Computer Ethics, Intellectual Property, Netiquette & Cybersecurity

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/47

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering computer ethics, intellectual property, netiquette rules, cybersecurity threats, and protective practices drawn from the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

48 Terms

1
New cards

Ethics

The study of assigning value to actions based on whether they are good or bad.

2
New cards

Computer Ethics

Moral guidelines that govern online behavior and protect users from privacy breaches, identity theft, and other harms.

3
New cards

10 Commandments of Computer Ethics

A set of guidelines created by the Computer Ethics Institute outlining responsible computer use.

4
New cards

Commandment 1

Thou shalt not use a computer to harm other people.

5
New cards

Commandment 2

Thou shalt not interfere with other people's computer work.

6
New cards

Commandment 3

Thou shalt not snoop around in other people's files.

7
New cards

Commandment 4

Thou shalt not use a computer to steal.

8
New cards

Commandment 5

Thou shalt not use a computer to bear false witness (spread misinformation).

9
New cards

Commandment 6

Thou shalt not use or copy software for which you have not paid.

10
New cards

Commandment 7

Thou shalt not use other people's computer resources without authorization.

11
New cards

Commandment 8

Thou shalt not appropriate other people's intellectual output.

12
New cards

Commandment 9

Thou shalt think about the social consequences of the program you write.

13
New cards

Commandment 10

Thou shalt use a computer in ways that show consideration and respect.

14
New cards

Intellectual Property (IP)

Creations of the mind—such as inventions, literary works, and designs—protected by law.

15
New cards

World Intellectual Property Organization (WIPO)

UN agency that serves as the global forum for IP services, policy, and cooperation.

16
New cards

Intellectual Property Office of the Philippines (IPOPHL)

Government agency that administers and enforces IP rights in the Philippines.

17
New cards

Patent

Exclusive legal right granted to an innovator to make, use, or sell an invention for 20 years.

18
New cards

Utility Model

Protection for a novel, industrially applicable technical solution, valid for 7 years.

19
New cards

Industrial Design

Right that safeguards the ornamental or aesthetic aspects of a product; initial term 5 years, renewable twice.

20
New cards

Trademark

Word, phrase, symbol, or logo that identifies the source of goods or services and protects brand identity.

21
New cards

Copyright

Automatic protection for creators of original literary, artistic, and scientific works; lasts 50 years after author’s death in PH.

22
New cards

Netiquette

Etiquette for online communication that emphasizes respect, courtesy, and responsible behavior.

23
New cards

Remember the Human

Netiquette rule urging users to treat others online as they wish to be treated.

24
New cards

Same Standards Online

Maintain the same courtesy and respect online as in real-life interactions.

25
New cards

Know Where You Are in Cyberspace

Adjust communication to suit the norms of each online environment.

26
New cards

Respect Time & Bandwidth

Share concise, meaningful content; avoid wasting others’ resources.

27
New cards

Make Yourself Look Good Online

Use correct spelling, grammar, and a polite tone in digital communication.

28
New cards

Share Expert Knowledge

Contribute accurate information to benefit the online community.

29
New cards

Keep Flame Wars Under Control

Avoid escalating heated online arguments; aim for constructive dialogue.

30
New cards

Respect Privacy

Do not disclose or misuse other people’s personal information online.

31
New cards

Don’t Abuse Power

Having greater knowledge or access does not justify exploiting others online.

32
New cards

Be Forgiving of Mistakes

Respond kindly to online errors; correct privately when possible.

33
New cards

Cybersecurity

Practices and technologies that protect computer systems, networks, and data from threats.

34
New cards

Phishing

Deceptive emails or sites that trick users into revealing sensitive information.

35
New cards

Ransomware

Malware that encrypts a user’s files and demands payment for their release.

36
New cards

Malware

Malicious software—viruses, worms, trojans—that causes data theft, destruction, or unauthorized access.

37
New cards

Distributed Denial of Service (DDoS)

Attack that floods a target server or network with traffic, disrupting services.

38
New cards

Unauthorized Access

Physical or digital entry into computer systems without permission.

39
New cards

Cybercrime Prevention Act of 2012

Philippine law (RA 10175) defining and penalizing cyber offenses like hacking, fraud, and online libel.

40
New cards

Data Privacy Act of 2012

Philippine law (RA 10173) that protects personal information and establishes data subject rights.

41
New cards

Data Processing Principles

Openness, proportionality, legitimate purpose, and security when handling personal data.

42
New cards

Consent (Data Privacy)

Data subject’s voluntary agreement required before personal data processing, unless exempted by law.

43
New cards

Privacy Impact Assessment (PIA)

Process that evaluates and mitigates privacy risks in high-risk data processing activities.

44
New cards

Physical Security

Restricting physical access to computers and server rooms to authorized personnel only.

45
New cards

Authentication & Access Control

Using strong passwords, passphrases, and role-based privileges to limit system access.

46
New cards

Encryption

Technique such as Full Disk Encryption that encodes data to prevent unauthorized reading.

47
New cards

Regular Backups

Scheduled copies of data stored offsite or in the cloud to prevent loss from damage or attacks.

48
New cards

Firewall

Hardware or software that filters network traffic, blocking unauthorized connections.