2. INTRODUCTION
• Ethics
Set of moral principles
that govern the behaviour
of a group or individual
• Computer Ethics
System of moral
standards or values used
as guidelines for the
computer user
3. COMPUTER ETHICS vs LAW
Ethics
• Serves as guidelines
• Free to follow
• Universal
• Results in ethical
computer users
• Not following is
immoral
Law
• Rules
• Must follow
• Country dependent
• Prevents misuse of
computer
• Not following is a
crime
5. ETHICAL VALUES
• Do not install or uninstall software without
prior permission
• Do not steal information of any other
computer
• Do not make illegal copies of software
• Protect important documents using
passwords
• Do not browse unwanted websites or
emails
6. INTELLECTUAL PROPERTY RIGHT
• New useful ideas and
designs
• Functional and
Technical inventions
• Original works that
express ideas
• Purely artistic works
• Brand that identifies
source of goods or
services
• Symbol, logo, word,
sound, colour, design,
etc.
9. SPAM PREVENTION
•Avoid opening spam emails and
clicking on links in spam messages
•Don’t buy anything from a spammer
•Don’t be tempted to reply
•Avoid ‘unsubscribe’ options
• Use a disposable email
address
• Munging: Use address
as ‘a at b dot com’ instead
of a@b.com
10. SOFTWARE PIRACY
Always buy your
software from a reputed
organization
Make sure that your
software comes with a
licensed agreement ,
original disc and
authentic packaging
Avoid buying multiple
software titles from
different publishers on a
single disc
If the seller provides a
serial number other than
one mentioned on
package, it indicates that
software is not authentic
12. CYBER LAWS
• Cyber space is governed by a
system of law and regulations called
Cyber Law
• Refers to all legal and regulatory
aspects of internet
• Cyber law is the part of the overall legal system that deals with the
Internet, cyberspace, and their respective legal issues.
• Cyber law covers a fairly broad area, encompassing several subtopics
including freedom of expression, access to and usage of the Internet,
and online privacy
14. MALICIOUS INTENT AND CODE
Malicious code is a program that is covertly inserted into another program with the intent of
malicious activities
Can be prevented by limiting the capabilities of the servers and web applications to only the
functions necessary to support the operations, and bringing awareness and training programs, we
can protect our system from malicious intent
15. CONCLUSION
Safeguard yourself and others by following all best practices and the 10 commandments of
computer ethics
1. Thou shalt not use a computer to harm other people
2. Thou shalt not interfere with other people's computer work
3. Thou shalt not snoop around in other people's computer files
4. Thou shalt not use a computer to steal
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not copy or use proprietary software for which you have not paid (without
permission)
7. Thou shalt not use other people's computer resources without authorization or proper
compensation
8. Thou shalt not appropriate other people's intellectual output
9. Thou shalt think about the social consequences of the program you are writing or the
system you are designing
10.Thou shalt always use a computer in ways that ensure consideration and respect for other
humans
16.
17. QUESTION 1:
Unwanted messages in the mailbox are called?
Malicious Code SPAM
Cookies
NEXT->
CLICK ON THE CORRECT ANSWER
18. QUESTION 2:
Cyber criminals who crack the password to
access information from the Internet are called?
Sackers
Hackers
Virus
NEXT->
CLICK ON THE CORRECT ANSWER
19. QUESTION 3:
Set of moral values which regulate the use of
computers are called?
Cyber Law Computer Ethics
Malicious Intent
NEXT->
Privacy
CLICK ON THE CORRECT ANSWER
20. QUESTION 4:
The process of making duplicate copy of the
original software illegally is known as?
Malicious Code
Software Piracy
Cookies
NEXT->
Hacking
CLICK ON THE CORRECT ANSWER
21. QUESTION 5:
There are 5 commandments of Computer Ethics?
True
NEXT->
False
CLICK ON THE CORRECT ANSWER