QTS_Unit 5_Question 2

Things to avoid when using the internet and social networks

The use of the internet and social networks, of course, must comply with relevant laws, such as the Civil Code, the Law on Cybersecurity, etc. However, not all internet users and Social networks can also clearly identify where the violation limit is because there is a complexity of the problem or there are too many “fuzzy” points that make the violation not easy to see. Therefore, users of the internet and social networks must be really observant and have the necessary knowledge to ensure that they use cyberspace responsibly, do not violate the law and do not do. may affect the responsibilities of party members, responsibilities of civil servants, public employees, and the charters of organizations of which they are members.

Things to avoid when using the internet and social networks

Here are some suggestions for what to avoid.

First, note violations of the law on national security, social order and safety. This is a very broad group of acts related to the posting and distribution of information about the anti-state of the Socialist Republic of Vietnam, denying the ruling role of the Communist Party of Vietnam, offensive information to the public. leaders, leaders of the Party and State, abusing democratic freedoms and rights to infringe upon the interests of the State, the legitimate rights and interests of organizations and individuals… At first glance, many cadres and party members will say that they never violate those things, but in fact there is a lot of false information hidden in seemingly correct information, if the recipient is not careful, he will fall into a trap. It is easy to see that currently, on YouTube and many other websites, information is posted that reflects real events, events, and characters, but it contains false comments, fabricated details, etc., if Viewers do not distinguish carefully, but share and distribute, they accidentally abet the bad guys to spread information that violates the law.

Second, note violations of personal rights and reputation of individuals and organizations. This is the fact that people post information, pictures of other people, of the organization without their consent, intentionally or unintentionally. According to the civil law, personal rights include the right to have a full name; the right to identify ethnicity; the individual’s rights to the image; the right to ensure safety of life, health and body; the right to have dignity, honor and reputation protected; right to privacy, marriage, divorce; the right to a nationality; the right to freedom of belief and religion; the right to freedom of movement and residence; labor rights; creative freedom, the author’s right to the work; rights to industrial property objects… These rights are protected by law. For example: Ms. A. is a colleague of the same agency and knew that Ms. B. had divorced when Ms. B. reported to the branch, so she posted information expressing her sympathy and sympathy for her friend about this on Facebook. and tagged Ms. B. while Ms. B. did not want people to know that she was divorced due to concerns about psychological and emotional effects on her children; in this case, Ms. A. has violated the law unintentionally and without malicious motives. Similarly, posting pictures, houses, vehicles… of other people or personal information, information of organizations or businesses… without their consent is also illegal.

Third, note violations of the law related to intellectual property, property ownership, gambling… Intellectual property (sometimes considered intellectual property) is a creative product. human creations, such as literary works, music, computer software, inventions, inventions, utility solutions, industrial designs… Intellectual property is protected by law, so users should use it. Cyberspace, whether unintentionally or intentionally violated, is also a violation of the law. For example, after being lent by Mr. C. a draft of a movie script, Mr. D. publicly posted it on his personal blog to promote you without Mr. C’s consent, causing the content to the script is exploited by others; Mr. D.’s behavior is against the law. In addition, if cyber users arbitrarily share information about other people’s bank accounts, personal assets, websites containing illegal gambling advertising or online gambling organizations, the law … with any intention can also violate the law.

Fourth, note violations of information security in cyberspace. Using cyberspace today has many risks, such as cyber attacks, cyber terrorism, cyber espionage, cybercrime; causing malfunction, attack, intrusion, hijacking, falsification, interruption, disruption, paralysis or destruction of information systems; causing disruption to the operation of computer networks or telecommunications networks; being installed and distributed computer programs harmful to the operation of computer networks, telecommunications networks and electronic means; illegally infiltrated computer networks, telecommunications networks or electronic means… The users themselves, if they lack the necessary knowledge and skills, may unknowingly abet the above-mentioned acts. For example, a person receives an e-mail informing them that they have won a prize

+ There are no comments

Add yours