IT Social & Professional Issues - Lecture Notes PDF

Summary

This document introduces the concept of social issues in the field of information technology. It also discussed cybercrime and its various types. Furthermore, it mentions the key provisions of the Cybercrime Prevention Act of 2012. Providing solutions and prevention strategies related to ethical abuses in IT are also among the document's topics.

Full Transcript

IT SOCIAL & PROFESSIONAL ISSUES Course content Course content Introduction to Ethical and Social Issues in IT OBJECTIVES: 01. To know the different Social Issues in the field of IT to provide solutions 02. To present strategies to prevent ethical abuse in the field of IT 03. To reduce ch...

IT SOCIAL & PROFESSIONAL ISSUES Course content Course content Introduction to Ethical and Social Issues in IT OBJECTIVES: 01. To know the different Social Issues in the field of IT to provide solutions 02. To present strategies to prevent ethical abuse in the field of IT 03. To reduce challenges brought by ethical abuse in the field of IT wHAT IS A SOCIAL ISSUE? -ARE TOPICS OR SUBJECTS THAT IMPACT MANY PEOPLE (SOCIETY) Characteristics That Define Social Issue: 01. The public must recognize the situation as a problem 02. The situation is against the general values accepted by society 03. A large segment of the population recognizes the problem as a valid concern 04. The problem can be rectified or alleviated through the joint action of citizens and/or community resources. wHAT IS cybercrime? - CRIMINAL ACTIVITIES CARRIED OUT BY MEANS OF COMPUTERS OR THE INTERNET wHAT IS cybercrime? - INVOLVES ONE OF BOTH OF THE FOLLOWING: CYBER-DEPENDENT CRIMES - Criminal activity targeting computers using viruses and other types of malware CYBER-ENABLED CRIMES - Criminal activity using computers to commit other crimes How are Cybercriminals Able to Victimise so many people? Cybercriminals can commit their crimes from other countries where there is little threat of getting punished It's hard to identify who the cyber criminals are Cybercriminals never have to meet their victims KEY PROVISIONS OF THE CYBERCRIME PREVENTION ACT OF 2012: ILLEGAL ACCESS: Access to a computer or any application without permission ILLEGAL INTERCEPTION: Interception of any non-public communication of computer data to, from, or within a computer system by an unauthorised person. DATA INTERFERENCE: Unauthorized tampering with, destroying, deleting, or deteriorating computer data, electronic documents, or electronic data messages, as well as the introduction or transmission of viruses. KEY PROVISIONS OF THE CYBERCRIME PREVENTION ACT OF 2012: SYSTEM INTERFERENCE: Unauthorized interference with the operation of a computer or computer network, including the introduction or transmission of viruses, by inputting, transmitting, damaging, deleting, deteriorating, altering, or depressing data or programmes, electronic data messages, or by deleting, deteriorating, altering, or surprising them. This provision can also cover authorised activity if the person's behavior went beyond the agreed-upon scope and resulted in the damages listed in this provision. KEY PROVISIONS OF THE CYBERCRIME PREVENTION ACT OF 2012: MISUSE OF DEVICES: Unauthorized use, possession, production, sale, procurement, importation, distribution, or otherwise making available of gadgets, computer programmes, or other materials developed or adapted for committing any of the acts listed in Republic Act 10175. Unauthorized use of a computer password, access code, or similar data that allows the entire or a portion of a computer system to be accessed with the intent of using it to perpetrate any of the offences listed in Republic Act 10175. KEY PROVISIONS OF THE CYBERCRIME PREVENTION ACT OF 2012: CYBERSQUATTING: Acquisition of a domain name in bad faith on the internet to profit, deceive, harm reputation, and prevent others from registering it. This includes trademarks that were already registered at the time of registration, names of people other than the registrant, and trademarks that were purchased with intellectual property interests in them. Those who get domain names of prominent brands and individuals who in turn are used to damage their reputation can be sued under this provision. Note that freedom of expression and infringement on trademarks or names of persons are usually treated separately. A party can exercise freedom of expression without necessarily violating the trademarks of a brand or the names of persons. KEY PROVISIONS OF THE CYBERCRIME PREVENTION ACT OF 2012: COMPUTER RELATED FORGERY: Unauthorized input, alteration, or deletion of computer data that results in inauthentic data with the intent that it be considered or acted on for legal purposes as if it were authentic, regardless of whether the data is directly readable and intelligible; or the act of knowingly using computer data that is the product of computer-related forgery as defined here to perpetuate COMPUTER-RELATED FRAUD: Unauthorized access to, alteration of, or deletion of computer data or programmes, or interference with the operation of a computer system, with the purpose to cause damage. KEY PROVISIONS OF THE CYBERCRIME PREVENTION ACT OF 2012: COMPUTER RELATED IDENTITY THEFT: Unauthorized acquisition, use, abuse, transfer, possession, change, or deletion of an individual’s identifying information, whether natural or legal. CYBERSEX: For favour or consideration, willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious presentation of sexual organs or sexual activity via a computer system. KEY PROVISIONS OF THE CYBERCRIME PREVENTION ACT OF 2012: CHILD PORNOGRAPHY: Unlawful or banned activities conducted through a computer system, as defined and punished by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009. KEY PROVISIONS OF THE CYBERCRIME PREVENTION ACT OF 2012: LIBEL: Acts of libel that are illegal or forbidden under Article 355 of the Revised Penal Code, as amended, and are committed using a computer system or any other similar means that may be created in the future. Penal Code Revision According to Article 355 Libel is defined as defamation of character by writings or other means. Libel committed by writing, printing, lithography, engraving, radio, phonograph, painting, theatrical exhibition, cinematographic exhibition, or any other similar means is punishable by prison correctional for the minimum and medium periods, or a fine ranging from 200 to 6,000 pesos, or both, in addition to any civil action that the offended party may bring. KEY PROVISIONS OF THE CYBERCRIME PREVENTION ACT OF 2012: AIDING OR ABETTING IN THE COMMISSION OF CYBERCRIME: Anyone who knowingly assists or abets the conduct of any of the offences listed in this Act will be held accountable. ATTEMPT IN THE COMMISSION OF CYBERCRIME Any person who willfully attempts to commit any of the offences enumerated in this Act shall be held liable. All crimes defined and penalized by the Revised Penal Code, as amended, and special laws, if committed by, through and with the use of information and communications technologies shall be covered by the relevant provisions of this Act. KEY PROVISIONS OF THE CYBERCRIME PREVENTION ACT OF 2012: CORPORATE LIABILITY: When any of the punishable acts herein defined are knowingly committed on behalf of or for the benefit of a juridical person by a natural person acting either individually or as part of an organ of the juridical person who has a leading position within, based on: (a) a power of representation of the juridical person provided the act committed falls within the scope of such authority; or (b) an authority to make decisions on behalf of the juridical person. It also includes the commission of any of the penal acts made possible due to the lack of supervision, provided that the act committed falls within the scope of such authority; or(c) an authority to exercise control inside the juridical person. thank you

Use Quizgecko on...
Browser
Browser