O PROTECT YOUR RIGHTS. E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR...
-
Upload
griselda-eaton -
Category
Documents
-
view
213 -
download
0
Transcript of O PROTECT YOUR RIGHTS. E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR...
![Page 1: O PROTECT YOUR RIGHTS. E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP CYBER CRIME COMPUTER CRIME,](https://reader035.fdocuments.in/reader035/viewer/2022071808/56649f0b5503460f94c1ec04/html5/thumbnails/1.jpg)
E – R U L E
o PROTECT YOUR RIGHTS
![Page 2: O PROTECT YOUR RIGHTS. E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP CYBER CRIME COMPUTER CRIME,](https://reader035.fdocuments.in/reader035/viewer/2022071808/56649f0b5503460f94c1ec04/html5/thumbnails/2.jpg)
DEFINITION E-RULE
GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP
CYBER CRIMECOMPUTER CRIME, DIGITAL CRIME, E-CRIME AND ELECTRONIC CRIME; ALL INDICATE THAT CRIMES ARE COMMITED THROUGH THE USE IF TECHNOLOGY TO INTIMIDATE PEOPLE, COMMIT FRAUD OR STEAL VALUABLE INFORMATION
![Page 3: O PROTECT YOUR RIGHTS. E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP CYBER CRIME COMPUTER CRIME,](https://reader035.fdocuments.in/reader035/viewer/2022071808/56649f0b5503460f94c1ec04/html5/thumbnails/3.jpg)
![Page 4: O PROTECT YOUR RIGHTS. E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP CYBER CRIME COMPUTER CRIME,](https://reader035.fdocuments.in/reader035/viewer/2022071808/56649f0b5503460f94c1ec04/html5/thumbnails/4.jpg)
REASONS FOR CYBER CRIME
FOR PURSUIT OF FAME AND TO GAIN REPUTATION FOR INTELLINGENCE
FOR FINANCIAL MEANS TO GET REVENGE ON SOMEONE THEY
HAT/DISLIKE PURELY TO PURSUE CRIMINAL
ACTIVITIES TO STEAL INDENTITY TO FORGE DOCUMENTS AND
MESSAGES
![Page 5: O PROTECT YOUR RIGHTS. E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP CYBER CRIME COMPUTER CRIME,](https://reader035.fdocuments.in/reader035/viewer/2022071808/56649f0b5503460f94c1ec04/html5/thumbnails/5.jpg)
![Page 6: O PROTECT YOUR RIGHTS. E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP CYBER CRIME COMPUTER CRIME,](https://reader035.fdocuments.in/reader035/viewer/2022071808/56649f0b5503460f94c1ec04/html5/thumbnails/6.jpg)
EFFECTS OF CYBER CRIMES
LOSS OF REVENUE / PROFITS WASTE OF VALUABLE TIME DAMAGE REPUTATIONS REDUCED PRODUCTIVITY
![Page 7: O PROTECT YOUR RIGHTS. E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP CYBER CRIME COMPUTER CRIME,](https://reader035.fdocuments.in/reader035/viewer/2022071808/56649f0b5503460f94c1ec04/html5/thumbnails/7.jpg)
PROPERTY INFRINGEMENTS AND
LEGAL RIGHTS SOFTWARE PIRACY
Many employees install the same programme on multiple computers using software for which only one license agreement was paid. These actions are against the law.
FREEWARE AND SHAREWAREFreeware allows you to download, copy, pass on or use software without payment for a license and you are allowed to utilize it for as long as you like. It is stiil considered as the intellectual property for the development.Shareware is a software that can be used by anyone for free for a limited time period.
EULAEnd User License Agreement is the license which comes with commercial software. It gives you the right to load or install software legally but you are prohibited from sharing and installing the software on others computers.
![Page 8: O PROTECT YOUR RIGHTS. E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP CYBER CRIME COMPUTER CRIME,](https://reader035.fdocuments.in/reader035/viewer/2022071808/56649f0b5503460f94c1ec04/html5/thumbnails/8.jpg)
RAIFANA ROSA BT MOHD SATTAR2009294916EE230ELECTRICAL INSTRUMENTATIOM