SlideShare a Scribd company logo
1 of 16
CHAPTER 1: INFORMATION
AND COMMUNICATION
TECHNOLOGY
Computer Ethics and Legal Issues
Definition
Computer Ethics   Is a system of moral standards or moral values
                  used as a guideline for computer users
Code of Ethics    Is a guideline in ICT that help determine whether
                  a specific computer action is ethical or unethical
Intellectual      Is works created by inventors, authors and artists
Property
Privacy           Refers to the right of individuals and companies
                  to deny or restrict the collection and use of
                  information about them
Computer Crime    Is any illegal acts involving computers
Cyber Law         Is any laws relating to protect the Internet and
                  other online communication technologies
Differentiate between ethics and law

            ETHICS                              LAW
As a guideline to computer        As a rule to control computer
users                             users
Computers users are free to       Computers users must follow
follow or ignore the code of      the regulations and law
ethics
Universal, can be applied         Depend on country and state
anywhere, all over the world      where the crime is committed
To produced ethical computers     To prevent misuse of
users                             computers
Not following ethics are called   Not obeying laws are called
immoral                           crime
Intellectual Property Laws
    Four types of Intellectual Property are:




•    Patents for inventions
•    Trademarks for brand identity
•    Design for product appearance
•    Copyright for materials
Privacy
Ways of making personal data more privates:
 Install personal firewall

 Clear your history file when you are browsing

 Purchase goods with cash, rather than credit card
Authentication
   Authentication is a process where user verifies their
    identity. Authentication deals with the problem of
    determining whether a user should be allowed
    access to a particular system.
   Four commonly authentication methods:
A) User identification
   Is a unique combination of characters (letter,
    number or symbol) that identify specific user
   Examples:
              pin number
              password
B) Possessed object
   Is a any item that you must carry to gain access to
    computer of computer facility
   Examples:
               ATM card
               credit card
               smart card
C) Biometric device
   Is a device that translates personal characteristics
    into digital code that is compared with the digital
    code stored in the database
   Examples:
               fingerprint reader
               iris scanner
               hand geometric scanner
               signature verification system
Controversial Contents and Control
         PORNOGRAPHY                                     SLANDER
 is any form media or material (like       is a false spoken statement about
books, video or photos) that show erotic   someone, intended to damage his or her
behavior and intended to cause sexual      reputation
excitement
                                            the effects of slander on society are:
 the effects of pornography on society    iv)Can develop society that disregards on
are:                                       honesty and truth
iv)Can lead to criminal acts such as       v)Can lead to bad habits of spreading
exploitation of women                      rumors and untruth
v)Can lead to sexual addiction             vi)Can cause people to have nagative
vi)Can develop lower moral values          attitudes toward another person
towards other people
vii)Can erode good religious, cultural,
behaviors and beliefs
Computer Crimes
   Why we need cyber law?
    i)     Cyber laws are made to force people to be good
    ii)    To give protection against the misuse of computers
           and computer criminal activities
   Examples of cyber abuse on the users:
    i)     Sending a computer virus via e-mail
    ii)    Harassment through e-mail
    iii)   Hacking into your school's database to change your
           examination results
   Malaysian Cyber Law
    i)     Computer Crime Act 1997
    ii)    Copyright (Amendment) Bill 1997
    iii)   Digital Signature Act 1997
    iv)    Telemedicine Bill 1997
    v)     Communication and Multimedia Act 1998
    vi)    Digital Signature Regulations 1998
   4 examples of computer crimes:
   Computer fraud - is the crime of obtaining money
    by deceiving (to trick) people through the use of
    computers such as email hoaxes, program fraud,
    investment schemes and claim of expertise on
    certain fields
   Copyright infringement - is a violation of the rights
    secured by a copyright. It occurs when you break
    the copyright laws such as copying movie, software
    or CD’s illegally
Computer theft – is defined as the unauthorized
    used of another person’s property such as transfer
    of payment to the wrong accounts, get online
    material with no cost and tap into the data
    transmission lines
e   Computer attack – is defined as any activities
    taken to disrupt the equipments of computers
    systems, change processing controls and corrupt
    stored data

More Related Content

What's hot

Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 

What's hot (20)

Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
ACM code of ethics
ACM code of ethicsACM code of ethics
ACM code of ethics
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

Viewers also liked

Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
charlesgarrett
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 

Viewers also liked (14)

Towards comprehensive public & private sector whistleblower protection
Towards comprehensive public & private sector whistleblower protectionTowards comprehensive public & private sector whistleblower protection
Towards comprehensive public & private sector whistleblower protection
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Security policy
Security policySecurity policy
Security policy
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
EU-GDPR On Boarding & IT Handlungsfelder
 EU-GDPR On Boarding & IT Handlungsfelder  EU-GDPR On Boarding & IT Handlungsfelder
EU-GDPR On Boarding & IT Handlungsfelder
 
Ethical Constraints
Ethical Constraints Ethical Constraints
Ethical Constraints
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Netiquette and code of conduct in communication
Netiquette and code of conduct in communicationNetiquette and code of conduct in communication
Netiquette and code of conduct in communication
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Risk Analysis
Risk AnalysisRisk Analysis
Risk Analysis
 
Ethics
EthicsEthics
Ethics
 

Similar to Computer Ethics and Legal Issues

English in written
English in writtenEnglish in written
English in written
azhar manap
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
anilinvns
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
Aten Kecik
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
charvill
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 

Similar to Computer Ethics and Legal Issues (20)

Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
English in written
English in writtenEnglish in written
English in written
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Ethical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfEthical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology Presentatiopdf
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
 

More from Kak Yong

Module programming
Module programmingModule programming
Module programming
Kak Yong
 
Module info systems
Module info systemsModule info systems
Module info systems
Kak Yong
 
Module ict society
Module ict societyModule ict society
Module ict society
Kak Yong
 
Module computer systems
Module computer systemsModule computer systems
Module computer systems
Kak Yong
 
Module networks
Module networksModule networks
Module networks
Kak Yong
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programming
Kak Yong
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimedia
Kak Yong
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systems
Kak Yong
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
Kak Yong
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systems
Kak Yong
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-society
Kak Yong
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02
Kak Yong
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02
Kak Yong
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02
Kak Yong
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02
Kak Yong
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01
Kak Yong
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01
Kak Yong
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02
Kak Yong
 

More from Kak Yong (20)

Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersif
 
Module programming
Module programmingModule programming
Module programming
 
Module info systems
Module info systemsModule info systems
Module info systems
 
Module ict society
Module ict societyModule ict society
Module ict society
 
Module computer systems
Module computer systemsModule computer systems
Module computer systems
 
Module networks
Module networksModule networks
Module networks
 
Synopsis
SynopsisSynopsis
Synopsis
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programming
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimedia
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systems
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systems
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-society
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

Computer Ethics and Legal Issues

  • 1. CHAPTER 1: INFORMATION AND COMMUNICATION TECHNOLOGY Computer Ethics and Legal Issues
  • 2. Definition Computer Ethics Is a system of moral standards or moral values used as a guideline for computer users Code of Ethics Is a guideline in ICT that help determine whether a specific computer action is ethical or unethical Intellectual Is works created by inventors, authors and artists Property Privacy Refers to the right of individuals and companies to deny or restrict the collection and use of information about them Computer Crime Is any illegal acts involving computers Cyber Law Is any laws relating to protect the Internet and other online communication technologies
  • 3. Differentiate between ethics and law ETHICS LAW As a guideline to computer As a rule to control computer users users Computers users are free to Computers users must follow follow or ignore the code of the regulations and law ethics Universal, can be applied Depend on country and state anywhere, all over the world where the crime is committed To produced ethical computers To prevent misuse of users computers Not following ethics are called Not obeying laws are called immoral crime
  • 4. Intellectual Property Laws Four types of Intellectual Property are: • Patents for inventions • Trademarks for brand identity • Design for product appearance • Copyright for materials
  • 5. Privacy Ways of making personal data more privates:  Install personal firewall  Clear your history file when you are browsing  Purchase goods with cash, rather than credit card
  • 6. Authentication  Authentication is a process where user verifies their identity. Authentication deals with the problem of determining whether a user should be allowed access to a particular system.
  • 7. Four commonly authentication methods:
  • 8. A) User identification  Is a unique combination of characters (letter, number or symbol) that identify specific user  Examples: pin number password
  • 9. B) Possessed object  Is a any item that you must carry to gain access to computer of computer facility  Examples: ATM card credit card smart card
  • 10. C) Biometric device  Is a device that translates personal characteristics into digital code that is compared with the digital code stored in the database  Examples: fingerprint reader iris scanner hand geometric scanner signature verification system
  • 11. Controversial Contents and Control PORNOGRAPHY SLANDER  is any form media or material (like  is a false spoken statement about books, video or photos) that show erotic someone, intended to damage his or her behavior and intended to cause sexual reputation excitement  the effects of slander on society are:  the effects of pornography on society iv)Can develop society that disregards on are: honesty and truth iv)Can lead to criminal acts such as v)Can lead to bad habits of spreading exploitation of women rumors and untruth v)Can lead to sexual addiction vi)Can cause people to have nagative vi)Can develop lower moral values attitudes toward another person towards other people vii)Can erode good religious, cultural, behaviors and beliefs
  • 12.
  • 13. Computer Crimes  Why we need cyber law? i) Cyber laws are made to force people to be good ii) To give protection against the misuse of computers and computer criminal activities  Examples of cyber abuse on the users: i) Sending a computer virus via e-mail ii) Harassment through e-mail iii) Hacking into your school's database to change your examination results
  • 14. Malaysian Cyber Law i) Computer Crime Act 1997 ii) Copyright (Amendment) Bill 1997 iii) Digital Signature Act 1997 iv) Telemedicine Bill 1997 v) Communication and Multimedia Act 1998 vi) Digital Signature Regulations 1998
  • 15. 4 examples of computer crimes:  Computer fraud - is the crime of obtaining money by deceiving (to trick) people through the use of computers such as email hoaxes, program fraud, investment schemes and claim of expertise on certain fields  Copyright infringement - is a violation of the rights secured by a copyright. It occurs when you break the copyright laws such as copying movie, software or CD’s illegally
  • 16. Computer theft – is defined as the unauthorized used of another person’s property such as transfer of payment to the wrong accounts, get online material with no cost and tap into the data transmission lines e Computer attack – is defined as any activities taken to disrupt the equipments of computers systems, change processing controls and corrupt stored data