Society , Law & Ethics

 Unit III : Society , Law & Ethics


Digital Footprint
  • A digital footprint is data that is left behind when users have been online. There are two types of digital footprints which are active and passive.
  • An active digital footprint is where the user has deliberately shared information about themselves either by using social media sites or by using websites.
  • A passive digital footprint is made when information is collected from the user without the person knowing this is happening.

Examples of active Digital Footprints

  •  Posting on Instagram, Facebook, Instagram, Twitter, and other social media platforms
  •  Filling out online forms, i.e. when signing up to receive emails or texts
  •  Agreeing to install cookies on our devices when prompted by the browser

Examples of passive Digital Footprints

  • Websites that install cookies in our device without disclosing it to us
  • Apps and websites that use geolocation to pinpoint our location
  • Social media news channels and advertisers that use our likes, shares, and comments to profile us and to serve up advertisements based on our interests
How digital footprint is being used for marketing purposes

Digital footprints are also known as cyber shadow, electronic footprint, or digital shadow are generally collected with the help of tracking cookies. these cookies are created while using popular sites. Whatever we search is stored in these along with our dates, GPS relevant data. These are shared by actual site we are visiting to the popular sites.
Popular sites in turn analyze these data and revert back in the form of advertise later on.
we should care about managing our digital footprint by following ways:

1. To protect our reputation
2. To make safe personal information
3. To prevent financial loss
4. To preserve our freedom  

Risk due to digital footprint

  • Privacy concern
  • Scam
  • Identity theft
How to manage digital footprints
  • Enter name into several search engines
  • Double-check privacy settings, but don't trust them
  • Create strong, memorable passwords
  • Keep all our software up to date.
  • Review our mobile use. Delete useless files (temp.)
  • Build reputation through behavior.

Net or communication etiquettes

Netiquette is short for "Internet etiquette” or communication etiquettes over internet. It is Just like etiquette - a code of polite behavior in society, netiquette is a code of good behavior on the Internet. It includes several aspects of the Internet, social media, email, online chat, web forums, website comments, multiplayer gaming, and other types of online communication.

Social Media Etiquettes:
  • Avoid over-automation.
  • Be authentic and genuine.
  • Don’t be overly promotional.
  • Handle your hashtags carefully.
  • Don’t bad-mouth your competition
Data protection

 It refers to the practices, safeguards, and binding rules put in place to protect our personal information and ensure that it remain in control. In short, we should be able to decide whether or not we want to share some information, who has access to it, for how long, for what reason, and be able to modify some of this information, and more.

Consequences of Unprotected Data/Data breaches:

  • Suffer from security breach/attack
  • Physical data loss
  • Hit with a virus
  • Targeted by hackers
  • Suffer from DDoS(Distributed denial of service)
  • Lose of money
  • Intellectual property at risk
  • Damage downtime

How we can protect our personal data online
  • Through Encrypt our Data
  • Keep Passwords Private
  • Don't overshare on Social Networking Sites
  • Use Security Software
  • Avoid Phishing Emails
  • Be Wise About Wi-Fi
  • Be Alert to Impersonators
  • Safely Dispose of Personal Information

Intellectual Property Right (IPR 

Intellectual Property (IP) – This is a property created by a person or group of persons using their own intellect for ultimate use in commerce and which is already not available in the public domain.

Examples of IP Property which are, an invention relating to a product or any process, a new design, a literary or artistic work and a trademark (a word, a symbol and / or a logo etc.)

Intellectual Property Right (IPR) is the statutory right granted by the Government, to the owner(s) of the intellectual property or applicant(s) of an intellectual property (IP) to exclude others from exploiting the IP commercially for a given period of time, in lieu of the discloser of his/her IP in an IPR application.

Kinds of IPRs
  • Patent (to protect technologies - The Patent Act)
  • Trade Mark (to protect words, signs, logos, labels –The Trade Mark Act)
  • Design (to protect outer ornamental configuration –The Designs Act)
  • Geographical Indications (GI) (to protect region specific product –The Geographical Indications of Goods Act)
  • Copyright (to protect literary and artistic work –The Copyright Act)

Plagiarism

Plagiarism pronounced as   plei ·juh·ri·zm

Plagiarism is “the act of presenting the words, ideas, images, sounds, or the creative expression of others as it is your creation or your own.” The word plagiarism is derived from the Latin word plagiare, which means to kidnap or abduct.

Why is it important to understand Plagiarism?
  • Plagiarism is stealing of intellectual property
  • Plagiarism is cheating
  • Plagiarism is an Academic offence
  • Plagiarism is Academic theft!
How to avoid plagiarism
  • Use your own ideas
  • Cite the sources-When someone else's ideas are used, always acknowledge the sources and tell your reader WHERE THE IDEAS ARE FROM.
  • Rewrite other's ideas in your own words 
  • Take careful notes
  • Develop your writing skills
Licensing and Copyright

A software license is a document that provides legally binding guidelines to the person who holds it for the use and distribution of software.

Difference between Licensing and Copyright

Copyright is a type of intellectual property protection and licensing is a kind of risk control measure that can be applied to control copyright loss exposure, so the licensor (copyright owner) can grant permission that usually takes the form of a licensing agreement to use its copyrighted material. This agreement specifies the exact material to be used, purposes the work could be used for and the duration of the license.

Free and Open-Source software (FOSS)

FOSS is a kind of software that all allows users to not only freely run the program for any purpose, but also provides users access to its source code. Moreover, it also allows us to modify as we wish, as well as freely distribute copies of the original version or their altered version.

Following criteria must be met for FOSS
  • Source code must be included.
  • Anyone must be allowed to modify the source code.
  • Modified versions can be redistributed.
  • The license must not require the exclusion of other

Types of Software based on use:

Free Software – Free Software are those which are freely accessible, freely accessible, freely used, changed, improved, copied and distributed. It provides all types of freedom. The term ‘Free’ means ‘Freedom’ at very little or No cost. The Source Code is also available with Free Software.

Open-Source Software: Open-Source Software can be freely used, changed, improved, copied and Re-distributed but it may have some cost for the media and support for further development. Source Code is also available with OSS. It can be modified and redistributed with some guidelines. The License may restrict source-code from being distributed and modification to maintain the Author’s integrity. A software which is FREE as well as OPEN, called Free & pen Source Software (FOSS) or Free Libre & Open Source Software (FLOSS).


Types of Software based on use:

  • Proprietary Software: These Software are neither open nor freely available. They must have some cost and Source code is also not given since it is property of the developer organization. No change, copy and distribution are allowed.
  • Freeware: These are available free of cost. They can be used, copied, distributed but no modification is allowed because Source Code is not available.
  • Shareware: These software are freely used, copied and distributed for a certain period of time. After expiry, you have to purchase or uninstall them. Modification is not possible due to non-availability of the source code. These are the Demo version and freely distributed for trial.
  • Adware is a type of malicious software that displays unwanted advertisements on your device, often in the form of pop-ups or banners.

Cyber Crime

Any crime that involves a computer and a network is called a “Computer Crime” or “Cyber Crime or in other term, it is a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes).


STEPS TO PROTECT YOURSELF AGAINST CYBER CRIME

1. Make sure your security software is current – and update it regularly.
2. Lock or log off your computer when you step away.
3. Go offline when you don’t need an internet connection.
4. Consider sharing less online.
5. Think twice about using public Wi-Fi.
6. When in doubt, don’t click.

Hacking

Hacking is the process of gaining unauthorized access into a computing device, or group of computer systems. This is done through cracking of passwords and codes which gives access to the systems.

Difference between hacker and cracker is that a cracker breaks the security of computer systems, and a hacker is a person who likes to explore computer systems and master them.


Types of Hackers

Black hat hackers or crackers are individuals with extraordinary computing skills, resorting to malicious / destructive activities. Black hat hackers use their knowledge and skill for their own personal gains probably by hurting others.

White hat hackers are those individuals who use their hacking skills for defensive purposes. This means that the white hat hackers use their knowledge and skill for the good of others and for the common good. Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal.

Grey-Hat Hackers These are individuals who work both offensively and defensively at different times. Their behavior can’t be predicted. Sometimes they use their skills for the common good.


Eavesdropping

It is the unauthorized real-time interception of a communication, such as a phone
call, instant message, video conference or fax transmission.

Phishing

Phishing is a cyber-attack that uses disguised email as a weapon. The attackers masquerade as a trusted entity of some kind, The goal is to trick the email recipient into believing that the message is something they want or need — recipient fills/send sensitive information like account no, username, password etc. ,then attacker use these.

Ransomware is a type of malware that prevents users from accessing their system or personal files and demands ransom payment.

Preventing cyber crime

Use strong password
Secure your computer
Protect your data
Secure your mobile devices
Secure wireless network

Introduction-Cyber Safety

Cyber safety is the safe and responsible use of Internet & ICT (Information & Communication Technology). Cyber safety is about to not only keeping information safe and secure, but also being responsible with that information, being respectful of other people online. As per Cyber safety people are advised to use good 'netiquette'.


Cyberbullying is the use of technology to harass, threaten or humiliate a target. Examples of cyberbullying is sending mean texts, posting false information about a person online, or sharing embarrassing photos or videos.


Different Types of Cyber Bullying

  • Doxing – publishing revealing personal information about an individual online, for purposes of defaming, humiliating, or harassing the victim
  • Harassment – posting threatening, hurtful, or intimidating messages online, or sending them directly to someone, with the intention of harming that person
  • Impersonation – creating fake accounts or gaining access to a person’s real social media accounts and posting things to damage the victim’s reputation.
  • Cyberstalking – tracking and monitoring a person’s online activity, and using the internet to stalk or harass an individual.
  • Cyber Trolling has become a more common term for any kind of purposeful online abuse on social media sites like Twitter or Facebook.

Computer Security Threats

  • Malware: Malware could be computer viruses, worms, Trojan horses, dishonest spyware, and malicious.
  • Computer virus: It is a small piece of software that can spread from one infected computer to another. It can corrupt, steal, or delete data on your computer/hard drive.
  • Trojan horse: can do anything from record your passwords by logging keystrokes (known as a keylogger) to hijacking your webcam to watch and record your every move.
  • Computer worm: A computer worm is a software program that can copy itself from one computer to another, without human interaction.
  • Spam: unwanted messages in your email inbox sent through computer generated program.
  • Phishing: Phishing are fraudulent attempts by cybercriminals to obtain private information. For e.g. a message prompt your personal information by pretending that bank/mail service provider is updating its website.
  • Spyware: spyware is used to spy on their victims. An e.g. is keylogger software that records a victim’s every keystroke on his or her keyboard.
  • Adware: unwanted ads shown while surfing internet.
  • Eavesdropping: is the act of intercepting communications between two points.

Indian -IT Act

Information technology act 2000/ITA-2000/IT act is an act of the Indian parliament notified on 17 oct 2000.

  • This primary law deals with cybercrimes and electronic commerce in India.
  • It consists of 94 sections that are divided into 13 chapters and 4 schedules
  • A person of others nationalities can also be indicated under the law if the crime involves a computer or network located in India, which means the law applies to the whole of India.
  • The IT Act,2000 has provisions that permits the interception, monitoring of traffic data
The cyber laws in India and the provision for legal action and punishment have been explained -


Section :   67A    
Offense :    Publishing images containing sexual acts 
Penalty :   Imprisonment up to seven years and/or fine up to 10 lakh

Section :    67B
Offence :   Publishing child porn or predating children online 
Penalty : imprisonment Up to five years and/or fine up to 10 lakh On 1st                          conviction.

Section :    67C
Offence :   Failure to maintain records
Penalty :    Imprisonment up to three years and/or fine up to 2 lakh

Section :   68
Offence :  Failure/refusal to comply with orders
Penalty :   Imprisonment up to seven years, and/or possible fine


Section :  69
Offence : Failure/refusal to decrypt data
Penalty : Imprisonment up to three years, and/or fine up to 1 lakh

Section : 70
Offence : Securing access or attempting to secure access to protected system
Penalty : Imprisonment up to ten years, and/or fine

Section : 71
Offence : Misrepresentation
Penalty : Imprisonment up to three years, and/or fine up to 1 lakh

IT Act, 2000 Amendment

  • A major amendment was made in 2008.
  • It introduced section 69, which gave authorities the power of “interception/monitoring/decryption” of any information through any computer resource.
  • It also introduced 66A which penalized sending of “offensive messages”.
  • Amendments also contained penalties for child pornography, cyber terrorism, and surveillance.
  • The act was passed in December 2008 and came into force in October 2009
Some key points of the Information Technology (IT) Act 2000 are as follows:

  • Act has given birth to new business to companies to issue digital certificates by becoming the Certifying Authorities.
  • This Act allows the government to issue notices on internet through e- governance.
  • E-mail is now considered as a valid and legal form of communication.
  • Digital signatures are given legal validity within the Act.
  • The communication between the companies or between the company and the government can be done through internet.
  • Addressing the issue of security is the most important feature of this Act. It introduced the construct of digital signatures that verifies the identity of an individual on internet.
  • In case of any harm or loss done to the company by criminals, the Act provides a remedy in the form of money to the company.
  E-Waste Management 

E-Waste -Whenever an electronic device covers up its working life, or becomes non-usable due to technological advancements or becomes non- functional, it is not used anymore and comes under the category of e-waste or electronic waste. As the technology is changing day by day, more and more electronic devices are becoming non-functional and turning into e-waste. Managing such non-functional electronic devices is termed as e-waste management.

E-waste Hazards -on environment

  • Acidification of soil
  • Air pollution
  • Pollution of ground water
  • Landfills with lead and heavy metals On Human Health
  • Lung cancer
  • DNA damage
  • Asthmatic bronchitis
  • Chronic damage to the brain

Proper Disposal of used Electronic Gadgets

E-waste is a growing problem for us in India. As an 132cr strong economy, we produce e- waste in large quantities. It is very important to dispose off waste in a pragmatic manner.

Ways to dispose off e-waste:
 
1. Give Back to Your Electronic Companies and Drop Off Points
2. Visit Civic Institutions
3. Donating Your Outdated Technology
4. Sell off Your Outdated Technology

Awareness about health concerns related to the use of Technology 

Today, computer technologies provide people with many benefits, educational activities can be designed, online shopping is available, it is possible to get in touch with people overseas and to chat with them. 
It is possible to search for anything and sometimes. 
It is even possible to do one’s job at home without going to his or her office.
If these technologies, which dominate our lives more each passing day, are not used carefully.
Then it is inevitable for people to end up with certain illnesses like-
1. Neck strain
2. Vision Problem
3. Sense of isolation
4. Sleeping disorder
5. Stress
6. Loss of attention
7. Problem in social relationships of individuals.
8. Computer anxiety
9. Internet addiction etc.


In order to avoid these problems-

  • One should learn how to use these technologies without experiencing any problem rather than avoiding using them.
  • Some of the users of computer technologies are not even aware of their health-related problems that they have.
  • Some of those who are aware of their illnesses see a doctor for various reasons. Users of computer technologies should immediately take education on the healthy use of these technologies. 
  • If the necessary precautions are not taken about this issue, individuals may have serious health problems, and the institutions may face a serious decrease in work force as well as financial losses.


**************

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.