Computers and the Internet

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
E-Commerce and the Law Section Understanding Business and Personal Law E-Commerce and the Law Section 13.3 Contracts for the Sale of Goods Electronic.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Internet.
What is identity theft, and how can you protect yourself from it?
Internet Safety/Cyber Ethics
Ethics and Legal Issues in Computing
Netiquette Rules.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Intellectual Property
E-Commerce and the Law Section Understanding Business and Personal Law E-Commerce and the Law Section 13.3 Contracts for the Sale of Goods What.
Digital Citizenship Project
A Guide to Digital Citizenship
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
7/3/08 Created by Mae Thomas Property Rights There can be consequences if you violate others' intellectual property rights. (That is, if you copy something.
Computers and the Internet. Key Information: Key Information: Even if you delete your mail, messages may remain on servers or backup devices for.
Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication.
Online Privacy, Government, and Intellectual Property Rouda’s CSCI 101 class.
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
By: Tina Hill.  This is the unwritten rules of the different media sites on the internet.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
According to netiquette simply refers to our behavior the internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Digital Citizenship Project By Allen Naylor Ed 505.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
ED 505: Magen Anthony. Netiquette on Social Media site is the etiquette or guideline for posting on social media or other online sites. This helps individuals.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
Cassidy Culligan Digital Citizenship Project ED 505.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Rules of Netiquette Online Security Internet threats Protecting reputations online Copyright Contextualized online search and research skills.
Shopping online tips Presented by: Wala Al-Zahrani
Chapter 9: Internet Law, Social Media, and Privacy
Physical Safety Issues
Digital Citizenship.
DIGITAL CITIZENSHIP What You Should Know!.
Learn how to protect yourself against common attacks
What is copyright law?.
Physical Safety Issues
Legal and Ethical Issues
CHAPTER 33 Cyberlaw.
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Internet Safety Vocabulary
LEGAL TERMS IN DIGITAL MEDIA
Protecting Yourself from Fraud including Identity Theft
Physical Safety Issues
Legal Terms electronic commerce (p. 284) electronic signature (p.286)
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Computers and the Internet

Emails Eavesdropping can occur at any point during the delivery of your messages. If you are suspected of a crime, law enforcement officials can seize all your email. At work, your boss has the legal right to review all email you send from work, even if you send it through a private account. Employers are also not required to inform you if they monitor your email. The best policy is to treat email as a public conversation you would not mind if anyone overheard.

Spam Spam itself is not illegal, but it is annoying and can sometimes carry viruses or be used for unlawful purposes. The CAN-SPAM Act was passed by congress which means that the messages must include the sender’s real email address and a way to opt- out of receiving future emails. Spam is unlikely to abide soon, but many ISP’s, online email services, and software companies offer filters to help control spam.

Phishing, Spyware, and Other Invasions “Phishing” occurs when an email is sent that pretends to be from a legitimate business and tries to trick you into giving out private information that will be used for identity theft. “Spyware” is any software program that gathers information about you through your internet connection. Once spyware is on your computer, it can transfer information about your internet use, email addresses, passwords, and credit card information.

The USA Patriotic Act Is the uniting and strengthening of America by Providing Appropriate Tools required to Intercept and Obstruct Terrorism. This act does not require officials to inform you of a search in advance if it might impede the investigation. If a suspect uses a computer that is available to others, such as work, public library, or an internet café, law enforcement can monitor the computer. You also do not even need to be suspected of a crime for law enforcement to be able to view your records.

Online Shopping When purchasing an item from online retailers that allow individuals to sell items through their sites, such as Ebay or Amazon, be careful to use only the official websites. The FTC rule requires that goods you buy through these means must be shipped within the time the seller has advertised. If no time period is specified, the goods must be within thirty days of your order.

Copyright and Trademark Infringement A copyright is a bundle of rights that exist in works that are creative or artistic, such as literary works, movies, musical works, sound recordings, paintings, photographs, choreography, software and industrial designs. Trademark is a distinctive sign or symbol used by a business to identify itself and its products to consumers. Only exception is “Fair Use” which allows the public to use portions of copyrighted materials for such things as criticism and commentary, news reporting, research ad scholarship, non-profit educational use and parody. If you reproduce copyrighted or trademark work without permission, you can be sued by the owner of the work.