ICT Ethics and Security
ICT Ethics and Security
(7) Tell your teacher / parents if anyone online asks you to meet in person.
(8) Never share your movement plans or location on social network.
(9) Never enter online chat room without an adult person.
(10) Do not share details about your life with others online.
(11) About using abusive language
(12) Do not buy or order anything online without parent’s supervision.
(13) Do not save personal information on public devices
(14) File sharing is ethical but don’t share virus infected files that can harm any
one’s data or computer
Q: Identify Ethical rules for the computer users?
Ans: Computer ethics is set of moral principles that regulate the use of computers.
Some computer and internet ethics include intellectual property right (such as
copyrighted electronic content), privacy concerns, how computers affect society.
Q: Define cyber Ethics, Cyber Safety, Cyber Security?
Ans: CYBER ETHICS refers to the code of responsible behavior on the internet.
Just as we are taught to act responsibly in everyday life with lessons such as
“Don’t take what does not belong to you” and ”Do not harm others”, We must act
responsibly in cyber world as well. The basic rule is “Do not do something in
cyber space that you would consider wrong or illegal in everyday life”.
Following are some ethical rules for internet and cyber space usage:
(i) one should value and accept the opinions of others, accept international,
national and local and cultural values
(ii) While using e-mail, chatting on social media, use appropriate language during
communication.
(iii) Avoid debates about religious sensitive topics, political affiliation etc.
(iv)Avoid sharing personal information on internet.
(v) Abide by copyright law while downloading any material or software
(vi) Use facilities and services only for the purpose for which you are authorized.
In case of breach, the safety of the person may be compromised and one may
become a victim of cyber bullying.
Cyber bullying is harassment like threatening, embarrassing, or targeting another
person with the use of technology. Online threats, aggressiveness, mean, or rude
texts, tweets, posts or messages all count. So does posting personal information,
pictures, or videos designed to hurt or embarrass someone else.
CYBER SAFETY AND SECURITY is the safe and responsible use of information
and communication Technology. It is about being safe, secure and responsible with
the information.
Acceptable user policy is an arrangement between the user and the provider that
defines how users are allowed to use the network or internet. An acceptable user
policy should describe both the acceptable and unacceptable behavior.