Legal and Ethical Issues For Entrepreneurs
Student Worksheet
In this Individual Activity, you will research the following legal and ethical terms and create the
table below in MS WORD with the results of your research in the explanation column. You need
about 2-3 points for each term.
Go to Page Layout, then choose orientation and then change it to LANDSCAPE. You will have
more room to write your explanations of the terms.
TERM EXPLANATION
Software Piracy Software piracy is the illegal use and or distribution of copyrighted computer software.
Pharming A malicious program is installed on the computer during a phishing attack, which aims
to divert traffic from one legitimate website to a fake one.
Cookie Cookies store specific information on websites that a person visits. So if you don’t
have an account on a particular website then cookies are used to see how many times
you've visited the site and what to recommend.
Computer Virus A computer virus is a form of malware that accompanies another program (such as a
document) and has the ability to multiply and propagate after it has been launched on a
machine.
Copyright Copyright is a legal concept that grants the creators of original works of authorship,
such as literary, artistic, musical, and other creative works, the exclusive right to
control and profit from their creations.
Hacker Someone who uses their knowledge and skills in computer programming and
technology to gain unauthorized access to computer systems and networks, with the
goal of illegal or unethical activities.
Encryption The process of converting data or information into a coded or unreadable form, so that
it can be securely transmitted or stored and can only be read or accessed by authorized
individuals who have the necessary key or password to decrypt the data.
Spam Spam is wanted messages that often include scams or malware and they are sent in
bunches making it harder to find what you are looking for.
Online Fraud Cybercrime in which an individual or organization uses the internet and digital
technology to deceive and defraud people of their money, personal information, or
other valuable assets.
Intellectual Property The creations of the mind, such as inventions, literary and artistic works, designs,
symbols, names, and images that are used in commerce. Intellectual property can be
protected by legal rights, such as patents, trademarks, copyrights, and trade secrets.
Spyware Type of malicious software that is designed to spy on a computer user's activities and
collect information without their knowledge or consent.
Cyberbullying The use of digital technology, such as the internet and social media, to harass,
intimidate, or harm another person.
Phishing Phishing is what is described as a way to trick people into giving out sensitive data to
an illegitimate site through a master of deception.
Online Identity Theft Type of cybercrime in which an individual's personal information is stolen and used to
commit fraud or other criminal activities.
Email Spoofing Email spoofing is a type of cyberattack in which an attacker impersonates a legitimate
email sender by altering the "From" field of an email message to make it seem like the
email came from a different address than it actually did.
Social Networking Refers to the use of internet-based platforms or applications that allow individuals to
connect and communicate with each other, share information, and build relationships.
Blogs An online journal or informational website that displays content with the most recent
post appearing first. Blogs can cover a wide range of topics, such as personal
experiences, news, politics, entertainment, technology, or business.