Computing Ethics
Computing Ethics
INTRODUCTION
3
INTELLECTUAL PROPERTY
RIGHT
4
agenda DIGITAL INFRINGEMENT
5
CYBER LAWS
10
With Advancements in the field of
Information Technology (IT),the world
is witnessing vast changes .
IT is a powerful tool that gives us new
ideas and helps us to make new
Introduction inventions and discoveries.
However at the same time we also
came across many ethical dilemmas
while using Information Technology.
While enjoying the fruits of Information
Technology , we should ensure that
the information is not misused .
Intellectual property rights (IPR) are legal
protections for creations of the mind. Here are some
key properties:
1.Exclusivity: IPR grants creators exclusive rights
to use, distribute, and monetize their creations.
2.Territoriality: IPR is generally protected within
specific jurisdictions, meaning rights must be sought
Intellectual
in each country where protection is desired. Property Right
3.Duration: Different types of IPR have varying
durations of protection (e.g., copyrights typically last OWNERSHIP OF IDEAS
for the creator's life plus 70 years, while patents
usually last for 20 years).
4.Transferability: IPR can often be transferred or
licensed, allowing creators to sell or share their
rights.
Digital Infringement
ENHANCING YOUR KNOWLEDGE
Software Piracy
Software piracy refers to the unauthorized use, distribution, or
reproduction of software. It includes several practices, such as:
1.Copying Software: Making copies of software without
permission from the copyright holder, often for personal use or
distribution.
2.Illegal Distribution: Sharing software through file-sharing
networks, torrent sites, or other means without the
authorization of the copyright owner.
3.Using Cracked Software: Employing modified versions of
software that have been altered to bypass licensing or
activation mechanisms.
4.Commercial Piracy: Selling counterfeit or unauthorized copies
of software, often at significantly reduced prices.
5.Unlicensed Use: Installing and using software on more
devices than the license allows. 6
Cyber Crime
Cybercrime refers to illegal activities conducted through
the internet or with the aid of computer systems. Here
are some key aspects of cybercrime:
Types of Cybercrime
1.Hacking: Unauthorized access to systems or
networks to steal data or disrupt services.
2.Phishing: Fraudulent attempts to obtain sensitive
information, often through deceptive emails or
websites.
3.Ransomware: Malware that encrypts a victim's files,
demanding payment for their release.
4.Identity Theft: Stealing personal information to
impersonate someone else for financial gain.
5.Cyberbullying: Harassment or bullying conducted
via digital platforms.
6.Online Fraud: Various scams, such as auction fraud
or credit card fraud, conducted online. 7
7.Distributed Denial of Service (DDoS): Overloading
Hacking
Hacking refers to the Hacking involves several techniques and
practice of exploring methods to access systems, networks, or data
and manipulating that are typically secured. This can include:
computer systems or
networks, often to •Exploiting vulnerabilities: Taking advantage
discover vulnerabilities of weaknesses in software, systems, or
or gain unauthorized networks.
access. The
motivations behind •Gaining unauthorized access: Breaking into
hacking can vary systems without permission, often to steal data
widely, leading to or disrupt services.
different categories of
hackers and hacking
practices.
8
Malicious Intent
Malicious intent in the context Data Theft: Hackers may target organizations to steal
of hacking refers to the sensitive information, such as trade secrets, intellectual
purpose behind an attack,
typically aimed at causing property, or personal data for identity theft.
harm, stealing information, or
disrupting services. This Disruption: Some attackers aim to disrupt services or
intent is often categorized into operations, either for revenge or to make a political
various motives: statement (e.g., DDoS attacks on critical infrastructure).
Financial Gain: Many attacks Revenge or Sabotage: Former employees or disgruntled
are driven by the desire to
steal money or valuable individuals might hack into systems to damage a company’s
information that can be reputation or operations.
monetized, such as credit
card numbers, bank Cyber Espionage: State-sponsored actors may engage in
credentials, or personal data. hacking to gather intelligence or data from other nations or
companies.
9
CYBER LAWS REFER TO THE
LEGAL REGULATIONS AND
FRAMEWORKS THAT
GOVERN ACTIVITIES
CONDUCTED OVER THE
INTERNET AND THROUGH
DIGITAL TECHNOLOGIES.
Cyber Laws THESE LAWS ADDRESS
VARIOUS ISSUES RELATED
TO CYBERSECURITY, DATA
PROTECTION, PRIVACY, AND
INTELLECTUAL PROPERTY,
AMONG OTHERS. HERE ARE
SOME KEY ASPECTS OF
CYBER LAWS:
•Data Protection and Privacy:
•General Data Protection Regulation (GDPR):
A comprehensive regulation in the EU that
governs how personal data is collected,
processed, and stored, giving individuals more
control over their data.
•California Consumer Privacy Act (CCPA): A
law in California that enhances privacy rights
Key areas of Cyber and consumer protection for residents.
•Cybercrime:
Laws •Computer Fraud and Abuse Act (CFAA): A
U.S. law that prohibits unauthorized access to
computer systems and outlines penalties for
various cybercrimes.
•Convention on Cybercrime (Budapest
Convention): An international treaty aimed at
addressing crimes committed via the internet
and improving international cooperation.
SHRESHTH BHALOTIA
81600-80889
thank you 9TH ARAVALLIS