SlideShare a Scribd company logo
1 of 16
CHAPTER 1: INFORMATION
AND COMMUNICATION
TECHNOLOGY
Computer Ethics and Legal Issues
Definition
Computer Ethics   Is a system of moral standards or moral values
                  used as a guideline for computer users
Code of Ethics    Is a guideline in ICT that help determine whether
                  a specific computer action is ethical or unethical
Intellectual      Is works created by inventors, authors and artists
Property
Privacy           Refers to the right of individuals and companies
                  to deny or restrict the collection and use of
                  information about them
Computer Crime    Is any illegal acts involving computers
Cyber Law         Is any laws relating to protect the Internet and
                  other online communication technologies
Differentiate between ethics and law

            ETHICS                              LAW
As a guideline to computer        As a rule to control computer
users                             users
Computers users are free to       Computers users must follow
follow or ignore the code of      the regulations and law
ethics
Universal, can be applied         Depend on country and state
anywhere, all over the world      where the crime is committed
To produced ethical computers     To prevent misuse of
users                             computers
Not following ethics are called   Not obeying laws are called
immoral                           crime
Intellectual Property Laws
    Four types of Intellectual Property are:




•    Patents for inventions
•    Trademarks for brand identity
•    Design for product appearance
•    Copyright for materials
Privacy
Ways of making personal data more privates:
 Install personal firewall

 Clear your history file when you are browsing

 Purchase goods with cash, rather than credit card
Authentication
   Authentication is a process where user verifies their
    identity. Authentication deals with the problem of
    determining whether a user should be allowed
    access to a particular system.
   Four commonly authentication methods:
A) User identification
   Is a unique combination of characters (letter,
    number or symbol) that identify specific user
   Examples:
              pin number
              password
B) Possessed object
   Is a any item that you must carry to gain access to
    computer of computer facility
   Examples:
               ATM card
               credit card
               smart card
C) Biometric device
   Is a device that translates personal characteristics
    into digital code that is compared with the digital
    code stored in the database
   Examples:
               fingerprint reader
               iris scanner
               hand geometric scanner
               signature verification system
Controversial Contents and Control
         PORNOGRAPHY                                     SLANDER
 is any form media or material (like       is a false spoken statement about
books, video or photos) that show erotic   someone, intended to damage his or her
behavior and intended to cause sexual      reputation
excitement
                                            the effects of slander on society are:
 the effects of pornography on society    iv)Can develop society that disregards on
are:                                       honesty and truth
iv)Can lead to criminal acts such as       v)Can lead to bad habits of spreading
exploitation of women                      rumors and untruth
v)Can lead to sexual addiction             vi)Can cause people to have nagative
vi)Can develop lower moral values          attitudes toward another person
towards other people
vii)Can erode good religious, cultural,
behaviors and beliefs
Computer Crimes
   Why we need cyber law?
    i)     Cyber laws are made to force people to be good
    ii)    To give protection against the misuse of computers
           and computer criminal activities
   Examples of cyber abuse on the users:
    i)     Sending a computer virus via e-mail
    ii)    Harassment through e-mail
    iii)   Hacking into your school's database to change your
           examination results
   Malaysian Cyber Law
    i)     Computer Crime Act 1997
    ii)    Copyright (Amendment) Bill 1997
    iii)   Digital Signature Act 1997
    iv)    Telemedicine Bill 1997
    v)     Communication and Multimedia Act 1998
    vi)    Digital Signature Regulations 1998
   4 examples of computer crimes:
   Computer fraud - is the crime of obtaining money
    by deceiving (to trick) people through the use of
    computers such as email hoaxes, program fraud,
    investment schemes and claim of expertise on
    certain fields
   Copyright infringement - is a violation of the rights
    secured by a copyright. It occurs when you break
    the copyright laws such as copying movie, software
    or CD’s illegally
Computer theft – is defined as the unauthorized
    used of another person’s property such as transfer
    of payment to the wrong accounts, get online
    material with no cost and tap into the data
    transmission lines
e   Computer attack – is defined as any activities
    taken to disrupt the equipments of computers
    systems, change processing controls and corrupt
    stored data

More Related Content

What's hot

Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin itRushana Bandara
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICSRJ Khan
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
computer ethics
computer ethicscomputer ethics
computer ethicsHoney jose
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing professionshahmansoor109
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 

What's hot (20)

Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 

Viewers also liked

Viewers also liked (11)

Towards comprehensive public & private sector whistleblower protection
Towards comprehensive public & private sector whistleblower protectionTowards comprehensive public & private sector whistleblower protection
Towards comprehensive public & private sector whistleblower protection
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Security policy
Security policySecurity policy
Security policy
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
EU-GDPR On Boarding & IT Handlungsfelder
 EU-GDPR On Boarding & IT Handlungsfelder  EU-GDPR On Boarding & IT Handlungsfelder
EU-GDPR On Boarding & IT Handlungsfelder
 
Ethical Constraints
Ethical Constraints Ethical Constraints
Ethical Constraints
 
Netiquette and code of conduct in communication
Netiquette and code of conduct in communicationNetiquette and code of conduct in communication
Netiquette and code of conduct in communication
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Risk Analysis
Risk AnalysisRisk Analysis
Risk Analysis
 
Ethics
EthicsEthics
Ethics
 

Similar to Computer Ethics and Legal Issues

English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxtalhajann43
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1ikmalsham
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
Ethical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfEthical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfDesireDelosSantos
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 

Similar to Computer Ethics and Legal Issues (20)

Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
English in written
English in writtenEnglish in written
English in written
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Ethical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfEthical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology Presentatiopdf
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 

More from Kak Yong

Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersifKak Yong
 
Module programming
Module programmingModule programming
Module programmingKak Yong
 
Module info systems
Module info systemsModule info systems
Module info systemsKak Yong
 
Module ict society
Module ict societyModule ict society
Module ict societyKak Yong
 
Module computer systems
Module computer systemsModule computer systems
Module computer systemsKak Yong
 
Module networks
Module networksModule networks
Module networksKak Yong
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programmingKak Yong
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaKak Yong
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsKak Yong
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksKak Yong
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsKak Yong
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyKak Yong
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Kak Yong
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Kak Yong
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Kak Yong
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Kak Yong
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Kak Yong
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Kak Yong
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Kak Yong
 

More from Kak Yong (20)

Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersif
 
Module programming
Module programmingModule programming
Module programming
 
Module info systems
Module info systemsModule info systems
Module info systems
 
Module ict society
Module ict societyModule ict society
Module ict society
 
Module computer systems
Module computer systemsModule computer systems
Module computer systems
 
Module networks
Module networksModule networks
Module networks
 
Synopsis
SynopsisSynopsis
Synopsis
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programming
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimedia
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systems
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systems
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-society
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02
 

Recently uploaded

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 

Recently uploaded (20)

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Computer Ethics and Legal Issues

  • 1. CHAPTER 1: INFORMATION AND COMMUNICATION TECHNOLOGY Computer Ethics and Legal Issues
  • 2. Definition Computer Ethics Is a system of moral standards or moral values used as a guideline for computer users Code of Ethics Is a guideline in ICT that help determine whether a specific computer action is ethical or unethical Intellectual Is works created by inventors, authors and artists Property Privacy Refers to the right of individuals and companies to deny or restrict the collection and use of information about them Computer Crime Is any illegal acts involving computers Cyber Law Is any laws relating to protect the Internet and other online communication technologies
  • 3. Differentiate between ethics and law ETHICS LAW As a guideline to computer As a rule to control computer users users Computers users are free to Computers users must follow follow or ignore the code of the regulations and law ethics Universal, can be applied Depend on country and state anywhere, all over the world where the crime is committed To produced ethical computers To prevent misuse of users computers Not following ethics are called Not obeying laws are called immoral crime
  • 4. Intellectual Property Laws Four types of Intellectual Property are: • Patents for inventions • Trademarks for brand identity • Design for product appearance • Copyright for materials
  • 5. Privacy Ways of making personal data more privates:  Install personal firewall  Clear your history file when you are browsing  Purchase goods with cash, rather than credit card
  • 6. Authentication  Authentication is a process where user verifies their identity. Authentication deals with the problem of determining whether a user should be allowed access to a particular system.
  • 7. Four commonly authentication methods:
  • 8. A) User identification  Is a unique combination of characters (letter, number or symbol) that identify specific user  Examples: pin number password
  • 9. B) Possessed object  Is a any item that you must carry to gain access to computer of computer facility  Examples: ATM card credit card smart card
  • 10. C) Biometric device  Is a device that translates personal characteristics into digital code that is compared with the digital code stored in the database  Examples: fingerprint reader iris scanner hand geometric scanner signature verification system
  • 11. Controversial Contents and Control PORNOGRAPHY SLANDER  is any form media or material (like  is a false spoken statement about books, video or photos) that show erotic someone, intended to damage his or her behavior and intended to cause sexual reputation excitement  the effects of slander on society are:  the effects of pornography on society iv)Can develop society that disregards on are: honesty and truth iv)Can lead to criminal acts such as v)Can lead to bad habits of spreading exploitation of women rumors and untruth v)Can lead to sexual addiction vi)Can cause people to have nagative vi)Can develop lower moral values attitudes toward another person towards other people vii)Can erode good religious, cultural, behaviors and beliefs
  • 12.
  • 13. Computer Crimes  Why we need cyber law? i) Cyber laws are made to force people to be good ii) To give protection against the misuse of computers and computer criminal activities  Examples of cyber abuse on the users: i) Sending a computer virus via e-mail ii) Harassment through e-mail iii) Hacking into your school's database to change your examination results
  • 14. Malaysian Cyber Law i) Computer Crime Act 1997 ii) Copyright (Amendment) Bill 1997 iii) Digital Signature Act 1997 iv) Telemedicine Bill 1997 v) Communication and Multimedia Act 1998 vi) Digital Signature Regulations 1998
  • 15. 4 examples of computer crimes:  Computer fraud - is the crime of obtaining money by deceiving (to trick) people through the use of computers such as email hoaxes, program fraud, investment schemes and claim of expertise on certain fields  Copyright infringement - is a violation of the rights secured by a copyright. It occurs when you break the copyright laws such as copying movie, software or CD’s illegally
  • 16. Computer theft – is defined as the unauthorized used of another person’s property such as transfer of payment to the wrong accounts, get online material with no cost and tap into the data transmission lines e Computer attack – is defined as any activities taken to disrupt the equipments of computers systems, change processing controls and corrupt stored data