This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Public computers are accessed by many different users. Many websites are setup with a login name and password submission prior to access to the website. If a person does not log off correctly the next user of the computer can access all of your personal information. Utilizing your neighbors wireless Internet signal is illegal without their prior permission. To access any wireless Internet signal without the owners approval is piracy. Stealing in any form is not only illegal, it is also unethical. The reason is the original owner of the Internet signal paid for the usage of the Internet with the understanding that it was for their own use, not the use of others who are able to access it from other areas. All the situations may have different expectations for Internet privacy, yet the insurance of privacy in one way or another is always expected when accessing the Internet no matter where you are. INTERNET PRIVACY 3...
View Full Document
This note was uploaded on 11/27/2011 for the course MAT 117 MAT 117 taught by Professor Rabano during the Spring '09 term at University of Phoenix.
- Spring '09