10 Chapter 4 part 1
10 Chapter 4 part 1
ETHICAL AND
PROFESSIONAL ISSUES IN
COMPUTING
Module Four
Cybersecurity Ethics: Cyberspace and
Other Applications
2
Learning Objectives
3
INTRODUCTION TO CYBER LAWS
4
4.1 Cyber laws
5
4.2 The need for cyber laws
1. Cyber laws are vital because they touch almost all aspects of transactions and behavior on
and concerning the Internet, the World Wide Web and Cyberspace.
2. Cyber laws ensure the right to enter into legally enforceable digital contracts.
3. Cybercrimes, for example, malware attacks, computer frauds, phishing, hacking, unauthorized
access, email hijacking, denial of service and pornography, and becoming frequent, and may
potentially harm sensitive data, the economy as well as the reputation of an individual or an
5. In numerous non-cyber crime cases as well, significant proof might be found in systems,
mobile phones, for example, in instances of separation, murder, tax avoidance, and so on.
6
4.2 The need for cyber laws
7
Ethics versus Legal
8
Ethics versus Legal
9
4.4 Need for cyber regulation based on cyber ethics
10
4.5 Cybercrime categories from the legal perspective
11
4.5 Cybercrime categories from the legal perspective
14
4.6 Cyber law and intellectual property (IP)
15
4.6 Cyber law and intellectual property (IP)
4.6.1 Copyrights: grants rights to the creator of original works, such as musical,
dramatic, literary, and artistic works, including software codes.
4.6.2 Patents: are used to protect inventions, particularly new software and
online business strategies.
Example: Some types of patents in the United States: utility patents (protecting
specific functions), design patents (protecting the appearance of manufactured
objects).
Example: It is essential for contracts to specify who owns the IP that is created
and how the IP will be treated in the future.
17
4.6 Cyber law and intellectual property (IP)
4.6.7 Privacy: Online organizations must consider user privacy, balancing legal,
policy, and research considerations.
Example: Addressing how employees use company email and other digital
assets in employment contracts.
4.6.10 Data Retention: Managing and retaining data, especially considering its
value, transmission through the Internet, and storage in multiple locations.
2. Jurisdiction seems challenging for developing cyber laws because the Internet is
virtual.
20
4.7 Challenges In Cyber Law
21
4.7 Challenges In Cyber Law
1. Are all the crimes recognized that we see every day in
cyber‑space?
Cyber Crime is an evolving field, and therefore, as technology moves, new types
of crimes surface.
22
4.7 Challenges In Cyber Law
24
4.7 Challenges In Cyber Law
25