Professional Documents
Culture Documents
I.T Issues and Opportunities: Module1 - Computer Ethics
I.T Issues and Opportunities: Module1 - Computer Ethics
T Issues and
Opportunities
Module1 – Computer Ethics
Introduction
The use of technology in all aspects of our daily
lives continues to expand each year.
Computer
Ethics Crimes
Privacy IP Law
Issues in IT:
Ethics
Ethics
“doing what is right, to achieve what is good”
refers to the rules and standards that govern
how an individual behaves in society.
Computer Ethics
is software that is
designed to restrict
unwanted access to an
organization’s network.
The firewall screens
electronic traffic in both
directions so that
organizational security
is maintained.
System Intrusion
Hackers
Hackers are people that break into someone’s computer
system without permission. Some hackers intentionally steal
data or commit vandalism, while others merely “explore” the
system to see how it works and what files it contains.
Cybersquatting
is registering a domain name that a famous
Cybersquatting
company will want to use and then selling that name back to
the company for a profit.
On November 29, 1999, President Clinton signed into law
the Anticybersquatting Consumer Protection Act, making
cybersquatting illegal.
System Intrusion
Piracy
4. Bacteria or rabbits –
multiply rapidly and fill up the
computer’s memory
Issues in IT:
Intellectual Property
Intellectual Property defined
Industrial property
Copyright
Two Categories of IP
Industrial property
which includes inventions (patents),
Copyright
trademarks, industrial designs, and
geographic indications of source;
is the
Fair use – use of copyright materials that does not
violate or infringe the exclusive rights of the copyright
holder.
Limitations of Copyright
1. Copyright does not protect the author’s creative idea.
2. Copyright protects only fixed, original and creative
expressions, not the ideas or facts upon which the
expression is based
For Example:
Copyright may protect a film but it cannot protect the underlying theme of the
film.