SlideShare a Scribd company logo
2
Most read
3
Most read
17
Most read
Mukesh N Tekwani mukeshtekwani@outlook.com
2
What is Cyber Law?
1. Cyber law – all legal and regulatory aspects of the
Internet.
2. Cyber space - governed by a system of laws and
regulations called cyber law.
3. Why is cyber law needed? Millions of people around the
world use Internet for business, banking, social
interactions, and Internet is misused for criminal
activities. Hence the need for laws
3
Cyber Security Law – What you can do
1. In case you become a victim of cyber crime, what can you do?
2. Preserve the relevant incriminating electronic evidence.
3. Legal liability can be:
a) Civil liability
b) Criminal liability
4. Even if you are the victim, you still have a legal liability. The law
expects you to have the duty of due diligence.
5. If you are the victim, you must report the breach to the relevant
statutory authorities
6. Example – getting email from a bank with a bank statement/invoice
meant for someone else
4
Cyber Security Law – Challenges
1. The person committing cybercrime may not be located in your
country and so legal remedies could be difficult.
2. Anyone sitting in one country could target the network of a
company or a govt in another country.
3. There is no international legal law for such matters. So jurisdiction is
going to pay a very important role in tackling cybercrime.
5
International Cyber Law
1. There are no international cyber laws.
2. Every country has its own cyber laws – only for its citizens.
3. What happens if a cyber crime is committed on country X from
country Y ?
4. Some countries have come up with bilateral agreements with other
countries – but no international laws in place
5. July 2015 – Germany came up with cyber laws – laws to protect
critical infrastructure only. Equipment, plants that are important for
running the country.
6. June 2017 – China’s cyber security law – very broad – personal
information also covered
6
What should companies do?
1. Inform customers of the breach
2. Tell customers what to do in this case
3. Examples –
1. Yahoo password leaks.
2. British Airways credit card and other info leak
7
Copyright
1. Copyright is an intellectual property right attached to
original works – e.g., books, movies, music, logo,…
2. Copyright is a protection provided by law to authors of
original works. This includes literature, films, music,
paintings, etc
3. Copyright laws apply to published and unpublished
work.
4. Copyright law helps to determine authorship, duration
of protection and laws for transfering rights to others
8
Security
1. Security is an organisational concern.
2. Every business needs safeguards that protect computer
systems and data from damage or unlawful use.
3. Protect systems from hackers
4. Protect data from unlawful use.
9
Controls
1. What are controls? These are policies, procedures,
rules, techniques designed to prevent errors in data and
systems.
2. Examples are :
a. access privileges – who, what, when
b. Data validation – numeric data for DOB, no numeric
for name, etc
c. Input authorizations, view rights, edit rights
10
Privacy
1. Security is an organisational concern
2. Privacy is an individual concern.
3. People need assurance that their personal information
such as employment, financial records, medical records,
employment history will not be misused.
4. You must ensure that you don’t reveal your personal /
private information to others.
5. Info such as – bank details, date of birth, medical
history, employment records, educational records…..
11
Software Piracy
1. It is the unauthorized copying and distribution of
copyrighted software
2. How is it done ? – Downloading, copying, sharing, selling
copies of original software
3. Software license – how many copies can be installed. If
you install more than the specified number of copies, it is
piracy
4. Sharing login credentials used to access a web-based
software application – e.g. one person pays for an online
service and many use that service by sharing password.
12
Code of Ethics
1. Ethics => Ethics is a branch of philosophy. Ethics defines
what is good and bad, what is right and wrong, obligations.
2. All software professionals (programmers, systems admins,…)
have the responsibility to provide certain quality or work
and assure control, privacy and security in their services and
products.
3. What does a code of ethics do? It gives these norms and
principles. Code of ethics sets standards.
4. Code of ethics sets commitments, requirements and
responsibilities for members of an organization.
13
Code of Ethics for Computer Professionals
1. Fair Treatment – treat everyone fairly. No discrimination on
grounds of age, gender, post, etc
2. Access private info only when it is extremely necessary for
your official duties, after taking permissions from concerned
authorities.
3. Don’t use confidential information for your personal gain.
14
Code of Ethics for Computer Professionals
4. Maintain the privacy of users and professionals.
5. Maintain good communication with users – inform users of
which resources can be shared, legal obligations, etc.
6. Maintain good system integrity – regularly perform
maintenance of hardware and software, check network and
Internet availability. Analyze system performance
(download speeds, bootup times for computers, etc)
7. Prevent unauthorized access to systems and resources
(applications, printers, data, …)
15
Code of Ethics for Computer Professionals
8. Maintain healthy cooperation. ‘We’, not ‘I’.
9. Support your colleagues – cooperate with other colleagues.
Learn from them if you don’t know something. Train them
if they need help in learning
10. Acknowledge the responsibility of the team – the
community.
11. Be honest – honesty is the best policy. Take help of seniors
if it is necessary, to perform your duties efficiently.
12. Update yourself with latest technology, software, systems
practices. If necessary, go for training, self-study.
16
Code of Ethics for Computer Professionals
13. Update yourself on social ad legal issues relating to
computing. Share with others whatever new you have
learnt. Encourage others to adopt changes in policies – this
is social responsibility
14. If you make mistakes, admit them and correct them. Don’t
try to blame others for your mistakes. Maintain
professionalism while performing your duties.
15. Remove any wrong data about individuals.
17
Do’s for Computer Professionals
1. Use the Internet to enhance your knowledge. Take courses
from sites such as Udacity, Udemy, Coursera, MIT, etc
2. When communicating with strangers, don’t share your
personal data. Personal data = family, financial, job, health
3. Respect privacy of others
4. Avoid political discussions with strangers
5. Use antivirus software to protect your computer systems
6. Download software from reliable sites only
18
Don’ts for Computer Professionals
1. Don’t share your passwords and usernames with others
2. Don’t arrange to meet unknown persons whom you met on
Internet
3. Don’t use unauthorized or pirated software
4. Don’t break / hack into computers. It’s a crime.
5. Don’t answer any improper messages
6. Don’t fall prey to lottery, cashback, loan schemes.
7. Don’t fall into traps of friendship from strangers.
19
Cyber Insurance
1. A cyber insurance policy protects you from cyber breaches.
2. All gadgets are covered under these policies – laptops,
computers, mobile phones, ..
3. Some companies that offer Cyber Security Insurance are:
HDFC (Cyber Security) and Bajaj Allianz (Individual Cyber
Safe Insurance Policy)
20
Cyber Insurance
1. A cyber insurance policy protects you from cyber breaches.
2. All gadgets are covered under these policies – laptops,
computers, mobile phones, ..
3. Some companies that offer Cyber Security Insurance are:
HDFC (Cyber Security) and Bajaj Allianz (Individual Cyber
Safe Insurance Policy)
21
Cyber Insurance
Cyber Insurance covers the following:
i. A financial loss resulting from being a victim of email spoofing and
phishing
ii. Fraudulent online transactions in bank account, debit/credit card or e-
wallet
iii. Reputational liability, including claims alleging defamation and invasion of
privacy
iv. Losses and expenses related to defence and prosecution cost related to
identity theft
v. Restoration cost to retrieve data or computer program damaged by entry
of the malware
vi. Cyber extortion loss
THANK YOU
Prof Mukesh N Tekwani
mukeshtekwani@outlook.com
November 9, 2019

More Related Content

PPTX
Human rights education
alagappa university, Karaikudi
 
PPT
Chapter 5 Planning for Security-students.ppt
Shruthi48
 
PPTX
General Data Protection Regulations (GDPR): Do you understand it and are you ...
Cvent
 
PPT
Cyber crime and fraud
FCA - Future Chartered Accountants
 
PDF
Cyber Ethics Notes.pdf
AnupmaMunshi
 
PPT
Entrepreneurship Chap 13
Umair Arain
 
PPTX
Machine learning ppt
Rajat Sharma
 
PPTX
Job sequencing with Deadlines
YashiUpadhyay3
 
Human rights education
alagappa university, Karaikudi
 
Chapter 5 Planning for Security-students.ppt
Shruthi48
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
Cvent
 
Cyber crime and fraud
FCA - Future Chartered Accountants
 
Cyber Ethics Notes.pdf
AnupmaMunshi
 
Entrepreneurship Chap 13
Umair Arain
 
Machine learning ppt
Rajat Sharma
 
Job sequencing with Deadlines
YashiUpadhyay3
 

What's hot (20)

PPTX
Introduction to Cyber Crimes
atuljaybhaye
 
PPTX
Indian Cyber laws
mulikaa
 
PPTX
cyber stalking
Rishabh Kataria
 
PPTX
Cyber Space
DINESH KAMBLE
 
PPTX
Presentation on Software Piracy
Pallavi Agarwal
 
PPTX
Right to privacy on internet and Data Protection
atuljaybhaye
 
PPT
Cyber defamation
Tuhin Batra
 
PPTX
Cyber crime and its types
DINESH KAMBLE
 
PPTX
Cyber law
Umang Maheshwari
 
PPTX
Introduction to cybercrime
patelripal99
 
PPT
Digital signature
Hossain Md Shakhawat
 
PPT
Introduction to Cyber Law
n|u - The Open Security Community
 
PPTX
Cyber crime types
kiran yadav
 
PPTX
Jurisdiction in cyberspace
Dr. Arun Verma
 
PPTX
Cyber Crime
Mazhar Nazik
 
PPTX
Social engineering
Vishal Kumar
 
PPT
Cyber Ethics
WonderingAriana
 
PPTX
Cyber law
Arnab Roy Chowdhury
 
PPTX
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
PPTX
Cyber law In India: its need & importance
Aditya Shukla
 
Introduction to Cyber Crimes
atuljaybhaye
 
Indian Cyber laws
mulikaa
 
cyber stalking
Rishabh Kataria
 
Cyber Space
DINESH KAMBLE
 
Presentation on Software Piracy
Pallavi Agarwal
 
Right to privacy on internet and Data Protection
atuljaybhaye
 
Cyber defamation
Tuhin Batra
 
Cyber crime and its types
DINESH KAMBLE
 
Cyber law
Umang Maheshwari
 
Introduction to cybercrime
patelripal99
 
Digital signature
Hossain Md Shakhawat
 
Introduction to Cyber Law
n|u - The Open Security Community
 
Cyber crime types
kiran yadav
 
Jurisdiction in cyberspace
Dr. Arun Verma
 
Cyber Crime
Mazhar Nazik
 
Social engineering
Vishal Kumar
 
Cyber Ethics
WonderingAriana
 
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Cyber law In India: its need & importance
Aditya Shukla
 
Ad

Similar to Cyber Laws (20)

DOCX
Ethics assignment.docx
BestMan28
 
PPTX
Computer ethics cyber security and technology of it
sr24production
 
PPTX
computer and society impact of Computer in society
Sumama Shakir
 
PPTX
E commerce
DrSelvamohanaK
 
PPTX
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
PPTX
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Dr. Khaled Bakro
 
PPTX
Cyber Law and Cyber Crime
Syangba132
 
PDF
Nfwordle
Nadine Fray
 
PPTX
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
Fizaril Amzari Omar
 
PPTX
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
PDF
The internet of things..perspectives for the Nigerian legal system
Simon Aderinlola
 
PPT
Policies and Law in IT
Anushka Perera
 
PPTX
chapter 6 ethics emerging technology.pptx
ArebuMaruf
 
PPTX
Corporate ethics
Melvin DCruz
 
PPTX
Aqua Blue Illustrative What is Cyber Security Presentation.pptx
MuhsinaMohammedAli2
 
PPTX
corporateethics11111111111111111111.pptx
hali086
 
PPTX
chapter 6 Ethics and Professionalism of ET.pptx
AmanuelZewdie4
 
PPTX
chapter_six_ethics and proffesionalism_new-1.pptx
KelemAlebachew
 
PPTX
why ethics computer ethics 10 commandments.pptx
jennyJey2
 
PPTX
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
AnnMarieTAquinoII
 
Ethics assignment.docx
BestMan28
 
Computer ethics cyber security and technology of it
sr24production
 
computer and society impact of Computer in society
Sumama Shakir
 
E commerce
DrSelvamohanaK
 
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Dr. Khaled Bakro
 
Cyber Law and Cyber Crime
Syangba132
 
Nfwordle
Nadine Fray
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
Fizaril Amzari Omar
 
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
The internet of things..perspectives for the Nigerian legal system
Simon Aderinlola
 
Policies and Law in IT
Anushka Perera
 
chapter 6 ethics emerging technology.pptx
ArebuMaruf
 
Corporate ethics
Melvin DCruz
 
Aqua Blue Illustrative What is Cyber Security Presentation.pptx
MuhsinaMohammedAli2
 
corporateethics11111111111111111111.pptx
hali086
 
chapter 6 Ethics and Professionalism of ET.pptx
AmanuelZewdie4
 
chapter_six_ethics and proffesionalism_new-1.pptx
KelemAlebachew
 
why ethics computer ethics 10 commandments.pptx
jennyJey2
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
AnnMarieTAquinoII
 
Ad

More from Mukesh Tekwani (20)

PDF
The Elphinstonian 1988-College Building Centenary Number (2).pdf
Mukesh Tekwani
 
PPSX
Circular motion
Mukesh Tekwani
 
PPSX
Gravitation
Mukesh Tekwani
 
PDF
ISCE-Class 12-Question Bank - Electrostatics - Physics
Mukesh Tekwani
 
PPTX
Hexadecimal to binary conversion
Mukesh Tekwani
 
PPTX
Hexadecimal to decimal conversion
Mukesh Tekwani
 
PPTX
Hexadecimal to octal conversion
Mukesh Tekwani
 
PPTX
Gray code to binary conversion
Mukesh Tekwani
 
PPTX
What is Gray Code?
Mukesh Tekwani
 
PPSX
Decimal to Binary conversion
Mukesh Tekwani
 
PDF
Video Lectures for IGCSE Physics 2020-21
Mukesh Tekwani
 
PDF
Refraction and dispersion of light through a prism
Mukesh Tekwani
 
PDF
Refraction of light at a plane surface
Mukesh Tekwani
 
PDF
Spherical mirrors
Mukesh Tekwani
 
PDF
Atom, origin of spectra Bohr's theory of hydrogen atom
Mukesh Tekwani
 
PDF
Refraction of light at spherical surfaces of lenses
Mukesh Tekwani
 
PDF
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
Mukesh Tekwani
 
PPSX
Social media
Mukesh Tekwani
 
PPSX
TCP-IP Reference Model
Mukesh Tekwani
 
The Elphinstonian 1988-College Building Centenary Number (2).pdf
Mukesh Tekwani
 
Circular motion
Mukesh Tekwani
 
Gravitation
Mukesh Tekwani
 
ISCE-Class 12-Question Bank - Electrostatics - Physics
Mukesh Tekwani
 
Hexadecimal to binary conversion
Mukesh Tekwani
 
Hexadecimal to decimal conversion
Mukesh Tekwani
 
Hexadecimal to octal conversion
Mukesh Tekwani
 
Gray code to binary conversion
Mukesh Tekwani
 
What is Gray Code?
Mukesh Tekwani
 
Decimal to Binary conversion
Mukesh Tekwani
 
Video Lectures for IGCSE Physics 2020-21
Mukesh Tekwani
 
Refraction and dispersion of light through a prism
Mukesh Tekwani
 
Refraction of light at a plane surface
Mukesh Tekwani
 
Spherical mirrors
Mukesh Tekwani
 
Atom, origin of spectra Bohr's theory of hydrogen atom
Mukesh Tekwani
 
Refraction of light at spherical surfaces of lenses
Mukesh Tekwani
 
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
Mukesh Tekwani
 
Social media
Mukesh Tekwani
 
TCP-IP Reference Model
Mukesh Tekwani
 

Recently uploaded (20)

PPTX
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
PPT
1965 INDO PAK WAR which Pak will never forget.ppt
sanjaychief112
 
PDF
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PPT
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
PPT
Transformaciones de las funciones elementales.ppt
rirosel211
 
PPTX
Generics jehfkhkshfhskjghkshhhhlshluhueheuhuhhlhkhk.pptx
yashpavasiya892
 
PDF
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
PPTX
How tech helps people in the modern era.
upadhyayaryan154
 
PPTX
LESSON-2-Roles-of-ICT-in-Teaching-for-learning_123922 (1).pptx
renavieramopiquero
 
PPTX
Pengenalan perangkat Jaringan komputer pada teknik jaringan komputer dan tele...
Prayudha3
 
PPTX
dns domain name system history work.pptx
MUHAMMADKAVISHSHABAN
 
PPTX
Slides Powerpoint: Eco Economic Epochs.pptx
Steven McGee
 
PPTX
办理方法西班牙假毕业证蒙德拉贡大学成绩单MULetter文凭样本
xxxihn4u
 
PDF
Project English Paja Jara Alejandro.jpdf
AlejandroAlonsoPajaJ
 
PPTX
EthicalHack{aksdladlsfsamnookfmnakoasjd}.pptx
dagarabull
 
PDF
Latest Scam Shocking the USA in 2025.pdf
onlinescamreport4
 
PPTX
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
PDF
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC
 
PPTX
谢尔丹学院毕业证购买|Sheridan文凭不见了怎么办谢尔丹学院成绩单
mookxk3
 
PPTX
Different Generation Of Computers .pptx
divcoder9507
 
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
1965 INDO PAK WAR which Pak will never forget.ppt
sanjaychief112
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
Transformaciones de las funciones elementales.ppt
rirosel211
 
Generics jehfkhkshfhskjghkshhhhlshluhueheuhuhhlhkhk.pptx
yashpavasiya892
 
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
How tech helps people in the modern era.
upadhyayaryan154
 
LESSON-2-Roles-of-ICT-in-Teaching-for-learning_123922 (1).pptx
renavieramopiquero
 
Pengenalan perangkat Jaringan komputer pada teknik jaringan komputer dan tele...
Prayudha3
 
dns domain name system history work.pptx
MUHAMMADKAVISHSHABAN
 
Slides Powerpoint: Eco Economic Epochs.pptx
Steven McGee
 
办理方法西班牙假毕业证蒙德拉贡大学成绩单MULetter文凭样本
xxxihn4u
 
Project English Paja Jara Alejandro.jpdf
AlejandroAlonsoPajaJ
 
EthicalHack{aksdladlsfsamnookfmnakoasjd}.pptx
dagarabull
 
Latest Scam Shocking the USA in 2025.pdf
onlinescamreport4
 
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC
 
谢尔丹学院毕业证购买|Sheridan文凭不见了怎么办谢尔丹学院成绩单
mookxk3
 
Different Generation Of Computers .pptx
divcoder9507
 

Cyber Laws

  • 2. 2 What is Cyber Law? 1. Cyber law – all legal and regulatory aspects of the Internet. 2. Cyber space - governed by a system of laws and regulations called cyber law. 3. Why is cyber law needed? Millions of people around the world use Internet for business, banking, social interactions, and Internet is misused for criminal activities. Hence the need for laws
  • 3. 3 Cyber Security Law – What you can do 1. In case you become a victim of cyber crime, what can you do? 2. Preserve the relevant incriminating electronic evidence. 3. Legal liability can be: a) Civil liability b) Criminal liability 4. Even if you are the victim, you still have a legal liability. The law expects you to have the duty of due diligence. 5. If you are the victim, you must report the breach to the relevant statutory authorities 6. Example – getting email from a bank with a bank statement/invoice meant for someone else
  • 4. 4 Cyber Security Law – Challenges 1. The person committing cybercrime may not be located in your country and so legal remedies could be difficult. 2. Anyone sitting in one country could target the network of a company or a govt in another country. 3. There is no international legal law for such matters. So jurisdiction is going to pay a very important role in tackling cybercrime.
  • 5. 5 International Cyber Law 1. There are no international cyber laws. 2. Every country has its own cyber laws – only for its citizens. 3. What happens if a cyber crime is committed on country X from country Y ? 4. Some countries have come up with bilateral agreements with other countries – but no international laws in place 5. July 2015 – Germany came up with cyber laws – laws to protect critical infrastructure only. Equipment, plants that are important for running the country. 6. June 2017 – China’s cyber security law – very broad – personal information also covered
  • 6. 6 What should companies do? 1. Inform customers of the breach 2. Tell customers what to do in this case 3. Examples – 1. Yahoo password leaks. 2. British Airways credit card and other info leak
  • 7. 7 Copyright 1. Copyright is an intellectual property right attached to original works – e.g., books, movies, music, logo,… 2. Copyright is a protection provided by law to authors of original works. This includes literature, films, music, paintings, etc 3. Copyright laws apply to published and unpublished work. 4. Copyright law helps to determine authorship, duration of protection and laws for transfering rights to others
  • 8. 8 Security 1. Security is an organisational concern. 2. Every business needs safeguards that protect computer systems and data from damage or unlawful use. 3. Protect systems from hackers 4. Protect data from unlawful use.
  • 9. 9 Controls 1. What are controls? These are policies, procedures, rules, techniques designed to prevent errors in data and systems. 2. Examples are : a. access privileges – who, what, when b. Data validation – numeric data for DOB, no numeric for name, etc c. Input authorizations, view rights, edit rights
  • 10. 10 Privacy 1. Security is an organisational concern 2. Privacy is an individual concern. 3. People need assurance that their personal information such as employment, financial records, medical records, employment history will not be misused. 4. You must ensure that you don’t reveal your personal / private information to others. 5. Info such as – bank details, date of birth, medical history, employment records, educational records…..
  • 11. 11 Software Piracy 1. It is the unauthorized copying and distribution of copyrighted software 2. How is it done ? – Downloading, copying, sharing, selling copies of original software 3. Software license – how many copies can be installed. If you install more than the specified number of copies, it is piracy 4. Sharing login credentials used to access a web-based software application – e.g. one person pays for an online service and many use that service by sharing password.
  • 12. 12 Code of Ethics 1. Ethics => Ethics is a branch of philosophy. Ethics defines what is good and bad, what is right and wrong, obligations. 2. All software professionals (programmers, systems admins,…) have the responsibility to provide certain quality or work and assure control, privacy and security in their services and products. 3. What does a code of ethics do? It gives these norms and principles. Code of ethics sets standards. 4. Code of ethics sets commitments, requirements and responsibilities for members of an organization.
  • 13. 13 Code of Ethics for Computer Professionals 1. Fair Treatment – treat everyone fairly. No discrimination on grounds of age, gender, post, etc 2. Access private info only when it is extremely necessary for your official duties, after taking permissions from concerned authorities. 3. Don’t use confidential information for your personal gain.
  • 14. 14 Code of Ethics for Computer Professionals 4. Maintain the privacy of users and professionals. 5. Maintain good communication with users – inform users of which resources can be shared, legal obligations, etc. 6. Maintain good system integrity – regularly perform maintenance of hardware and software, check network and Internet availability. Analyze system performance (download speeds, bootup times for computers, etc) 7. Prevent unauthorized access to systems and resources (applications, printers, data, …)
  • 15. 15 Code of Ethics for Computer Professionals 8. Maintain healthy cooperation. ‘We’, not ‘I’. 9. Support your colleagues – cooperate with other colleagues. Learn from them if you don’t know something. Train them if they need help in learning 10. Acknowledge the responsibility of the team – the community. 11. Be honest – honesty is the best policy. Take help of seniors if it is necessary, to perform your duties efficiently. 12. Update yourself with latest technology, software, systems practices. If necessary, go for training, self-study.
  • 16. 16 Code of Ethics for Computer Professionals 13. Update yourself on social ad legal issues relating to computing. Share with others whatever new you have learnt. Encourage others to adopt changes in policies – this is social responsibility 14. If you make mistakes, admit them and correct them. Don’t try to blame others for your mistakes. Maintain professionalism while performing your duties. 15. Remove any wrong data about individuals.
  • 17. 17 Do’s for Computer Professionals 1. Use the Internet to enhance your knowledge. Take courses from sites such as Udacity, Udemy, Coursera, MIT, etc 2. When communicating with strangers, don’t share your personal data. Personal data = family, financial, job, health 3. Respect privacy of others 4. Avoid political discussions with strangers 5. Use antivirus software to protect your computer systems 6. Download software from reliable sites only
  • 18. 18 Don’ts for Computer Professionals 1. Don’t share your passwords and usernames with others 2. Don’t arrange to meet unknown persons whom you met on Internet 3. Don’t use unauthorized or pirated software 4. Don’t break / hack into computers. It’s a crime. 5. Don’t answer any improper messages 6. Don’t fall prey to lottery, cashback, loan schemes. 7. Don’t fall into traps of friendship from strangers.
  • 19. 19 Cyber Insurance 1. A cyber insurance policy protects you from cyber breaches. 2. All gadgets are covered under these policies – laptops, computers, mobile phones, .. 3. Some companies that offer Cyber Security Insurance are: HDFC (Cyber Security) and Bajaj Allianz (Individual Cyber Safe Insurance Policy)
  • 20. 20 Cyber Insurance 1. A cyber insurance policy protects you from cyber breaches. 2. All gadgets are covered under these policies – laptops, computers, mobile phones, .. 3. Some companies that offer Cyber Security Insurance are: HDFC (Cyber Security) and Bajaj Allianz (Individual Cyber Safe Insurance Policy)
  • 21. 21 Cyber Insurance Cyber Insurance covers the following: i. A financial loss resulting from being a victim of email spoofing and phishing ii. Fraudulent online transactions in bank account, debit/credit card or e- wallet iii. Reputational liability, including claims alleging defamation and invasion of privacy iv. Losses and expenses related to defence and prosecution cost related to identity theft v. Restoration cost to retrieve data or computer program damaged by entry of the malware vi. Cyber extortion loss
  • 22. THANK YOU Prof Mukesh N Tekwani [email protected] November 9, 2019