Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Computing Issues that Affect Us All lesson 30. This lesson includes the following sections: Computer Crime Computer Viruses Theft Computers and the Environment.
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Hart District Acceptable Use Policy Acceptable Use Policy.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Legislation in ICT.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 1 Introduction to Security
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Exploring Security and Privacy Issues Living Online Lesson 6 Internet and Web Page Design.
Living Online Module Lesson 29 — Security, Privacy, and Ethics Online
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 11 Security and Privacy: Computers and the Internet.
Ch15QQ 1. Hardware theft includes the theft of portable computers as well as desktop computers. 2. A surge suppressor can be used to protect a computer.
Section 6 Theory Software Copyright, Viruses and Hacking.
Clark County School District (CCSD)
Unethical use of Computers and Networks
Crime & Malpractice AS Module Heathcote Ch. 10.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Security and Ethics Safeguards and Codes of Conduct.
Woodland Hills School District Computer Network Acceptable Use Policy.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Issues for Computer Users, Electronic Devices, Computer and Safety.
BASIC SECURITY THREATS TO INFORMATION SYSTEMS. All information systems linked up in networks are prone to security violations. All information systems.
Security Issues & Ethics in Education By Maud Mushayamunda.
Computer Security Keeping you and your computer safe in the digital world.
Add video notes to lecture
Legal and ethical issues
Legislation in ICT.
Chapter 11 crime and security in the networked economy
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Five Unethical Uses of Computers
BCT 2.00 Analyze Technology Issues
Chapter 10: Privacy, Security, and Ethics
Computers: Tools for an Information Age
Faculty of Science IT Department By Raz Dara MA.
Legislation in ICT.
Ethical Use of Computers
Presentation transcript:

Security, Ethics and the Law

Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright violations is a felony crime. Flaming - nasty arguing that often resorts to personal attacks while ing.

Computer security involves trying to protect hardware, software, and information from loss or damage. A company’s most vital assets is its information. All businesses, federal and state governments must attempt to maintain the integrity of the information stored on a computer.

Computer Crimes Theft or destruction of hardware, software or information. It is surprising how many employees will steal computer hardware. Theft of hardware is very expensive to replace Theft can be controlled by monitoring access and using cables to secure equipment.

Software piracy involves the illegal copying and use of commercial software. Commercial software piracy is a felony. All software programs are copyrighted. It is illegal to copy software without purchasing. It is important that companies make all employees aware of software law. Using network or site licensing also helps in reducing piracy.

Viruses are special programs that copy themselves into other programs or special locations on the hard drive. Some viruses destroy or damage information or software, while others simply display messages stating that your computer system has been infected. Antivirus software is widely used to prevent infection.

Theft of Information This type of theft is more difficult to detect. Breaking into a computer system is just as illegal as breaking into someone’s home or place of business. User name and passwords help to prevent theft of information.

The illegal or unauthorized access of computer systems or data. Hacking is the illegal access to private information or use of services that you would normally have to pay for. The Computer Fraud and Abuse Act was passed in It toughened police powers against hackers.

Theft of money or services; and counterfeiting. Either employees or outsiders may steal information for personal economic gain or to sell to competitors. User names and passwords can be used to prevent unauthorized system access. Low-cost desktop publishing equipment has led to an increase in counterfeiting. The most common cause of damaged hardware or software is employee carelessness. Many people are concerned about the wide availability of personal data. Several laws have been passed in this area.

1. Read & answer the questions on the handout. 2. Write the answers on a separate sheet of paper. 3. Turn in.