SlideShare a Scribd company logo
Cyber Law and Ethics
Using Social Media
PRESENTED BY : MUHAMMD KHUBAIB AWAN
Introduction
 Social media has become an integral part of our daily lives, transforming the way
we communicate, share information, and connect with others.
 In this digital age, it is essential to recognize the impact and influence of social
media on individuals, communities, and societies.
 This presentation aims to explore the legal and ethical dimensions of using social
media, emphasizing the need to navigate the digital landscape responsibly.
SOCIAL MEDIA
What is cyber law
 Cyber law is the body of law that deals with the use of technology,
particularly the Internet.
Cyber Law Cover
• Cybercrime
• Intellectual
property
• Privacy
• Data security
Cyber Crime
 Cybercrime is any criminal activity that involves the use of a computer or
the Internet.
EXAMPLES
Hacking
Identity theft
Phishing
Cyberbullying
Intellectual Property
 Intellectual property (IP) is a form of property that protects the creations of
the human mind, such as:
 Inventions
 Literary works
 Music
 Artwork
Intellectual Property
Copyright
 Copyright is a form of IP that protects original works of authorship, such as:
 Books
 Movies
 Songs
 Software
Copyright
Fair Use
 Fair use is a doctrine that allows the use of copyrighted material without
the permission of the copyright holder under certain circumstances, such
as:
 Criticism
 Comment
 News reporting
 Teaching
Fair Use
What is Privacy
 Privacy is the right to be free from unreasonable intrusion into one's
personal life.
 Social media can pose a threat to privacy, as our personal information is
often shared online.
Privacy
What is data Security
 Data security is the process of protecting data from unauthorized access,
use, disclosure, disruption, modification, or destruction.
 Social media companies are responsible for protecting the data of their
users.
Data Security
Ethics of Social Media Use
 There are a number of ethical considerations related to social media use,
such as:
 Respect for others
 Honesty
 Responsibility
Ethics of Social Media Use
Cyberbullying is the use of electronic
communication to bully a person,
typically by sending messages of an
intimidating or threatening nature.
What is Cyberbullying
Hate speech is speech that attacks a
person or group on the basis of attributes
such as race, religion, sexual orientation,
or gender.
Hate Speech
Misinformation and disinformation
 Misinformation is false or inaccurate information that is spread without
malicious intent.
 Disinformation is false or inaccurate information that is spread intentionally
to deceive.
Social Media Addiction
 What is social media addiction
 Social media addiction is an excessive use of social media that interferes
with a person's daily life.
Social Media Addiction
Digital Footprint
 A digital footprint is the trail of data that a person leaves behind online,
such as their social media posts, search history, and online purchases.
Tips for Ethical Social Media Use
 Be respectful of others.
 Be honest.
 Think before you post.
 Be mindful of your privacy settings.
 Use social media in moderation.
Tips for Ethical Social Media Use
Conclusion
 Social media is a powerful tool that can be used for good or evil.
 By understanding the cyber laws and ethics of using social media, we can
make responsible and ethical choices about how we use it.
THANK YOU

More Related Content

What's hot

Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
Jubayer Alam Shoikat
 
Computer Network & Types
Computer Network & TypesComputer Network & Types
Computer Network & Types
Shefa Idrees
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cyber security
Cyber securityCyber security
Cyber security
Sapna Patil
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
Santosh Delwar
 
Basic components of a computer network
Basic components of a computer  networkBasic components of a computer  network
Basic components of a computer network
Edison Francis
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
muhammad-Sulaiman
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
charvill
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
Aasim Mushtaq
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
kieshore
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Ramki M
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
Abdullah Khosa
 
Advantages and Disadvantages of internet
Advantages and Disadvantages of internetAdvantages and Disadvantages of internet
Advantages and Disadvantages of internet
Leomar Bondoc
 
DATA COMMUNICATION PPT
DATA COMMUNICATION PPTDATA COMMUNICATION PPT
DATA COMMUNICATION PPT
Majane Padua
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
shashi kiran
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 

What's hot (20)

Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
 
Computer Network & Types
Computer Network & TypesComputer Network & Types
Computer Network & Types
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
Basic components of a computer network
Basic components of a computer  networkBasic components of a computer  network
Basic components of a computer network
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Network security
Network security Network security
Network security
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Advantages and Disadvantages of internet
Advantages and Disadvantages of internetAdvantages and Disadvantages of internet
Advantages and Disadvantages of internet
 
DATA COMMUNICATION PPT
DATA COMMUNICATION PPTDATA COMMUNICATION PPT
DATA COMMUNICATION PPT
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to cyber law and ethics uisng social media .pdf

Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
SheejamolMathew
 
The Basics of Media and Information Literacy.pptx
The Basics of Media and Information Literacy.pptxThe Basics of Media and Information Literacy.pptx
The Basics of Media and Information Literacy.pptx
AngeloAdajar
 
3.-Ethical-and-Social-Issues-In-ICT.pptx
3.-Ethical-and-Social-Issues-In-ICT.pptx3.-Ethical-and-Social-Issues-In-ICT.pptx
3.-Ethical-and-Social-Issues-In-ICT.pptx
PurnaBahadurRana1
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
Shekh Md Mehedi Hasan
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
OxfordRiNorth
 
digital media and society.pptx
digital media and society.pptxdigital media and society.pptx
digital media and society.pptx
catherinviscom
 
ETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital EmpowermentETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital Empowerment
nellykelly1663
 
Lesson1.pptx
Lesson1.pptxLesson1.pptx
Lesson1.pptx
JULIETADIWATA1
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
RoshanMaharjan13
 
Social media, Technology, and Youth
Social media, Technology, and YouthSocial media, Technology, and Youth
Social media, Technology, and Youth
Khadija Parween
 
Cyberspace
CyberspaceCyberspace
Cyberspace
Utchi
 
Share Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxShare Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptx
eyesred813
 
Ethics
EthicsEthics
Ethics
EthicsEthics
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenship
monazarrinkelk
 
cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...
cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...
cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...
PiyushSharma12895
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theories
nincher
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theories
matarid
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey92
 

Similar to cyber law and ethics uisng social media .pdf (20)

Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
The Basics of Media and Information Literacy.pptx
The Basics of Media and Information Literacy.pptxThe Basics of Media and Information Literacy.pptx
The Basics of Media and Information Literacy.pptx
 
3.-Ethical-and-Social-Issues-In-ICT.pptx
3.-Ethical-and-Social-Issues-In-ICT.pptx3.-Ethical-and-Social-Issues-In-ICT.pptx
3.-Ethical-and-Social-Issues-In-ICT.pptx
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
digital media and society.pptx
digital media and society.pptxdigital media and society.pptx
digital media and society.pptx
 
ETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital EmpowermentETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital Empowerment
 
Lesson1.pptx
Lesson1.pptxLesson1.pptx
Lesson1.pptx
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Social media, Technology, and Youth
Social media, Technology, and YouthSocial media, Technology, and Youth
Social media, Technology, and Youth
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Share Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxShare Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptx
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenship
 
cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...
cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...
cyberbullying-understanding-the-risks-and-developing-strategies-for-preventio...
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theories
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theories
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 

Recently uploaded

INSET Powerpoint Presentation Science Session 5.pptx.pdf
INSET Powerpoint Presentation Science Session 5.pptx.pdfINSET Powerpoint Presentation Science Session 5.pptx.pdf
INSET Powerpoint Presentation Science Session 5.pptx.pdf
MishaWilliams2
 
How Can Microsoft Office 365 Improve Your Productivity?
How Can Microsoft Office 365 Improve Your Productivity?How Can Microsoft Office 365 Improve Your Productivity?
How Can Microsoft Office 365 Improve Your Productivity?
Digital Host
 
Epidemiology of viral hepatitis infection .pptx
Epidemiology of  viral hepatitis infection .pptxEpidemiology of  viral hepatitis infection .pptx
Epidemiology of viral hepatitis infection .pptx
ArunaDevi561806
 
prestige-tranquil details of house and rooms
prestige-tranquil details of house and roomsprestige-tranquil details of house and rooms
prestige-tranquil details of house and rooms
Madhavi443720
 
PSP3 employability assessment form .docx
PSP3 employability assessment form .docxPSP3 employability assessment form .docx
PSP3 employability assessment form .docx
blessfkombo
 
THE SOCIAL STEM- #1 TRUSTED DIGITAL MARKETING COMPANY
THE SOCIAL STEM- #1 TRUSTED  DIGITAL MARKETING COMPANYTHE SOCIAL STEM- #1 TRUSTED  DIGITAL MARKETING COMPANY
THE SOCIAL STEM- #1 TRUSTED DIGITAL MARKETING COMPANY
thesocialstem05
 
Introduction To Disaster Recovery IT Services
Introduction To Disaster Recovery IT ServicesIntroduction To Disaster Recovery IT Services
Introduction To Disaster Recovery IT Services
Skywardit Solutions
 
The Money Wave 2024 Review: Is It the Key to Financial Success?
The Money Wave 2024 Review: Is It the Key to Financial Success?The Money Wave 2024 Review: Is It the Key to Financial Success?
The Money Wave 2024 Review: Is It the Key to Financial Success?
nirahealhty
 
The Money Wave 2024 Review_ Is It the Key to Financial Success.pdf
The Money Wave 2024 Review_ Is It the Key to Financial Success.pdfThe Money Wave 2024 Review_ Is It the Key to Financial Success.pdf
The Money Wave 2024 Review_ Is It the Key to Financial Success.pdf
nirahealhty
 
Module 16 Incineration of Healthcare Waste and the Stockholm Convention Guide...
Module 16 Incineration of Healthcare Waste and the Stockholm Convention Guide...Module 16 Incineration of Healthcare Waste and the Stockholm Convention Guide...
Module 16 Incineration of Healthcare Waste and the Stockholm Convention Guide...
Beshoelwy
 
Presentación1InteligenciaArtificial.pptx
Presentación1InteligenciaArtificial.pptxPresentación1InteligenciaArtificial.pptx
Presentación1InteligenciaArtificial.pptx
estudiomontesdeocape
 
Pros and Cons of Investing in Stock Market ETFs.docx
Pros and Cons of Investing in Stock Market ETFs.docxPros and Cons of Investing in Stock Market ETFs.docx
Pros and Cons of Investing in Stock Market ETFs.docx
SFC Today
 
netflix-inspired intro for your latest presentation
netflix-inspired intro for your latest presentationnetflix-inspired intro for your latest presentation
netflix-inspired intro for your latest presentation
ArunRamkumar5
 
The Ultimate Guide to Web Hosting Reviews in 2024.pdf
The Ultimate Guide to Web Hosting Reviews in 2024.pdfThe Ultimate Guide to Web Hosting Reviews in 2024.pdf
The Ultimate Guide to Web Hosting Reviews in 2024.pdf
Hosting Mastery Hub
 
ADEGUNADEGUNADEGUNADEGUNADEGUNADEGUNADEGUN.pdf
ADEGUNADEGUNADEGUNADEGUNADEGUNADEGUNADEGUN.pdfADEGUNADEGUNADEGUNADEGUNADEGUNADEGUNADEGUN.pdf
ADEGUNADEGUNADEGUNADEGUNADEGUNADEGUNADEGUN.pdf
ifraghaffar125
 
DataVinci-Google Analytics-Consulting-Services
DataVinci-Google Analytics-Consulting-ServicesDataVinci-Google Analytics-Consulting-Services
DataVinci-Google Analytics-Consulting-Services
Data Vinci
 
Network Security Firewall(Basics of Firewall)
Network Security Firewall(Basics of Firewall)Network Security Firewall(Basics of Firewall)
Network Security Firewall(Basics of Firewall)
sivaraman163206
 

Recently uploaded (17)

INSET Powerpoint Presentation Science Session 5.pptx.pdf
INSET Powerpoint Presentation Science Session 5.pptx.pdfINSET Powerpoint Presentation Science Session 5.pptx.pdf
INSET Powerpoint Presentation Science Session 5.pptx.pdf
 
How Can Microsoft Office 365 Improve Your Productivity?
How Can Microsoft Office 365 Improve Your Productivity?How Can Microsoft Office 365 Improve Your Productivity?
How Can Microsoft Office 365 Improve Your Productivity?
 
Epidemiology of viral hepatitis infection .pptx
Epidemiology of  viral hepatitis infection .pptxEpidemiology of  viral hepatitis infection .pptx
Epidemiology of viral hepatitis infection .pptx
 
prestige-tranquil details of house and rooms
prestige-tranquil details of house and roomsprestige-tranquil details of house and rooms
prestige-tranquil details of house and rooms
 
PSP3 employability assessment form .docx
PSP3 employability assessment form .docxPSP3 employability assessment form .docx
PSP3 employability assessment form .docx
 
THE SOCIAL STEM- #1 TRUSTED DIGITAL MARKETING COMPANY
THE SOCIAL STEM- #1 TRUSTED  DIGITAL MARKETING COMPANYTHE SOCIAL STEM- #1 TRUSTED  DIGITAL MARKETING COMPANY
THE SOCIAL STEM- #1 TRUSTED DIGITAL MARKETING COMPANY
 
Introduction To Disaster Recovery IT Services
Introduction To Disaster Recovery IT ServicesIntroduction To Disaster Recovery IT Services
Introduction To Disaster Recovery IT Services
 
The Money Wave 2024 Review: Is It the Key to Financial Success?
The Money Wave 2024 Review: Is It the Key to Financial Success?The Money Wave 2024 Review: Is It the Key to Financial Success?
The Money Wave 2024 Review: Is It the Key to Financial Success?
 
The Money Wave 2024 Review_ Is It the Key to Financial Success.pdf
The Money Wave 2024 Review_ Is It the Key to Financial Success.pdfThe Money Wave 2024 Review_ Is It the Key to Financial Success.pdf
The Money Wave 2024 Review_ Is It the Key to Financial Success.pdf
 
Module 16 Incineration of Healthcare Waste and the Stockholm Convention Guide...
Module 16 Incineration of Healthcare Waste and the Stockholm Convention Guide...Module 16 Incineration of Healthcare Waste and the Stockholm Convention Guide...
Module 16 Incineration of Healthcare Waste and the Stockholm Convention Guide...
 
Presentación1InteligenciaArtificial.pptx
Presentación1InteligenciaArtificial.pptxPresentación1InteligenciaArtificial.pptx
Presentación1InteligenciaArtificial.pptx
 
Pros and Cons of Investing in Stock Market ETFs.docx
Pros and Cons of Investing in Stock Market ETFs.docxPros and Cons of Investing in Stock Market ETFs.docx
Pros and Cons of Investing in Stock Market ETFs.docx
 
netflix-inspired intro for your latest presentation
netflix-inspired intro for your latest presentationnetflix-inspired intro for your latest presentation
netflix-inspired intro for your latest presentation
 
The Ultimate Guide to Web Hosting Reviews in 2024.pdf
The Ultimate Guide to Web Hosting Reviews in 2024.pdfThe Ultimate Guide to Web Hosting Reviews in 2024.pdf
The Ultimate Guide to Web Hosting Reviews in 2024.pdf
 
ADEGUNADEGUNADEGUNADEGUNADEGUNADEGUNADEGUN.pdf
ADEGUNADEGUNADEGUNADEGUNADEGUNADEGUNADEGUN.pdfADEGUNADEGUNADEGUNADEGUNADEGUNADEGUNADEGUN.pdf
ADEGUNADEGUNADEGUNADEGUNADEGUNADEGUNADEGUN.pdf
 
DataVinci-Google Analytics-Consulting-Services
DataVinci-Google Analytics-Consulting-ServicesDataVinci-Google Analytics-Consulting-Services
DataVinci-Google Analytics-Consulting-Services
 
Network Security Firewall(Basics of Firewall)
Network Security Firewall(Basics of Firewall)Network Security Firewall(Basics of Firewall)
Network Security Firewall(Basics of Firewall)
 

cyber law and ethics uisng social media .pdf

  • 1. Cyber Law and Ethics Using Social Media PRESENTED BY : MUHAMMD KHUBAIB AWAN
  • 2. Introduction  Social media has become an integral part of our daily lives, transforming the way we communicate, share information, and connect with others.  In this digital age, it is essential to recognize the impact and influence of social media on individuals, communities, and societies.  This presentation aims to explore the legal and ethical dimensions of using social media, emphasizing the need to navigate the digital landscape responsibly.
  • 4. What is cyber law  Cyber law is the body of law that deals with the use of technology, particularly the Internet.
  • 5. Cyber Law Cover • Cybercrime • Intellectual property • Privacy • Data security
  • 6. Cyber Crime  Cybercrime is any criminal activity that involves the use of a computer or the Internet.
  • 8. Intellectual Property  Intellectual property (IP) is a form of property that protects the creations of the human mind, such as:  Inventions  Literary works  Music  Artwork
  • 10. Copyright  Copyright is a form of IP that protects original works of authorship, such as:  Books  Movies  Songs  Software
  • 12. Fair Use  Fair use is a doctrine that allows the use of copyrighted material without the permission of the copyright holder under certain circumstances, such as:  Criticism  Comment  News reporting  Teaching
  • 14. What is Privacy  Privacy is the right to be free from unreasonable intrusion into one's personal life.  Social media can pose a threat to privacy, as our personal information is often shared online.
  • 16. What is data Security  Data security is the process of protecting data from unauthorized access, use, disclosure, disruption, modification, or destruction.  Social media companies are responsible for protecting the data of their users.
  • 18. Ethics of Social Media Use  There are a number of ethical considerations related to social media use, such as:  Respect for others  Honesty  Responsibility
  • 19. Ethics of Social Media Use
  • 20. Cyberbullying is the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. What is Cyberbullying
  • 21. Hate speech is speech that attacks a person or group on the basis of attributes such as race, religion, sexual orientation, or gender. Hate Speech
  • 22. Misinformation and disinformation  Misinformation is false or inaccurate information that is spread without malicious intent.  Disinformation is false or inaccurate information that is spread intentionally to deceive.
  • 23. Social Media Addiction  What is social media addiction  Social media addiction is an excessive use of social media that interferes with a person's daily life.
  • 25. Digital Footprint  A digital footprint is the trail of data that a person leaves behind online, such as their social media posts, search history, and online purchases.
  • 26. Tips for Ethical Social Media Use  Be respectful of others.  Be honest.  Think before you post.  Be mindful of your privacy settings.  Use social media in moderation.
  • 27. Tips for Ethical Social Media Use
  • 28. Conclusion  Social media is a powerful tool that can be used for good or evil.  By understanding the cyber laws and ethics of using social media, we can make responsible and ethical choices about how we use it.