SlideShare a Scribd company logo
1 of 16
CHAPTER 1: INFORMATION
AND COMMUNICATION
TECHNOLOGY
Computer Ethics and Legal Issues
Definition
Computer Ethics   Is a system of moral standards or moral values
                  used as a guideline for computer users
Code of Ethics    Is a guideline in ICT that help determine whether
                  a specific computer action is ethical or unethical
Intellectual      Is works created by inventors, authors and artists
Property
Privacy           Refers to the right of individuals and companies
                  to deny or restrict the collection and use of
                  information about them
Computer Crime    Is any illegal acts involving computers
Cyber Law         Is any laws relating to protect the Internet and
                  other online communication technologies
Differentiate between ethics and law

            ETHICS                              LAW
As a guideline to computer        As a rule to control computer
users                             users
Computers users are free to       Computers users must follow
follow or ignore the code of      the regulations and law
ethics
Universal, can be applied         Depend on country and state
anywhere, all over the world      where the crime is committed
To produced ethical computers     To prevent misuse of
users                             computers
Not following ethics are called   Not obeying laws are called
immoral                           crime
Intellectual Property Laws
    Four types of Intellectual Property are:




•    Patents for inventions
•    Trademarks for brand identity
•    Design for product appearance
•    Copyright for materials
Privacy
Ways of making personal data more privates:
 Install personal firewall

 Clear your history file when you are browsing

 Purchase goods with cash, rather than credit card
Authentication
   Authentication is a process where user verifies their
    identity. Authentication deals with the problem of
    determining whether a user should be allowed
    access to a particular system.
   Four commonly authentication methods:
A) User identification
   Is a unique combination of characters (letter,
    number or symbol) that identify specific user
   Examples:
              pin number
              password
B) Possessed object
   Is a any item that you must carry to gain access to
    computer of computer facility
   Examples:
               ATM card
               credit card
               smart card
C) Biometric device
   Is a device that translates personal characteristics
    into digital code that is compared with the digital
    code stored in the database
   Examples:
               fingerprint reader
               iris scanner
               hand geometric scanner
               signature verification system
Controversial Contents and Control
         PORNOGRAPHY                                     SLANDER
 is any form media or material (like       is a false spoken statement about
books, video or photos) that show erotic   someone, intended to damage his or her
behavior and intended to cause sexual      reputation
excitement
                                            the effects of slander on society are:
 the effects of pornography on society    iv)Can develop society that disregards on
are:                                       honesty and truth
iv)Can lead to criminal acts such as       v)Can lead to bad habits of spreading
exploitation of women                      rumors and untruth
v)Can lead to sexual addiction             vi)Can cause people to have nagative
vi)Can develop lower moral values          attitudes toward another person
towards other people
vii)Can erode good religious, cultural,
behaviors and beliefs
Computer Crimes
   Why we need cyber law?
    i)     Cyber laws are made to force people to be good
    ii)    To give protection against the misuse of computers
           and computer criminal activities
   Examples of cyber abuse on the users:
    i)     Sending a computer virus via e-mail
    ii)    Harassment through e-mail
    iii)   Hacking into your school's database to change your
           examination results
   Malaysian Cyber Law
    i)     Computer Crime Act 1997
    ii)    Copyright (Amendment) Bill 1997
    iii)   Digital Signature Act 1997
    iv)    Telemedicine Bill 1997
    v)     Communication and Multimedia Act 1998
    vi)    Digital Signature Regulations 1998
   4 examples of computer crimes:
   Computer fraud - is the crime of obtaining money
    by deceiving (to trick) people through the use of
    computers such as email hoaxes, program fraud,
    investment schemes and claim of expertise on
    certain fields
   Copyright infringement - is a violation of the rights
    secured by a copyright. It occurs when you break
    the copyright laws such as copying movie, software
    or CD’s illegally
Computer theft – is defined as the unauthorized
    used of another person’s property such as transfer
    of payment to the wrong accounts, get online
    material with no cost and tap into the data
    transmission lines
e   Computer attack – is defined as any activities
    taken to disrupt the equipments of computers
    systems, change processing controls and corrupt
    stored data

More Related Content

What's hot

Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slidesthothakhail
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICSRJ Khan
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsDyuti Islam
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpointstanbridge
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to securityDhani Ahmad
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 

What's hot (20)

Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Software liability
Software liabilitySoftware liability
Software liability
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Professional ethics
Professional ethicsProfessional ethics
Professional ethics
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 

Viewers also liked

Viewers also liked (13)

Towards comprehensive public & private sector whistleblower protection
Towards comprehensive public & private sector whistleblower protectionTowards comprehensive public & private sector whistleblower protection
Towards comprehensive public & private sector whistleblower protection
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Security policy
Security policySecurity policy
Security policy
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
EU-GDPR On Boarding & IT Handlungsfelder
 EU-GDPR On Boarding & IT Handlungsfelder  EU-GDPR On Boarding & IT Handlungsfelder
EU-GDPR On Boarding & IT Handlungsfelder
 
Ethical Constraints
Ethical Constraints Ethical Constraints
Ethical Constraints
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Netiquette and code of conduct in communication
Netiquette and code of conduct in communicationNetiquette and code of conduct in communication
Netiquette and code of conduct in communication
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Risk Analysis
Risk AnalysisRisk Analysis
Risk Analysis
 
Ethics
EthicsEthics
Ethics
 

Similar to Computer Ethics and Legal Issues

English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxtalhajann43
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1ikmalsham
 
Ethical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfEthical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfDesireDelosSantos
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptYäsh Chaudhary
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 

Similar to Computer Ethics and Legal Issues (20)

Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
English in written
English in writtenEnglish in written
English in written
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 
Ethical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfEthical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology Presentatiopdf
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 

More from Kak Yong

Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersifKak Yong
 
Module programming
Module programmingModule programming
Module programmingKak Yong
 
Module info systems
Module info systemsModule info systems
Module info systemsKak Yong
 
Module ict society
Module ict societyModule ict society
Module ict societyKak Yong
 
Module computer systems
Module computer systemsModule computer systems
Module computer systemsKak Yong
 
Module networks
Module networksModule networks
Module networksKak Yong
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programmingKak Yong
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaKak Yong
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsKak Yong
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksKak Yong
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsKak Yong
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyKak Yong
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Kak Yong
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Kak Yong
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Kak Yong
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Kak Yong
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Kak Yong
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Kak Yong
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Kak Yong
 

More from Kak Yong (20)

Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersif
 
Module programming
Module programmingModule programming
Module programming
 
Module info systems
Module info systemsModule info systems
Module info systems
 
Module ict society
Module ict societyModule ict society
Module ict society
 
Module computer systems
Module computer systemsModule computer systems
Module computer systems
 
Module networks
Module networksModule networks
Module networks
 
Synopsis
SynopsisSynopsis
Synopsis
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programming
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimedia
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systems
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systems
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-society
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02
 

Recently uploaded

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Computer Ethics and Legal Issues

  • 1. CHAPTER 1: INFORMATION AND COMMUNICATION TECHNOLOGY Computer Ethics and Legal Issues
  • 2. Definition Computer Ethics Is a system of moral standards or moral values used as a guideline for computer users Code of Ethics Is a guideline in ICT that help determine whether a specific computer action is ethical or unethical Intellectual Is works created by inventors, authors and artists Property Privacy Refers to the right of individuals and companies to deny or restrict the collection and use of information about them Computer Crime Is any illegal acts involving computers Cyber Law Is any laws relating to protect the Internet and other online communication technologies
  • 3. Differentiate between ethics and law ETHICS LAW As a guideline to computer As a rule to control computer users users Computers users are free to Computers users must follow follow or ignore the code of the regulations and law ethics Universal, can be applied Depend on country and state anywhere, all over the world where the crime is committed To produced ethical computers To prevent misuse of users computers Not following ethics are called Not obeying laws are called immoral crime
  • 4. Intellectual Property Laws Four types of Intellectual Property are: • Patents for inventions • Trademarks for brand identity • Design for product appearance • Copyright for materials
  • 5. Privacy Ways of making personal data more privates:  Install personal firewall  Clear your history file when you are browsing  Purchase goods with cash, rather than credit card
  • 6. Authentication  Authentication is a process where user verifies their identity. Authentication deals with the problem of determining whether a user should be allowed access to a particular system.
  • 7. Four commonly authentication methods:
  • 8. A) User identification  Is a unique combination of characters (letter, number or symbol) that identify specific user  Examples: pin number password
  • 9. B) Possessed object  Is a any item that you must carry to gain access to computer of computer facility  Examples: ATM card credit card smart card
  • 10. C) Biometric device  Is a device that translates personal characteristics into digital code that is compared with the digital code stored in the database  Examples: fingerprint reader iris scanner hand geometric scanner signature verification system
  • 11. Controversial Contents and Control PORNOGRAPHY SLANDER  is any form media or material (like  is a false spoken statement about books, video or photos) that show erotic someone, intended to damage his or her behavior and intended to cause sexual reputation excitement  the effects of slander on society are:  the effects of pornography on society iv)Can develop society that disregards on are: honesty and truth iv)Can lead to criminal acts such as v)Can lead to bad habits of spreading exploitation of women rumors and untruth v)Can lead to sexual addiction vi)Can cause people to have nagative vi)Can develop lower moral values attitudes toward another person towards other people vii)Can erode good religious, cultural, behaviors and beliefs
  • 12.
  • 13. Computer Crimes  Why we need cyber law? i) Cyber laws are made to force people to be good ii) To give protection against the misuse of computers and computer criminal activities  Examples of cyber abuse on the users: i) Sending a computer virus via e-mail ii) Harassment through e-mail iii) Hacking into your school's database to change your examination results
  • 14. Malaysian Cyber Law i) Computer Crime Act 1997 ii) Copyright (Amendment) Bill 1997 iii) Digital Signature Act 1997 iv) Telemedicine Bill 1997 v) Communication and Multimedia Act 1998 vi) Digital Signature Regulations 1998
  • 15. 4 examples of computer crimes:  Computer fraud - is the crime of obtaining money by deceiving (to trick) people through the use of computers such as email hoaxes, program fraud, investment schemes and claim of expertise on certain fields  Copyright infringement - is a violation of the rights secured by a copyright. It occurs when you break the copyright laws such as copying movie, software or CD’s illegally
  • 16. Computer theft – is defined as the unauthorized used of another person’s property such as transfer of payment to the wrong accounts, get online material with no cost and tap into the data transmission lines e Computer attack – is defined as any activities taken to disrupt the equipments of computers systems, change processing controls and corrupt stored data