You are on page 1of 7

Computer Ethnics

DEV NATHAN_-2E
Ten Importance Instructions of
Computer Ethnics
 You shall not use a computer to harm other people
 You shall not tire with other people computer works
 You shall not use a computer to steal
 You shall not copy or use software for which you have not paid illegally
 You shall not us other peoples computer resources without permission
or proper compensation
 You shall not look around in other peoples computer file
 You shall not use a computer to gain false identity
 You shall not correct other people ideas or works
 You shall think about the social effects of the program you are writing
or the system you are designing
 You shall always use a computer in ways that ensure consideration and
respect for your friend
Copyright
Copyright is the legal right given to the owner of a
copyright to prevent others from copying an work
,livery ,dramatic ,or music .Only the copyright owner
has the legal right to reproduce the work in any form
and has the right to sue others who copy or disturb.
The owner of the copyright has the
special right to do and authorise
the following :
 To reproduce the work
 To prepare copied work based upon the work
 To destruct cones of the work to the public by sale or
faster of ownership
 To disallow other person from using the worth without
permission
 To carry out the work public
 Copyright protection in Malaysia is governed by the
copyright ACT 1987
1) There is no system for registration of copyright imp
Malaysia .A work is elignelis protected atumoncelay upon
fluffiest of the following conditions:
A. Sufficient effort has been expected to make the work
original in character
B. The work has been written down recorded to material
form
C. The author is qualified person the works made in
Malaysia or the work is first published in Malaysia
 A person who does not own the copyright and without
license from the owner or does not have permissions in any
of the following acts has the broken the copyright law
1. use resource only from academic assignments and
research and not reproduce In any material from to public
2. Changing of system settings is not allowed
3. Respect and abide by all copyright laws
4. Downloading ,installation or remote of software or
hardware is not allowed
 Send no absence or harm message in any format in
violation of any palpable law
 Respect the rights and prop lay for others by not
accessing other members data
 Email message should be brief ,casual and should
indicate the senders the sender true identify
 No one should purposely attempt to weird the system
security or disturb the system should through hacking

You might also like