SlideShare une entreprise Scribd logo
1  sur  27
Computing and IT in the Workplace
CT006-1

Ethical & Legal Issues
Learning Outcomes
At the end of this section, YOU should be able to:
•

To explain and describe the common issues that arises in the use of computing

•

To explain and discuss the steps that can be taken to ensure proper use of IT

Computing and IT in the Workplace

Chapter 3

2
Topics we will cover
• Ethics and Society
• Unauthorized use of computers and networks

• Software theft
• Information privacy
• Code of Conduct
• Spyware and Spam

Computing and IT in the Workplace

Chapter 3

3
Ethics and Society
• What are computer ethics?
Moral guidelines that govern use of computers and information systems
Unauthorized use of
computers and
networks

Software theft

Intellectual property
rights—rights to which
creators are entitled for
their work

Information accuracy

Codes of conduct

Information privacy

Computing and IT in the Workplace

Chapter 3

4
Unauthorized Access and Use
• What is unauthorized access and how is it
achieved?
Use of a computer or
network without permission
Hackers typically break into computer
by connecting to it and then logging in
as a legitimate user
Hacker, or cracker, is someone who
tries to access a computer
or network illegally

Computing and IT in the Workplace

Chapter 3

5
Unauthorized Access and Use
• How can companies protect against hackers?
Intrusion detection software
analyzes network traffic, assesses
system vulnerabilities, and identifies
intrusions and suspicious behavior

Access control defines who
can access computer and
what actions they can take

Audit trail records access
attempts

Computing and IT in the Workplace

Chapter 3

6
Hardware Theft and Vandalism
• What are hardware theft and hardware vandalism?


Hardware theft is act of
stealing computer equipment






Cables sometimes used to lock
equipment
Some notebook computers use
passwords, possessed objects,
and biometrics as security
methods
For PDAs, you can passwordprotect the device

Hardware vandalism is act of
defacing or destroying
computer equipment

Computing and IT in the Workplace

Chapter 3

7
Software Theft
• What is software theft?
Act of stealing or
illegally copying
software or
intentionally
erasing
programs

Computing and IT in the Workplace

Software piracy
is illegal
duplication
of copyrighted
software

Chapter 3

8
Software Theft
• What is a license agreement?



Right to use software
Single-user license agreement allows user to install
software on one computer, make backup copy, and sell
software after removing from computer

Computing and IT in the Workplace

Chapter 3

9
Software Theft
• What are some other safeguards against software
theft?
Product activation allows user to input product
identification number online or by phone and
receive unique installation identification number

Business Software Alliance (BSA) promotes better
understanding of software piracy problems

Computing and IT in the Workplace

Chapter 3

10
Information Theft
• What is encryption?






Safeguards against information theft
Process of converting plaintext (readable data) into ciphertext
(unreadable characters)
Encryption key (formula) often uses more than one method
To read the data, the recipient must decrypt, or decipher, the
data

Computing and IT in the Workplace

Chapter 3

11
Information Theft
• What does an encrypted file look like?

Computing and IT in the Workplace

Chapter 3

12
IT Code of Conduct
• What is an IT code of conduct?



Written guideline that helps determine whether
computer action is ethical
Employers can distribute to employees
IT CODE OF CONDUCT

Computing and IT in the Workplace

Chapter 3

13
Information Privacy
• What is information privacy?
Right of individuals and
companies to restrict collection
and use of information about them
Difficult to maintain today
because data is stored online
Employee monitoring is using
computers to observe employee
computer use
Legal for employers to use
monitoring software programs

Computing and IT in the Workplace

Chapter 3

14
Information Privacy
• What are some ways to safeguard personal
information?
Fill in necessary information
on rebate, warranty, and
registration forms

Avoid shopping club
and buyers cards

Inform merchants that you
do not want them to distribute
your personal information

Install a cookie manager
to filter cookies
Clear your history file when
you are finished browsing
Set up a free e-mail account;
use this e-mail address for
merchant forms

Turn off file and print sharing
on your Internet connection
Limit the amount of information
you provide to Web sites; fill
in only required information

Computing and IT in the Workplace

Install a personal firewall

Chapter 3

Sign up for e-mail
filtering through your
Internet service provider or
use an antispam program,
such as Brightmail

Do not reply to spam
for any reason

Surf the Web anonymously
with a program such as
Freedom Web Secure or
through an anonymous
Web site such as
Anonymizer.com

15
Information Privacy
• What is an electronic profile?





Data collected when you fill out form on Web
Merchants sell
your electronic
profile
Often you can
specify whether
you want
personal
information
distributed

Computing and IT in the Workplace

Chapter 3

16
Information Privacy
• What is a cookie?

User
preferences

How
regularly
you visit
Web sites

Computing and IT in the Workplace

Small file on
your computer
that contains
data about you

Some Web sites
sell or trade
information
stored in your
cookies

Set browser to
accept cookies,
prompt you to
accept cookies,
or disable
cookies

Interests
and
browsing
habits

Chapter 3

17
Information Privacy
• How do cookies work?
Step 2. If browser finds a

Step 1. When you type Web

cookie, it sends information in
cookie file to Web site.

address of Web site in your
browser window, browser
program searches your hard
disk for a cookie associated
with Web site.

Step 3. If Web site does not receive

cookie information, and is expecting it,
Web site creates an identification number
for you in its database and sends that
number to your browser. Browser in turn
creates a cookie file based on that number
and stores cookie file on your hard disk.
Web site now can update information in
cookie files whenever you access the site.

Computing and IT in the Workplace

Web server for
www.company.com

Chapter 3

18
Information Privacy
• What is a cookie manager?


Software program that selectively
blocks cookies

Computing and IT in the Workplace

Chapter 3

19
Information Privacy


Spyware is program
placed on computer
without user’s
knowledge




Secretly collects
information about user

Spam is unsolicited
e-mail message sent
to many recipients

Computing and IT in the Workplace

Chapter 3

20
Information Privacy
• How can you control spam?

Service that
blocks e-mail
messages from
designated
sources

E-mail filtering
Collects spam in
central location
that you can
view any time

Anti-spam program
Sometimes
removes valid
e-mail messages

Attempts to
remove spam

Computing and IT in the Workplace

Chapter 3

21
Privacy Law
• What privacy laws have been enacted?

Computing and IT in the Workplace

Chapter 3

22
Privacy Law
• What privacy laws have been enacted? (cont’d)

Computing and IT in the Workplace

Chapter 3

23
Content Filtering
• What is content filtering?





Process of restricting access to certain material
Internet Content Rating
Association (ICRA)
provides rating system
of Web content
Web filtering software
restricts access to
specified sites

Computing and IT in the Workplace

Chapter 3

24
Review Questions





What are the issues surrounding information
privacy?
Explain the process of encryption and discuss on
why this process is needed.
How to prevent unauthorized computer access
and discuss the implications based on the case
study given.

Computing and IT in the Workplace

Chapter 3

25
Question and Answer Session

Q&A
Computing and IT in the Workplace

Chapter 3

26
What we will cover next
Topic and Structure of next session

Security Issues

Computing and IT in the Workplace

Chapter 3

27

Contenu connexe

Tendances

Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrimeOnline
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 

Tendances (20)

Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Information security
Information securityInformation security
Information security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Phishing
PhishingPhishing
Phishing
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 

En vedette

Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
Social media for children
Social media for childrenSocial media for children
Social media for childrenSachin Dabir
 
Ashnik corporate presentation Dec 2012
Ashnik corporate presentation Dec 2012Ashnik corporate presentation Dec 2012
Ashnik corporate presentation Dec 2012Sachin Dabir
 
Legal and Ethical Issues in Computing (Hacking in Turkey)
Legal and Ethical Issues in Computing (Hacking in Turkey)Legal and Ethical Issues in Computing (Hacking in Turkey)
Legal and Ethical Issues in Computing (Hacking in Turkey)melihtuna
 
Web Cookies
Web CookiesWeb Cookies
Web Cookiesapwebco
 
Ethical dilemmas at worplace
Ethical dilemmas at worplaceEthical dilemmas at worplace
Ethical dilemmas at worplaceSALAR ALI MEMON
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkVolker Hirsch
 

En vedette (10)

Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Social media for children
Social media for childrenSocial media for children
Social media for children
 
Ashnik corporate presentation Dec 2012
Ashnik corporate presentation Dec 2012Ashnik corporate presentation Dec 2012
Ashnik corporate presentation Dec 2012
 
Computer Ethics
Computer  EthicsComputer  Ethics
Computer Ethics
 
Legal and Ethical Issues in Computing (Hacking in Turkey)
Legal and Ethical Issues in Computing (Hacking in Turkey)Legal and Ethical Issues in Computing (Hacking in Turkey)
Legal and Ethical Issues in Computing (Hacking in Turkey)
 
Web Cookies
Web CookiesWeb Cookies
Web Cookies
 
Ethical dilemmas at worplace
Ethical dilemmas at worplaceEthical dilemmas at worplace
Ethical dilemmas at worplace
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Similaire à ethical legal issues

Chapter 9 security privacy csc
Chapter 9 security privacy cscChapter 9 security privacy csc
Chapter 9 security privacy cscHisyam Rosly
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfSujanTimalsina5
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacymalik1972
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Sean Bradley
 
Protect computer from malware
Protect computer from malwareProtect computer from malware
Protect computer from malwareShouaQureshi
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016dilahkmpk
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxFannyKwok1
 
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptWilsonWanjohi5
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.rizwanshafique4321
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Fizaril Amzari Omar
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemssaltashict
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using ITMirza Ćutuk
 

Similaire à ethical legal issues (20)

Chapter 9 security privacy csc
Chapter 9 security privacy cscChapter 9 security privacy csc
Chapter 9 security privacy csc
 
Week 12
Week 12Week 12
Week 12
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"
 
Protect computer from malware
Protect computer from malwareProtect computer from malware
Protect computer from malware
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.ppt
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
Newethics
NewethicsNewethics
Newethics
 
Module 10 e security-en
Module 10 e security-enModule 10 e security-en
Module 10 e security-en
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
DC16_Ch05.pptx
DC16_Ch05.pptxDC16_Ch05.pptx
DC16_Ch05.pptx
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

ethical legal issues

  • 1. Computing and IT in the Workplace CT006-1 Ethical & Legal Issues
  • 2. Learning Outcomes At the end of this section, YOU should be able to: • To explain and describe the common issues that arises in the use of computing • To explain and discuss the steps that can be taken to ensure proper use of IT Computing and IT in the Workplace Chapter 3 2
  • 3. Topics we will cover • Ethics and Society • Unauthorized use of computers and networks • Software theft • Information privacy • Code of Conduct • Spyware and Spam Computing and IT in the Workplace Chapter 3 3
  • 4. Ethics and Society • What are computer ethics? Moral guidelines that govern use of computers and information systems Unauthorized use of computers and networks Software theft Intellectual property rights—rights to which creators are entitled for their work Information accuracy Codes of conduct Information privacy Computing and IT in the Workplace Chapter 3 4
  • 5. Unauthorized Access and Use • What is unauthorized access and how is it achieved? Use of a computer or network without permission Hackers typically break into computer by connecting to it and then logging in as a legitimate user Hacker, or cracker, is someone who tries to access a computer or network illegally Computing and IT in the Workplace Chapter 3 5
  • 6. Unauthorized Access and Use • How can companies protect against hackers? Intrusion detection software analyzes network traffic, assesses system vulnerabilities, and identifies intrusions and suspicious behavior Access control defines who can access computer and what actions they can take Audit trail records access attempts Computing and IT in the Workplace Chapter 3 6
  • 7. Hardware Theft and Vandalism • What are hardware theft and hardware vandalism?  Hardware theft is act of stealing computer equipment     Cables sometimes used to lock equipment Some notebook computers use passwords, possessed objects, and biometrics as security methods For PDAs, you can passwordprotect the device Hardware vandalism is act of defacing or destroying computer equipment Computing and IT in the Workplace Chapter 3 7
  • 8. Software Theft • What is software theft? Act of stealing or illegally copying software or intentionally erasing programs Computing and IT in the Workplace Software piracy is illegal duplication of copyrighted software Chapter 3 8
  • 9. Software Theft • What is a license agreement?   Right to use software Single-user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer Computing and IT in the Workplace Chapter 3 9
  • 10. Software Theft • What are some other safeguards against software theft? Product activation allows user to input product identification number online or by phone and receive unique installation identification number Business Software Alliance (BSA) promotes better understanding of software piracy problems Computing and IT in the Workplace Chapter 3 10
  • 11. Information Theft • What is encryption?     Safeguards against information theft Process of converting plaintext (readable data) into ciphertext (unreadable characters) Encryption key (formula) often uses more than one method To read the data, the recipient must decrypt, or decipher, the data Computing and IT in the Workplace Chapter 3 11
  • 12. Information Theft • What does an encrypted file look like? Computing and IT in the Workplace Chapter 3 12
  • 13. IT Code of Conduct • What is an IT code of conduct?   Written guideline that helps determine whether computer action is ethical Employers can distribute to employees IT CODE OF CONDUCT Computing and IT in the Workplace Chapter 3 13
  • 14. Information Privacy • What is information privacy? Right of individuals and companies to restrict collection and use of information about them Difficult to maintain today because data is stored online Employee monitoring is using computers to observe employee computer use Legal for employers to use monitoring software programs Computing and IT in the Workplace Chapter 3 14
  • 15. Information Privacy • What are some ways to safeguard personal information? Fill in necessary information on rebate, warranty, and registration forms Avoid shopping club and buyers cards Inform merchants that you do not want them to distribute your personal information Install a cookie manager to filter cookies Clear your history file when you are finished browsing Set up a free e-mail account; use this e-mail address for merchant forms Turn off file and print sharing on your Internet connection Limit the amount of information you provide to Web sites; fill in only required information Computing and IT in the Workplace Install a personal firewall Chapter 3 Sign up for e-mail filtering through your Internet service provider or use an antispam program, such as Brightmail Do not reply to spam for any reason Surf the Web anonymously with a program such as Freedom Web Secure or through an anonymous Web site such as Anonymizer.com 15
  • 16. Information Privacy • What is an electronic profile?    Data collected when you fill out form on Web Merchants sell your electronic profile Often you can specify whether you want personal information distributed Computing and IT in the Workplace Chapter 3 16
  • 17. Information Privacy • What is a cookie? User preferences How regularly you visit Web sites Computing and IT in the Workplace Small file on your computer that contains data about you Some Web sites sell or trade information stored in your cookies Set browser to accept cookies, prompt you to accept cookies, or disable cookies Interests and browsing habits Chapter 3 17
  • 18. Information Privacy • How do cookies work? Step 2. If browser finds a Step 1. When you type Web cookie, it sends information in cookie file to Web site. address of Web site in your browser window, browser program searches your hard disk for a cookie associated with Web site. Step 3. If Web site does not receive cookie information, and is expecting it, Web site creates an identification number for you in its database and sends that number to your browser. Browser in turn creates a cookie file based on that number and stores cookie file on your hard disk. Web site now can update information in cookie files whenever you access the site. Computing and IT in the Workplace Web server for www.company.com Chapter 3 18
  • 19. Information Privacy • What is a cookie manager?  Software program that selectively blocks cookies Computing and IT in the Workplace Chapter 3 19
  • 20. Information Privacy  Spyware is program placed on computer without user’s knowledge   Secretly collects information about user Spam is unsolicited e-mail message sent to many recipients Computing and IT in the Workplace Chapter 3 20
  • 21. Information Privacy • How can you control spam? Service that blocks e-mail messages from designated sources E-mail filtering Collects spam in central location that you can view any time Anti-spam program Sometimes removes valid e-mail messages Attempts to remove spam Computing and IT in the Workplace Chapter 3 21
  • 22. Privacy Law • What privacy laws have been enacted? Computing and IT in the Workplace Chapter 3 22
  • 23. Privacy Law • What privacy laws have been enacted? (cont’d) Computing and IT in the Workplace Chapter 3 23
  • 24. Content Filtering • What is content filtering?    Process of restricting access to certain material Internet Content Rating Association (ICRA) provides rating system of Web content Web filtering software restricts access to specified sites Computing and IT in the Workplace Chapter 3 24
  • 25. Review Questions    What are the issues surrounding information privacy? Explain the process of encryption and discuss on why this process is needed. How to prevent unauthorized computer access and discuss the implications based on the case study given. Computing and IT in the Workplace Chapter 3 25
  • 26. Question and Answer Session Q&A Computing and IT in the Workplace Chapter 3 26
  • 27. What we will cover next Topic and Structure of next session Security Issues Computing and IT in the Workplace Chapter 3 27