You are on page 1of 32

Ethical issues in

1. Unauthorized Access
and Use of Hardware,
Software, Network and
Computer File
 If somebody would use anybody's
computer and files without permission
from the owner that is called
unauthorized access.
 A person is called a cracker or a hacker if
he/she tries to access a computer or network
illegally to access data and commit malicious
acts like identity theft.
 Hacker originally means a computer enthusiast
who does well in computer that benefits other
people. However, the term Hacker now has an
adverse connotation which refers to a person who
breaks into the computer system to steal or corrupt
the data in it.
Tips in carefully creating a
password:
 Use at least eight  Use a word from other
characters. languages.
 Use a combination of  Use a password that can
upper and lower case be entered easily without
letters, words, numbers, looking at the keyboard
and special character.  Do not leave written
 Use joined words copies of your password
together. anywhere.
 Add one or more  Do not share your
numbers at the password to anyone.
beginning, middle, or on
end of a word.
 A firewall is a security system (hardware
and/or software) that blocks unauthorized access
data on a network.

 Firewall restricts teachers and students from


accessing malicious data that may do harm in
school's computer, hardware, software, and files.
 All communications in schools are being routed
through a proxy server which screens all
incoming and outgoing messages.
2. Hardware Theft and
Vandalism
 Computer theft is stealing of hardware
and its devices while computer
vandalism is the act of damaging or
breaking the hardware- cutting the cables,
wires, smashing the computer and its
devices - and deleting of software or
computer files.
 The best precautionary measure in keeping the
hardware safe is to have full awareness on its
security by not leaving it anywhere and unattended.
3. Software Theft
 Software piracy is a form if software theft.
This happens when a person copies illegally
copyrighted software for personal or business
use.
 Software that has been purchased has with it
software license which provides conditions for its
use. These conditions must first be agreed upon
by the user prior to its use.
An end-user license
agreement (EULA) or single-
user license agreement is the
common type of license
included in software packages
purchased by an individual.
Some conditions are:
 Users may install the  Users may make one
software on only one copy for backup
computer. purposes.
 Users are prohibited  Users are prohibited
to install the software to give copies to
on a network (school friends and
computer lab colleagues.
network).
 In US, penalties reach up to $250,000 and
up to five years in jail. In the Philippines
penalties each up to Php 1,500,000 and up
to 6-9 years imprisonment.
 School enforce policies regarding the
installation and the use of computer
software to make sure that the conditions
that have agreed upon are strictly monitored
and followed.
 To make these policies known to all, it would
be better if teachers are given orientation by
the academic heads, after which teachers
Orient their students regarding the use of
technologies with its software to prevent
such violations
Various Types of Software
Licenses Used in Education
Type of license characteristics Used in schools
Single-user Software can be installed Used when a school
only in one computer. needs only a few copies of
Some license agreements a particular software.
allows users to install the commonly found in small
software on one desktop schools and when
computer and one purchasing specialized
notebook computer. software programs.

Multiple-user Software can be installed Cost-effective method to


on a set number of install software on more
computers, typically 5, than one computer. Most
10, 50 or more. Cost commonly used in
varies based on number schools.
of computers.
Network license Software is installed on the Cost-effective method of
school’s network. The allowing students and
license will specify and the teachers throughout the
software will control a school to have access to an
specific number of application software
simultaneous users, such program. As schools
as 50, 100, 250, or 500. continue to install
Cost varies based on networks, network license
number of computers. are becoming more
common.

Community license Frequently used with Very cost effective method


software distributed on for school districts to
CDs/DVDs. Any number purchase large quantities
of programs can be of software. Savings can be
purchased from either significant over individual
Macintosh or PC CD or DVD pricing
platforms.
4. Information Theft
 Information theft is a computer crime when
one deliberately steals information for purposes of
studying how to compete with other organizations
or companies.
 Getting confidential information about school
administrators, academic officials, teachers, staff,
and students without legal authorization is
considered as information theft.
 Encryption is the process of converting
readable data to unreadable one. An
encryption key is needed to enable the
person to convert it back in readable form. A
person who illegally accesses the
information would only see characters that
do not contain meaning.
5. Malicious Acts In
Software
 Spam is an unwanted message being received
through e-mails, discussion boards, text messaging
devices, and others. Spams are truly annoying for it
fills up your inbox and then later wastes your time
in deleting these spam messages a spam sent
through instant messaging devices called spim
while spam sent through internet telephony is
called split.
 Phishing may also be called as carding or
spoofing. Phishing is a scam in which an
agent sends a legitimate looking e-mail that
attempts to steal personal and financial
information including bank account
numbers of the recipient.
 Spam messages can be reduced if not
prevented by adjusting the built-in settings
in your e-mails to delete spam
automatically. Outlook express has in its set
up that can block messages from a particular
sender or subject.
 E-mail filtering can also be done by signing
up in your internet services provider. E-mail
filtering blocks unwanted e-mail messages
from designated sources.
 Anti-spam program can also help block
these unwanted messages before it reaches
your inbox. The problem that these anti-
spam and e-mail filtering can bring is that it
sometimes block and remove valid/legal e-
mail messages.
 Malware is a malicious software that causes
harm to one or more computer.
 This malware enters to the scene when an
attachment to a message that carries a virus is
opened and then later shared to other computers
via network or via portable storage medium (CD,
external hard drive, flash drive, etc).
 Adware is a software that incorporated the
presentation of advertisement as condition
for operating the software.
THANK
YOU!!
REPORTED BY:
GAJO, RHEA MAE
PUDADERA, JONELLA

You might also like