SlideShare a Scribd company logo
• Generated a list of proper Netiquette to be
used in the internet
• Applied the copyright law and other
cybercrime laws on a given set of
situations
• When you enter any new culture -- and cyberspace has its
own culture -- you're liable to commit a few social blunders.
You might offend people without meaning to. Or you might
misunderstand what others say and take offense when it's
not intended. To make matters worse, something about
cyberspace makes it easy to forget that you're interacting
with other real people -- not just ASCII characters on a
screen, but live human characters.
1. Remember the human
2. Adhere to the same standards of behavior
online that you follow in real life
3. Know where you are in cyber space
4. Respect other people’s time and bandwidth
5. Make yourself look good online
The Core Rules of Netiquette are excerpted from the book Netiquette by Virginia Shea (Albion
Books, 1994).
6. Share expert knowledge
7. Help keep flame wars under control
8. Respect other people’s privacy
9. Don’t abuse your power
10. Be forgiving of other people’s mistake
The Core Rules of Netiquette are excerpted from the book Netiquette by Virginia Shea (Albion
Books, 1994).
• Netiquette is based on real-world etiquette that states the acceptable
conduct in the Internet. It specifically tells us to follow rules in
different online communities, respect the rights over the works of
other people made available online, not to waste other people’s time,
offer help in any way, connect with people rather than make enemies,
and respect one’s privacy. It basically tells us to remember and
consider the human behind the technology. What you will not
normally do in the real world should not be done also in the Internet.
•Refers to the creations of the human mind such as
literary, scholarly, and artistic works which includes web
pages. Intellectual property rights protect individuals by
giving the creators property rights over their creations.
• Is a form of intellectual property
which specifically refers to
inventions, industrial designs,
trademarks, service marks, designs
of integrated circuits, commercial
names, and designations. Intellectual
property rights also protect the
creators from unfair competition.
• Associating a product or service with another
manufacturer or service provider
• Imitation of product or services logos
• Piracy
•Protects the form through which ideas are expressed.
• Ex. Books, pamphlets, periodicals, lectures, letters, dramatic
or musical compositions, drawings, paintings, architectures,
photographic and cinematographic works, illustrations,
maps, advertisements, computer programs, and other similar
original creations.
•Protection for inventions gives the
inventor monopoly over the idea
but during fixed numbers of years
which is usually 20 years.
•Inventions should be registered
and made public.
•The author is given the right to
control his original work such as
preventing copying and use by
others.
Factors to be Considered for Fair Use:
1. How the Material was used
2. The nature of the copyrighted material
3. The amount or importance of the part in relation to the whole copyrighted
material
4. The effect on the potential value of the copyrighted material
• Occurs when authors allow others to use their copyright
protected work for free. Abandonment may be restricted to
noncommercial use.
• Ex. General Public License (GPL) – allows others to use it
freely as long as they agree on stated conditions.
• Web pages are covered by copyright
• Linking a site is not always okay
• Posting or reporting of articles is not fair
• Free graphics is not free
• Free scripts have conditions
Cybercrime Law of the Philippines
•Republic Act No. 10175 -
https://www.officialgazette.gov.ph/2012/09/12
/republic-act-no-10175/
• Create a Reaction Paper regarding the Cyber Crime Law
• Submit a Computerized format in Short bond paper. (Max. of 2 Pages)
• Margin: 1 inch in all sides
• Font Size: 12 Font Type: Times New Roman
• Paragraph: Single Space
• Points of Discussion
• What are the provisions that you think it’s too much or too weak and need to be
changed.
• Do you Agree/Disagree in that Provision? Why?
• Use the same Web App (Bubbl.us). Create a Concept Map that will
explain the use of the internet such as how to interact with it and its
benefits from using it. The presentation should provide the following
information:
1. Technical and Software requirements – what kind of hardware
and setup, software, and services are needed?
2. Social and ethical requirements – what should be the general
attitude and issues to be avoided when using the internet?
3. Service Offered – what are the services and features of the Internet?
4. Benefits – How will you benefit from the use of the internet?
Technical & Software
requirements
Using the
Internet
Services offered by
the Internet
Benefits
Social and Ethical
requirements
• https://www.youtube.com/watch?v=Wl9InWYntac
• Go to bubbl.us website
• Open the link above for tutorial.
• Save your file by Export then select .jpg or .png format.
• Upload in mvle.
Send us a message or
visit us
Laoag City, Ilocos Norte,
Philippines
(63) 77-600-2014
cte@mmsu.edu.ph
Get in Touch
With Us
facebook.com/MMSUofficial
www.mmsu.edu.ph
Follow us for updates

More Related Content

What's hot

Essential Law for Animators: Protect Your Characters!
Essential Law for Animators: Protect Your Characters!Essential Law for Animators: Protect Your Characters!
Essential Law for Animators: Protect Your Characters!
Deborah Gonzalez, Esq.
 
Don't Copy Wrong Copyright
Don't Copy Wrong Copyright Don't Copy Wrong Copyright
Don't Copy Wrong Copyright
Elise C. Cole
 
Copyright Issues in Digitisation
Copyright Issues in DigitisationCopyright Issues in Digitisation
Copyright Issues in Digitisation
Alastair Dunning
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
Adyns
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
AnkitTripathi159
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
onur karaman
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Faraz Ahmed
 
Copyright and Ethics In Digital Age
Copyright and Ethics In Digital AgeCopyright and Ethics In Digital Age
Copyright and Ethics In Digital Age
Kathy Gill
 
Copyright
CopyrightCopyright
Copyrightdklier
 
Plagiarism, Copyright and Fair Use in Business Communications
Plagiarism, Copyright and Fair Use in Business CommunicationsPlagiarism, Copyright and Fair Use in Business Communications
Plagiarism, Copyright and Fair Use in Business Communications
schubert b2b
 
Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship groot83
 
Digital law
Digital lawDigital law
Digital law
myls69
 
What Every IT Person Should Be Aware of.
What Every IT Person Should Be Aware of.What Every IT Person Should Be Aware of.
What Every IT Person Should Be Aware of.
ABDULAZIZ KHAMIS
 
Lesson on Digital Ethics & Copyrights
Lesson on Digital Ethics & CopyrightsLesson on Digital Ethics & Copyrights
Lesson on Digital Ethics & Copyrights
computerswithredin
 
Ethical and legal issues
Ethical and legal issuesEthical and legal issues
Ethical and legal issuesNickardo Salmon
 
Building creative expression
Building creative expressionBuilding creative expression
Building creative expressionrichardofaustin
 
Digital rights & responsibilities
Digital rights & responsibilitiesDigital rights & responsibilities
Digital rights & responsibilities
Zachmclovin16
 
Copyright Protection in Cyberspace- A Comparitive Study of the USA and India
Copyright Protection in Cyberspace- A Comparitive Study of the USA and IndiaCopyright Protection in Cyberspace- A Comparitive Study of the USA and India
Copyright Protection in Cyberspace- A Comparitive Study of the USA and IndiaDevanshi Goyal
 

What's hot (20)

Essential Law for Animators: Protect Your Characters!
Essential Law for Animators: Protect Your Characters!Essential Law for Animators: Protect Your Characters!
Essential Law for Animators: Protect Your Characters!
 
Don't Copy Wrong Copyright
Don't Copy Wrong Copyright Don't Copy Wrong Copyright
Don't Copy Wrong Copyright
 
Copyright Issues in Digitisation
Copyright Issues in DigitisationCopyright Issues in Digitisation
Copyright Issues in Digitisation
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Copyright and Ethics In Digital Age
Copyright and Ethics In Digital AgeCopyright and Ethics In Digital Age
Copyright and Ethics In Digital Age
 
Copyright
CopyrightCopyright
Copyright
 
Plagiarism, Copyright and Fair Use in Business Communications
Plagiarism, Copyright and Fair Use in Business CommunicationsPlagiarism, Copyright and Fair Use in Business Communications
Plagiarism, Copyright and Fair Use in Business Communications
 
Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship
 
Digital law
Digital lawDigital law
Digital law
 
What Every IT Person Should Be Aware of.
What Every IT Person Should Be Aware of.What Every IT Person Should Be Aware of.
What Every IT Person Should Be Aware of.
 
Lesson on Digital Ethics & Copyrights
Lesson on Digital Ethics & CopyrightsLesson on Digital Ethics & Copyrights
Lesson on Digital Ethics & Copyrights
 
Ethical and legal issues
Ethical and legal issuesEthical and legal issues
Ethical and legal issues
 
Building creative expression
Building creative expressionBuilding creative expression
Building creative expression
 
Digital rights & responsibilities
Digital rights & responsibilitiesDigital rights & responsibilities
Digital rights & responsibilities
 
Unit 306 - Lesson 10 - Legal Issues
Unit 306 - Lesson 10 - Legal IssuesUnit 306 - Lesson 10 - Legal Issues
Unit 306 - Lesson 10 - Legal Issues
 
Copyright Protection in Cyberspace- A Comparitive Study of the USA and India
Copyright Protection in Cyberspace- A Comparitive Study of the USA and IndiaCopyright Protection in Cyberspace- A Comparitive Study of the USA and India
Copyright Protection in Cyberspace- A Comparitive Study of the USA and India
 

Similar to Lec2 netiquette legal issues and security

MIL WEEK 8.pptx
MIL WEEK 8.pptxMIL WEEK 8.pptx
MIL WEEK 8.pptx
danielloberiz1
 
On Creativity, Copyrights and Commerce
On Creativity, Copyrights  and CommerceOn Creativity, Copyrights  and Commerce
On Creativity, Copyrights and Commerce
Adelphi Consulting
 
Collisions in the digital paradigm short
Collisions in the digital paradigm short Collisions in the digital paradigm short
Collisions in the digital paradigm short David Harvey
 
Alcc copyright extended
Alcc copyright extendedAlcc copyright extended
Alcc copyright extended
CopyrightTrish
 
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
CedLinc
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and TechnologyMr Shipp
 
Copyright and Technology
Copyright and TechnologyCopyright and Technology
Copyright and Technology
Nickkisha Farrell
 
Ethical & legal work practices in the design industry
Ethical & legal work practices in the design industryEthical & legal work practices in the design industry
Ethical & legal work practices in the design industryWebmaster
 
Intellectual Property and Technology
Intellectual Property and TechnologyIntellectual Property and Technology
Intellectual Property and Technology
WhitefordTaylor
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Society law & ethics.pdf
Society law & ethics.pdfSociety law & ethics.pdf
Society law & ethics.pdf
Aditya901507
 
Dark Side of the Net Lecture 1 Introduction
Dark Side of the Net Lecture 1 IntroductionDark Side of the Net Lecture 1 Introduction
Dark Side of the Net Lecture 1 Introduction
Marcus Leaning
 
Competitive Landscape Of The Web
Competitive Landscape Of The WebCompetitive Landscape Of The Web
Competitive Landscape Of The Web
William J. Brown
 
Copyright in digital era
Copyright in digital eraCopyright in digital era
Copyright in digital era
Sunil Saini
 
Internet Law
Internet LawInternet Law
Copyright crash course edtc 6340 64 mario a ortiz
Copyright crash course edtc 6340 64 mario a ortizCopyright crash course edtc 6340 64 mario a ortiz
Copyright crash course edtc 6340 64 mario a ortizUniversity of Texas
 
Society_law_and_ethics.pdf
Society_law_and_ethics.pdfSociety_law_and_ethics.pdf
Society_law_and_ethics.pdf
ManyaThakur12
 
Impact of computers on society
Impact of computers on societyImpact of computers on society
Impact of computers on society
Middle East International School
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends
Endcode_org
 
Ethical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceEthical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceNicholas Davis
 

Similar to Lec2 netiquette legal issues and security (20)

MIL WEEK 8.pptx
MIL WEEK 8.pptxMIL WEEK 8.pptx
MIL WEEK 8.pptx
 
On Creativity, Copyrights and Commerce
On Creativity, Copyrights  and CommerceOn Creativity, Copyrights  and Commerce
On Creativity, Copyrights and Commerce
 
Collisions in the digital paradigm short
Collisions in the digital paradigm short Collisions in the digital paradigm short
Collisions in the digital paradigm short
 
Alcc copyright extended
Alcc copyright extendedAlcc copyright extended
Alcc copyright extended
 
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
 
Copyright and Technology
Copyright and TechnologyCopyright and Technology
Copyright and Technology
 
Ethical & legal work practices in the design industry
Ethical & legal work practices in the design industryEthical & legal work practices in the design industry
Ethical & legal work practices in the design industry
 
Intellectual Property and Technology
Intellectual Property and TechnologyIntellectual Property and Technology
Intellectual Property and Technology
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Society law & ethics.pdf
Society law & ethics.pdfSociety law & ethics.pdf
Society law & ethics.pdf
 
Dark Side of the Net Lecture 1 Introduction
Dark Side of the Net Lecture 1 IntroductionDark Side of the Net Lecture 1 Introduction
Dark Side of the Net Lecture 1 Introduction
 
Competitive Landscape Of The Web
Competitive Landscape Of The WebCompetitive Landscape Of The Web
Competitive Landscape Of The Web
 
Copyright in digital era
Copyright in digital eraCopyright in digital era
Copyright in digital era
 
Internet Law
Internet LawInternet Law
Internet Law
 
Copyright crash course edtc 6340 64 mario a ortiz
Copyright crash course edtc 6340 64 mario a ortizCopyright crash course edtc 6340 64 mario a ortiz
Copyright crash course edtc 6340 64 mario a ortiz
 
Society_law_and_ethics.pdf
Society_law_and_ethics.pdfSociety_law_and_ethics.pdf
Society_law_and_ethics.pdf
 
Impact of computers on society
Impact of computers on societyImpact of computers on society
Impact of computers on society
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends
 
Ethical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceEthical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerce
 

Recently uploaded

一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 

Recently uploaded (20)

一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 

Lec2 netiquette legal issues and security

  • 1.
  • 2. • Generated a list of proper Netiquette to be used in the internet • Applied the copyright law and other cybercrime laws on a given set of situations
  • 3. • When you enter any new culture -- and cyberspace has its own culture -- you're liable to commit a few social blunders. You might offend people without meaning to. Or you might misunderstand what others say and take offense when it's not intended. To make matters worse, something about cyberspace makes it easy to forget that you're interacting with other real people -- not just ASCII characters on a screen, but live human characters.
  • 4. 1. Remember the human 2. Adhere to the same standards of behavior online that you follow in real life 3. Know where you are in cyber space 4. Respect other people’s time and bandwidth 5. Make yourself look good online The Core Rules of Netiquette are excerpted from the book Netiquette by Virginia Shea (Albion Books, 1994).
  • 5. 6. Share expert knowledge 7. Help keep flame wars under control 8. Respect other people’s privacy 9. Don’t abuse your power 10. Be forgiving of other people’s mistake The Core Rules of Netiquette are excerpted from the book Netiquette by Virginia Shea (Albion Books, 1994).
  • 6. • Netiquette is based on real-world etiquette that states the acceptable conduct in the Internet. It specifically tells us to follow rules in different online communities, respect the rights over the works of other people made available online, not to waste other people’s time, offer help in any way, connect with people rather than make enemies, and respect one’s privacy. It basically tells us to remember and consider the human behind the technology. What you will not normally do in the real world should not be done also in the Internet.
  • 7.
  • 8. •Refers to the creations of the human mind such as literary, scholarly, and artistic works which includes web pages. Intellectual property rights protect individuals by giving the creators property rights over their creations.
  • 9. • Is a form of intellectual property which specifically refers to inventions, industrial designs, trademarks, service marks, designs of integrated circuits, commercial names, and designations. Intellectual property rights also protect the creators from unfair competition.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. • Associating a product or service with another manufacturer or service provider • Imitation of product or services logos • Piracy
  • 15.
  • 16. •Protects the form through which ideas are expressed. • Ex. Books, pamphlets, periodicals, lectures, letters, dramatic or musical compositions, drawings, paintings, architectures, photographic and cinematographic works, illustrations, maps, advertisements, computer programs, and other similar original creations.
  • 17. •Protection for inventions gives the inventor monopoly over the idea but during fixed numbers of years which is usually 20 years. •Inventions should be registered and made public. •The author is given the right to control his original work such as preventing copying and use by others.
  • 18.
  • 19. Factors to be Considered for Fair Use: 1. How the Material was used 2. The nature of the copyrighted material 3. The amount or importance of the part in relation to the whole copyrighted material 4. The effect on the potential value of the copyrighted material
  • 20. • Occurs when authors allow others to use their copyright protected work for free. Abandonment may be restricted to noncommercial use. • Ex. General Public License (GPL) – allows others to use it freely as long as they agree on stated conditions.
  • 21. • Web pages are covered by copyright • Linking a site is not always okay • Posting or reporting of articles is not fair • Free graphics is not free • Free scripts have conditions
  • 22. Cybercrime Law of the Philippines •Republic Act No. 10175 - https://www.officialgazette.gov.ph/2012/09/12 /republic-act-no-10175/
  • 23. • Create a Reaction Paper regarding the Cyber Crime Law • Submit a Computerized format in Short bond paper. (Max. of 2 Pages) • Margin: 1 inch in all sides • Font Size: 12 Font Type: Times New Roman • Paragraph: Single Space • Points of Discussion • What are the provisions that you think it’s too much or too weak and need to be changed. • Do you Agree/Disagree in that Provision? Why?
  • 24. • Use the same Web App (Bubbl.us). Create a Concept Map that will explain the use of the internet such as how to interact with it and its benefits from using it. The presentation should provide the following information: 1. Technical and Software requirements – what kind of hardware and setup, software, and services are needed? 2. Social and ethical requirements – what should be the general attitude and issues to be avoided when using the internet? 3. Service Offered – what are the services and features of the Internet? 4. Benefits – How will you benefit from the use of the internet?
  • 25. Technical & Software requirements Using the Internet Services offered by the Internet Benefits Social and Ethical requirements
  • 26. • https://www.youtube.com/watch?v=Wl9InWYntac • Go to bubbl.us website • Open the link above for tutorial. • Save your file by Export then select .jpg or .png format. • Upload in mvle.
  • 27. Send us a message or visit us Laoag City, Ilocos Norte, Philippines (63) 77-600-2014 cte@mmsu.edu.ph Get in Touch With Us facebook.com/MMSUofficial www.mmsu.edu.ph Follow us for updates