0% found this document useful (0 votes)
14 views3 pages

LESSON 5- IT

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views3 pages

LESSON 5- IT

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

LESSON 5- COMPUTER ETHICS  If the material you share with others online came

from another source, make every effort to gain


permission from the original author or copyright
WHAT IS NETIQUETTE? holder.
 Copying someone else's work and passing it off as
 Simple stated, it’s network etiquette your own is plagiarism.
 Is the etiquette of cyberspace and “etiquette” means  It damages your reputation and could subject you to
the forms of required by good breeding or pescribed serious academic and legal consequences.
by authority to be required in social or official life.
 concerned with the "proper" way to communicate in
an online environment RESPECT DIVERSITY IN VIEWPOINTS

REMEMBER THE GOLDEN RULE  Be constructive and respectful when sharing


opinions, beliefs, and criticisms, or responding to
 Make a good impression - treat others with the those of others in the conversation.
same respect that you would like to receive and  When sharing a viewpoint that differs from someone
avoid confrontational or offensive language. else’s, it is a best practice to first acknowledge the
 To help convey meaning when creating messages, it other person by briefly restating what he or she said,
is sometimes acceptable to include appropriate but in your own words.
emoticon symbols, such as a smiley face :)  When presenting an opinion or criticism, it is helpful
 However,. for professional communications these to use phrases that identify to whose point of view
would be inappropriate you are referring.
 If the opinion is yours, you can begin with the phrase
“In my experience” or “In my opinion”.
AVOID SLANG, ACRONYMS, AND TEXT TALK  If it is a viewpoint of someone else, make sure you
identify that in your message
 Communicating effectively in college and business (Example: “According to Eric Ericson,” or “The
environments requires the use of correct president believes”).
terminology, spelling, and grammar that can easily
be understood.
TEN COMMANDMENTS OF COMPUTER ETHICS
For example, use “your” instead of “ur”.
RULE 1: Practice the Golden Rule
 Typing an entire message using all capital letters is
known as “screaming”.  Do unto others as you would have others do unto
 It is better to draw emphasis to selected words or you. Remember, your written words are read by real
phrases by: using italic or bold text; using a people, all deserving of respectful communication.
different color for text or background color; or  Before you press "send" or "submit," ask yourself,
denoting emphasis using special characters "Would I be okay with this if someone else had
written it?"
(Example: **Important**).
RULE 2: Adhere to the same standards of behavior online
PROOFREAD YOUR MESSAGES BEFORE SENDING that you follow in life
 Proofreading your messages before you send them  You should do your best to act within the laws and
is a best practice for effective and efficient ethical manners of society whenever you inhabit
communication. "cyberspace." Would you behave rudely to someone
 Strive to make your communications concise and face-to- face? On most occasions, no. Neither should
free of any: you behave this way in the virtual world.
✓Spelling and grammar errors

✓Confusing terms or phrases that could be misunderstood RULE 3: Know where you are in cyberspace

✓Errors of omission, such as missing content or recipients  "Netiquette varies from domain to domain." (Shea,
1994)
✓Errors in accuracy of information  Depending on where you are in the virtual world, the
same written communication can be acceptable in
one area, where it might be considered
EXERCISE GOOD JUDGEMENT WHEN SHARING inappropriate in another.
INFORMATION WITH OTHERS  What you text to a friend may not be appropriate in
an email to a classmate or colleague.
 ONLINE – E-mail and chat messages that you send or
receive are considered private and should not be RULE 4: Respect other people's time and bandwidth
forwarded or copied to others without gaining the
 Electronic communication takes time: time to read
consent of all involved participants.
and time in which to respond.
 It is a good practice to always ask a post’s author for
 Most people today lead busy lives, just like you do,
permission before sharing a post with other parties.
and don't have time to read or respond to frivolous
emails or discussion posts.
 As a virtual world communicator, it is your
responsibility to make sure that the time spent CYBERCRIMES
reading your words isn't wasted.
WHAT IS CYBER?

 It is the Characteristics of the culture of computers,


RULE 5: Make yourself look good online writing
information, technology and virtual reality.
 One of the best things about the virtual world is the  Cybercrime is defined as a crime in which a
lack of judgment associated with your physical computer is the object of the crime (hacking,
appearance, sound of your voice, or the clothes you phishing, spamming and child pornography) is used
wear . as a tool to commit an offense.
 You will, however, be judged by the quality of your  Cybercriminals may use computer technology to
writing, so keep the following tips in mind: Always access personal information, business trade secrets
check for spelling and grammar errors Know what or use the internet for exploitative or malicious
you're talking about and state it clearly Be pleasant purposes.
and polite
Republic Act No. 10175 Cybercrime Prevention Act of 2012

➢is a law in the Philippines approved on September 12,2012


RULE 6: Share your knowledge
which aims to address legal issues concerning online
 Information can be shared or accessed and in fact, interactions and internet.
this "information sharing.
Republic Act No. 10173 Data Privacy Act of 2012
 When you post a question and receive intelligent
answers, share the results with others. ➢is an act protecting individual personal information.
 Post resources and references about your subject
matter.

RULE 7: Help keep flame wars under control COMMON FORMS OF CYBERCRIMES

 What is meant by "flaming" and "flame wars?" COPYRIGHT


 Flaming is what people do when they express a
 The exclusive legal right, given to an originator or an
strongly held opinion without holding back any
assignee to print, publish, perform, film, or record
emotion." (Shea, 1994).
literary, artistic, or musical material, and to authorize
 Don't feed the flames; extinguish them by guiding
others to do the same.
the discussion back to a more productive direction.
 Copyright infringement is the violation, piracy or
RULE 8: Respects other people’s privacy theft of a copyright holder's exclusive rights through
the unauthorized use of a copyrighted material or
 Depending on what you are reading in the virtual work.
world, be it an online class discussion forum,
Facebook page, or an email, you may be exposed to PLAGIARISM
some private or personal information that needs to
 An act or instance of using or closely imitating the
be handled with care.
language and thoughts of another author without
 Perhaps someone is sharing some medical news
authorization.
about a loved one or discussing a situation at work.
What do you think would happen if this information COMPUTER ADDICTION
"got into the wrong hands?" Embarrassment? Hurt
feelings? Loss of a job?  Offline: generally used when speaking about
excessive gaming behavior, which can be practiced
RULE 9: Don’t abuse your power both offline and online.
 Online: Also known as “Internet Addiction”, gets
 Just like in face-to-face situations, there are people in
more attention in general from scientific research
cyberspace who have more "power" than others.
than offline computer addiction, mainly because
 More expertise in technology or have years of
most cases of computer addiction are related to the
experience in a particular skill or subject matter.
excessive use of the Internet.
 Just remember: knowing more than others do or
 Virtual Self -The persona you create about yourself
having more power than others may have does not
virtually.
give you the right to take advantage of anyone. Think
of Rule 1: Remember the human. CRIMINAL ACTIVITIES

RULE 10: Be forgiving of other people’s mistakes HACKING

 Not everyone has the same amount of experience  Unauthorized access of or interference with
working in the virtual world. And not everyone computer systems, servers, or other information and
knows the rules of netiquette. communication system.
 At some point, you will see a stupid question, read  Unauthorized access to corrupt, alter, steal, or
an unnecessarily long response, or encounter destroy electronic data using computers or other
misspelled words; when this happens, practice information and communication systems without the
kindness and forgiveness as you would hope computer or system owner’s knowledge and consent
someone would do if you had committed the same  The introduction of computer viruses resulting in the
offense. corruption, alteration, theft, or loss of such data
 Illegal Access  Penalty of 6-12 years of imprisonment or prison
mayor.
HACKING

 Illegal Interception
 Data Interference
 System Interference
 Misuse of Devices
 Infection of IT Systems with Malware – if the act is
committed against critical infrastructure of the
Philippines the, penalty is between 12-20 years
reclusion temporal
 Six years up to twelve years of imprisonment also
known as prison mayor.

COMPUTER-RELATED FORGERY FRAUD AND/OR IDENTITY


THEFT

 An attempt to obtain sensitive information such as


usernames, passwords, and credit card details and
(indirectly money), often for malicious reasons.
 Phishing
 Pharming
 Spam
 Maximum of Php 200,000 fine or prison mayor

ELECTRONIC THEFT

 Illegal Downloading
 Obtaining files that you do not have the right to use
from the internet.
 Digital Piracy
 Practice of illegally copying and selling digital music,
video, computer software, etc.
 Copyright Infringement
 Penalty of Php 50,000 – 500, 000 and or prison
mayor

CYBERBULLYINGG

 The use of electronic communication to bully a


person, typically by sending a message of an
intimidating or threatening nature.
 The Anti-Bullying Act of 2013 (RA 10627)

CYBERSEX

 Willful engagement, maintenance, control, or


operation, directly or indirectly of any lascivious
exhibition of sexual organs or sexual activity with the
aid of a computer system for favor or consideration.
 There is a discussion on this matter if it involves
“couples” or “people in relationship” who engage in
cybersex.
 Penalty at least Php 200,000 and or prison mayor

CHILD PORNOGRAPHY

 Is a form of child sexual exploitation.


 Unlawful or prohibited acts defined and punishable
by Republic Act No. 9775 or the Anti- Child
Pornography Act of 2009, committed through a
computer system.
 Penalty of 12-20 years of imprisonment or reclusion
temporal

CYBER DEFAMATION

 Is an unprivileged false statement of fact which tends


to harm the reputation of a person or company.

You might also like