Inbound 3741383423091718019
Inbound 3741383423091718019
Inbound 3741383423091718019
Computer Ethics
By: Angie T. Sauza, LPT
What is Netiquette?
• Network etiquette
that is the etiquette of cyberspace and “etiquette”
Internet etiquette
“Having good netiquette involves being
mindful of your behavior, avoiding
offensive or derogatory language, and
treating others as you would in face-to-
face interactions.”
- AVIGAIL LEV, PSYD, FOUNDER & DIRECTOR OF THE BAY AREA CBT
CENTER
10 Basic Netiquette Rules
• Make Real People a Priority
• Use Respectful Language
• Share with Discretion
• Don’t Exclude Others
• Choose Friends Wisely
• Respect People’s Privacy
• Fact Check Before Posting
• Don’t Spam
• Respond to Emails and Texts Promptly
• Update Online Information
Ten Commandments of Computer Ethics
• Thou shalt not use a computer to harm other people.
• Thou shalt not interfere with other people’s computer work.
• Thou shalt not snoop around in other people’s computer files.
• Thou shalt not use a computer to steal.
• Thou shalt not use a computer to bear false witness
• Thou shalt not copy or use proprietary software for which you have not paid.
• Thou shalt not use other people’s computer resources without authorization or
proper compensation.
• Thou shalt not appropriate other people’s intellectual output.
• Thou shalt think about the social consequences of the program you are writing or
the system you are designing.
• Thou shalt always use a computer in ways that ensure consideration and respect
for your fellow humans.
Cybercrimes
Cyber
-it is the characteristics of the culture of computers,
information, technology and virtual reality.
Cybercrime is defined as a crime in which a computer
is the object of the crime such as hacking, phishing,
spamming and child pornography
Cybercriminals use computer technology to access
personal information, business trade secrets or use the
internet for exploitative or malicious purposes
Impact of e-crimes
This includes:
• Loss of online business and consumer confidence in the digital economy,
• The potential for critical infrastructure to be compromised affecting water
supply, health services, national communications, energy distribution,
financial services, and transport,
• Loss of personal financial resources and the subsequent emotional
damage.
• Loss of business assets,
• Costs to government agencies and businesses in re-establishing credit
histories, accounts and identities,
• Costs to businesses in improving cyber security measures,
• Stimulating other criminal activity, or
• Costs in time and resources for law enforcement agencies.
Classifications of e-crimes
• Copyright
The exclusive legal right, given to an originator or an
assignee to print, publish, perform, film, or record literary,
artistic, or musical material, and to authorize others to do
the same.
Copyright infringement is the violation, piracy or theft of a
copyright holder's exclusive rights through the unauthorized
use of a copyrighted material or work.
Common forms of cybercrimes:
• Plagiarism
An act or instance of using or closely imitating the language and
thoughts of another author without authorization.
• Computer Addiction
I LOVE YOU
• One of the most infamous viruses in May 2000
• Network worm
• ILOVEYOU was not the first malware to exploit a hole in
Microsoft’s e-mail client, but it certainly initiated one of the
most serious virus outbreaks at the beginning of the new
millennium.
HISTORY OF CYBERCRIMES
• Illegal Downloading
• Obtaining files that you do not have the right to use from
the internet.
• Digital Piracy
• Practice of illegally copying and selling digital music, video,
computer software, etc.
• Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or prison mayor
Cyberbullying
• Virtual listening
• Potentially access your computer with the right equipment.
• Steal your personal information including logins and
passwords.
Spam
1. Computer-related forgery
2. Computer-related Fraud
3. Computer-related Identity Theft
• Content-Related Offenses
1. Cybersex
2. Child Pornography
3. Unsolicited Commercial Communications
4. Libel
Authorized to collect or record traffic statistics
• Republic Act No. 10173, also known as the Data Privacy Act of 2012
(DPA), aims to protect personal data in information and
communications systems both in the government and the private
sector. The DPA created the National Privacy Commission (NPC)
which is tasked to monitor its implementation.
The function of the NPC
• Rule making.
• Advisory. The NPC is the advisory body on matters related to personal
data protection.
• Public education. – The NPC shall launch initiatives to educate the public
about data privacy, data protection and fair information rights and
responsibilities.
• Compliance and monitoring. – The body has compliance and monitoring
functions to ensure personal information controllers comply with the law. It
is also tasked to manage the registration of personal data processing
systems.
• Complaints and investigations.
• Enforcement.
Offenses and Penalties
Crime Imprisonment Fine
Unauthorized Processing Processing personal data without the 1 year – 6 Php500,000 to
consent of the data subject, or without years Php4,000,000
being authorized under DPA or any
existing law.
• https://www.researchgate.net/publication/331914032
• 5 arrested over BDO hacking incident – NBI (rappler.com)
• R.A. No. 10175: The Cybercrime Prevention Act: The Net Co
mmandments – Philippine Legal Research (legalresearchph.
com)
• Data Privacy | Bulacan State University (bulsu.edu.ph)