Lesson 3 Flashcards
A rule; mandates certain behavior; dictates permissible or forbidden conduct; carry sanctions.
Laws
Define socially acceptable behavior ans do not carry sanctions.
Ethics
The fixed moral attitudes of a group.
Cultural Mores
The legal obligation of an entity.
Liability
Compensating for wrongs done by an employee or an organization.
Restitution
Insures that the employees know what constitutes acceptable behavior.
Due Care
Body of expectations; functions as laws within an organization; ignorance of a policy is an acceptable defense.
Policy
What are the criteria for policy enforcement? (5)
Dissemination (Distribution)
Review (Reading)
Comprehension (Understanding)
Compliance (Agreement)
Uniform Enforcement
A type of law that governs nation or state; manages conflicts between people.
Civil Law
A type of law that involves violations that are harmful to society.
Criminal Law
A type of law that regulates relationship between individuals and organizations.
Private Law
A type of law that regulates the structure of government agencies.
Public Law
What are the four (4) common types of laws?
Civil
Criminal
Private
Public
A cybersecurity law that penalizes cybercrimes. (e.g. hacking, identity theft, online fraud)
RA 10175 | Cybercrime Prevention Act of 2012
Established the DICT, tasked with developing policies, plans, and programs for the ICT sector in the Philippines.
RA 10844 | Department of Information and Communications Technology Act of 2015
A strategic framework developed to strengthen the Philippine’s cybersecurity posture.
National Cybersecurity Plan (NCSP)
A republic act that governs intellectual property rights. (e.g. patents, copyrights, trademarks, trade secrets)
RA 8293 | The Intellectual Property Code of the Philippines
A cybersecurity law that regulates the processing of personal data in the Philippines.
RA 10173 | Data Privacy Act of 2012
The state of being free from unsanctioned intrusion.
Privacy
What do you do when suspected of identity theft? (10)
Report to Authorities
Notify Financial Institutions
Check Credit Report
Place Fraud Alert
Update Security
Monitor Accounts
Seek Legal Help
Document Everything
Educate Yourself
Follow Up
An executive order that promotes transparency; grants people access to information held by government agencies.
Executive Order No. 2, S. 2016 | Freedom of Information (FOI) Law
Establishes an int’l task force overseeing internet security functions; attempts to improve int’l investigation; lacks realistic provisions.
European Council Cyber-Crime Prevention Convention
Made by the World Trade Organization (WTO), the first significant international effort to protect intellectual property rights.
Agreement on Trade-Related Aspects of Intellectual Property Rights
A U.S. contribution to reduce impact of copyright infringement, trademarks, etc.
Digital Millennium Copyright Act (DMCA)
What are the Ten (10) Commandments of Computer Ethics?
Thou shalt not use a computer to harm other people.
Thou shalt not interfere with other people’s computer work.
Thou shalt not snoop around in other people’s computer files.
Thou shalt not use a computer to steal.
Thou shalt not use a computer to bear false witness.
Thou shalt not copy or use proprietary software for which you have not paid.
Thou shalt not use other people’s computer resources without authorization/proper compensation.
Thou shalt not appropriate other people‘s intellectual output.
Thou shalt think about the social consequences of the program you are writing or the system you are designing.
Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans.
Create difficulty in determining ethical behavior.
Cultural Differences
How are scenarios in Ethical Differences Across Cultures grouped? (3)
Software License Infringement
Illicit Use
Misuse of Corporate Resources
The overriding factor in leveling ethical perceptions within a small population is…
Education
What are the general causes of unethical & illegal behavior? (3)
Ignorance
Accident
Intent
The best method for preventing an illegal or unethical activity. (e.g. laws, rules, etc.)
Deterrence
Laws and policies can only deter if these conditions are satisfied: (3)
Fear of Penalty
Probability of Being Caught
Probability of Penalty Being Administered
Leads ICT development at national level.
Department of Information & Communications Technology (DICT)
Leads ICT development at national level.
Department of Information & Communications Technology (DICT)
Ensures protection of data and enforces the Data Privacy Act of 2012.
National Privacy Commission
In-charge of the regulation of telecommunications and broadcasting industries.
National Telecommunications Commission
Private-sector-led; collaborates with the gov’t to promote ICT development and the local IT-BPM industry.
National ICT Confederation of the Philippines
Coordinates law enforcement efforts to combat cybercrime.
Cybercrime Investigation & Coordination Center
A national cybersecurity organization that coordinates responses to cyber incidents.
Philippine Computer Emergency Response Team (PH-CERT)