2. 1. Privacy
The law stated that a privacy is
the right of every people to make
personal decisions and live their
lives that is secluded from public
scrutiny in a reasonable manner
3. Privacy Invasion
Privacy invasion is a wrongful
act that have corresponding legal
responsibility because it causes
loss or injury to people’s lives.
4. Types of Privacy Invasion;
a. Instrution into seclusion
b. Appropriation of name or likeness
c. Public disclosure of private facts
d. Placing a person in a false light
5. 2. Hacking
The act of gaining unauthorized access to data
using a system or any digital devices such as
computers also called system penetration. It is
one of the most common threats in
cybersecurity since information in digital form is
vulnerable to various types of attacks
6. Different form of Hacking
Different tools and methods used in Hacking
Black-hat hacker
White-hat hacker
Gray-hat hacker
Skript kiddle
Key-logging software
Packet-sniffing software
Port-scanning software
Social Engineering
Dumpster diving
7. 3. Theft
The most popular type of theft is known as
identity theft – an act of stealing other’s personal
information to commit fraud. It can also be in the form of
pretending to be someone else, using the information of
other people for money and other benefits. An
identity thief can make unauthorized purchases and
transactions using other person’s credit card
information.
8. 4. Copyright Infringement
The act of using the copyrighted works or
covered by copyright law without
permission. Specifically,
reproducing, distributing, displaying,
performing protected work, or making
derivative works without
authorization of the copyright holder.
9. Different forms of copyright infringement:
Film recording in a movie theater
Posting a video on your company’s website that features
copyrighted contents such as songs, wordings, and images
Modifying copyrighted image or videos and displaying it to
company’s website
Creating merchandise for sale that features copyrighted works
Downloading films or music without paying their use
Copying any artistic or literary work without license
10. 5. Freedom of Expression and
Online Defamation
Freedom of expression -is the right to
search, receive, and impart information of
your choice regardless of boundary
without interference.
11. Online Defamation - is the act of giving false
statement that is harmful to someone’s
reputation verbally or in written form using
online platforms such as social media platform.
two types of defamation:
a) Libel – it refers to the written defamatory
statement
b) Slander – it refers to the spoken defamatory
statement
12. 6. Piracy
It involves illegal copying, use, and
distribution of digital intellectual property
such as software, music, and movies. Piracy
and plagiarism are classifications of
violation of laws regarding intellectual
property rights such as copyright crimes.
13. Examples of Piracy includes the following:
Illegal use or interception of internet
connection of other people
Publication, reproduction, and/or use of
patented or copyrighted work without
permission
Unauthorized copying of protected
software
Using protected software without license
14. 6. Fraud
In general, it is a wrongful act and
criminal deception resulting in financial
or personal gain. Computer fraud is the
term used in executing the illegal act
using computer system or attacking a
computer intends to alter, damage, or
worst disable it.
15. Types of fraud includes:
a) Mail Fraud – fraudulent activity that uses
mails or emails such as sending a letter to
someone to scam money or gain personal
information.
b) Health Care Fraud– it refers to a situation
where an individual such as insurance provider
or medical office misuse the insurance
information for their own personal gain.
16. Types of fraud includes:
c) Debit and Credit Card Fraud – accessing
other people’s debit or credit cards that
can completely drain bank accounts.
d) Internet Fraud – fraudulent activity
using internet to take advantage to other
people. It includes data breaches, malware,
and phishing.
17. 7. Internet Pornography
Accessing pictures or films that contains
representation of sexual behavior using
Internet. It is accessible over the Internet
via file sharing and websites.
18. CONCLUSION
The ethical issues in the digital age encompass a wide
range of concerns, from privacy to data protection,
cybersecurity, and the digital divide. Each issue poses
ethical dilemmas for individuals, corporations, and
policymakers to address. Recognizing the ethical
implications of these issues is crucial for creating a more
equitable and responsible digital future. Stricter
regulations, greater transparency, and broader access to
digital resources are among the potential solutions that
stakeholders must rally behind to safeguard ethics in the
digital age.