0% found this document useful (0 votes)
15 views60 pages

Chap 3 Ethics in Information Technology

Notes for the subject Living in the IT Era

Uploaded by

Rochelle Jabillo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views60 pages

Chap 3 Ethics in Information Technology

Notes for the subject Living in the IT Era

Uploaded by

Rochelle Jabillo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 60

ETHICS IN

INFORMATIO
N
TECHNOLOG
GEE LIE - Living in the IT Era

First Semester | 2024 - 2025


"Just because you can do
something doesn't mean you
should do it."
GEE LIE - Living in the IT Era
Information Technology (IT) Ethics
encompasses the moral principles and standards that
regulate the use of technology in areas such as information
systems, data management, and digital communication. It
focuses on the obligations of individuals, organizations, and
governments to use, share, and protect information in ways
that uphold privacy, security, and fairness. IT ethics plays a
vital role in ensuring that technology serves the public
interest and is not exploited for harmful purposes.
GEE LIE - Living in the IT Era
GUIDE QUESTIONS:
• What are the moral responsibilities of computer
professionals?
• Who is to blame when computer software failure
causes harm?
• Is computer hacking immoral?

• Is it immoral to make unauthorized copies of


software?
GEE LIE - Living in the IT Era
CYBERCRIM
E
LAW
GEE LIE - Living in the IT Era
CYBERCRIM
GEE LIE - Living in the IT Era

CybercrimeE
refers to illegal activities
conducted using computers,
networks, the internet, or the
ICT

Cybercriminals
are individuals or groups who
engage in cybercrime, using
technology to exploit, harm, or
steal from others
Cybercrime Law
are laws that create
offences and penalties for
cybercrimes:
• computer crimes,
• internet crimes,
• information crimes,
• communications
crimes,
• technology crimes.
GEE LIE - Living in the IT Era
CYBERCRIME LAW IN THE
PHILIPPINES
GEE LIE - Living in the IT Era

The Cybercrime Prevention Act of 2012, officially


recorded as Republic Act No. 10175 was approved on
September 12, 2012. It aims to address legal issues
concerning online interactions and the internet in the
Philippines.
Among the cybercrime offences included in the bill
are:
• cybersquatting,
• cybersex,
• child pornography,
• identity theft,
• illegal access to data and
Cybersquatting
The acquisition of a
GEE LIE - Living in the IT Era

domain name on the


Internet in bad faith or
with the intent to profit,
mislead, destroy one's
reputation or deprive
others from registering
the same domain name.
Also covered by the law
are computer-related
forgery, fraud and identity
Cybersex
GEE LIE - Living in the IT Era

Refers to online or digital


activities where individuals
engage in sexual
conversation, exchange
explicit images, or
participate in virtual sexual
interactions, often through
text, video, or other digital
media.
Child
Federal and state laws
Pornography
GEE LIE - Living in the IT Era

make it a crime to produce,


distribute, or even just
possess pornographic
materials that portray a
minor (someone under the
age of 18). Increasingly,
child pornography laws are
being relied on to punish
individuals who use the
internet to share or obtain
pornographic images and
Occurs when someone Identity Theft
illegally obtains and uses
GEE LIE - Living in the IT Era

another person's personal


information, such as their
name, Social Security number,
credit card details, or other
sensitive data, typically for
financial gain. It can involve
activities like opening
accounts in someone else's
name, making fraudulent
purchases, or even
committing crimes using the
Cyber Libel
GEE LIE - Living in the IT Era

Refers to the act


of defaming
someone
through false
and damaging
statements
made online or
through digital
GEE LIE - Living in the IT Era

HOW TO

AGAINST
PROTECT
YOURSELF
1 Avoid using public networks.
Larana University | 2024

2 Avoid using public computers for sensitive


business.
3 Use strong passwords.

4 Keep your software updated.

5 Manage your social media settings


6 Avoid downloading
applications.
Larana University | 2024

7 Strengthen your home network.

8 Know that identity theft can happen


anywhere.
9 Keep an eye on the kids.

10 Know what to do if you become a victim.


DO'S AND
DONT'S
IN USING THE
INTERNET
GEE LIE - Living in the IT Era
"With great power
comes
with great
responsibility."
GEE LIE - Living in the IT Era
“Even if we have the power to do
almost everything with the internet,
we have to be responsible enough to
consider our online behavior and
choices that can have an impact on
ourselves, and others.”
GEE LIE - Living in the IT Era
DO’s :
GEE LIE - Living in the IT Era

1 Protect Your Privacy 5 Be Cautious with Download

2 Verify Information 6 Monitor Children’s Internet Usa

3 Practice Online Security 7 Secure Public Wi-Fi Use

4 Engage Respectfully 8 Think Before Posting


DONTS’s
:
GEE LIE - Living in the IT Era

1 Avoid Oversharing 5 Don’t Engage in Cyberbullyin

2 Don’t Trust Everything You 6 Avoid Illegal Activities


See
3 Don’t Skip Reading Terms and
Don’t Ignore Red Flags 7
Privacy Policies

4 Don’t Use Weak 8 Don’t Ignore Your Screen Tim


Passwords
INTELLECTUA
L
PROPERTY
GEE LIE - Living in the IT Era
INTELLECTUAL
PROPERTY
refers to creations of the mind that are
legally protected. It encompasses ideas,
inventions, artistic works, symbols, names,
images, and designs. IP laws give creators
exclusive rights to their creations, allowing
them to control and benefit from their use.
GEE LIE - Living in the IT Era
4 types of IP
GEE LIE - Living in the IT Era

1 Patent
2 Trademark
3 Trade Secret
4 Copyright
Patent
GEE LIE - Living in the IT Era

A patent is a legal right


granted by a government to an
inventor, giving them exclusive
rights to make, use, sell, or
distribute an invention for a
specified period, typically 20
years from the filing date. In
exchange, the inventor must
publicly disclose details about
Trademar
GEE LIE - Living in the IT Era

k A trademark is a symbol,
word, phrase, logo, or design
that identifies and represents
a specific brand, product, or
service. It helps people
recognize the source of goods
or services and sets them
apart from competitors.
Trademar
GEE LIE - Living in the IT Era

k A trade secret is confidential


business information that
gives a company a competitive
edge. It is not publicly known
and is protected as long as it
remains a secret. Unlike
patents or trademarks, trade
secrets don’t need to be
registered with the
Copyright
GEE LIE - Living in the IT Era

Copyright is a legal protection


that gives the creator of an
original work the exclusive right
to control how their work is used.
It applies to creative works like
books, music, movies, software,
and artwork. Copyright ensures
that only the creator (or someone
they authorize) can copy, share,
or adapt the work.
Violations of IP
GEE LIE - Living in the IT Era

1 Patent Infringement
Happens when a person or company makes,
uses, sells, or imports a patented invention
without authorization from the patent holder.

Example: Manufacturing and selling a product


that uses a patented technology without a
license.
Violations of IP
GEE LIE - Living in the IT Era

2 Trademark Infringement
Involves using a trademark (a brand name, logo,
or symbol) that is identical or confusingly similar
to a registered trademark, causing confusion
among consumers.

Example: Selling counterfeit goods using a


brand’s logo without permission.
Violations of IP
GEE LIE - Living in the IT Era

2 Trade Secret Misappropriation


Occurs when a business's confidential
information (e.g., formulas, processes, or
customer lists) is disclosed or used without
consent, often by former employees or
competitors.

Example: An employee takes proprietary data


from their employer to a competitor.
Violations of IP
GEE LIE - Living in the IT Era

4 Copyright Infringement
Occurs when someone reproduces, distributes,
performs, or displays copyrighted works (like
books, music, movies, software, etc.) without
permission from the copyright holder.

Example: Downloading or sharing copyrighted


movies or software illegally.
IDENTITY
THEFT
GEE LIE - Living in the IT Era
IDENTITY THEFT
is a serious crime that involves the unauthorized
use of someone else's personal information, such
as Social Security numbers, credit card details, or
bank account numbers, to commit fraud or other
crimes. The thief may use this information to open
accounts, make purchases, or engage in activities
that can cause financial damage or harm to the
victim's reputation.
GEE LIE - Living in the IT Era
Types of Identity
Theft
GEE LIE - Living in the IT Era

Financial Identity Theft:


This is when a thief uses your personal information to
access or open bank accounts, credit cards, loans, or other
financial products in your name.

Criminal Identity Theft:


This happens when a thief uses your information during an
arrest or investigation to evade criminal charges or to avoid
punishment.
Medical Identity Theft:
This occurs when someone uses your identity to obtain
GEE LIE - Living in the IT Era

medical services or prescriptions, potentially affecting your


health records.
Child Identity Theft:
This involves stealing the identity of a minor, typically to
open credit accounts or commit fraud. Because children
rarely check their credit reports, it can go unnoticed for
years.
Tax Identity Theft:
This is when someone uses your Social Security number to
file a false tax return and claim your refund.
THE LAW
REGARDING IDENTITY
RA THEFTACT OF 2012
10173- DATA PRIVACY - AN
ATIDOTE TO IDENTITY THEFT IN THE PH - "AN CT
PROTECTING NDIVIDUAL PERSONAL INFORMATION
IN INFORMATION AND COMMUNICATIONS SYSTEMS
IN THE GOVERNMENT AND THE PRIVATE SECTOR,
CREATING FOR THIS PURPOSE A NATIONAL PRIVACY
COMMISSION, AND
GEEFOR OTHER
LIE - Living PURPOSES."
in the IT Era
Online Identity Theft
GEE LIE - Living in the IT Era

PHISHING
is a type of cybercrime in which
attackers attempt to trick individuals into
revealing sensitive information, such as
usernames, passwords, credit card numbers,
or other personal data. This is usually done by
pretending to be a legitimate entity, such as a
bank, company, or trusted service, through
deceptive emails, messages, or websites.
Phishing
GEE LIE - Living in the IT Era

tactics:
Email Phishing:
Fraudulent emails that appear to come from trusted
sources, asking recipients to click on links or open
attachments that contain malware or lead to fake
websites.
Spear Phishing
A more targeted form of phishing where attackers
customize their messages to specific individuals or
organizations, often using personal information to make
the scam more convincing.
Phishing
GEE LIE - Living in the IT Era

tactics:
Smishing
Phishing via SMS or text messages, tricking users into
clicking malicious links or sharing sensitive data.

Vishing
Phishing done over the phone, where scammers pose as
legitimate organizations to steal personal information.
HOW TO PROTECT
YOURSELF FROM PHISHING
GEE LIE - Living in the IT Era

ATTACKS?
• Always verify the sender's identity,
• Avoid clicking on suspicious links,
and
• Check for signs of authenticity
(such as website URLs and
spelling errors
OTHER SAFETY MEASURES
GEE LIE - Living in the IT Era

• Be wary in giving away your information


• Visit only secure websites
• Be prompt once alerted
• Invest in RFID protection
• Avoid games and quizzes on social media
• Protect your computer from viruses and
malware
HACKING
GEE LIE - Living in the IT Era
Hacking
GEE LIE - Living in the IT Era

Hacking refers to the act of gaining unauthorized


access to a computer system, network, or device,
usually to manipulate or control it. It can involve
exploiting vulnerabilities in systems or bypassing
security measures to access sensitive data, alter
functionality, or disrupt operations. However,
"hacking" can have both positive and negative
connotations depending on intent and the
outcome of the actions.
Hacker
GEE LIE - Living in the IT Era

A hacker is an individual who engages


in the activity of hacking. Hackers can
be categorized into different types
based on their skills, motivations, and
the legality of their actions.
Types of Hackers
GEE LIE - Living in the IT Era

• Black hat

• Gray hat

• White hat
Black Hat
GEE LIE - Living in the IT Era

These hackers are


cybercriminals who break
into digital spaces without
consent to commit harm or
gain financial gain. They may
use "doorway pages" to
deceive search engines and
rank highly for specific
White Hat
GEE LIE - Living in the IT Era

These hackers are


cybersecurity professionals
who are paid to help
organizations improve their
digital security. They find
vulnerabilities in software
and networks and exploit
them only with permission.
Gray Hat
GEE LIE - Living in the IT Era

These hackers operate in a gray area


between white and black hat hackers.
They may break into networks without
permission to find vulnerabilities, but
they don't intend to cause harm. They
may be curious about hacking high-
profile systems, or they may believe
that the internet is unsafe for business
and want to make it safer. However,
their methods are not considered
ethical by many in the cyber world
CYBER
SECURITY
PRIVACY
GEE LIE - Living in the IT Era
CYBER SECURITY PRIVACY
Cybersecurity refers to the practices, technologies,
and processes designed to protect computer
systems, networks, and data from cyber threats, such
as hacking, data breaches, malware, and other
malicious activities. It involves multiple layers of
defense across devices, networks, and applications,
ensuring that data is kept confidential, intact, and
accessible only by authorized
GEE users.
LIE - Living in the IT Era
Major Areas covered by
Cybersecurity
GEE LIE - Living in the IT Era

• Application
Security
• Information
Security
• Network Security

• Disaster Recovery
Planning
Application
Focusing
Security on the security of software
GEE LIE - Living in the IT Era

applications by identifying and fixing


vulnerabilities in code. This includes regular
software updates and the use of secure coding
practices.

Information
Security
Ensuring the confidentiality, integrity, and
availability of data both in transit and at rest.
This includes securing databases, sensitive
files, and communication protocols.
Network Security
Protecting network infrastructure from
GEE LIE - Living in the IT Era

unauthorized access, attacks, or other


vulnerabilities. This includes using firewalls,
intrusion detection systems (IDS), and
encryption.

Disaster Recovery Planning


Creating a strategy to ensure that an
organization can recover its critical IT systems,
applications, and data after a cyberattack,
natural disaster, or other disruptive events.
Common types of malicious
software
GEE LIE - Living in the IT Era

• Viruses: These are programs that attach themselves to legitimate


files or programs. When these files are executed, the virus
spreads and may cause harm by corrupting files, stealing
information, or damaging system operations.

• Worms: Unlike viruses, worms can self-replicate and spread


without any user interaction. They typically exploit vulnerabilities
in software or network protocols to propagate and can cause
widespread disruption by consuming system resources or
spreading through networks.
• Trojans (Trojan Horses): These malware programs
GEE LIE - Living in the IT Era

disguise themselves as legitimate software or files,


tricking users into installing them. Once installed,
Trojans can give attackers unauthorized access to the
system, steal information, or install additional malicious
software.

• Ransomware: Ransomware encrypts a victim’s files or


locks them out of their system, demanding a ransom
(usually in cryptocurrency) in exchange for restoring
access. Famous examples include WannaCry, NotPetya,
and CryptoLocker.
GEE LIE - Living in the IT Era

• Spyware: This type of malware secretly monitors


and collects user activity, such as keystrokes,
browsing history, and login credentials. Its main
goal is often to steal sensitive information like
passwords, credit card numbers, and personal
data.
What can you do to
avoid being hacked?

GEE LIE - Living in the IT Era


Remember this:
Never, Ignore, Install, Never
GEE LIE - Living in the IT Era

• NEVER open an email if it appears in your spam


folder.
• IGNORE unexpected warnings from sources you
don't trust.
• INSTALL a good antivirus and anti-malware
program on your computer and keep it updated.
• NEVER give out personal information to
strangers who call on the phone.
THANK YOU

You might also like