Professional Documents
Culture Documents
PROGRAMMING ESSENTIALS
UNIT 1: TECHNOLOGY AND
INTERNET GUIDELINES
Unit Objectives
• Determine the significance of
internet
• Name the risks in using the internet
• Identify computer safety, ethics and
ways to safeguard personal
information
• Be aware of the existing Anti-
cybercrime Law in the country.
Unit Topics
Computer
ethics, in its
simplest
definition, is a
set of moral
standards that
regulate the use
of a computer.
Computer Ethics
In computer ethics, it is essential to
understand the three (3) basic
aspects of standards.
• Copyright and Intellectual
Property
• Day-to-Day Ethics
• Netiqutte
Computer Ethics
• Copyright and
Intellectual
Property. It is the
protection of
industrial property
from illegal use,
copy, sell, and
other related acts
without proper
consent from the
owner.
Computer Ethics
• Day-to-Day
Ethics. It is the
dos and don’ts. It
is critical that
each of us
understand the
various types of
malicious activity
involving
electronic activity
and its resulting
Computer Ethics
Examples of unethical manners in using
computer are:
• Software piracy
• Generation of computer malicious
programs (worm, virus, etc)
• Plagiarism
• Hacking
• Data forgery and fraud
• Illegal access
Computer Ethics
• Netiquette. This is
the basic laws and
principles that
abound with online
communications
with people
through the use of
electronic devices
such as mobile
phone and
computer.
Computer Ethics
The Computer Code of Ethics
1. Maintain the highest standard of
professional behavior.
2. Avoid situations that create a
conflict of interest.
3. Do not violate the confidentiality of
your employer or those you
service.
Computer Ethics
4. Continue to learn so your
knowledge keeps pace with the
technology.
5. Never misrepresent or withhold
information that is germane to a
problem or situation of public
concern.
6. Use information judiciously and
maintain system integrity at all
times.
Computer Ethics
7. Do not violate the rights or privacy
of others.
8. Take appropriate action when
exposed to unethical or illegal
practices.
9. Do not exploit the shortcomings of
an employer’s computer system for
personal gain.
10.Accomplish each task to the best of
your ability.
How To Safeguard Personal Informatio
Online
9. Computer-related Identity
Theft: The intentional acquisition,
use, misuse, transfer, possession,
alteration or deletion of identifying
information belonging to another,
whether natural or juridical,
without right (with condition).
The Republic Act 10175: Anti-Cybercrime
Law