SlideShare a Scribd company logo
Cyber Law and Ethics
Using Social Media
PRESENTED BY : MUHAMMD KHUBAIB AWAN
Introduction
 Social media has become an integral part of our daily lives, transforming the way
we communicate, share information, and connect with others.
 In this digital age, it is essential to recognize the impact and influence of social
media on individuals, communities, and societies.
 This presentation aims to explore the legal and ethical dimensions of using social
media, emphasizing the need to navigate the digital landscape responsibly.
SOCIAL MEDIA
What is cyber law
 Cyber law is the body of law that deals with the use of technology,
particularly the Internet.
Cyber Law Cover
• Cybercrime
• Intellectual
property
• Privacy
• Data security
Cyber Crime
 Cybercrime is any criminal activity that involves the use of a computer or
the Internet.
EXAMPLES
Hacking
Identity theft
Phishing
Cyberbullying
Intellectual Property
 Intellectual property (IP) is a form of property that protects the creations of
the human mind, such as:
 Inventions
 Literary works
 Music
 Artwork
Intellectual Property
Copyright
 Copyright is a form of IP that protects original works of authorship, such as:
 Books
 Movies
 Songs
 Software
Copyright
Fair Use
 Fair use is a doctrine that allows the use of copyrighted material without
the permission of the copyright holder under certain circumstances, such
as:
 Criticism
 Comment
 News reporting
 Teaching
Fair Use
What is Privacy
 Privacy is the right to be free from unreasonable intrusion into one's
personal life.
 Social media can pose a threat to privacy, as our personal information is
often shared online.
Privacy
What is data Security
 Data security is the process of protecting data from unauthorized access,
use, disclosure, disruption, modification, or destruction.
 Social media companies are responsible for protecting the data of their
users.
Data Security
Ethics of Social Media Use
 There are a number of ethical considerations related to social media use,
such as:
 Respect for others
 Honesty
 Responsibility
Ethics of Social Media Use
Cyberbullying is the use of electronic
communication to bully a person,
typically by sending messages of an
intimidating or threatening nature.
What is Cyberbullying
Hate speech is speech that attacks a
person or group on the basis of attributes
such as race, religion, sexual orientation,
or gender.
Hate Speech
Misinformation and disinformation
 Misinformation is false or inaccurate information that is spread without
malicious intent.
 Disinformation is false or inaccurate information that is spread intentionally
to deceive.
Social Media Addiction
 What is social media addiction
 Social media addiction is an excessive use of social media that interferes
with a person's daily life.
Social Media Addiction
Digital Footprint
 A digital footprint is the trail of data that a person leaves behind online,
such as their social media posts, search history, and online purchases.
Tips for Ethical Social Media Use
 Be respectful of others.
 Be honest.
 Think before you post.
 Be mindful of your privacy settings.
 Use social media in moderation.
Tips for Ethical Social Media Use
Conclusion
 Social media is a powerful tool that can be used for good or evil.
 By understanding the cyber laws and ethics of using social media, we can
make responsible and ethical choices about how we use it.
THANK YOU

More Related Content

What's hot

The internet
The internetThe internet
The internet
Kumod Shirkande
 
First step to internet
First step to internet First step to internet
First step to internet
Disani Neranjala
 
Internet ppt
Internet  ppt Internet  ppt
Internet ppt
JayashreeTalwar
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
Dhani Ahmad
 
Uses of internet
Uses of internetUses of internet
Uses of internet
Hafiz Muhammad Habib Qadri
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
Latif Hyder Wadho
 
Internet Service Provider-ISP
Internet Service Provider-ISPInternet Service Provider-ISP
Internet Service Provider-ISP
Jaya Kamnani
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
Gerard Sylvester
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Worksftz 420
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
JIJO CLEETUS
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
FLYMAN TECHNOLOGY LIMITED
 
Future of the Internet
Future of the InternetFuture of the Internet
Future of the Internet
Yogi Schulz
 
Introduction to-internet-n-emails
Introduction to-internet-n-emailsIntroduction to-internet-n-emails
Introduction to-internet-n-emails
Anuja Khaire
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
guest9e3d59
 
Information and communication technology:a class presentation
Information and communication technology:a class presentationInformation and communication technology:a class presentation
Information and communication technology:a class presentation
Selim Reza Bappy
 
Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 
Internet
InternetInternet
Internet
Harjot Singh
 
Internet And Its Uses
Internet And Its UsesInternet And Its Uses
Internet And Its Uses
Rishabh27
 
Data communication by Phone Lines
Data communication by Phone LinesData communication by Phone Lines
Data communication by Phone LinesMuhammad Ahtsham
 

What's hot (20)

The internet
The internetThe internet
The internet
 
First step to internet
First step to internet First step to internet
First step to internet
 
Internet ppt
Internet  ppt Internet  ppt
Internet ppt
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
 
Internet, intranet and extranet
Internet, intranet and extranetInternet, intranet and extranet
Internet, intranet and extranet
 
Uses of internet
Uses of internetUses of internet
Uses of internet
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
Internet Service Provider-ISP
Internet Service Provider-ISPInternet Service Provider-ISP
Internet Service Provider-ISP
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Works
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
 
Future of the Internet
Future of the InternetFuture of the Internet
Future of the Internet
 
Introduction to-internet-n-emails
Introduction to-internet-n-emailsIntroduction to-internet-n-emails
Introduction to-internet-n-emails
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
Information and communication technology:a class presentation
Information and communication technology:a class presentationInformation and communication technology:a class presentation
Information and communication technology:a class presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Internet
InternetInternet
Internet
 
Internet And Its Uses
Internet And Its UsesInternet And Its Uses
Internet And Its Uses
 
Data communication by Phone Lines
Data communication by Phone LinesData communication by Phone Lines
Data communication by Phone Lines
 

Similar to cyber law and ethics uisng social media .pdf

ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
SheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
The Basics of Media and Information Literacy.pptx
The Basics of Media and Information Literacy.pptxThe Basics of Media and Information Literacy.pptx
The Basics of Media and Information Literacy.pptx
AngeloAdajar
 
3.-Ethical-and-Social-Issues-In-ICT.pptx
3.-Ethical-and-Social-Issues-In-ICT.pptx3.-Ethical-and-Social-Issues-In-ICT.pptx
3.-Ethical-and-Social-Issues-In-ICT.pptx
PurnaBahadurRana1
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
Mehedi Hasan
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
OxfordRiNorth
 
digital media and society.pptx
digital media and society.pptxdigital media and society.pptx
digital media and society.pptx
catherinviscom
 
ETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital EmpowermentETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital Empowerment
nellykelly1663
 
Lesson1.pptx
Lesson1.pptxLesson1.pptx
Lesson1.pptx
JULIETADIWATA1
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
RoshanMaharjan13
 
Social media, Technology, and Youth
Social media, Technology, and YouthSocial media, Technology, and Youth
Social media, Technology, and Youth
Khadija Parween
 
Cyberspace
CyberspaceCyberspace
Cyberspace
Utchi
 
Share Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxShare Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptx
eyesred813
 
Ethics
EthicsEthics
Ethics
EthicsEthics
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenship
monazarrinkelk
 
cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...
cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...
cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...
PiyushSharma12895
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theories
nincher
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theories
matarid
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey92
 

Similar to cyber law and ethics uisng social media .pdf (20)

ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
The Basics of Media and Information Literacy.pptx
The Basics of Media and Information Literacy.pptxThe Basics of Media and Information Literacy.pptx
The Basics of Media and Information Literacy.pptx
 
3.-Ethical-and-Social-Issues-In-ICT.pptx
3.-Ethical-and-Social-Issues-In-ICT.pptx3.-Ethical-and-Social-Issues-In-ICT.pptx
3.-Ethical-and-Social-Issues-In-ICT.pptx
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
digital media and society.pptx
digital media and society.pptxdigital media and society.pptx
digital media and society.pptx
 
ETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital EmpowermentETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital Empowerment
 
Lesson1.pptx
Lesson1.pptxLesson1.pptx
Lesson1.pptx
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Social media, Technology, and Youth
Social media, Technology, and YouthSocial media, Technology, and Youth
Social media, Technology, and Youth
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Share Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxShare Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptx
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenship
 
cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...
cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...
cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theories
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theories
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 

Recently uploaded

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 

Recently uploaded (20)

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 

cyber law and ethics uisng social media .pdf

  • 1. Cyber Law and Ethics Using Social Media PRESENTED BY : MUHAMMD KHUBAIB AWAN
  • 2. Introduction  Social media has become an integral part of our daily lives, transforming the way we communicate, share information, and connect with others.  In this digital age, it is essential to recognize the impact and influence of social media on individuals, communities, and societies.  This presentation aims to explore the legal and ethical dimensions of using social media, emphasizing the need to navigate the digital landscape responsibly.
  • 4. What is cyber law  Cyber law is the body of law that deals with the use of technology, particularly the Internet.
  • 5. Cyber Law Cover • Cybercrime • Intellectual property • Privacy • Data security
  • 6. Cyber Crime  Cybercrime is any criminal activity that involves the use of a computer or the Internet.
  • 8. Intellectual Property  Intellectual property (IP) is a form of property that protects the creations of the human mind, such as:  Inventions  Literary works  Music  Artwork
  • 10. Copyright  Copyright is a form of IP that protects original works of authorship, such as:  Books  Movies  Songs  Software
  • 12. Fair Use  Fair use is a doctrine that allows the use of copyrighted material without the permission of the copyright holder under certain circumstances, such as:  Criticism  Comment  News reporting  Teaching
  • 14. What is Privacy  Privacy is the right to be free from unreasonable intrusion into one's personal life.  Social media can pose a threat to privacy, as our personal information is often shared online.
  • 16. What is data Security  Data security is the process of protecting data from unauthorized access, use, disclosure, disruption, modification, or destruction.  Social media companies are responsible for protecting the data of their users.
  • 18. Ethics of Social Media Use  There are a number of ethical considerations related to social media use, such as:  Respect for others  Honesty  Responsibility
  • 19. Ethics of Social Media Use
  • 20. Cyberbullying is the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. What is Cyberbullying
  • 21. Hate speech is speech that attacks a person or group on the basis of attributes such as race, religion, sexual orientation, or gender. Hate Speech
  • 22. Misinformation and disinformation  Misinformation is false or inaccurate information that is spread without malicious intent.  Disinformation is false or inaccurate information that is spread intentionally to deceive.
  • 23. Social Media Addiction  What is social media addiction  Social media addiction is an excessive use of social media that interferes with a person's daily life.
  • 25. Digital Footprint  A digital footprint is the trail of data that a person leaves behind online, such as their social media posts, search history, and online purchases.
  • 26. Tips for Ethical Social Media Use  Be respectful of others.  Be honest.  Think before you post.  Be mindful of your privacy settings.  Use social media in moderation.
  • 27. Tips for Ethical Social Media Use
  • 28. Conclusion  Social media is a powerful tool that can be used for good or evil.  By understanding the cyber laws and ethics of using social media, we can make responsible and ethical choices about how we use it.