0% found this document useful (0 votes)
4 views9 pages

Week10e Notecomputersss3securityandethicstwo

The document outlines various legal and ethical issues related to the use of Information and Communication Technology (ICT), including copyright, intellectual property law, ownership rights, and cyber crimes. It emphasizes the importance of understanding laws that vary by country, as well as the implications of piracy and hacking. Key topics discussed include identity theft, internet fraud, and the legal protections for creative works.

Uploaded by

jibakin4life
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views9 pages

Week10e Notecomputersss3securityandethicstwo

The document outlines various legal and ethical issues related to the use of Information and Communication Technology (ICT), including copyright, intellectual property law, ownership rights, and cyber crimes. It emphasizes the importance of understanding laws that vary by country, as well as the implications of piracy and hacking. Key topics discussed include identity theft, internet fraud, and the legal protections for creative works.

Uploaded by

jibakin4life
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

WEEK 10

SECURITY AND ETHICS


ISSUES OF LEGAL (LEGAL ISSUES)
IMPORTANCE TO CONSIDER WHEN
USING ICT:
(1) Copyright
(2) Intellectual Property Law
(2) Ownership rights to:
a. Text
b. Images
c. Audio
d. Video
(3) Web content subject to existing laws of host country
(4) Piracy – software, audio, video
(1) Cyber crimes:
(i) Identity theft (ii) Cyberstalking (iii) Denial-of-Service (DoS)
(iv) Internet fraud (v) Phishing Scams
(6) Hacking: gaining unauthorized access to resources with the
intension to cause harm.
WEEK 10
ISSUES OF LEGAL (LEGAL ISSUES)
IMPORTANCE TO CONSIDER WHEN
USING ICT:

LEGAL ISSUES
Legal Issues in network security and ethical related matters relate to all the

matters arising from any infringement and the position of the law in any

such case. Different countries have different laws and sanctions for

infringement.

Common legal issues are:

1. Copyright issues
2. Intellectual property law
3. Ownership rights
4. Patent
5. Trademark
6. Web content
7. Piracy
8. Cybercrimes
9. Hacking
EXPLANATION OF LEGAL
ISSUES:
(1) Copyright issues:
Copyright is meant to protect intellectual property. It is a
branch of law granting authors the exclusive license to reproduce,

distribute, perform, or display their creative works.

Copyright is a legal concept, enacted by most

governments, giving the creator of original work exclusive rights

to it, usually for a limited time. Generally, it is “the right to

copy”, but also gives the copyright holder the right to be credited

for the work, to determine among other things:

 Who may adapt the work to other forms,

 Who may perform the work, who may financially benefit from

it,

 And other related rights.


It is an intellectual property form (like the patent, the
trademark, and the trade secret) applicable to any expressible
forms of an idea or information that is substantive discrete.

Copyright is the legal right of creative artists or publishers


to control the use and reproduction of their original works.
Commercial, also called proprietary software or package software
is offered for sale. This software is copyrighted, which means the
seller has rights to stop any copying without permission.
Commercial software is not sold but what one buys is
the license to use it.
Shareware is copyrighted software with free of

charge use for a limited time (usually 30 days), or small money

contribution which will allow you to get updated versions and

technical support. It is distributed through the Internet and can be

sent to friends who will pay a registration fee.

Freeware is copyrighted software available

for an unlimited time period and distributed at no cost. Freeware

software includes public domain and proprietary software.

(2) Intellectual Property Law:


This involves creative works that have economic value and are
protected by law. Intellectual property laws reward the inventors
of most types of intellectual property by preventing others from
copying, performing, or distributing those works without
permission.

(3) Ownership rights:


This refers to legal ownership of a property and has the right
to use it and has full control over it unless prevented by some
agreement. Ownership rights may include right to text, images,
audio, video, etc.
Ownership is right of possession, the legal right of possessing
something. Ownership is when you commission (pay) someone to
write software for you.

(4) Web content subject to existing laws of host


country.
This is usually subjected to existing law of the host country.

(5) Piracy:
Piracy is the unauthorized reproduction or use of a copyrighted
book, recording, television program, patented invention,
trademarked product, software, audio, video, etc.
Pirated software refers to ways of obtaining software without the
permission of the software holder. “Cracked” software can also be
considered pirated software.

(6) Cyber crimes:


Cyber crime or computer crime refers to any crime that
involves a computer and a network. The computer may have been
used in the commission of a crime, or it may be the target. It
includes identity theft, internet fraud, cyberstalking, phishing
scams, Denial-of-Service (DoS) and so on.

(i) Identity Theft:


Identity theft is a form of stealing another person’s identity in

which someone pretends to be someone else by assuming that

person’s identity, typically in order to access resources or obtain

credit and other benefits in that person’s name.

(ii) Internet Fraud:


Internet fraud or computer fraud is any dishonest
misrepresentation of fact intended to let another to do or refrain
from doing something which causes loss.

(iii) Cyberstalking:
Cyberstalking is the use of the Internet or other electronic means

to stalk or harass an individual, or group of individuals, or an

organisation. It may include false accusations, monitoring, making

threats, identity theft, and damage to data or equipment, the

solicitation of minors for sex, or gathering information in order to

harass.

(iv) Phishing Scams:


Phishing scam is a way of attempting to acquire information such

as usernames, passwords, and credit card details by camouflaged

as a trustworthy entity in an electronic communication.

(v)Denial-of-Service (DoS):
This is an attempt to make a computer resource unavailable to its

intended users.

Network invaders also launches Denial-of-Service attack (DoS)

which occurs when a network is bombarded with bogus requests,

premature successful connection messages, failure messages,


and/or other commands which may deny legitimate users ability to

get on the network and may even cause the network to crash.

(7) Hacking:
Hacking means finding out weaknesses in a computer or computer
network and exploiting them. It also means gaining unauthorized
access to resources with the intension to cause harm.

(8) Patent
This is a legal document granted by the government, giving an
inventor the right to exclude others from making, using, selling,
offering to sell, or importing an invention for a specified number of
years. Patent periods differ from country to country; for example,
in USA patents last for 20 years.

(9) Trademark
This is any word; phrase or symbol used by the manufacturers or
sellers to name their goods and distinguish them from the goods
of others. It helps consumers identify goods they have used and
enjoyed in the past.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy