SlideShare a Scribd company logo
1 of 13
Computer Ethics
INTRODUCTION
• Ethics is a set of moral principles that govern the
behavior of a group or individual.
• Likewise, computer ethics is set of moral
principles that regulate the use of computers.
ETHICAL ISSUES
• The ethical issues classified into three ways:
 According to the type of technology
 According to the sector in which the
technology is used and
 According to ethical concepts or themes
Common issues of computer ethics
• Some common issues of computer ethics include
intellectual property rights such as copyrighted
electronic content, privacy concerns, and how
computers affect society.
For example, while it is easy to duplicate copyrighted
electronic or digital content, computer ethics would
suggest that it is wrong to do so without the author's
approval.
And while it may be possible to access someone's
personal information on a computer system, computer
ethics would advise that such an action is unethical.
unethical
Intellectual property
• Intellectual property refers to creations of the
intellect (hence, the name): inventions, literary
and artistic works, symbols, names, images, and
designs used in commerce are a part of it.
• Intellectual property is usually divided into two
branches,
• Industrial property and
• Copyright
• Industrial property, which includes
• Inventions (patents)
• Trademarks
• Industrial designs
• Commercial names
• Designations and
• Geographic indications (location specific
brands) etc.
Copy rights
• Copyright is a legal concept, enacted by most
governments. The copyright protects the original
authorship of works made available on communication
network, but does not protects ideas, procedures,
systems, or methods of operation.
Copyright Includes literary and artistic works such as
• Novels
• Poems
• Films and musical works
• Drawings
• Paintings
• Photographs, sculptures
• Architectural designs
COPYRIGHT ON INTERNET
The World Intellectual Property Organization
(WIPO), has established similar guidelines in its
Copyright Law,
It is also generally agreed that the owner of the
copyright and only the owner is authorized to do the
following with the work:
Reproduce it
Prepare derivative works based upon it
Distribute copies of it to the public
 Perform the work publicly (if applicable)
 Display the work publicly.
NETIQUTTES
Netiquette are about the various risks related to using
the Internet and proper ways in which to use a network.
Four important points using internet:
• Think twice before you click on Send button in the
mail/chat window.
• Protect your privacy: Protect your personal
information to keep someone from using it in an
unethical way.
• Avoid spamming: Spamming is sending unsolicited
bulk and/or commercial messages over the Internet.
• Help making network better: Receive helpful
information and report what you learned.
PLAGIARISM
• Plagiarism is copying someone else's work and
then passing it off as one's own. It is morally bad
because it is an act of stealing.
File privacy
• Any computer document produced either by an
individual in his private home or in his office
should remain private.
Thank you

More Related Content

What's hot

Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyrightAdyns
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsScøtt Lıgøckı
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computingUc Man
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Misuse of internet - ppt
Misuse of internet - pptMisuse of internet - ppt
Misuse of internet - pptJincy24
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing professionshahmansoor109
 
Working with ict ethical social and legal issues
Working with ict ethical social and legal issuesWorking with ict ethical social and legal issues
Working with ict ethical social and legal issuesMaher Al Beshlawy
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICSRJ Khan
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethicsaleeya91
 

What's hot (20)

Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computing
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Misuse of internet - ppt
Misuse of internet - pptMisuse of internet - ppt
Misuse of internet - ppt
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 
Working with ict ethical social and legal issues
Working with ict ethical social and legal issuesWorking with ict ethical social and legal issues
Working with ict ethical social and legal issues
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethics
 

Similar to Computer ethics

Lec2 netiquette legal issues and security
Lec2   netiquette legal issues and securityLec2   netiquette legal issues and security
Lec2 netiquette legal issues and securityMelchor Castro
 
Ethics, definitions & theories
Ethics, definitions & theoriesEthics, definitions & theories
Ethics, definitions & theoriesTobore Oshobe
 
An Introduction to Cyber Ethics
An Introduction to Cyber EthicsAn Introduction to Cyber Ethics
An Introduction to Cyber EthicsHimanshu Pathak
 
Topic 12 issues and trends in ed tech
Topic 12 issues and trends in ed techTopic 12 issues and trends in ed tech
Topic 12 issues and trends in ed techNFifa
 
Plagiarism, Copyright and Fair Use in Business Communications
Plagiarism, Copyright and Fair Use in Business CommunicationsPlagiarism, Copyright and Fair Use in Business Communications
Plagiarism, Copyright and Fair Use in Business Communicationsschubert b2b
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challengesCRM
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slidesthothakhail
 
Copyright and-intellectual-property-final
Copyright and-intellectual-property-finalCopyright and-intellectual-property-final
Copyright and-intellectual-property-finalApoorva Arora
 
Uc14 chap16
Uc14 chap16Uc14 chap16
Uc14 chap16ayahye
 
Lecture 1 introduction to course
Lecture 1 introduction to courseLecture 1 introduction to course
Lecture 1 introduction to courseGC University Fsd
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional EthicsFaraz Ahmed
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual PropertyŠkola Futura
 

Similar to Computer ethics (20)

Lec2 netiquette legal issues and security
Lec2   netiquette legal issues and securityLec2   netiquette legal issues and security
Lec2 netiquette legal issues and security
 
Ethics, definitions & theories
Ethics, definitions & theoriesEthics, definitions & theories
Ethics, definitions & theories
 
An Introduction to Cyber Ethics
An Introduction to Cyber EthicsAn Introduction to Cyber Ethics
An Introduction to Cyber Ethics
 
Topic 12 issues and trends in ed tech
Topic 12 issues and trends in ed techTopic 12 issues and trends in ed tech
Topic 12 issues and trends in ed tech
 
Plagiarism, Copyright and Fair Use in Business Communications
Plagiarism, Copyright and Fair Use in Business CommunicationsPlagiarism, Copyright and Fair Use in Business Communications
Plagiarism, Copyright and Fair Use in Business Communications
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
P.p lect1-
P.p lect1-P.p lect1-
P.p lect1-
 
Shak taha
Shak tahaShak taha
Shak taha
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Copyright and-intellectual-property-final
Copyright and-intellectual-property-finalCopyright and-intellectual-property-final
Copyright and-intellectual-property-final
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 
Uc14 chap16
Uc14 chap16Uc14 chap16
Uc14 chap16
 
Uc14 chap16
Uc14 chap16Uc14 chap16
Uc14 chap16
 
Lecture 1 introduction to course
Lecture 1 introduction to courseLecture 1 introduction to course
Lecture 1 introduction to course
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 

More from Atchaya Thalapathy

Types of lc detectors and recorders
Types of lc detectors and  recordersTypes of lc detectors and  recorders
Types of lc detectors and recordersAtchaya Thalapathy
 
Performance qualification of High performance liquid chromatography
Performance qualification of High performance liquid chromatography Performance qualification of High performance liquid chromatography
Performance qualification of High performance liquid chromatography Atchaya Thalapathy
 
Pulsed electric field processing
Pulsed electric field processing Pulsed electric field processing
Pulsed electric field processing Atchaya Thalapathy
 
COFFEE PROCESSING INDUSTRIES WASTE
COFFEE PROCESSING INDUSTRIES WASTE COFFEE PROCESSING INDUSTRIES WASTE
COFFEE PROCESSING INDUSTRIES WASTE Atchaya Thalapathy
 

More from Atchaya Thalapathy (6)

Types of lc detectors and recorders
Types of lc detectors and  recordersTypes of lc detectors and  recorders
Types of lc detectors and recorders
 
Performance qualification of High performance liquid chromatography
Performance qualification of High performance liquid chromatography Performance qualification of High performance liquid chromatography
Performance qualification of High performance liquid chromatography
 
Pulsed electric field processing
Pulsed electric field processing Pulsed electric field processing
Pulsed electric field processing
 
DISINFECTANT TECHNIQUE
DISINFECTANT TECHNIQUEDISINFECTANT TECHNIQUE
DISINFECTANT TECHNIQUE
 
BUTTER CHURNING
BUTTER CHURNINGBUTTER CHURNING
BUTTER CHURNING
 
COFFEE PROCESSING INDUSTRIES WASTE
COFFEE PROCESSING INDUSTRIES WASTE COFFEE PROCESSING INDUSTRIES WASTE
COFFEE PROCESSING INDUSTRIES WASTE
 

Recently uploaded

Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaFinlaw Consultancy Pvt Ltd
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
FULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | Delhi
FULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | DelhiFULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | Delhi
FULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | Delhisoniya singh
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 

Recently uploaded (20)

Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
FULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | Delhi
FULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | DelhiFULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | Delhi
FULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | Delhi
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 

Computer ethics

  • 2. INTRODUCTION • Ethics is a set of moral principles that govern the behavior of a group or individual. • Likewise, computer ethics is set of moral principles that regulate the use of computers.
  • 3. ETHICAL ISSUES • The ethical issues classified into three ways:  According to the type of technology  According to the sector in which the technology is used and  According to ethical concepts or themes
  • 4. Common issues of computer ethics • Some common issues of computer ethics include intellectual property rights such as copyrighted electronic content, privacy concerns, and how computers affect society.
  • 5. For example, while it is easy to duplicate copyrighted electronic or digital content, computer ethics would suggest that it is wrong to do so without the author's approval. And while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical. unethical
  • 6. Intellectual property • Intellectual property refers to creations of the intellect (hence, the name): inventions, literary and artistic works, symbols, names, images, and designs used in commerce are a part of it. • Intellectual property is usually divided into two branches, • Industrial property and • Copyright
  • 7. • Industrial property, which includes • Inventions (patents) • Trademarks • Industrial designs • Commercial names • Designations and • Geographic indications (location specific brands) etc.
  • 8. Copy rights • Copyright is a legal concept, enacted by most governments. The copyright protects the original authorship of works made available on communication network, but does not protects ideas, procedures, systems, or methods of operation. Copyright Includes literary and artistic works such as • Novels • Poems • Films and musical works • Drawings • Paintings • Photographs, sculptures • Architectural designs
  • 9. COPYRIGHT ON INTERNET The World Intellectual Property Organization (WIPO), has established similar guidelines in its Copyright Law, It is also generally agreed that the owner of the copyright and only the owner is authorized to do the following with the work: Reproduce it Prepare derivative works based upon it Distribute copies of it to the public  Perform the work publicly (if applicable)  Display the work publicly.
  • 10. NETIQUTTES Netiquette are about the various risks related to using the Internet and proper ways in which to use a network. Four important points using internet: • Think twice before you click on Send button in the mail/chat window. • Protect your privacy: Protect your personal information to keep someone from using it in an unethical way. • Avoid spamming: Spamming is sending unsolicited bulk and/or commercial messages over the Internet. • Help making network better: Receive helpful information and report what you learned.
  • 11. PLAGIARISM • Plagiarism is copying someone else's work and then passing it off as one's own. It is morally bad because it is an act of stealing. File privacy • Any computer document produced either by an individual in his private home or in his office should remain private.
  • 12.