Sunteți pe pagina 1din 27

DIGITAL LAWS AND

ETHICS IN BUSINESS
Prepared by:
Mrs. Gorgonia Lopez-Famadico
COMPUTER AND
INTERNET CRIMES
COMPUTER CRIME OR CYBERCRIME

- refers to any crime that involves a


computer and a network, where the
computers may or may not have
played an instrumental part in the
commission of a crime.
COMPUTER CRIME OR CYBERCRIME

- refers,more precisely, to
criminal exploitation of the
internet.
COMPUTER CRIME OR CYBERCRIME

- refers, more precisely, to criminal


exploitation of the Internet

TWO TYPES OF COMPUTER CRIME:

1. Crimes that target computer network or devices


directly.
2. Crimes facilitated by computer networks or
devices, the primary target of which is
independent of the computer network or device.
EXPLOIT

- is an attack on an information
system that takes advantage of
a particular system
vulnerability.
TYPES OF EXPLOITS
1. Computer Viruses
2. Worms
3. Trojan Horses
4. Botnet
5. Distributed Denial-of-Service Attacks
6. Rootkit
7. E-mail Spam
8. Phishing
9. Computer Fraud
TYPES OF PERPETRATORS
1. Hackers
2. Malicious Insider
3. Industrial Spies
4. Cybercriminals
5. Hacktivism and Cyberterrorists
CYBER CRIME
LAW
Republic Act No. 10175
An act defining cybercrime, providing for
the prevention, investigation, supression
and the imposition of penalties thereof
and for other purposes.
Electronic Commerce Act of 2000
(RA No. 8792)
An act providing for the recognition
and use of electronic commercial and
non-commercial transactions and
documents, penalties for unlawful
use thereof and for other purposes.
Electronic Commerce Act of 2000
(RA No. 8792)
An act providing for the recognition
and use of electronic commercial and
non-commercial transactions and
documents, penalties for unlawful
use thereof and for other purposes.
ACCESS
Refers to the instruction, communication with, storing
data in, retrieving data from, or otherwise making use of
any resources of a computer system of communication
network

CYBER
Refers to a computer or a computer network,
the electronic medium in which online
communication takes place
INTERCEPTION
Refers to listening to, recording, monitoring
or surveillance of the content of
communications, including procurement of
the content of data, either directly, through
access and use of a computer system or
indirectly, through the use of electronic
eavesdropping or tapping devices, at the
same time that the communication is
occuring.
Offenses against the confidentiality,
integrity and availability of computer data
and systems
1. Illegal Access
2. Illegal Interception
3. Data Interference
4. System Interference
5. Misuse of Devices
6. Cyber-squatting
Computer-related Offenses
1. Computer Forgery
2. Compuiter-related Fraud
3. Computer-related Identity Theft

Content-related Offenses
1. Cybersex
2. Child Pornography
3. Unsolicited Commercial Communications
4. Libel
TEN COMMANDMENTS OF COMPUTER ETHICS

1. Thou shalt not use a computer to harm other people


2. Thou shalt not interfere with other people‘s
computer work
3. Thou shalt not snoop around in other people‘s files
4. Thou shalt not use a computer to steal
5. Thou shalt not use a computer to bear a false
witness
TEN COMMANDMENTS OF COMPUTER ETHICS

1. Thou shalt not use or copy software for which you


have not paid
2. Thou shalt not use other people‘s computer
resources without authorization
3. Thou shalt not use appropriate other people‘s
intellectual output
4. Thou shalt think about the social consequences of
the program you write
5. Thou shalt use a computer in ways that show
consideration and respect
Applicable
philippine laws
that penalize
cybercrime
Republic Act No. 10175 Section 4 Paragraph 4 (Libel)

The unlawful or prohibited acts of libel as


defined in Article 355 of the Revised Penal
Code, as amended, committed through a
computer system or any other similar means
which may be devised in the future.
Cybercrime Prevention Act of 2012

An act defining cybercrime, prevention,


investigation, supression and the
imposition of penalties thereof and for
other purposes
Intellectual
Property Law
Awards to investors, artists and
intitutions certain exclusive rights to
produce, copy, distribute and license
goods and technologies
How are they protected?
1. By patented objects
2. By trademarks
3. By industrial designs
4. By trade secrets
5. By layout-designs
6. By geographical indications
Republic Act No. 8293
An act prescribing the intellectual
property code and establishing
the intellectual property office,
providing for its powers and
functions, and for other purposes.
SOCIAL NETWORKING

Are the most means of communication used by a large


number of people especially the youth.

Is a socail structure made of nodes that are tied by


one or more specific types of interdependency, such
as values, visions, ideas, financial exchange, friendsip,
kinship, dislike, conflict or trade.
TYPES OF SOCIAL NETWORK

1. Socializing : Online Communities – Facebook, WeChat, Meetme,


MySpace
2. Carrier and Business Opportunities : Business Netwirks –
LinkedIn, Viadeo, XING
3. Matchmaking, Soulmate : Online Matchmaking – Shaadi, Adult
Friend Finder, Bharatmatrimo
4. Getting Back in Touch : Alumni Networks – Facebook,
Classmates.com, Orkut
FEATURES ON SOCIAL NETWORKING

1. Messaging
2. News
3. Communities
4. Like Buttons
5. Games
6. Audio and Video Uploads

S-ar putea să vă placă și