Professional Documents
Culture Documents
Unit 5 Ethical and Legal Considerations Updated
Unit 5 Ethical and Legal Considerations Updated
Introduction
Privacy in the internet is one of the most popular among the issues. Very few
are chosen to practice the internet and stay fully secured, and in the other side
almost everyone decided to consider less about how much personal information is
available and accessible out there. And how we actually vulnerable and easy access
in excessive information sharing?
What is Privacy?
It defines the personal information of an individual that are not exposing online
or the data that cannot be produce or share without the consent or permission of the
owner. For example a lot of website asks for name and birthday for registration. For
the well-skilled hackers those information are more than enough to hacked and
reach our privacy and create falls identity. Also they can access even the secured
bank accounts. So better be careful about when and where input data.
1. Intrusion
Unwanted email (Spam)
Unwanted phone calls
2. Informtion Collection
Surveillance
Wiretapping
3. Information Processing
Identification theft
Data Mining
4. Information Dissemination
Breach of confidentiality
Appropriation (Pretending to be someone)
2. Address
4. Email address
5. Complete Name
6. School or job
7. Bank accounts
2. KASPERSKY
3. AVAST
4. F-SECURE
5. NORTON
6. SMADAV
a. Virus
Designed to replicate and transfer from one computer to
another
b. Worm
Programs that transfer from one computer to another by
any types of means. Ex. ILOVEYOU VIRUS
ILOVEYOU VIRUS
Also known as Love Bug or Love Letter
Spreading as an email message with the subject
line “ILOVEYOU” and the attachment “LOVE-
LETTER-FOR-YOU.txt.vbs”
(‘ybs’, a type of interpreted file) was most often
hidden by default on Windows computers of the
time
Opening the attachment the visual basic script.
c. Trojan
Programs that disguises as a valuable programs but once
downloaded or installed, leaves your computer unsecured
d. Spyware
Runs in the Background without the user knowing and
also known as spy its purpose is to monitor what the user
are currently doing and typing
e. Adware
Designed to send you advertisement as pop-ups
f. Ransomware
Its main purpose is to threaten to publish the user’s
information or data block access to it unless a ransom is
paid
g. Spam
It is the unwanted email mostly form bots or
advertisement the sends to your emails.
h. Phishing
It is the unwanted acquisition of someone’s personal data
like passwords and back accounts and other credentials
Trademark
Trade Secret
The word trade secret refers to a special intellectual property (IP) resource
that is unique and not reasonably noticeable by others. Businesses generally
leverage trade secret protection to attain a business advantage over their
competitors. Some refer to trade secrets simply as “confidential information.” Trade
secret. (n.d).
Examples:
● WD 40 Chemical Formula
Patent
Copyright
A B C D
All of the above types of work in the figure 6.0 are protected by ,copyright as
soon as they are created. Registration is not required. All that is required is that the
work be original i.e.not copied from another source. Types of Intellectual Property
Rights. (n.d.).
The term policy from the middle English term “policie” which means
“government” or “civil administration” and that word was originated from the latin
“politia” meaning “polity,” a politically united by the group of any kind while a
procedure, came from the French “procedure,” fact or manner of proceeding
IT Policies
Figure 1.0
Technology
Policy for getting
Hardware Website Policy
software
Purchasing Policy
Policy makers
These personnel must be always present in making policy especially in the process
of consultation i.e. Management Committee, Board of Directors, Executives.
3. Gather information
● Organize a meeting
● Read … read…read
4. Draft Policy
Consider the words and the length in which it suitable to the people
who will be expected to implement it.
5. Consultation
When the draft policy is done it should be disseminated to primary
users, circulated in the organization’s bulletin or web site, discussed in
meetings and forums. This is the stage where will need the help from
stakeholders to polish the content, clarify meaning and make corrections
to the policy before it is finalized.
6. Approve policy
In finalizing the policy the assigned personnel of the policy
development process is fairly satisfied that all matters and concerns
about the policy have been aired and dealt with. The final policy
document needs to be officially accepted by the management with an
appropriate record inserted into the minutes.
7. Implement
To whom the policy will be communicated and to how?. And also
consider if there is a need of a training to support the implementation
among staff and volunteers?
●
Purpose This is the section that
● Ensure the Safety of the
provides the introduction
and the information in which Information.
IT Procedures
Procedure
Procedure
on Keeping on
Mobile Software
Secure
Request
Procedure
on Procedure
Purchasing on Physical
computer Security
peripherals
orderly manner. In which in developing a procedure you have to read a lot about
procedure before you begin in writing it and always bare in mind the
preparation, writing and follow up major steps.. (Writing a Procedure that the
Reader Can Follow. (n.d.).
work , ensuring that everything goes seamlessly in the right direction. In basic
terms, it is a series of guidelines defined by the company that must be observed by
workers and employers at the workplace.
Employees must obey the policies and procedures when working with the
company. By involving certain policies in the workplace, there would be a sort of
professionalism and seriousness among workers that can contribute to improved
efficiency. This implicitly leads to the growth of the sector.
If the rules and policies are broken, then it will have a strong negative
impact on the organization. Violation of laws will lead to a decline in corporate
culture and ethics.
NET NEUTRALITY
Net neutrality is about the rules of the road for Internet users, and about the
relationship between the owners of those roads and the users. The existence of net
neutrality is bound to have problems. Indicating that, in developing countries such
as Philippines most internet users cannot afford line connection lacking to have of
a choice turns out to shifts into broadband or data connections. It shows that the
broadbands did not meet the needs of expectation of the users; connections are
not fast enough in viewing videos in YouTube and other public services content.
According to Marsden (2010), people are dismay or upset when someone connects
or want to share with their connection because they are aware that the speeds
slow down dramatically. To further inputs and information you may watch this video
to understand better what is Net Neutrality https://www.youtube.com/watch?
v=aiZ8xwwycXA.
There is certain legal content for the costumer to ensure that they can
access what they want to while also ensuring that some companies using these
IT 301: APPLICATION DEVELOPMENT AND EMERGING TECHNOLOGIES 5.14
UNIT 5: ETHICAL AND LEGAL CONSIDERATIONS
broadband networks will not interfered controls in the internet connection into
customer’s home. To further understand, net neutrality refers to a bunch of open
access principles enforced in such a variety of legal and technical ways (Fetzer,
2019). In layman’s term, it means that all internet content must be treated alike and
move at the same speed over the network. To understand better the effect of Net
Neutrality you mean watch this video for more information
https://www.youtube.com/watch?v=zq-2Yk5OgKc.
In conclusions, these three the theoretical, legal and technical definitions are
related in that theoretical net neutrality principles often to inform the state of legal
codification and technical execution (Fetzer, 2019).