67% found this document useful (3 votes)
3K views

Computer Ethics and Netiquette

The document discusses computer ethics and netiquette guidelines. It provides 10 commandments of computer ethics that promote the responsible and ethical use of computers. It then lists 10 core rules of netiquette that establish etiquette standards for online communication, such as remembering the human on the other side of the screen, respecting privacy, and controlling flame wars. The document also briefly outlines the provisions of the Philippine Anti Cyber Crime Law that prohibit various cybercrimes.

Uploaded by

Melmark Paulo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
67% found this document useful (3 votes)
3K views

Computer Ethics and Netiquette

The document discusses computer ethics and netiquette guidelines. It provides 10 commandments of computer ethics that promote the responsible and ethical use of computers. It then lists 10 core rules of netiquette that establish etiquette standards for online communication, such as remembering the human on the other side of the screen, respecting privacy, and controlling flame wars. The document also briefly outlines the provisions of the Philippine Anti Cyber Crime Law that prohibit various cybercrimes.

Uploaded by

Melmark Paulo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

JEROME D.

AGUILAR BSIT 4A
Computer ethics deals with the procedures, values and practices that govern the
process of consuming computing technology and its related disciplines without damaging or
violating the moral values and beliefs of any individual, organization or entity.

Computer ethics is a concept in ethics that addresses the ethical issues and constraints
that arise from the use of computers, and how they can be mitigated or prevented.
The ten Commandments of Computer Ethics

1. Thou shalt not use a computer to harm other people.


2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization or proper
compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are writing or the system
you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and respect for your
fellow humans.

Core Rules of Netiquette: Introduction

Netiquette, or network etiquette, is concerned with the "proper" way to communicate in an online
environment. Consider the following "rules," adapted from Virginia Shea's The Core Rules of
Netiquette, whenever you communicate in the virtual world.

Rule 1: Remember the Human


When communicating electronically, whether through email, instant message, discussion post, text,
or some other method, practice the Golden Rule: Do unto others as you would have others do unto
you. Remember, your written words are read by real people, all deserving of respectful
communication. Before you press "send" or "submit," ask yourself, "Would I be okay with this if
someone else had written it?"
Rule 2: Adhere to the same standards of behavior online that you follow in real life
While it can be argued that standards of behavior may be different in the virtual world, they certainly
should not be lower. You should do your best to act within the laws and ethical manners of society
whenever you inhabit "cyberspace." Would you behave rudely to someone face-to-face? On most
occasions, no. Neither should you behave this way in the virtual world.
Rule 3: Know where you are in cyberspace
"Netiquette varies from domain to domain." (Shea, 1994) Depending on where you are in the virtual
world, the same written communication can be acceptable in one area, where it might be
considered inappropriate in another. What you text to a friend may not be appropriate in an email
to a classmate or colleague. Can you think of another example?

Rule 4: Respect other people's time and bandwidth


Electronic communication takes time: time to read and time in which to respond. Most people today
lead busy lives, just like you do, and don't have time to read or respond to frivolous emails or
discussion posts. As a virtual world communicator, it is your responsibility to make sure that the time
spent reading your words isn't wasted. Make your written communication meaningful and to the
point, without extraneous text or superfluous graphics or attachments that may take forever to
download.
Rule 5: Make yourself look good online
One of the best things about the virtual world is the lack of judgment associated with your physical
appearance, sound of your voice, or the clothes you wear (unless you post a video of yourself singing
Karaoke in a clown outfit.) You will, however, be judged by the quality of your writing, so keep the
following tips in mind:

 Always check for spelling and grammar errors


 Know what you're talking about and state it clearly
 Be pleasant and polite

Rule 6: Share expert knowledge


The Internet offers its users many benefits; one is the ease in which information can be shared or
accessed and in fact, this "information sharing" capability is one of the reasons the Internet was
founded. So in the spirit of the Internet's "founding fathers," share what you know! When you post a
question and receive intelligent answers, share the results with others. Are you an expert at
something? Post resources and references about your subject matter. Recently expanded your
knowledge about a subject that might be of interest to others? Share that as well.
Rule 7: Help keep flame wars under control
What is meant by "flaming" and "flame wars?" "Flaming is what people do when they express a
strongly held opinion without holding back any emotion." (Shea, 1994). As an example, think of the
kinds of passionate comments you might read on a sports blog. While "flaming" is not necessarily
forbidden in virtual communication, "flame wars," when two or three people exchange angry posts
between one another, must be controlled or the camaraderie of the group could be compromised.
Don't feed the flames; extinguish them by guiding the discussion back to a more productive
direction.
Rule 8: Respect other people's privacy
Depending on what you are reading in the virtual world, be it an online class discussion forum,
Facebook page, or an email, you may be exposed to some private or personal information that
needs to be handled with care. Perhaps someone is sharing some medical news about a loved one
or discussing a situation at work. What do you think would happen if this information "got into the
wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect
your privacy, so should you respect the privacy of others. Be sure to err on the side of caution when
deciding to discuss or not to discuss virtual communication.
Rule 9: Don't abuse your power
Just like in face-to-face situations, there are people in cyberspace who have more "power" than
others. They have more expertise in technology or they have years of experience in a particular skill
or subject matter. Maybe it's you who posesses all of this knowledge and power! Just remember:
knowing more than others do or having more power than others may have does not give you the
right to take advantage of anyone. Think of Rule 1: Remember the human.
Rule 10: Be forgiving of other people's mistakes
Not everyone has the same amount of experience working in the virtual world. And not everyone
knows the rules of netiquette. At some point, you will see a stupid question, read an unnecessarily
long response, or encounter misspelled words; when this happens, practice kindness and forgiveness
as you would hope someone would do if you had committed the same offense.
JEROME D. AGUILAR BSIT 4A

The Republic Act 10175: Anti Cyber Crime Law

Republic Act No. 10175 Cybercrime Prevention Act of 2012


The cybercrime law regulates acts committed online, including provisions on the prevention of
cybersex, online child pornography, and identity theft and spamming. It also covers provisions
for online libel and gives officials powers to search and obtain data from online users
accounts.
Section 4 - Cyber Crime Offenses
(a) Offenses against the confidentiality, integrity and availability of computer data and
systems
1. Illegal Access - The access to the whole or any part of a computer system without right.
. Illegal Interception - The interception made by technical means without right of any non-
public transmission of computer data to, from, or within a computer system including
electromagnetic emissions from a computer system carrying such computer data.
3. Data Interference - The intentional or reckless alteration, damaging, deletion or
deterioration of computer data, electronic document, or electronic data message, without
right, including the introduction or transmission of viruses.
. System Interference - The intentional alteration or reckless hindering or interference with the
functioning of a computer or computer network by inputting, transmitting, damaging,
deleting, deteriorating, altering or suppressing computer data or computer program,
electronic document, or electronic data message, without right or authority, including the
introduction or transmission of viruses.
5. Misuse of Devices - The use, production, sale, procurement, importation, distribution, or
otherwise making available, without right, of:
 A device, including a computer program, designed or adapted primarily for the
purpose of committing any of the offenses under this Act; or
 A computer password, access code, or similar data by which the whole or any part of
a computer system is capable of being accessed with intent that it be used for the
purpose of committing any of the offenses under this Act.
. Cyber-squatting - The acquisition of a domain name over the internet in bad faith to profit,
mislead, destroy reputation, and deprive others from registering the same, if such a domain
name is:
 Similar, identical, or confusingly similar to an existing trademark registered with the
appropriate government agency at the time of the domain name registration:
 Identical or in any way similar with the name of a person other than the registrant, in
case of a personal name; and
 Acquired without right or with intellectual property interests in it.
(b) Computer-related offenses
1. Computer-related Forgery- The input, alteration, or deletion of any computer data without
right resulting in inauthentic data with the intent that it be considered or acted upon for legal
purposes as if it were authentic, regardless whether or not the data is directly readable and
intelligible; or the act of knowingly using computer data which is the product of computer-
related forgery as defined herein, for the purpose of perpetuating a fraudulent or dishonest
design.
. Computer-related Fraud - The unauthorized input, alteration, or deletion of computer data or
program or interference in the functioning of a computer system, causing damage thereby
with fraudulent intent: Provided, That if no damage has yet been caused, the penalty
imposable shall be one (1) degree lower.
3. Computer-related Identity Theft - The intentional acquisition, use, misuse, transfer, possession,
alteration or deletion of identifying information belonging to another, whether natural or
juridical, without right: Provided, That if no damage has yet been caused, the penalty
imposable shall be one (1) degree lower.
(c) Content-related offenses
1. Cybersex - The willful engagement, maintenance, control, or operation, directly or indirectly,
of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer
system, for favor or consideration.
. Child Pornography - The unlawful or prohibited acts defined and punishable by Republic Act
No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system.
The penalty to be imposed shall be (1) one degree higher than that provided for in Republic
Act No. 9775.
3. Unsolicited Commercial Communications - The transmission of commercial electronic
communication with the use of computer system which seek to advertise, sell, or offer for sale
products and services are prohibited unless:
 There is prior affirmative consent from the recipient; or
The primary intent of the communication is for service and/or administrative
announcements from the sender to its existing users, subscribers or customers; or
The following conditions are present:
 The commercial electronic communication contains a simple, valid, and reliable way
for the recipient to reject receipt of further commercial electronic messages (opt-out)
from the same source;
 The commercial electronic communication does not purposely disguise the source of
the electronic message; and
 The commercial electronic communication does not purposely include misleading
information in any part of the message in order to induce the recipients to read the
message.
Libel - The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal
Code, as amended, committed through a computer system or any other similar means
whLibel - The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal
Code, as amended, committed through a computer system or any other similar means which
may be devised in the future.
Section 5 - Other offenses under R.A. 10175
1. Aiding or Abetting in the Commission of Cybercrime - Any person who willfully abets or aids
in the commission of any of the offenses enumerated in this Act shall be held liable.
. Attempt in the Commission of Cybercrime - Any person who willfully attempts to commit any
of the offenses enumerated in R.A. 10175 shall be held liable.
Penalties:
 For sections 4a and 4b, imprisonment of prision mayor or a fine of at least P200,000 or
both.
 For section 4a5, imprisonment of prision mayor or a fine of not more than P500,000 or
both.
 If section 4a are committed in critical infrastructure, penalty of reclusion temporal or a
fine of at least P500,000 or both.
 For section 4c1, imprisonment of prision mayor or a fine of at least P200,000 but not
exceeding P1,000,000 or both.
 For section 4c2, penalties as enumerated in RA 9775 or Anti-Child Pornography Act of
2009. 1 degree higher if committed in computer system.
 For section 4c3, punishment of arresto mayor or a fine of at least P50,000 but not
exceeding P250,000 or both
 For section 5, punishment of 1 degree lower of the prescribed penalty for the offense or
a fine of at least P100,000 but not exceeding P500,000 or both.
 Corporate liability is equivalent to at least double the fines imposable in section 7 up to
maximum of P10,000,000.
 Enforcement and Implementation
JEROME D. AGUILAR BSIT 4A
 Law enforcement authorities, such as the National Bureau of Investigation (NBI) and the
Philippine National Police (PNP) shall be responsible for the implementation of the
provisions of this Act.
 The Department of Justice (DOJ) shall be responsible for assisting in investigations or
proceedings concerning criminal offenses related to computer systems or data, in
collection of electronic evidence of criminal offense and in ensuring the provisions of
the law are complied with.

1.) Computer and Internet Security Measures

 Computer and Internet Security Measures


 Computer Security Protecting computers, information, and services from unauthorized
access, change or destruction. Internet security extends this concept to systems that
are connected to the Internet
○ Browsing the Internet
○ Electronic Commerce
○ Social Networking
○ Emailing

Basic Approaches to Security


 Use anti-virus and anti-spyware Software Detects and removes viruses and spyware from your
computer Must be kept up to date
 Install security patches
 Enable Firewalls Protects computers by preventing unauthorized access
 Use strong passwords to protect computers
 Be cautious about downloading free software or files from untrusted sites
 Most prevalent threats to your security come to you in your Inbox; are all designed to get you
to click on an item like an attachment, link or picture.
 If you click, you could launch harmful programs or be directed to a harmful web site.
 Think before you click on links
 Most threats are targeted in hopes that you will click on a harmful link, attachment, picture,
video or icon in an email or web page
 Stop: Do not automatically click on Internet links until you have confidence in them.
 Think: Look at the actual address for the links in question. For instance if the link indicates “Click
Here” be sure to hover your mouse pointer over the link and investigate before you proceed.
 Click: Only after you are confident that the site is safe.

Security Guidelines - Mobile Devices


 Enable auto-lock
 Enable password protection
 Keep the phone OS and apps up-to-date
 Enable remote wipe feature where possible
 Avoid connecting to public wireless network when possible.

 Security Guidelines - Social Networks


 Security Guidelines Before you post, ask the following:
○ Will this post/picture cause a problem for me?
○ Would I say this in front of my mother? Limit the number of people that see it
○ Share public information with the public
○ Share inner thoughts and personal feelings with close friends
 Limit your visibility on services
 Do not Friend or Connect with people that you have not met in person or know well
 Limit your check-in information to friends only
 Never check in at your home, school, work
 A mayorship is a public “office”
 Avoid public lists for a location
 Review posts you are tagged in
 Turn off geo location data in photos
 Turn off “find my face” in photos and videos
 Disable location data for tweets Delete old location data too

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy