O PROTECT YOUR RIGHTS. E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR...

8
E – R U L E o PROTECT YOUR RIGHTS

Transcript of O PROTECT YOUR RIGHTS. E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR...

Page 1: O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,

E – R U L E

o PROTECT YOUR RIGHTS

Page 2: O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,

DEFINITION E-RULE

GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP

CYBER CRIMECOMPUTER CRIME, DIGITAL CRIME, E-CRIME AND ELECTRONIC CRIME; ALL INDICATE THAT CRIMES ARE COMMITED THROUGH THE USE IF TECHNOLOGY TO INTIMIDATE PEOPLE, COMMIT FRAUD OR STEAL VALUABLE INFORMATION

Page 3: O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
Page 4: O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,

REASONS FOR CYBER CRIME

FOR PURSUIT OF FAME AND TO GAIN REPUTATION FOR INTELLINGENCE

FOR FINANCIAL MEANS TO GET REVENGE ON SOMEONE THEY

HAT/DISLIKE PURELY TO PURSUE CRIMINAL

ACTIVITIES TO STEAL INDENTITY TO FORGE DOCUMENTS AND

MESSAGES

Page 5: O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
Page 6: O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,

EFFECTS OF CYBER CRIMES

LOSS OF REVENUE / PROFITS WASTE OF VALUABLE TIME DAMAGE REPUTATIONS REDUCED PRODUCTIVITY

Page 7: O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,

PROPERTY INFRINGEMENTS AND

LEGAL RIGHTS SOFTWARE PIRACY

Many employees install the same programme on multiple computers using software for which only one license agreement was paid. These actions are against the law.

FREEWARE AND SHAREWAREFreeware allows you to download, copy, pass on or use software without payment for a license and you are allowed to utilize it for as long as you like. It is stiil considered as the intellectual property for the development.Shareware is a software that can be used by anyone for free for a limited time period.

EULAEnd User License Agreement is the license which comes with commercial software. It gives you the right to load or install software legally but you are prohibited from sharing and installing the software on others computers.

Page 8: O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,

RAIFANA ROSA BT MOHD SATTAR2009294916EE230ELECTRICAL INSTRUMENTATIOM