER ETHICS COMPUTER CRIME System of moral standards or moral values used as a guideline for computer users. Any illegal acts involving computers. CODE OF ETHICS Guidelines in ICT that help determine whether a specific computer action is ethical or unethical. CYBER LAW INTELLECTUAL to protect the Internet and other Any laws relating PROPERTY communicationby inventors, authors and artists. Works created technologies. PRIVACY Right of individuals and companies to deny or restrict the collection and use of information about them.
  • 6. DIFFERENTIATE BETWEEN ETHICS AND LAW LAW ETHICS As a guideline Free to follow Universal Ethical computers users Immoral As a rule Must follow Depend on country Prevent misuse Crime
  • 7. CONCLUSION ā€¢ Thera are 6 definition you should know which are : computer ethics (moral standards) , code of ethics (guideline) , intellectual property (works created) , privacy (rights or restrict the collection), computer crime (illegal) and cyber law (to protect). ā€¢ 5 differences between ethics and law.
  • 8.
  • 9. EXERCISES 1. 2. 3. 4. 5. State the definition of privacy. State the definition of computer crime. State the definition of intellectual property. State the definition of computer ethics. Give three differences between ethics and law.