O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,

Slides:



Advertisements
Similar presentations
The Web Wizards Guide to Freeware/Shareware Chapter Six Open Source Software.
Advertisements

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
All About Piracy A Donny the Downloader guided PowerPoint lesson.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
 e-Access is about understanding the privilege of using electronic information as well as the right to having equal, secure and reliable access.  The.
Security, Privacy, and Ethics Online Computer Crimes.
Social and Ethical Issues Piracy & Copyright. Piracy.
W15D3. Protection (recap) Common sense Antivirus software (some free, eg: AVG) Update OS Verify the validity of info in s received  Use search.
By: Lauren Monteith, Derek Love, Cole Howell, and Reggie Jones.
e-Safety What e-Safety? E-safety is about measures and best particles for Netizens to guard their personal safety and the security of their networks.
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
CYBER RULE MODULE 3. LEARNING OBJECTIVES By the end of the module, you should be able to: 1.List 3 examples of cyber crimes 2.State 3 effects of cyber.
Copyright © 2012 Knowledge Point Cyber Rule. Copyright © 2012 Knowledge Point Learning Outcomes By the end of this module, you should be able to: List.
Exploring Security and Privacy Issues Living Online Lesson 6 Internet and Web Page Design.
INTELLECTUAL PROPERTY COPYRIGHTS, PATENTS AND TRADE MARKS.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
In New Digital World for better future CYBERJAYA become as a new digital city in our country E-Access.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Mrs. Jefferson Business Information Management I.
Computer Ethics for Computer Users
Development, Marketing, Licensing, and Distribution.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
Digital Planet: Tomorrow’s Technology and You
Section 2 Software.
Intellectual Property Software Piracy. Copying of software in large quantities for resale Illegal copying by businesses and individuals for their own.
Unethical use of Computers and Networks
Reason for Cyber Crime Pursuit of fame Purely out of mischief For finance means To get revenge on someone they hate Purely to pursuit criminal.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
ACPS Acceptable Use Policy Grades 3-5. A Good Technology User: Uses the computer and other technology with good intentions and for educational purposes.
This was my first quiz (practice one) This one is actually the Final Quiz, but it will not work.
Nu’aim Hussaini Bin Zulkefli Sr221 Csc434 Pn Noridah Binti Abu Bakar.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
e-Rule By Syazwani binti safee Pb11077 Nurul ashikin binti rani PB11083.
The Legalities of Technicalities By Kellie Birdwell.
1. Contents  EULAs, piracy and copyright  So why do we use computers anyway? So why do we use computers anyway?  The Digital Divide The Digital Divide.
Presentation.  Suppression of speech or public communication.
GROUP : MOMENT SA’AD BIN SABAR FB MOHD NORSHAFIQ BIN MOHD PAUZI FB POSITIVE VALUES IN USING TECHNOLOGY.
PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
James Keddy. Definition of digital citizenship In my own words digital citizenship is a way to conduct yourself on the internet that is respectful, responsible.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Security and Ethics Safeguards and Codes of Conduct.
Computer Ethics Computer Technology 1 By Jill Einerson.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
Ethics Self Imposed Right and Wrong Behavior Described as:
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Social Ethical and Legal Issues Web Design. 3.4 Social, Ethical, and Legal Issues Focus on Reading Main Ideas Ethical, social, and legal guidelines govern.
SOFTWARE PIRACY & WORKPLACE ETHICS. What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale.
Computer Software Heather Allen. Software Copyright Laws It is illegal for anyone to violate any of the rights provided by the copyright law to the owner.
Computers Are Your Future Twelfth Edition
Chapter 3 Installing and Learning Software
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
Five Unethical Uses of Computers
BCT 2.00 Analyze Technology Issues
Copyright, Designs and Patents Act 1988
Information Technology Topic: The internet
Ethical Use of Computers
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Lesson 2- Ethical Use of Digital Resources Edit all slides as needed.
Presentation transcript:

o PROTECT YOUR RIGHTS

 E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME, DIGITAL CRIME, E- CRIME AND ELECTRONIC CRIME; ALL INDICATE THAT CRIMES ARE COMMITED THROUGH THE USE IF TECHNOLOGY TO INTIMIDATE PEOPLE, COMMIT FRAUD OR STEAL VALUABLE INFORMATION

 FOR PURSUIT OF FAME AND TO GAIN REPUTATION FOR INTELLINGENCE  FOR FINANCIAL MEANS  TO GET REVENGE ON SOMEONE THEY HAT/DISLIKE  PURELY TO PURSUE CRIMINAL ACTIVITIES  TO STEAL INDENTITY  TO FORGE DOCUMENTS AND MESSAGES

 LOSS OF REVENUE / PROFITS  WASTE OF VALUABLE TIME  DAMAGE REPUTATIONS  REDUCED PRODUCTIVITY

 SOFTWARE PIRACY Many employees install the same programme on multiple computers using software for which only one license agreement was paid. These actions are against the law.  FREEWARE AND SHAREWARE Freeware allows you to download, copy, pass on or use software without payment for a license and you are allowed to utilize it for as long as you like. It is stiil considered as the intellectual property for the development. Shareware is a software that can be used by anyone for free for a limited time period.  EULA End User License Agreement is the license which comes with commercial software. It gives you the right to load or install software legally but you are prohibited from sharing and installing the software on others computers.