You are on page 1of 13

1.

PRIVACY INVASION

The "right to be let alone" protects certain private interests-such as


family, medical, sexual, or other extremely personal matters-from
unreasonable intrusion. Most states recognize a "right to privacy" which
an employer may not invade.

2. HACKING

Hacking is unauthorized use of computer and network resources. (The


term "hacker" originally meant a very gifted programmer. In recent years
though, with easier access to multiple systems, it now has negative
implications.)

Hacking is a felony in the United States and most other countries. When it
is done by request and under a contract between an ethical hacker and
an organization, it's OK. The key difference is that the ethical hacker has
authorization to probe the target.

We work with IBM Consulting and its customers to design and execute
thorough evaluations of their computer and network security. Depending
on the evaluation they request (ranging from Web server probes to all-out
attacks), we gather as much information as we can about the target from
publicly available sources. As we learn more about the target, its
subsidiaries and network connectivity, we begin to probe for weaknesses.

Examples of weaknesses include poor configuration of Web servers, old or


unpatched software, disabled security controls, and poorly chosen or
default passwords. As we find and exploit vulnerabilities, we document if
and how we gained access, as well as if anyone at the organization
noticed. (In nearly all the cases, the Information Syhstems department is
not informed of these planned attacks.) Then we work with the customer
to address the issues we've discovered.

The number of really gifted hackers in the world is very small, but there
are lots of wannabes.... When we do an ethical hack, we could be holding
the keys to that company once we gain access. It's too great a risk for our
customers to be put in a compromising position. With access to so many
systems and so much information, the temptation for a former hacker
could be too great -- like a kid in an unattended candy store.

3. SECURITY
• the state of being free from danger or injury; "we support the armed
services in the name of national security"
• defense against financial failure; financial independence; "his
pension gave him security in his old age"; "insurance provided
protection against loss of wages due to illness"
• freedom from anxiety or fear; "the watch dog gave her a feeling of
security"
• a formal declaration that documents a fact of relevance to finance
and investment; the holder has a right to receive interest or
dividends; "he held several valuable securities"
• property that your creditor can claim in case you default on your
obligation; "bankers are reluctant to lend without good security"
• a department responsible for the security of the institution's
property and workers; "the head of security was a former
policeman"
• a guarantee that an obligation will be met
• security system: an electrical device that sets off an alarm when
someone tries to break in
• measures taken as a precaution against theft or espionage or
sabotage etc.; "military security has been stepped up since the
recent uprising"
1. THEFT
The theft of article, whether locked or unlocked.
COPY RIGHT INFRINGEMENT
A violation of the rights secured by a copyright. Technically what
one would be guilty of if one used the contents of this and the other
web pages which make up this web site without permission from The
Naked Whiz.
UNFAIR COMPETITION
In commercial law refers to a number of areas of law involving
acts by one competitor or group of competitors which harm another in the
field, and which may give rise to criminal offenses and civil causes of
action. The most common actions falling under the banner of unfair
competition include:
• Matters pertaining to antitrust law, known in the European Union as
competition law. Antitrust violations constituting unfair competition
occur when one competitor attempts to force others out of the market
(or prevent others from entering the market) through tactics such as
predatory pricing or obtaining exclusive purchase rights to raw
materials needed to make a competing product.
• Trademark infringement and passing off, which occur when the maker
of a product uses a name, logo, or other identifying characteristics to
deceive consumers into thinking that they are buying the product of a
competitor. In the United States, this form of unfair competition is
prohibited under the common law and by state statutes, and governed
at the federal level by the Lanham Act.
• Misappropriation of trade secrets, which occurs when one competitor
uses espionage, bribery, or outright theft to obtain economically
advantageous information in the possession of another. In the United
States, this type of activity is forbidden by the Uniform Trade Secrets
Act and the Economic Espionage Act of 1996.
• Trade libel, the spreading of false information about the quality or
characteristics of a competitor's products, is prohibited at common
law.
• Tortious interference, which occurs when one competitor convinces a
party having a relationship with another competitor to breach a
contract with, or duty to, the other competitor is also prohibited at
common law.
Various unfair business practices such as fraud, misrepresentation, and
unconscionable contracts may be considered unfair competition, if they give
one competitor an advantage over others. In the European Union, each
member state must regulate unfair business practices in accordance with the
principles laid down in the Unfair Commercial Practices Directive, subject to
transitional periods.
VIRUS
A computer virus is a computer program that can copy itself and infect
a computer without the permission or knowledge of the owner. The term
"virus" is also commonly but erroneously used to refer to other types of
malware, adware, and spyware programs that do not have the reproductive
ability.
TELE/VIDEOCONFERENCING
A set of interactive telecommunication technologies which allow two or
more locations to interact via two-way video and audio transmissions
simultaneously. It has also been called 'visual collaboration' and is a type of
groupware.
Videoconferencing differs from a videophone calls in that its designed to
serve a conference rather than individuals. It is an intermediate form of
video telephony, first deployed commercially by AT&T during the early 1970s
using their Picture phone technology.
ONLINE DEFAMATION
Generally, defamation is a false and unprivileged statement of fact that
is harmful to someone's reputation, and published "with fault," meaning as a
result of negligence or malice. State laws often define defamation in specific
ways. Libel is a written defamation; slander is a spoken defamation.
PRIVACY
• the quality of being secluded from the presence or view of others
• the condition of being concealed or hidden
• Privacy is the ability of an individual or group to seclude themselves
or information about themselves and thereby reveal themselves
selectively .
FRAUD
• intentional deception resulting in injury to another person
• imposter: a person who makes deceitful pretenses
• something intended to deceive; deliberate trickery intended to gain
an advantage

PORNOGRAHY
Pornography or porn is the depiction of explicit sexual subject matter for
the purposes of sexual excitement.
Pornography may use any of a variety of media, ranging from books,
magazines, postcards, photos, sculpture, drawing, painting, animation,
sound recording, film, video, or video game. However, when sexual acts are
performed for a live audience, by definition it is not pornography, as the term
applies to the depiction of the act, rather than the act itself. Thus, portrayals
such as sex shows and striptease are not classified as pornography.
ETHICS AND LAW
Computer Ethics is a branch of practical philosophy which deals with
how computing professionals should make decisions regarding professional
and social conduct [1]. Since the 1990s the field has started being integrated
into professional development programs in academic settings. The
conceptual foundations of computer ethics are investigated by information
ethics, a branch of philosophical ethics established by Luciano Floridi.
Computer ethics is a very important topic in computer applications.
Netiquette, a portmanteau of "net etiquette", is a set of social
conventions that facilitate interaction over networks, ranging from Usenet
A law is as we know a government rule, a decree handed down by people poised to punish those w

ILOCOS SUR POLYTECHNIC STATE COLLEGE


COLLEGE OF AGRICULTURE
SANTA MARIA, ILOCOS SUR

RESEARCH WORK IN IT 104


ETHICAL DILEMMA / ISSUES IN THE
CYBERWORLD

PREPARED BY: RAMOS, CINDY LYN G.


PRESENTED TO: MR. GERALD DIRECTO

ILOCOS SUR POLYTECHNIC STATE COLLEGE


COLLEGE OF AGRICULTURE
SANTA MARIA, ILOCOS SUR

RESEARCH WORK IN IT 104


ETHICAL DILEMMA /
ISSUES IN THE
CYBERWORLD

PREPARED BY: HOLMES, JAKE DHARYL C.


PRESENTED TO: MR. GERALD DIRECTO

ILOCOS SUR POLYTECHNIC STATE COLLEGE


COLLEGE OF AGRICULTURE
SANTA MARIA, ILOCOS SUR

RESEARCH WORK IN IT 104


ETHICAL DILEMMA /
ISSUES IN THE
CYBERWORLD

PREPARED BY: STEFFI GRACE BARCELONA


PRESENTED TO: MR. GERALD DIRECTO

ILOCOS SUR POLYTECHNIC STATE COLLEGE


COLLEGE OF AGRICULTURE
SANTA MARIA, ILOCOS SUR

RESEARCH WORK IN IT 104


ETHICAL DILEMMA /
ISSUES IN THE
CYBERWORLD

PREPARED BY: JILL FABRIGAS


PRESENTED TO: MR. GERALD DIRECTO

ILOCOS SUR POLYTECHNIC STATE COLLEGE


COLLEGE OF AGRICULTURE
SANTA MARIA, ILOCOS SUR

RESEARCH WORK IN IT 104


ETHICAL DILEMMA /
ISSUES IN THE
CYBERWORLD

PREPARED BY: JUSTINE LLENA


PRESENTED TO: MR. GERALD DIRECTO

ILOCOS SUR POLYTECHNIC STATE COLLEGE


COLLEGE OF AGRICULTURE
SANTA MARIA, ILOCOS SUR

RESEARCH WORK IN IT 104


ETHICAL DILEMMA /
ISSUES IN THE
CYBERWORLD

PREPARED BY: GESON RAGUNTON


PRESENTED TO: MR. GERALD DIRECTO

ILOCOS SUR POLYTECHNIC STATE COLLEGE


COLLEGE OF AGRICULTURE
SANTA MARIA, ILOCOS SUR

RESEARCH WORK IN IT 104


ETHICAL DILEMMA /
ISSUES IN THE
CYBERWORLD

PREPARED BY: MARK ANTHONY DALIT


PRESENTED TO: MR. GERALD DIRECTO

ILOCOS SUR POLYTECHNIC STATE COLLEGE


COLLEGE OF AGRICULTURE
SANTA MARIA, ILOCOS SUR

RESEARCH WORK IN IT 104


ETHICAL DILEMMA /
ISSUES IN THE
CYBERWORLD

PREPARED BY: ROWELL NOVELOSO


PRESENTED TO: MR. GERALD DIRECTO

ILOCOS SUR POLYTECHNIC STATE COLLEGE


COLLEGE OF AGRICULTURE
SANTA MARIA, ILOCOS SUR

RESEARCH WORK IN IT 104

ETHICAL DILEMMA /
ISSUES IN THE
CYBERWORLD
PREPARED BY: MARIBEL DONATO
PRESENTED TO: MR. GERALD DIRECTO

ILOCOS SUR POLYTECHNIC STATE COLLEGE


COLLEGE OF AGRICULTURE
SANTA MARIA, ILOCOS SUR

RESEARCH WORK IN IT 104

ETHICAL DILEMMA /
ISSUES IN THE
CYBERWORLD

PREPARED BY: GESON RAGUNTON


PRESENTED TO: MR. GERALD DIRECTO

You might also like