Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23

Legal and Ethical Use of

Technology
Ethics for Computer Use
3.
1.
5. Use the
7.
9. computer
others’ to
using
computer help
spread
that your
people
truthful
resources
show own
respect
and
files
information
with not
and tonot
doand
permissiontoharm.
consideration use
not
andothers’
to
for dotocharacter
not
other files.
duplicate
people and it
assassination.
without
not
4.
8. to
Use do
2. Create authorization.
thecyberbullying.
computer
yourprograms
own work to and
share
or assigned notcomputer
the
10. or software
6. Use
work
having software
information and
ofinothers.
unit and not
mind that
not are
to interfere
its social original
stealwith
others’
impact and
others
and
legal and
information.
work.
not not pirated.
for self−interest.
Ethical Issues in Technology
and Software

1. Unauthorized Access and


Use of Hardware, Software,
Network, and Computer
Files
1. Unauthorized Access and Use of
Hardware, Software, Network, and
Computer Files
• If are
Who this people?
somebody would use
anybody’s
Hackercomputer
HACKER− originallyand
if he or files
means
she a
without“computer
permission
tries to access from the
enthusiast”
computer or
owner, network
that is illegally
an unauthorized
to access
access. data and commit
malicious acts.
Tips in carefully creating a
PASSWORD
• Do
Usenot
words
at leastfrom
leave other
eight
written languages.
characters.
copies of
• your
Use apasswords
password
combinationthatofcan be and
upper
anywhere.
remembered easily.words,
lower case letters,
• Select a password
numbers, thatcharacters.
and special can be
entered
• Use easily
joined eventogether.
words without
• looking
Add oneatorthe
more numbers at the
keyboard.
• Do
beginning, middle,
not share or end of to
your password a
word.
anyone.
FIREWA
What is a
FIREWALL?
LL
• All
A security
communications
system (hardware
in schools
andare
or
being
software)
routed
thatthrough
blocks aunauthorized
proxy
server
access which
to datascreens
on a network.
all incoming
andschool)
• (in outgoing messages.
it restricts teachers and
students from accessing malicious
data that may do harm in school’s
computer hardware and files.
Ethical Issues in Technology
and Software

2. Hardware Theft and


Vandalism
2. Hardware Theft and
Computer Theft is stealing of
Vandalism
The best precautionary
hardware and its device.
measure in keeping
Computer Vandalism is the act the
of
hardware
damaging orsafe is to hardware−
breaking have a full
awareness on itsand
cutting the cables security
wires, by not
smashing theit computer
leaving and its and
anywhere
devices and
unattended. deleting of software or
computer files.
Ethical Issues in Technology
and Software

3. Software Theft
Software
Software piracy
Theft- form of software
theft.
• When a person
copies illegally
How or When copyrighted
this happens? software for
personal or
business use.
End-user License Agreement
- Or
Some single-user
(EULA)of the conditions
license are:
agreement is
Going
the• commonagainst
Users are the agreement
prohibited is a
may type thetosoftware
of license
install give
violation
copies
included of
in tocopyright
friend
software law,
and colleagues.
packages
on only one computer.
In US, penalties
• Users by
purchased reach up to
arean individual.
prohibited to install
$250,000 and up to five years in jail.
the software on a network
In Philippines, penalties reach up
(school computer lab network)
to Php 1,500,000 and up to 6-9
• Users may make one copy for
imprisonment
backup purposes.
Various Types of Software Licenses Used in
Education Used in Schools
Characteristics
Used in Schools
Cost-effective
Frequently
Very-cost
Used
Software
Softwarewhen effective
can
is a used
be
school method
method
installed
installed
can be with
needs
on the
installed
Cost-effective method to
Single-
Community
Network allowing
school’s
software
for
only
on
onlya set
ina students
network.
school
number
few
one and
The
distributed
districts
copies
of
computer. teachers
license
of
Some on
to
a
Multiple install software
throughout the
on
school
more to
than
have
License
User will specify
CDs/DVDs.
purchase
particular
computers,
license and
largeAny
typically
agreements the software
quantities
number
software.
5, 10, of
allow
User one
access computer.
to an Most
application
will
users control
Commonly
programs
software.
50, or more.
to a
can specific
Savings
Cost
found
install be varies
the number
purchased
incan small
software be
commonly
software used in As
program. schools.
schools
of
onsimultaneous
from
significant
schools
based either
onand
one number
when
desktop users,
Mcintosh
over such
individual
or PC
ofpurchasing
computer as
continue
50, 100, to
or install
500. Cost networks,
varies
platforms.
CD
and or
one
network
DVD
specialized
computers. pricing.
notebook
license are software
computer.
becoming
based on
programs. number of computer.
Ethical Issues in Technology
and Software

4. Information Theft
What is Information theft?
- also
is getting
a computer
confidential
crime when info.one
about school steal
deliberately
administrations,
information for
academic
purposes officials,of
teachers,
studying staff,
howandto
students
compete w/out
with legal
other
authorization.
organizations or
Encryptio
What is an Encryption?
n of converting
-is the process
readable data to unreadable one.
- An encryption key Is needed to
enable the person to convert it back
in readable form.
-a person who illegally accesses
info. would only see characters that
do not contain any meaning.
Ethical Issues in Technology
and Software

5. Malicious Acts in
Software
5.
a.)Malicious
Spam Acts in
Software
• Unwanted
The message
ff. malicious being
acts are
received.
commonly experienced in e-mails,
• Truly annoying
cellphones, instant orfor it messaging
text fills up our
inbox
devices andand then later wastes our
blogs.
time in deleting.

• Spam sentsent through


through Internetinstant
called
• In Telephony is called a split.
messaging
a spam. devices called a spim.
What are the different ways to
reduce receiving SPAM messages?
• E-mail
By adjusting theand
filtering built-in settings
Anti-spam
-in your
Blockse-mails to delete e-mail
unwanted spam
automatically.from
messages designated
• sources.
But
Outlook
the problem
Express-that
has these
in itstwo
set
can
up that
bring
can isblock
thatmessages
it sometimes
from
block
a particular
or remove
sender valid/legal
or subject. e-
mail messages.
b.)
phishing
- called as carding or spoofing
- a scam in which an agent sends a
legitimate-looking e-mail that
attempts to steal personal and
financial information including
bank account numbers of the
recipient.
d.)Malware
c.) Adware
--ismalicious software
a software that causes
that incorporates
harm
the to one or more
presentation of computer.
advertisement
- it enters to the scene when an
as condition for operating
attachment to a message that the
software.
carries virus is opened & then
later shared to other computers
via network or via portable
storage medium (CD, flash drive,
etc.)
Examples of Acceptable Use of
Acceptable and
School Technology
Unacceptable
•• Abiding
Deleting by
Running the policies
antivirus
unwanted and onor
software
messages
• procedures
downloaded
old data
Using
Uses
of
fromfiles,
online
of
other networks
and that
attachments,
computers
time efficiently.
areSchool
accessed.orTechnology
peripherals,
servers. disks.
•• Enforcing
Using the appropriate
Internet used and
ethically and
• Being polite and using appropriate
• Signing
reporting
legally. correspondence.
misuse and security
language.
issues.
Examples of Unacceptable Use
of School Technology
•• Gaining
Altering access
Harassing
Conducting
Transmitting to by
anydeleting
ancommercial
individual
material
software pay-for-
using
that the
activities,
violates
files,
view
any site.or products,
Internet.
advertising
local
downloading country’s
programs, or taking
regulation,
or part
•• in
suchpolitical
Giving
copyingas out lobbying.
your own
copyrighted,
or installing or others’
threatening,
unauthorized
Downloading text, graphics, or
private
or information,
obscene
files and material.
programs. such
engaging in behaviors that may be as
•• Vandalizing
Plagiarizing
address, phoneequipment,
number, digital
• Assuming the
considered identity
obscene, ororusing the
abusive,
files, or
passwords.
libelous, willfully
indecent, spreading
vulgar,ofprofane,
passwords or materials another.
computer
or lewd. viruses.
Thank
You!!!

You might also like