This document discusses legal and ethical issues related to information and communication technology (ICT). It begins by defining the differences between ethics and law, noting that ethics provides moral guidelines while law establishes mandatory rules and penalties. The document then covers intellectual property rights, privacy, and the role of ICT in medicine. It provides an overview of the Cybercrime Prevention Act of 2012 in the Philippines, outlining punishable cybercrime offenses and associated penalties. The key punishable acts include illegal access of computer data, cybersex, child pornography, and unsolicited commercial communications. Corporations can also face liability and fines for cybercrimes committed by employees. The document concludes by asking how ICT ethics can be implemented in the 21st century
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
The US Department of Justice released a report regarding #cryptocurrency enforcement with strategies to take related to #digitalassets and interest in how enforcement will work in the #decentralizedfinance space.
The report could serve to shape the future vision of authorities and regulators towards #cryptocurrencies.
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
The US Department of Justice released a report regarding #cryptocurrency enforcement with strategies to take related to #digitalassets and interest in how enforcement will work in the #decentralizedfinance space.
The report could serve to shape the future vision of authorities and regulators towards #cryptocurrencies.
Cybercrime is a digital crime committed to reaping profits through the Internet as a medium. Any criminal activity that occurs in the digital world or through the internet network is referred to as internet crime. Cybercrime also refers to criminal activity on computers and computer networks. This activity can be done in a certain location or even done between countries. These crimes include credit card forgery, confidence fraud, the dissemination of personal information, pornography, and so on. In ancient times there was no strong law to combat cybercrime. Since there are electronic information laws and transactions, legal jurisdiction of computer crime has been applied. Computer networks are not only installed in one particular local area but can be applied to a worldwide network. It is what makes cybercrime can occur between countries freely. This issue requires universal jurisdiction. A country has the authority to combat crimes that threaten the international community. This jurisdiction is applied without determining where the crime was committed and the citizen who committed the cybercrime. This jurisdiction is created in the absence of an international judicial body specifically to try individual crimes. Cybercrime cannot be totally eradicated. Implementing international jurisdiction at least reduces the number of cybercrimes in the world.
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIABenedict Ishabakaki
This quarter Victory attorney & Consultants, we provide an overview of the cyber defamation in Tanzania, the legal perspective, remedy available and our recommendations
David Menken - Fire Dept. Use of Social Media - The Legal IssuesDavid Menken
This is a presentation given to the Westchester County Association of Fire Districts on August 26, 2015 on legal issues involving fire department use of social media. His presentation focused on two areas, (1) First Amendment issues and the ability of departments to regulate members' use of social media when it impacts the department, and (2) compliance with good government laws such as the Freedom of Information Act and the Open Meetings Law.
Overview of our GNI report, downloadable from http://globalnetworkinitiative.org/news/new-report-outlines-recommendations-governments-companies-and-others-how-protect-free
Legal Issues of Government Use of Social MediaDavid Menken
This presentation explores the legal issues relevant to government use of social media, most particularly first amendment and open meetings/document retention matters. It was given at the New York State Cyber Security Conference in Albany NY on June 2, 2015.
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019Benjamin Ang
This presentation explains two of the elevent Norms proposed by the UNGGE in 2015
Cyber Norm (b) States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs; and
Cyber Norm (c) States should consider all relevant information, including the larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences
Cybercrime is a digital crime committed to reaping profits through the Internet as a medium. Any criminal activity that occurs in the digital world or through the internet network is referred to as internet crime. Cybercrime also refers to criminal activity on computers and computer networks. This activity can be done in a certain location or even done between countries. These crimes include credit card forgery, confidence fraud, the dissemination of personal information, pornography, and so on. In ancient times there was no strong law to combat cybercrime. Since there are electronic information laws and transactions, legal jurisdiction of computer crime has been applied. Computer networks are not only installed in one particular local area but can be applied to a worldwide network. It is what makes cybercrime can occur between countries freely. This issue requires universal jurisdiction. A country has the authority to combat crimes that threaten the international community. This jurisdiction is applied without determining where the crime was committed and the citizen who committed the cybercrime. This jurisdiction is created in the absence of an international judicial body specifically to try individual crimes. Cybercrime cannot be totally eradicated. Implementing international jurisdiction at least reduces the number of cybercrimes in the world.
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIABenedict Ishabakaki
This quarter Victory attorney & Consultants, we provide an overview of the cyber defamation in Tanzania, the legal perspective, remedy available and our recommendations
David Menken - Fire Dept. Use of Social Media - The Legal IssuesDavid Menken
This is a presentation given to the Westchester County Association of Fire Districts on August 26, 2015 on legal issues involving fire department use of social media. His presentation focused on two areas, (1) First Amendment issues and the ability of departments to regulate members' use of social media when it impacts the department, and (2) compliance with good government laws such as the Freedom of Information Act and the Open Meetings Law.
Overview of our GNI report, downloadable from http://globalnetworkinitiative.org/news/new-report-outlines-recommendations-governments-companies-and-others-how-protect-free
Legal Issues of Government Use of Social MediaDavid Menken
This presentation explores the legal issues relevant to government use of social media, most particularly first amendment and open meetings/document retention matters. It was given at the New York State Cyber Security Conference in Albany NY on June 2, 2015.
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019Benjamin Ang
This presentation explains two of the elevent Norms proposed by the UNGGE in 2015
Cyber Norm (b) States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs; and
Cyber Norm (c) States should consider all relevant information, including the larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
Computer crime and the adequacy of the current legal framework in sri lankaVishni Ganepola
The slide set gives a brief idea as to what is computer crime,types of computer crimes, Existing Legal Framework on Computer Crimes in Sri Lanka, Effectiveness of the current legal framework and also provides few recommendations for further advancement in law.
You can access the video in the second page via the following link:
https://www.youtube.com/watch?v=JDRIGOJk0D4&t=7s
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
2. Objectives:
•Define legal and ethical ICT issues.
•Discuss ethical, legal and social aspects of
ICT.
•Recognize Cyber Crime Law in the Philippines.
•Analyze the Punishable acts and Penalties of
Cybercrime offenses.
3. Ethical, Legal and Social aspects of
Information and Communication
Technology
• Ethics and law
Ethics defines what is good for an individual as well
as for the society and establishes the nature of duties
that people owe themselves and one another. Human
beings have the ability, partly innate and partly acquired,
to judge human actions as morally good or bad, right or
wrong.
4. Differences between ethic and law
What is Computer ethic?
In general, ethics is a moral philosophy where a
person makes a specific moral choice and sticks to it.
What is Computer law?
Law is a legal system comprising of rulesand
principles that govern the affairs of community and
controlled by a political authority.
5. Differences between ethic and law
Ethics
Guidelines
Moral standards
Fee to follow
No punishments
Universals
Produce ethical computer
users
immoral
Law
Control
Judicial Standards
Must follow
Penalties, imprisonments and
other punishments
Depends on country
Prevent misusing of computers
Crime
6. Intellectual Property Rights
Intellectual property (IP) refers to works by created by
inventors, authors, and artists. These works are unique
and have value in the market place.
Intellectual property laws cover ideas, inventions,
literary, creations, unique names, business models,
industrial processes, computer program codes and more.
7. Intellectual Property Protection
There are four (4) types of Intellectual Property
protection
1. Patents for invention
2. Trademarks for brand identity
3. Design for product appearance
4. Copyright for material
8. • Privacy, Integrity, Security and Protection of
Information & the Internet
Privacy means providing confidentiality to our personal
data. One may not like, for example, to make public one’s
insurance details, medical history etc.
Information Integrity means the information provided
should be relevant, complete, up-to-date, trustworthy
and available in time. A job alert after the recruitment
is over or without the address of the employer or to
student who is in his/her high school, for example, is
hardly of any use.
9. Security and protection concerned with protection against accidental or
intentional destruction or disclosure of data and programs by
unscrupulous persons and in case data loss occurs how to recover it.
The Internet is a global technology network (WAN) made up of many
smaller contributing networks (LANs, MANs, CANs etc.) to support the
open exchange of information among many different kinds of institutions,
organizations and individuals all over the world. Internet, no doubt, is a
boon to the present society by providing answers to almost every problem
and need of mankind but at the same time, can be its greatest enemy
aswell.
10. • ICT in Medicine and Health care
ICT plays an increasingly important role in the field of
medicines and diagnosis. Today, ICT in medicine is not only
used for storing, processing, modeling and transmitting
patient data rather has given rise to completely new
diagnostic tools such as CT(computer tomography), CAT scan,
ultrasound, MRI (magnetic resonance imaging), functional
MRI, PET (positron emission tomography) etc that help
inspection of the inner body without dissection or invasion.
11. Cybercrime Law in the Philippines
“Cybercrime Prevention Act of 2012”.
[ Republic Act No. 10175 ]
Republic Act No. 10175, or the Cybercrime Prevention Act of
2012, was signed into law by President Aquino on Sept. 12, 2012.
Its original goal was to penalize acts like cybersex, child
pornography, identity theft and unsolicited electronic
communication in the country.
12. Cybercrime Law in the Philippines
“Cybercrime Prevention Act of 2012”.
[ Republic Act No. 10175 ]
Watch the video about the case of Cybercrime offenses in
the Philippines.
https://www.youtube.com/watch?v=wBX2PhfSGn4
14. Punishable Acts
Sec 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
a. Offenses against the confidentiality, integrity and
availability of computer data and systems:
1. Illegal Access 4.System Interference
2. Illegal Interception 5. Misuse of Devices
3. Data Interference 6. Cyber-squatting
16. Punishable Acts
SEC. 5. Other Offenses. — The following acts shall also
constitute an offense:
Aiding or Abetting in the Commission of Cybercrime
Attempt in the Commission of Cybercrime
SEC. 6. All crimes defined and penalized by the Revised Penal
Code, as amended, and special laws, if committed by, through and
with the use of information and communications technologies shall
be covered by the relevant provisions of this Act: Provided, That
the penalty to be imposed shall be one (1) degree higher than that
provided for by the Revised Penal Code, as amended, and special
laws, as the case may be.
17. Punishable Acts
SEC. 7. Liability under Other Laws. — A prosecution
under this Act shall be without prejudice to any liability for
violation of any provision of the Revised Penal Code, as
amended, or special laws.
18. Penalties
• SEC. 8. Penalties. — Any person found guilty of any of the
punishable acts enumerated in Sections 4(a) and 4(b) of this Act
shall be punished with imprisonment of prison mayor or a fine of
at least Two hundred thousand pesos (PhP200,000.00) up to a
maximum amount commensurate to the damage incurred or both.
• Any person found guilty of the punishable act under Section
4(a)(5) shall be punished with imprisonment of prison mayor or a
fine of not more than Five hundred thousand pesos
(PhP500,000.00) or both.
19. Penalties
• If punishable acts in Section 4(a) are committed against critical
infrastructure, the penalty of reclusion temporal or a fine of at
least Five hundred thousand pesos (PhP500,000.00) up to
maximum amount commensurate to the damage incurred or both,
shall be imposed.
• Any person found guilty of any of the punishable acts
enumerated in Section 4(c)(1) of this Act shall be punished with
imprisonment of prison mayor or a fine of at least Two hundred
thousand pesos (PhP200,000.00) but not exceeding One million
pesos (PhP1,000,000.00) or both.
20. Penalties
• Any person found guilty of any of the punishable acts enumerated in
Section 4(c)(2) of this Act shall be punished with the penalties as
enumerated in Republic Act No. 9775 or the “Anti-Child Pornography Act
of 2009”: Provided, That the penalty to be imposed shall be one (1)
degree higher than that provided for in Republic Act No. 9775, if
committed through a computer system.
• Any person found guilty of any of the punishable acts enumerated in
Section 4(c)(3) shall be punished with imprisonment of arrest mayor or a
fine of at least Fifty thousand pesos (PhP50,000.00) but not exceeding
Two hundred fifty thousand pesos (PhP250,000.00) or both.
21. Penalties
• Any person found guilty of any of the punishable acts enumerated in Section 5 shall be
punished with imprisonment one (1) degree lower than that of the prescribed penalty for
the offense or a fine of at least One hundred thousand pesos (PhP100,000.00) but not
exceeding Five hundred thousand pesos (PhP500,000.00) or both.
SEC. 9. Corporate Liability. — When any of the punishable acts herein defined are
knowingly committed on behalf of or for the benefit of a juridical person, by a
natural person acting either individually or as part of an organ of the juridical
person, who has a leading position within, based on: (a) a power of representation of
the juridical person provided the act committed falls within the scope of such
authority; (b) an authority to take decisions on behalf of the juridical
person: Provided, That the act committed falls within the scope of such authority;
or (c) an authority to exercise control within the juridical person, the juridical
person shall be held liable for a fine equivalent to at least double the fines
imposable in Section 7 up to a maximum of Ten million pesos (PhP10,000,000.00).
22. Penalties
• If the commission of any of the punishable acts herein defined
was made possible due to the lack of supervision or control by a
natural person referred to and described in the preceding
paragraph, for the benefit of that juridical person by a natural
person acting under its authority, the juridical person shall be
held liable for a fine equivalent to at least double the fines
imposable in Section 7 up to a maximum of Five million pesos
(PhP5,000,000.00).
• The liability imposed on the juridical person shall be without
prejudice to the criminal liability of the natural person who has
committed the offense.