ITEC85 - Legal, Ethical, and Professional Issues

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/42

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:59 AM on 4/11/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

43 Terms

1
New cards

Law

Rules that mandate or prohibit

certain behavior. They are enforced by the state (government) and carry penalties (fines, imprisonment). Laws represent the minimum standard of behavior.

2
New cards

Ethics

Rules that define socially

acceptable behavior. They are based on cultural mores and professional standards.

Breaking them results in social stigma, loss of job, or loss of professional certification.

3
New cards

Law vs. Ethics - The Distinction

The Conflict: Information Security often operates in the grey area where technology moves faster than the law.

Example: Is it legal to scan a network you don't own? (Usually No). Is it ethical if you

are trying to warn them of a flaw? (Debatable).

4
New cards

Liability

The legal obligation of an entity; limits what an organization is responsible for (and what they can be sued for).

5
New cards

Due Care

Taking reasonable measures to protect an asset. "Doing what a reasonable person would do." (e.g., Installing antivirus).

6
New cards

Due Diligence

The verification that Due

Care is happening. (e.g., Checking the logs to prove the antivirus is updating).

7
New cards

Business Impact

If a company is hacked,

they can be sued for "Negligence" if they failed to exercise Due Care.

8
New cards

The Commandments of Computer Ethics

Created by the Computer Ethics Institute. Core principles include:

- Thou shalt not use a computer to harm other people.

- Thou shalt not interfere with other people's computer work.

- Thou shalt not snoop around in other people's computer

files.

- Thou shalt not use a computer to steal.

- Thou shalt not use a computer to bear false witness (Fake News/Fraud).

Key Takeaway: Technology does not change right and

wrong; it just amplifies the impact.

9
New cards

White Hat

Ethical Hackers. They have

authorization (written permission) to test

systems. They disclose vulnerabilities to the

vendor/owner to fix them.

10
New cards

Black Hat

Malicious Hackers / Crackers.

They violate security for personal gain, destruction, or fame. They sell exploits or

data.

11
New cards

Grey Hat

The "Vigilantes." They hack

without permission (Illegal) but usually without malicious intent (Ethical?). They

might publicly release a vulnerability to force

a company to fix it (Full Disclosure).

12
New cards

Grey Hat

Warning: ____ activities are illegal under Philippine and International law.

13
New cards

Other Threat Actors

- Script Kiddies

- Hacktivists

- State-Sponsored / APT (Advanced Persistent

Threat)

14
New cards

Script Kiddies

Unskilled attackers who use

tools/scripts written by others. They lack theoretical knowledge but cause mass damage due to their numbers.

15
New cards

Hacktivists

Hackers motivated by a political or social cause (e.g., Anonymous). They use DoS or defacement to promote a message.

16
New cards

State-Sponsored / APT (Advanced Persistent

Threat)

Hackers employed by governments. Highly

skilled, well-funded, and patient. Targets: National

security, intellectual property, critical infrastructure.

17
New cards

Why study US Law?

Most major tech companies (Microsoft, Google, Cisco) are US-based, setting global standards.

18
New cards

U.S. / International Regulatory Acts

- CFAA (Computer Fraud and

Abuse Act)

- DMCA (Digital Millennium

Copyright Act)

- FOIA (Freedom of Information Act)

19
New cards

CFAA (Computer Fraud and

Abuse Act)

The foundation of anti-hacking law. Defines "unauthorized access" to a "protected computer."

20
New cards

Unauthorized Access Defined by CFAA

Without Authorization

Accessing a system that you

have no permission to access at all (e.g., hacking).

21
New cards

Unauthorized Access Defined by CFAA

Exceeding Authorized Access

Accessing permitted areas of a computer but then accessing files, data, or areas for which you are not authorized.

22
New cards

Unauthorized Access Defined by CFAA

Key Intent

The act must generally be intentional and, in many cases, accompanied by an intent to defraud, damage, or obtain something of value.

23
New cards

Protected Computer Defined by CFAA

The definition is broad, covering most computers

connected to the internet. It includes:

- Computers used by or for a financial institution.

- Computers used by the U.S. government.

- Any computer used in interstate or foreign commerce or communication (e.g., any computer with internet access).

24
New cards

DMCA (Digital Millennium Copyright Act)

Criminalizes the production and dissemination of technology used to circumvent copyright protections (DRM).

25
New cards

FOIA (Freedom of Information Act)

Allows citizens to request data from the federal government.

26
New cards

FOIA (Freedom of Information Act)

Security implication: What data must remain secret for national security vs. what must be public?

27
New cards

Philippine Legal Framework - Data Privacy

- Republic Act 10173 (Data Privacy Act of 2012)

28
New cards

Republic Act 10173 (Data Privacy Act of 2012)

Protects the fundamental human right of privacy while ensuring free flow of information.

29
New cards

Republic Act 10173 (Data Privacy Act of 2012)

Scope: Applies to any processing of personal data

in the Philippines.

30
New cards

Republic Act 10173 (Data Privacy Act of 2012)

Key Concept: "Data Subject" (the person) has rights (Right to be informed, right to access, right to erase).

31
New cards

Republic Act 10173 (Data Privacy Act of 2012)

Requirement: Organizations must appoint a DPO (Data Protection Officer).

32
New cards

Philippine Legal Framework - Cybercrime

Republic Act 10175 (Cybercrime Prevention Act of 2012)

33
New cards

Republic Act 10175 (Cybercrime Prevention Act of 2012)

Offenses against confidentiality, integrity, and

availability: Illegal Access, Illegal Interception, Data

Interference (Destruction), System Interference.

34
New cards

Republic Act 10175 (Cybercrime Prevention Act of 2012)

Computer-related offenses: Computer-related Forgery and Identity Theft.

35
New cards

Republic Act 10175 (Cybercrime Prevention Act of 2012)

Content-related offenses: Cybersex, Child Pornography, and Cyber-libel.

36
New cards

Republic Act 10175 (Cybercrime Prevention

Act of 2012)

Impact: Hacking is now a criminal offense with specific jail time in the Philippines.

37
New cards

Professional Organizations

Why join? To network, learn, and establish credibility.

38
New cards

Professional Organizations

- ACM (Association for Computing Machinery)

- ISC² (Intl. Information System Security Certification

Consortium)

- ISACA

39
New cards

ACM (Association for Computing Machinery)

Focuses on computing as a science and profession. Strong Code of Ethics regarding public safety.

40
New cards

ISC² (Intl. Information System Security Certification Consortium)

The gold standard for security

certifications (CISSP).

41
New cards

ISACA

Focuses on IT Governance and Auditing (CISA, CISM).

42
New cards

The ISC² Code of Ethics

Security professionals must adhere to four canons:

- Protect society, the common good, necessary public trust and confidence, and the infrastructure.

- Act honorably, honestly, justly, responsibly, and legally.

- Provide diligent and competent service to principals.

- Advance and protect the profession.

Note: Protecting "Society" comes before protecting

your "Employer."

43
New cards

Summary & Key Takeaways

- Ignorance of the law (RA 10173/10175) is no excuse for a security breach.

- Ethical behavior builds the trust required to be a security professional.