SlideShare a Scribd company logo
TOPIC:
LEGAL AND ETHICAL ASPECTS
• Introduction
• Legality means an act is in accordance with the law. Ethics is about
concepts of right and wrong behaviour. Some actions may be legal
but in some peoples opinion not ethical. The definition of legal is
something connected to law or a government’s system of rules. Ethics
also called moral philosophy, the discipline concerned with what is
morally good and bad and morally right and wrong.
LEGAL AND ETHICAL ASPECTS IN
INFORMATION SECURITY
• There are many legal and ethical issues with computer that can be
exploited by bad people to do bad things. Some of those issues
include illegal music and videos file downloading, spyware, identity
theft, keystroke logging, cyber bullying, and phishing.
Illegal File Downloading:
• These are forma of media are protected by copyright law meaning that
they cannot be copied or reproduced or resold without the permission
of the original creator or owner which is that inevitably makes the
action illegal even though many people today do listen or watch music
movies illegally but not necessarily by downloading them.
• Illegal downloading (also known as piracy) is when a user
downloads a copy of paid content for free without permission
from the owner. This includes music, TV shows, movies, video
games, audiobooks, ebooks and sports broadcasts.
Illegal music and video file
downloading (piracy)
SPYWARE:
• Spyware is software downloaded onto a user’s electronic device
without their knowledge and is used mostly to steal their personal
information. These can be used for good and bad. Parents can use
them to monitor their children or companies to monitor their
employees while third party apps can be downloaded to infect phones
and use their camera or microphone to soy on the owner.
CYBERBULLYING / CYBER HARRASMENT
• Cyberbullying is making other feel sad, angry or sacred multiple times
over the internet on a wide variety of electronic devices. This is
usually done on different social media websites such as Facebook or
instagram or just by texting or email. Unlike bullying in schools,
cyberbullying can be done anonymously, making the perpetrator
faceless to the victim.
IDENTITY THEFT:
• Identity theft or identity fraud is when someone steals personal identifiable
information on others in order to impersonate said person. This can be one of the
worst legal issues with the computer because it allows the criminal to get credit card
information and buy things in the name of someone else or even do crimes in others
names. There are two types of identity theft, account takeover and true name.
Account takeover is when the thief uses the information taken to gain control of the
original person account, allowing them ti change some things and buy others before
they realise what is going on. True name theft is when the thief creates new accs in
other names. This can be done for many reasons in many forms however one of the
main ones would be to obtain blank cheques.
ETHICS AND INFORMATION SECURITY
• Many professional groups have explicit rules governing ethical behaviour in
the workplace. For example , doctors and lawyers who commit egregious
violations of their profession canons of conduct can be removed from
practice. Unlike the medical and legal fields however the information
technology field in general and the information security field in particular do
not
• From the computer ethics institute
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other peoples computer work.
3. Thou shalt not snoop around in other people’s computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. Thou shalt not use other peoples computer resources without authorisation or proper
compensation.
8. Thou shalt not appropriate other peoples intellectual output.
9. Thou shalt think about the social consequences of the program you are writing or the system
you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and respect for your
fellow humans.
CYBERCRIME AND COMPUTER CRIME
• Types of computer crimes:
• Computer crime or cyber crime is a term usually broadly to describe criminal activity
in which computers or computer network are tool , a target or a place of criminal
activity.
• Computer as targets:
• This form of crime targets as computer system , to acquire information stored on
that computer system, to control the target system without authorisation or payment
or to alter the integrity of data or interfere with the availability of the computer or
server.
• Computer as storage devices:
• Computers can be used to further unlawful activity by using a computer or a
computer device as a passive storage medium. For example, the computer can be
used to store stolen password list , credit card or calling card numbers, proprietary
corporate information , pornographic image files.
• Computer as communication tools:
• Many of the crimes falling within this category are simply traditional crimes that are
committed online. Examples include the illegal sale of prescription drugs, controlled
substances, alcohol , and guns ; fraud ; gambling and child pornography.
EXAMPLES OF LEGAL AND ETHICAL ASPECTS
IN DIFFERENT
FIELDS:
• 1. Legal and ethical issues related to e-commerce
• The developments in technology have projected very extensive possibilities
in different spheres, on of these is e-commerce. The notably quick changing
atmosphere is the e-commerce market because the demand and fame of e-
shopping are increasing day by day. Clients are concerned about the quality
of services and products as well as the percentage of price and quality. The
ambitiousness brings several solutions in ecommerce and abundance or lots
of decisions might and should be made effectively with business ethics and
legal decision making could helped this way.
LEGAL ASPECTS ARE
• Fraud over the internet
• The e-commerce fraud appears out with the brisk growth in recognition of
websites. This is a scorching issue for both mortar and clicks merchants and
cyber merchants. The small investors are allured by the commitment of
wrong profits by the stock promoters. Buyers and sellers are opposed to
conducting frauds in auction as well. The availability of popup ads and
emails has opened the paths and paved the horizon for financial criminals
and fraud to get access to many people.
• Copyright
• If you talk about the laws of copyright protects the intellectual and
smart property cannot be recycled freely. It is very difficult for an
investor in e-commerce to protect intellectual property. For instance, if
you have purchased software, you have got the right to operate or use
it but you have no right to spread and distribute it. The right of
distribution are just within the holder of its copyright.
• Domain names
• The competition over the selection of names of the domain is an
additional legal issue. Internet addresses and location are
acknowledged as domain names. A dominant and elite name is
microsoft.com and qbrust.com. Top levels of domain names are
accredited by essential non-profit organisations they also check
trademarks for possible infringement and conflicts as well. Issues
arise when certain companies or organisations have similar names.
ETHICAL ASPECTS ARE
• Web tracking
• E-commerce draws facts and data on how visitors operate a site with
the log files. Firms track the movement of individuals through cookie
analysis and tracking software. Program files cookies can raise a
bunch of privacy concerns. The history of tracking is stored on the
hard disk of your PC and whenever you visit the website again the PC
knows it already. Many intelligent end users like to install programs
example spam butcher, cookie cutter etc.
• Privacy
• Most of the payment systems electronically have the identity of the client.
Hence, it is important to provide protection to the identity of consumers who
use the electronic mode of payment systems. A privacy problem connected
to the employees/people of an organisation is tracking. The system of
monitoring are installed and set up in many organisations to monitor web
activities and e-mails in order to know the people who broadly use business
hours for the activities not related to businesses. The activities of e-
commerce performed by a consumer can be tracked by the computer.
2. LEGAL AND ETHICAL ASPECTS OF
ADVERTISING
Legal aspects of advertising
The government in each country has to make sure that advertisements
appearing don’t flaunt their rules and regulations:
1. It should not show anti national feelings.
2. It should not contain misleading information about the product.
3. It should not violate government rules.
Some examples of the advertisement will legal aspects:
1. Get your car checked for pollution
2. Drinks and driving do not mix
Ethical aspects of advertising
Ethics are the moral standards against which behaviour is judged Key areas of debate regarding
ethics and advertising are
Truth in advertising
1. Deception in making false or misleading statements
2. cannot legislate against emotional appeals
Advertising to children
1. Advertising promotes superficiality and materialism in children
2. Children are inexperienced and easy prey
3. Persuasion to children creates child parent conflict

More Related Content

What's hot

Computer ethics
Computer ethicsComputer ethics
Computer ethics
Atchaya Thalapathy
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
Jose Luis Leon Gonzalez
 
ethical legal issues
ethical legal issuesethical legal issues
ethical legal issues
Asia Pasific University
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
Are Computer Ethical Issues Unique ?
Are Computer Ethical Issues Unique ?Are Computer Ethical Issues Unique ?
Are Computer Ethical Issues Unique ?
VARUN KUMAR
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
divyanigarg2
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Gracy Joseph
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette
EMCox02
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
Kumawat Dharmpal
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
Amanda lee
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
Saqib Raza
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
Alomgir Hossain
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
gururaj lulkarni
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
Himanshu Pathak
 

What's hot (20)

Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
ethical legal issues
ethical legal issuesethical legal issues
ethical legal issues
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Are Computer Ethical Issues Unique ?
Are Computer Ethical Issues Unique ?Are Computer Ethical Issues Unique ?
Are Computer Ethical Issues Unique ?
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 

Similar to Legal And Ethical Aspects.pptx

E commerce
E commerce E commerce
E commerce
DrSelvamohanaK
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
Muhammad Haroon
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
gaurav jain
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethicsgeneveve_
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
Delmer Gerald Calderon
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
E Marketing Ethical and Legal Issues
E Marketing Ethical and Legal IssuesE Marketing Ethical and Legal Issues
E Marketing Ethical and Legal Issueskarthik indrajit
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
E commerce
E commerceE commerce
E commerce
Noor Mohammad Khan
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
home based
 
Digital marketing ppt -e -Commerce unit -5
Digital marketing ppt -e -Commerce unit -5Digital marketing ppt -e -Commerce unit -5
Digital marketing ppt -e -Commerce unit -5
AssocProfMBAVelTechC
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
sajida zafar
 
Chapter5.ppt
Chapter5.pptChapter5.ppt
Chapter5.ppt
AaishAiman
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
AmanuelZewdie4
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
JohnLagman3
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
sr24production
 

Similar to Legal And Ethical Aspects.pptx (20)

E commerce
E commerce E commerce
E commerce
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
E Marketing Ethical and Legal Issues
E Marketing Ethical and Legal IssuesE Marketing Ethical and Legal Issues
E Marketing Ethical and Legal Issues
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
E commerce
E commerceE commerce
E commerce
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
Digital marketing ppt -e -Commerce unit -5
Digital marketing ppt -e -Commerce unit -5Digital marketing ppt -e -Commerce unit -5
Digital marketing ppt -e -Commerce unit -5
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Chapter5.ppt
Chapter5.pptChapter5.ppt
Chapter5.ppt
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 

Recently uploaded

How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 

Recently uploaded (20)

How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 

Legal And Ethical Aspects.pptx

  • 1. TOPIC: LEGAL AND ETHICAL ASPECTS • Introduction • Legality means an act is in accordance with the law. Ethics is about concepts of right and wrong behaviour. Some actions may be legal but in some peoples opinion not ethical. The definition of legal is something connected to law or a government’s system of rules. Ethics also called moral philosophy, the discipline concerned with what is morally good and bad and morally right and wrong.
  • 2. LEGAL AND ETHICAL ASPECTS IN INFORMATION SECURITY • There are many legal and ethical issues with computer that can be exploited by bad people to do bad things. Some of those issues include illegal music and videos file downloading, spyware, identity theft, keystroke logging, cyber bullying, and phishing. Illegal File Downloading:
  • 3. • These are forma of media are protected by copyright law meaning that they cannot be copied or reproduced or resold without the permission of the original creator or owner which is that inevitably makes the action illegal even though many people today do listen or watch music movies illegally but not necessarily by downloading them. • Illegal downloading (also known as piracy) is when a user downloads a copy of paid content for free without permission from the owner. This includes music, TV shows, movies, video games, audiobooks, ebooks and sports broadcasts. Illegal music and video file downloading (piracy)
  • 4. SPYWARE: • Spyware is software downloaded onto a user’s electronic device without their knowledge and is used mostly to steal their personal information. These can be used for good and bad. Parents can use them to monitor their children or companies to monitor their employees while third party apps can be downloaded to infect phones and use their camera or microphone to soy on the owner.
  • 5. CYBERBULLYING / CYBER HARRASMENT • Cyberbullying is making other feel sad, angry or sacred multiple times over the internet on a wide variety of electronic devices. This is usually done on different social media websites such as Facebook or instagram or just by texting or email. Unlike bullying in schools, cyberbullying can be done anonymously, making the perpetrator faceless to the victim.
  • 6. IDENTITY THEFT: • Identity theft or identity fraud is when someone steals personal identifiable information on others in order to impersonate said person. This can be one of the worst legal issues with the computer because it allows the criminal to get credit card information and buy things in the name of someone else or even do crimes in others names. There are two types of identity theft, account takeover and true name. Account takeover is when the thief uses the information taken to gain control of the original person account, allowing them ti change some things and buy others before they realise what is going on. True name theft is when the thief creates new accs in other names. This can be done for many reasons in many forms however one of the main ones would be to obtain blank cheques.
  • 7. ETHICS AND INFORMATION SECURITY • Many professional groups have explicit rules governing ethical behaviour in the workplace. For example , doctors and lawyers who commit egregious violations of their profession canons of conduct can be removed from practice. Unlike the medical and legal fields however the information technology field in general and the information security field in particular do not • From the computer ethics institute 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other peoples computer work.
  • 8. 3. Thou shalt not snoop around in other people’s computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other peoples computer resources without authorisation or proper compensation. 8. Thou shalt not appropriate other peoples intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
  • 9. CYBERCRIME AND COMPUTER CRIME • Types of computer crimes: • Computer crime or cyber crime is a term usually broadly to describe criminal activity in which computers or computer network are tool , a target or a place of criminal activity. • Computer as targets: • This form of crime targets as computer system , to acquire information stored on that computer system, to control the target system without authorisation or payment or to alter the integrity of data or interfere with the availability of the computer or server.
  • 10. • Computer as storage devices: • Computers can be used to further unlawful activity by using a computer or a computer device as a passive storage medium. For example, the computer can be used to store stolen password list , credit card or calling card numbers, proprietary corporate information , pornographic image files. • Computer as communication tools: • Many of the crimes falling within this category are simply traditional crimes that are committed online. Examples include the illegal sale of prescription drugs, controlled substances, alcohol , and guns ; fraud ; gambling and child pornography.
  • 11. EXAMPLES OF LEGAL AND ETHICAL ASPECTS IN DIFFERENT FIELDS: • 1. Legal and ethical issues related to e-commerce • The developments in technology have projected very extensive possibilities in different spheres, on of these is e-commerce. The notably quick changing atmosphere is the e-commerce market because the demand and fame of e- shopping are increasing day by day. Clients are concerned about the quality of services and products as well as the percentage of price and quality. The ambitiousness brings several solutions in ecommerce and abundance or lots of decisions might and should be made effectively with business ethics and legal decision making could helped this way.
  • 12. LEGAL ASPECTS ARE • Fraud over the internet • The e-commerce fraud appears out with the brisk growth in recognition of websites. This is a scorching issue for both mortar and clicks merchants and cyber merchants. The small investors are allured by the commitment of wrong profits by the stock promoters. Buyers and sellers are opposed to conducting frauds in auction as well. The availability of popup ads and emails has opened the paths and paved the horizon for financial criminals and fraud to get access to many people.
  • 13. • Copyright • If you talk about the laws of copyright protects the intellectual and smart property cannot be recycled freely. It is very difficult for an investor in e-commerce to protect intellectual property. For instance, if you have purchased software, you have got the right to operate or use it but you have no right to spread and distribute it. The right of distribution are just within the holder of its copyright.
  • 14. • Domain names • The competition over the selection of names of the domain is an additional legal issue. Internet addresses and location are acknowledged as domain names. A dominant and elite name is microsoft.com and qbrust.com. Top levels of domain names are accredited by essential non-profit organisations they also check trademarks for possible infringement and conflicts as well. Issues arise when certain companies or organisations have similar names.
  • 15. ETHICAL ASPECTS ARE • Web tracking • E-commerce draws facts and data on how visitors operate a site with the log files. Firms track the movement of individuals through cookie analysis and tracking software. Program files cookies can raise a bunch of privacy concerns. The history of tracking is stored on the hard disk of your PC and whenever you visit the website again the PC knows it already. Many intelligent end users like to install programs example spam butcher, cookie cutter etc.
  • 16. • Privacy • Most of the payment systems electronically have the identity of the client. Hence, it is important to provide protection to the identity of consumers who use the electronic mode of payment systems. A privacy problem connected to the employees/people of an organisation is tracking. The system of monitoring are installed and set up in many organisations to monitor web activities and e-mails in order to know the people who broadly use business hours for the activities not related to businesses. The activities of e- commerce performed by a consumer can be tracked by the computer.
  • 17. 2. LEGAL AND ETHICAL ASPECTS OF ADVERTISING Legal aspects of advertising The government in each country has to make sure that advertisements appearing don’t flaunt their rules and regulations: 1. It should not show anti national feelings. 2. It should not contain misleading information about the product. 3. It should not violate government rules.
  • 18. Some examples of the advertisement will legal aspects: 1. Get your car checked for pollution 2. Drinks and driving do not mix Ethical aspects of advertising Ethics are the moral standards against which behaviour is judged Key areas of debate regarding ethics and advertising are Truth in advertising 1. Deception in making false or misleading statements 2. cannot legislate against emotional appeals Advertising to children 1. Advertising promotes superficiality and materialism in children 2. Children are inexperienced and easy prey 3. Persuasion to children creates child parent conflict