Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.

Similar presentations


Presentation on theme: "Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright."— Presentation transcript:

1 Security, Ethics and the Law

2 Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright violations is a felony crime. Flaming - nasty arguing that often resorts to personal attacks while emailing.

3 Computer security involves trying to protect hardware, software, and information from loss or damage. A company’s most vital assets is its information. All businesses, federal and state governments must attempt to maintain the integrity of the information stored on a computer.

4 Computer Crimes Theft or destruction of hardware, software or information. It is surprising how many employees will steal computer hardware. Theft of hardware is very expensive to replace Theft can be controlled by monitoring access and using cables to secure equipment.

5 Software piracy involves the illegal copying and use of commercial software. Commercial software piracy is a felony. All software programs are copyrighted. It is illegal to copy software without purchasing. It is important that companies make all employees aware of software law. Using network or site licensing also helps in reducing piracy.

6 Viruses are special programs that copy themselves into other programs or special locations on the hard drive. Some viruses destroy or damage information or software, while others simply display messages stating that your computer system has been infected. Antivirus software is widely used to prevent infection.

7 Theft of Information This type of theft is more difficult to detect. Breaking into a computer system is just as illegal as breaking into someone’s home or place of business. User name and passwords help to prevent theft of information.

8 The illegal or unauthorized access of computer systems or data. Hacking is the illegal access to private information or use of services that you would normally have to pay for. The Computer Fraud and Abuse Act was passed in 1986. It toughened police powers against hackers.

9 Theft of money or services; and counterfeiting. Either employees or outsiders may steal information for personal economic gain or to sell to competitors. User names and passwords can be used to prevent unauthorized system access. Low-cost desktop publishing equipment has led to an increase in counterfeiting. The most common cause of damaged hardware or software is employee carelessness. Many people are concerned about the wide availability of personal data. Several laws have been passed in this area.

10 1. Read & answer the questions on the handout. 2. Write the answers on a separate sheet of paper. 3. Turn in.


Download ppt "Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright."

Similar presentations


Ads by Google