Uploaded by JULIANA RAE CONTRERAS

Finals-Reviewer-Ethics

advertisement
Freedom of Expression
Digital Environment
Intellectual Property
Social Media
John Stuart Mill
1987 Constitution Article 3, Section 4
Libel
True
Immunity from Libel
Atty. Loreto C. Ata
Online/Cyber Libel
False
Freedom of Speech and of the Press
Defamation
False
True
False
Unit 5
According to George Reynolds in his book, "Ethics
in Information Technology" this refers to the right
of individuals to express their opinions, beliefs,
and ideas without fear of retaliation or
censorship
What are the scope of Freedom of Expression
He is the known as the father of Utilitarianism.
This states that no law shall be passed abridging
the freedom of speech, of expression, or of the
press, or the right of the people peaceably to
assemble and petition the government for
redress of grievances
It is a criminal offense that involves the
publication or public airing of false, malicious,
and defamatory statements about a person or
entity that can damage their reputation.
Opinions are not libelous but facts can be.
Refers to the legal protection granted to
individuals or any entities from being sued for
making defamatory statements
According to him, there are ten defenses in libel
suits
It is the use of the computer system or any other
electronic device where online communication
takes place
X liked and shared the video so he is liable for
cyber libel
This is one of the ten defenses in libel suits which
protects open debate of governmental concerns.
The act of harming a person's reputation through
the use of words and is broken into two
categories
When the defaming words are spoken, it is
considered as libel; if the words are written, this
is known as slander.
Unit 7
The growth of e-commerce has revolutionized
the way businesses and consumers interact,
making it easier to buy and sell goods and
services online
Text messages can never be considered evidence
True
Identity Theft
RA 8792 Electronic Commerce Act of 2000/ Ecommerce Law
False
Mass Media
Public Key Encryption
Digital Signature
Legal Tender
Banknotes, Coins, Checks, Electronic Funds,
Money Orders
False
Encryption
Nature of the problem
Level of care taken in building the software
Terms of any contracts or agreements
True
False
Secret Key Encryption
RA 8484 is the Access Devices Regulating Act of
1998
Not an effect of breach to a business
An act providing for the recognition and use of
electronic commercial and non-commercial
transactions, penalties for unlawful use thereof,
and other purposes
Business media and mass media are equivalent
Refers to traditional forms of media such as TV,
radio, newspaper, and magazines
An asymmetric encryption technique that uses
different keys for encryption and decryption,
allowing computers over the internet to securely
communicate with each other
An asymmetric cryptography that is used to
validate the authenticity of a digital document,
message, or software
Anything recognized by law as a means to settle
public or private debt or meet a financial
obligation, including tax payments, contracts, and
legal fines or damages
Types of Legal Tenders
You are responsible for any system error
It is a method by which information is converted
into a secret code that hides the information’s
true meaning
Factors that may be considered in determining
the extent of liability of computer programmers
You should contact your bank after losing your
card
You should not tell your bank when you lost your
card
What is known as symmetric encryption
Download