Cyber Ethics
Cyber Ethics
Cyber Ethics
VIII A
RIGHT TO PRIVACY
•Users should have the right to protect any information which they don’t want to
share openly. This is the right to privacy. Private information like user’s contact
details, address, security-related information like bank details, credit card/debit
card details, are all included in basic cyber ethics of user privacy and must not be
breached in any case.
•Any breach of privacy is theft/fraud of user identity and user personal information,
which is punishable as per the rules of law.
SOFTWARE PIRACY
Software piracy describes the act of illegally using, copying, or
distributing software without ownership or legal rights. The majority of software today is purchased as
a single-user license, meaning that only one computer may have that software installed on it at one
time. Copying that software to multiple computers, sharing it with your friend and selling it
commercially without multiple licenses is considered software piracy, which is illegal.
There are plenty of types of software piracy, some more well known than others, including:
•Counterfeiting
•End-user piracy
•Internet piracy
•Hard disk loading
•Client-server overuse
Counterfeiting