Copyright © 2012 Knowledge Point Cyber Rule. Copyright © 2012 Knowledge Point Learning Outcomes By the end of this module, you should be able to: List.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
 e-Access is about understanding the privilege of using electronic information as well as the right to having equal, secure and reliable access.  The.
Unit 1 Living in the Digital WorldChapter 4 – Smart Working This presentation will cover the following topics: Software choices Name:
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
INTERNET and CODE OF CONDUCT
e-Safety What e-Safety? E-safety is about measures and best particles for Netizens to guard their personal safety and the security of their networks.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
CYBER RULE MODULE 3. LEARNING OBJECTIVES By the end of the module, you should be able to: 1.List 3 examples of cyber crimes 2.State 3 effects of cyber.
Data Protection Act. Lesson Objectives To understand the data protection act.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
General Awareness Training
General Purpose Packages
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Cyber crime & Security Prepared by : Rughani Zarana.
Computer Ethics for Computer Users
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Crime & Malpractice AS Module Heathcote Ch. 10.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Nu’aim Hussaini Bin Zulkefli Sr221 Csc434 Pn Noridah Binti Abu Bakar.
Chapter 10: Crimes Against Property
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA
Computer security By Isabelle Cooper.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Copyright © 2012 Knowledge Point digital world architecture of evolution Resources:
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
DIGITAL CITIZENSHIP What You Should Know!.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
Information Security Footprint.
Computer Ethics.
Part 3.
Communicating in the IT Industry
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Copyright © 2012 Knowledge Point Cyber Rule

Copyright © 2012 Knowledge Point Learning Outcomes By the end of this module, you should be able to: List three examples of cyber crimes. State three effetcts of cyber crimes related to individuals. Elaborate three benefits of having Cyber law in the country

Copyright © 2012 Knowledge Point Definition Cyber Rule is defined as governing communication and technology use including respect for ownership and authorship.

Copyright © 2012 Knowledge Point What is Cyber Crimes? Crimes which are committed through the use of technology are known as ‘cyber crimes’. Computers are used to intimidate people, commit fraud or steal valuable information. Many ‘real world’ crimes such as blackmailing, forgery, theft, money laundering and embezzlement have become cyber crimes as criminals are now using the Internet to carry out their deeds.

Copyright © 2012 Knowledge Point Cyber Crimes Following are some Examples of Cyber Crimes Internet banking fraud Harassment

Copyright © 2012 Knowledge Point Internet banking fraud Internet banking fraud is defined as any fraud or theft committed using online technology to illegally remove money from, or transfer it to, a different bank account. Types of Internet banking fraud include phishing and mule recruitment.

Copyright © 2012 Knowledge Point UAE Cyber Crimes Law Article No.11: Anyone convicted of obtaining data of credit card or any other electronic cards by the use of the internet or any high-tech means, shall be imprisoned and fined.

Copyright © 2012 Knowledge Point Case Study 1: ‘Phishing’ Raid Empties Mashreq Bank Customer Accounts: Fraud victims who lost around Dh128,500 (US$35,000) from their bank accounts are demanding refunds after hackers siphoned (took off) their savings under the guise of recharging hundreds of mobile numbers...”

Copyright © 2012 Knowledge Point Case Study 2: Abu Dhabi Police Warn Public against Online Fraud Abu Dhabi – The public has been warned against online fraud schemes involving users’ bank accounts by the Abu Dhabi Police. According to the head of the Department, Colonel Rashid Bu Rasheed, the Criminal Investigation Department of Abu Dhabi Police has received reports on fraudulent attempts to obtain sensitive information by fraudsters. These people pose as banking service providers in fake s to trick recipients into filling in application forms to “reactivate their de-activated bank accounts”.

Copyright © 2012 Knowledge Point Harassment Harassment is defined as the act of systematic or continued unwanted and annoying actions of one party or a group, including threats and demands. It is driven by various motives such as racial prejudice and personal hatred. Activity: Draw person’s reaction before and after getting blackmail!!

Copyright © 2012 Knowledge Point UAE Cyber Crimes Law Article No.9, anyone convicted of using the internet or any other high-tech means for threatening or blackmailing another person.

Copyright © 2012 Knowledge Point Case Study: A 38-year-old man faced 5 years of probation, 500 hours of community service, and more than $12,000 as compensation for harassing several employees in the City of Seattle via the Internet. He was charged with two counts of using a telecommunications device with Intent to Annoy, Abuse, Threaten or Harass. The man sent dozens of uninvited and harassing s and pornographic material to these employees and hid his identity with special programs. This case is believed to be the first federal prosecution of cyber harassment in the United States.

Copyright © 2012 Knowledge Point Intellectual Property infringement Intellectual Property infringement is one of the most rampant business-related criminal activities and normally involves the illegal use or re-production of proprietary information or technology from a legal owner. Advancement in the IT sector has enabled critical information or technology to be duplicated and stored in its digital form.

Copyright © 2012 Knowledge Point Case Study: Chinese National Pleads Guilty to Stealing Ford Trade Secrets “...The accused employee copied 4,000 Ford documents as well as sensitive Ford design documents onto an external hard drive before telling Ford that he was leaving the company...”

Copyright © 2012 Knowledge Point Software piracy Software piracy is a general occurrence amongst computer and Internet users where many think it is alright to share software they bought. For example, employees often install the same application on multiple computers using software for which only one license agreement was paid. Such actions are against the law, and people who are caught doing this may be fined or even sentenced to prison.

Copyright © 2012 Knowledge Point Intrusion Intrusion is defined as illegal, offensive, or unauthorized entry into a facility or system.

Copyright © 2012 Knowledge Point Case Study: Hackers Break into UAE Credit Network to Fund US Purchases Hackers Break into UAE Credit Network to Fund US Purchases: “An international investigation is being carried out to find the hackers who broke into UAE financial servers to fund US purchases...”

Copyright © 2012 Knowledge Point Offenses Offenses are defined as the acts of causing anger, resentment, displeasure, or affront. For example, in the UAE abuse of any Islamic law or community values or anything said against any recognized religion is considered as an offense.

Copyright © 2012 Knowledge Point UAE Cyber Crimes law Article No.15 stipulates that anyone convicted of using the internet or high- tech means for the purpose of committing the following crimes shall be imprisoned or fined. The crimes are as follows: 1. Abuse of any Islamic holy shrines or rituals 2. Abuse of holy shrines and religious rituals stipulated in other religions since such rituals are maintained in accordance to the rulings of Islamic Sharia 3. Insulting any recognized religion 4. Incitement or promotion of sins

Copyright © 2012 Knowledge Point UAE Cyber Crimes law “continued” If anyone is convicted of opposing the Islamic religion, or abusing its principles, or carrying out any missionary activities for the benefit of other religions, he should be sentenced to more than seven years in jail. According to Article No.16, anyone convicted of transcending family principles and values or publishing news or pictures related to the private life of the family’s members, shall be jailed for no less than one year and fined Dh50, 000.

Copyright © 2012 Knowledge Point Case Study: Middle East Bloggers Two men who operated an online forum in the UAE were convicted and fined according to the law for allowing a commenter to post comments that were deemed defamatory. A blogger was sentenced to 4 years in prison after mocking the authority of the Egyptian president and insulting Islam. The country’s 1996 press law allows criminals to be prosecuted for the crime of “spreading false news” and to the penal code, which prevents material that is considered insulting.

Copyright © 2012 Knowledge Point Reasons for Cyber Crime Cyber crimes are committed for many reasons including the following: For pursuit of fame and to gain reputation for intelligence or brilliance Purely out of mischief For financial means To get revenge on someone they hate/dislike To signal some form of protest Purely to pursue criminal activities To steal identity (identity theft) To forge documents and messages

Copyright © 2012 Knowledge Point Effects of Cyber Crime Cyber crimes can contribute to the following losses to an organization: Loss of Revenue/Profits Waste of Valuable Time Damaged Reputations Reduced Productivity

Copyright © 2012 Knowledge Point Tips: How to protect Yourself from being a Victim of Cyber Crimes DO NOT open s and attachments from unknown senders DO NOT execute.EXE or unknown files directly from your mail Purchase a good anti-virus and security software and update regularly (at least once a Week) Use virus-scanning software on all diskettes and thumb drives before attempting to access data Secure your Internet Web browsing Make regular backups of your data and test its integrity Run regular updates of Microsoft Windows on your PC f your office has access to broadband (or high speed) Internet access, consider purchasing a software or hardware firewall that can help in guarding your computer system If you depend on or run a wireless network, take time to secure it and make sure you understand how it works

Copyright © 2012 Knowledge Point Tips: How to protect Yourself from being a Victim of Cyber Crimes “contioned” Be responsible and take time to learn about how to take better care of your PC Remember that your PC is just like your car; it requires some basic maintenance in order for it to function well Use the internet to read up on some tips about PC maintenance. This is available on many websites such as or

Copyright © 2012 Knowledge Point What would you do in the following situations? You receive an from Antony D’souza. What will you do? You have a wireless Internet connection at home. How would you make sure that strangers do not use it? Activity: Find Top 5 free Anti-Virus Software from pcworld.com

Copyright © 2012 Knowledge Point Licenses Manufacturers keep track on the legal use of their products by providing valid licenses for which users or buyers have to pay. There are commonly three types of software licenses: Single User License - Software can only be installed on one computer, allowing use to only one person at a time Multi Use License - Multiple users can use the software on multiple machines Site License - Anyone on a particular website or in an organization can use the software

Copyright © 2012 Knowledge Point Freeware & Shareware FreewareShareware Software that allows users to download, copy, pass it on or use it for free without a time limit All features of the program are accessible Software that can be used by anyone for free for a limited time period Not all features of the program are accessible unless users buy the full package Note: Nonetheless, being free does not mean it is not copyrighted; it is still considered the Intellectual Property of the developer. Note: There are certain shareware programs that offer users the full version, without setting any time or feature limitations. Class Activity: Search for a Freeware in Internet

Copyright © 2012 Knowledge Point EULA – End User License Agreement EULA is the license that comes with commercial software. It states what is allowed in terms of installing the software and making copies. The EULA will appear on the first screen of the installation wizard when you start to install the product. In order to continue with installation, you must read and agree to the terms set out in the license.

Copyright © 2012 Knowledge Point Product ID You can check whether you are using a valid copy of software by going to the ‘help’ menu. From the help menu, go to the ‘about’ option. This will let you view the person to whom the software has been licensed and also the valid product ID. Always check the product ID and EULA before you install free software.

Copyright © 2012 Knowledge Point Legislation The Copyright, Designs and Patents Act covers the issue of software piracy. There are three main things which the Act covers: It is illegal to make copies of software without obtaining the permission of the owner. Purchasing a license does not make you the owner of the software; it only gives you the rights to use it. It is illegal to use pirated software. It is illegal to transmit pirated software though a telecommunications line.

Copyright © 2012 Knowledge Point Rules & Regulations governing Communications & Technology use: Personal data refers to any piece of information that identifies you, such as your name, home address, , phone number and others. Without you realizing it, every day, your data is either collected or freely given by you over the Internet. Therefore, they can be easily obtained and misused by irresponsible people.

Copyright © 2012 Knowledge Point Data Protection Act Due to the increasing amount of personal information that is being collected every day, some countries have set up Data Protection Act to ensure that any data you give is properly used and stored. There are eight principles laid out by the Data Protection Act: 1. Personal data should be fairly and legally obtained and processed 2. Personal data can be held only for specified and legal purposes 3. Personal data should be adequate, relevant and not excessive for the required purpose 4. Personal data should be accurate and kept up-to-date 5. Personal data should not be kept for longer than is necessary 6. Data must be processed in accordance with the rights of the data subject 7. Appropriate security measures must be taken against unauthorized access 8. Personal data cannot be transferred to other countries

Copyright © 2012 Knowledge Point Lesson Learned As an IT user, you have to be aware of Cyber Law in the country. By understanding the rules and regulations, it will help you to seek protection should you involve in any cyber crime cases.