SlideShare a Scribd company logo
1 of 29
Download to read offline
Cyber Law and Ethics
Using Social Media
PRESENTED BY : MUHAMMD KHUBAIB AWAN
Introduction
 Social media has become an integral part of our daily lives, transforming the way
we communicate, share information, and connect with others.
 In this digital age, it is essential to recognize the impact and influence of social
media on individuals, communities, and societies.
 This presentation aims to explore the legal and ethical dimensions of using social
media, emphasizing the need to navigate the digital landscape responsibly.
SOCIAL MEDIA
What is cyber law
 Cyber law is the body of law that deals with the use of technology,
particularly the Internet.
Cyber Law Cover
• Cybercrime
• Intellectual
property
• Privacy
• Data security
Cyber Crime
 Cybercrime is any criminal activity that involves the use of a computer or
the Internet.
EXAMPLES
Hacking
Identity theft
Phishing
Cyberbullying
Intellectual Property
 Intellectual property (IP) is a form of property that protects the creations of
the human mind, such as:
 Inventions
 Literary works
 Music
 Artwork
Intellectual Property
Copyright
 Copyright is a form of IP that protects original works of authorship, such as:
 Books
 Movies
 Songs
 Software
Copyright
Fair Use
 Fair use is a doctrine that allows the use of copyrighted material without
the permission of the copyright holder under certain circumstances, such
as:
 Criticism
 Comment
 News reporting
 Teaching
Fair Use
What is Privacy
 Privacy is the right to be free from unreasonable intrusion into one's
personal life.
 Social media can pose a threat to privacy, as our personal information is
often shared online.
Privacy
What is data Security
 Data security is the process of protecting data from unauthorized access,
use, disclosure, disruption, modification, or destruction.
 Social media companies are responsible for protecting the data of their
users.
Data Security
Ethics of Social Media Use
 There are a number of ethical considerations related to social media use,
such as:
 Respect for others
 Honesty
 Responsibility
Ethics of Social Media Use
Cyberbullying is the use of electronic
communication to bully a person,
typically by sending messages of an
intimidating or threatening nature.
What is Cyberbullying
Hate speech is speech that attacks a
person or group on the basis of attributes
such as race, religion, sexual orientation,
or gender.
Hate Speech
Misinformation and disinformation
 Misinformation is false or inaccurate information that is spread without
malicious intent.
 Disinformation is false or inaccurate information that is spread intentionally
to deceive.
Social Media Addiction
 What is social media addiction
 Social media addiction is an excessive use of social media that interferes
with a person's daily life.
Social Media Addiction
Digital Footprint
 A digital footprint is the trail of data that a person leaves behind online,
such as their social media posts, search history, and online purchases.
Tips for Ethical Social Media Use
 Be respectful of others.
 Be honest.
 Think before you post.
 Be mindful of your privacy settings.
 Use social media in moderation.
Tips for Ethical Social Media Use
Conclusion
 Social media is a powerful tool that can be used for good or evil.
 By understanding the cyber laws and ethics of using social media, we can
make responsible and ethical choices about how we use it.
THANK YOU

More Related Content

What's hot

Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals Kirti Verma
 
The History Of The Internet Presentation
The  History Of The  Internet  PresentationThe  History Of The  Internet  Presentation
The History Of The Internet Presentationdgieseler1
 
Features Of The Internet
Features Of The InternetFeatures Of The Internet
Features Of The Internetkimromero
 
How the internet works
How the internet worksHow the internet works
How the internet worksftcim
 
Web browsing and Internet termenologies
Web browsing and Internet termenologiesWeb browsing and Internet termenologies
Web browsing and Internet termenologiesVTC_NeilaSofien
 
Types of network
Types of networkTypes of network
Types of networkishjari
 
Internet
InternetInternet
Internetmustha3
 
ternet Services and how to use library filed
ternet Services and how to use library filedternet Services and how to use library filed
ternet Services and how to use library filedshanika kalpani
 
How internet works
How internet worksHow internet works
How internet worksANurag Kumar
 
Computer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & DisadvantagesComputer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & DisadvantagesRita Gokani
 
Connecting to the internet
Connecting to the internetConnecting to the internet
Connecting to the internetUjjwal 'Shanu'
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internetFolasade Adedeji
 
How Internet Works
How Internet WorksHow Internet Works
How Internet WorksUrvi Talaty
 

What's hot (20)

Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
 
The History Of The Internet Presentation
The  History Of The  Internet  PresentationThe  History Of The  Internet  Presentation
The History Of The Internet Presentation
 
What is the internet
What is  the internetWhat is  the internet
What is the internet
 
Uses of internet
Uses of internetUses of internet
Uses of internet
 
Features Of The Internet
Features Of The InternetFeatures Of The Internet
Features Of The Internet
 
How the internet works
How the internet worksHow the internet works
How the internet works
 
Web browsing and Internet termenologies
Web browsing and Internet termenologiesWeb browsing and Internet termenologies
Web browsing and Internet termenologies
 
Internet ppt
Internet pptInternet ppt
Internet ppt
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
PPT On INTERNET
PPT On INTERNETPPT On INTERNET
PPT On INTERNET
 
The internet
The internetThe internet
The internet
 
Types of network
Types of networkTypes of network
Types of network
 
Internet
InternetInternet
Internet
 
ternet Services and how to use library filed
ternet Services and how to use library filedternet Services and how to use library filed
ternet Services and how to use library filed
 
How internet works
How internet worksHow internet works
How internet works
 
Computer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & DisadvantagesComputer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & Disadvantages
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
Connecting to the internet
Connecting to the internetConnecting to the internet
Connecting to the internet
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internet
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 

Similar to cyber law and ethics uisng social media .pdf

ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
The Basics of Media and Information Literacy.pptx
The Basics of Media and Information Literacy.pptxThe Basics of Media and Information Literacy.pptx
The Basics of Media and Information Literacy.pptxAngeloAdajar
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...Mehedi Hasan
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxOxfordRiNorth
 
digital media and society.pptx
digital media and society.pptxdigital media and society.pptx
digital media and society.pptxcatherinviscom
 
ETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital EmpowermentETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital Empowermentnellykelly1663
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Social media, Technology, and Youth
Social media, Technology, and YouthSocial media, Technology, and Youth
Social media, Technology, and YouthKhadija Parween
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Share Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxShare Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxeyesred813
 
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenshipmonazarrinkelk
 
cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...
cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...
cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...PiyushSharma12895
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesnincher
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesmatarid
 
Description In the news we are constantly hearing about securit.docx
Description In the news we are constantly hearing about securit.docxDescription In the news we are constantly hearing about securit.docx
Description In the news we are constantly hearing about securit.docxcarolinef5
 

Similar to cyber law and ethics uisng social media .pdf (20)

ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
The Basics of Media and Information Literacy.pptx
The Basics of Media and Information Literacy.pptxThe Basics of Media and Information Literacy.pptx
The Basics of Media and Information Literacy.pptx
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
digital media and society.pptx
digital media and society.pptxdigital media and society.pptx
digital media and society.pptx
 
ETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital EmpowermentETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital Empowerment
 
Lesson1.pptx
Lesson1.pptxLesson1.pptx
Lesson1.pptx
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Social media, Technology, and Youth
Social media, Technology, and YouthSocial media, Technology, and Youth
Social media, Technology, and Youth
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Share Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxShare Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptx
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenship
 
cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...
cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...
cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theories
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theories
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Description In the news we are constantly hearing about securit.docx
Description In the news we are constantly hearing about securit.docxDescription In the news we are constantly hearing about securit.docx
Description In the news we are constantly hearing about securit.docx
 

Recently uploaded

The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyDamar Juniarto
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresencePC Doctors NET
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfOndejSur
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfappinfoedgeca
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxChloeMeadows1
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebJie Liau
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkklolsDocherty
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsrahman018755
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.Tortogel
 
Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsrahman018755
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appscristianmanaila2
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirtrahman018755
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?Linksys Velop Login
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideVarun Mithran
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsrahman018755
 

Recently uploaded (17)

The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
 
Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirts
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 

cyber law and ethics uisng social media .pdf

  • 1. Cyber Law and Ethics Using Social Media PRESENTED BY : MUHAMMD KHUBAIB AWAN
  • 2. Introduction  Social media has become an integral part of our daily lives, transforming the way we communicate, share information, and connect with others.  In this digital age, it is essential to recognize the impact and influence of social media on individuals, communities, and societies.  This presentation aims to explore the legal and ethical dimensions of using social media, emphasizing the need to navigate the digital landscape responsibly.
  • 4. What is cyber law  Cyber law is the body of law that deals with the use of technology, particularly the Internet.
  • 5. Cyber Law Cover • Cybercrime • Intellectual property • Privacy • Data security
  • 6. Cyber Crime  Cybercrime is any criminal activity that involves the use of a computer or the Internet.
  • 8. Intellectual Property  Intellectual property (IP) is a form of property that protects the creations of the human mind, such as:  Inventions  Literary works  Music  Artwork
  • 10. Copyright  Copyright is a form of IP that protects original works of authorship, such as:  Books  Movies  Songs  Software
  • 12. Fair Use  Fair use is a doctrine that allows the use of copyrighted material without the permission of the copyright holder under certain circumstances, such as:  Criticism  Comment  News reporting  Teaching
  • 14. What is Privacy  Privacy is the right to be free from unreasonable intrusion into one's personal life.  Social media can pose a threat to privacy, as our personal information is often shared online.
  • 16. What is data Security  Data security is the process of protecting data from unauthorized access, use, disclosure, disruption, modification, or destruction.  Social media companies are responsible for protecting the data of their users.
  • 18. Ethics of Social Media Use  There are a number of ethical considerations related to social media use, such as:  Respect for others  Honesty  Responsibility
  • 19. Ethics of Social Media Use
  • 20. Cyberbullying is the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. What is Cyberbullying
  • 21. Hate speech is speech that attacks a person or group on the basis of attributes such as race, religion, sexual orientation, or gender. Hate Speech
  • 22. Misinformation and disinformation  Misinformation is false or inaccurate information that is spread without malicious intent.  Disinformation is false or inaccurate information that is spread intentionally to deceive.
  • 23. Social Media Addiction  What is social media addiction  Social media addiction is an excessive use of social media that interferes with a person's daily life.
  • 25. Digital Footprint  A digital footprint is the trail of data that a person leaves behind online, such as their social media posts, search history, and online purchases.
  • 26. Tips for Ethical Social Media Use  Be respectful of others.  Be honest.  Think before you post.  Be mindful of your privacy settings.  Use social media in moderation.
  • 27. Tips for Ethical Social Media Use
  • 28. Conclusion  Social media is a powerful tool that can be used for good or evil.  By understanding the cyber laws and ethics of using social media, we can make responsible and ethical choices about how we use it.