You are on page 1of 23

Legal and Ethical

Use of
Technology

Presenter: PERLY S. LUCES


ADVANCE EDUCATIONAL TECHNOLOGY CL 103 NEXT
Technology and software issues are
elaborated for you to be aware and be guided
in doing the right thing and avoiding the
unacceptable acts that may lead you to
commiting mistakes or possible software and
technology crimes that's against the law.
Ethics for Computer Use
1. Use the computer to help people and not to harm them.
2. Use your own or assigned computer unit and not to
interfere with others.
3. Use the computer using your own files and not to use
other's files.
4. Use the computer to share information and not to steal
other's information.
5. Use computer to spread truthful information and not to
do character assassination.
Ethics for Computer Use
6. Use software that are original and legal and not
pirated.
7. Use other's computer resources with permission and
not to duplicate it without authorization.
8. Use your own work and not the work of others.
9. Use the computer that shows respect and
consideration for other people and not to do cyber
bullying.
10. Create programs or software having in mind its social
impact and not for self-interest.
Ethical Issues in Technology and Software
Unauthorized Access and Use of Hardware, Software, Network, and Computer Files
- if somebody would use anybody's computer and files without
permission from the owner, that is called unauthorized access. A
person is called a cracker or hacker if he/she tries to access a
computer or network illegally to access data and commit
malicious acts like identity theft.
- Hacker originally means a computer enthusiast who
does well in computer that benefits other people.
However, the term hacker now has an adverse
connotation which refers to a person who breaks into the
computer system to steal or corrupt the data in it.
Tips in Creating Password
* Use at least 8 characters.
* Use a combination of upper and lower case letters, words, numbers
and special characters.
* Use joined words together
* Add one or more numbers at the beginning, middle, or end of a
word
* Use words from other language.
* Select password that can be remembered easily.
* Select a password that can be entered easily even without looking
at the keyboard.
* Do not leave written copies of your passwords anywhere.
* Do not share your password to anyone.
Hardware Theft and Vandalism
Computer Theft- stealing of hardware
and its devices

Computer Vandalism - act of damaging


or breaking the hardware, cutting the
cables and wires, smashing the computer
and its devices, and deleting of software
or computer files
Software Theft
Software privacy is a form of software
theft. This happens when a person copies
illegally copyrighted software for
personal or business use.
EULA (End-User License
Agreement)
Single-user license agreement -the common type of license
included in software packages purchased by an individual. Some of
the conditions are:
- Users may install the software on only one computer.
- Users are prohibited to install the software on a network (school
computer lab network).
- Users may make one copy for backup purposes.
- Users are prohibited to give copies to friends and colleagues.
EULA (End-User License
Agreement)

Going against the agreement is a violation


of copyright law, thus committing a federal
crime. In US, penalties reach up to $250,000
and up to five years in jail. In the Philippines,
penalties reach up to Php1,500,000 and up
to 6-9 years of imprisonment.
Various Types of Software Licenses Used in
Education
Types of. Characteristics. Used in Schools
License
1. Single-user: can be installed only used when school
in one computer. needs only specialized
software programs

2.Mutiple-user: can be installed on a cost-effective


set of computers. method to install
software or more than
. one computer.
Various Types of Software Licenses Used in
Education
Types of License Characteristics. Used in Schools
3. Network license: installed on school cost-effective
network. It will specify method of allowing
and the software will students and
control a specific teachers throughout
. number or users the school to h ave
access in app. software
4. Community frequently used with very cost-effective
License: software distributed methods for school
on CD/DVD. Can be district to purchase.
purchased from macintosh Saving can be
or PC platforms. significant over
. individual CD or DVD
Information Theft
-A computer crime when one deliberately steals
information for purposes of studying how to compete
with other organizations or company.
-Encryptic is the process of converting readable data to
unreadable one. An encryption key is needed to enable
the person to convert it back in readable form.
Malicious Act in Software

1. Spam
Unsolicited junk email sent indiscriminately in bulk, often
for commercial purposes. Much of it is sent by botnets,
networks of virus-infected computers, complicating the
process of tracking down the spammers. According to
various estimates, about 80% of all email in the world is
all spam.
Malicious Act in Software

2. Phishing
A term used to describe a malicious individual or group
of individuals who scams users. They do so by sending
email or creating web pages that are designed to collect
an individual's online bank, credit card, or other login
information. Also called as carding or spoofing.
Malicious Act in Software

3. Malware
Short for "malicious software". A computer programs
designed to infiltrate and damage computers without the
user's consent. Malware is the general term covering all
the different types of threats to your computer's safety
such as viruses, spyware, worms, trojans, rootkits and so
on.
Malicious Act in Software

4. Adware
Frequently used to describe a form of malware which
presents unwanted advertisements to the user of a
computer. The advertisements produced by adware are
sometimes in the form of a pop-up or sometimes in an
"unclosable window'.
Example of Acceptable Use of
School Technology
1. Abiding by the policies and procedures of other
networks that are accessed.
2. Being polite and using approriate language.
3. Deleting unwanted messages or old data from
computers and servers.
4. Enforcing appropriate used and reporting misuse
or security issues
Example of Acceptable Use of
School Technology

5. Running antivirus software on downloaded


files, attachments, peripherals, or disks .
6. Signing correspondence.
7. Using online time effeciently.
8. Using the internet ethically and legally.
Example of Unacceptable Use of
School Technology
1. Altering software by deleting files, downloading
programs or copying or installing unauthorized files
or programs.
2. Assuming the identity or using the passwords or
materials of another.
3. Conducting commercial activities, advertising
products, or taking part in political lobbying.
Example of Unacceptable Use of
School Technology
4. Downloading text, graphics or software or
engaging in behaviours that may considered
obscene, abusive, libelous, indescent, vulgar,
profane or lewd.
5. Gaining access to any pay-for-view site.
6. Giving out your own or other's private information,
such as address, phone numbers or password.
Example of Unacceptable Use of
School Technology
7. Harassing an individual using the internet.
8. Plagiarizing.
9. Transmitting materials that violates any local or
countries regulation, or obscene materials.
10. Vandalizing equipment, digital files or willfully
spreading computer viruses.
Do you have
any questions?
I HOPE YOU LEARNED SOMETHING NEW.
THANK YOU FOR LISTENING.

You might also like