0% found this document useful (0 votes)
44 views3 pages

Veree Pwoli Sano Ahn Law Okke Ind

This document discusses various topics related to IT law, ethics, and society including intellectual property, plagiarism, digital rights management, licensing, open source software, privacy laws, cybercrime, e-waste management, and issues of gender and disability related to computer use. Some key points discussed are the definition of intellectual property, how to avoid plagiarism, what digital rights management is used for, common types of cybercrime like phishing and hacking, and the importance of properly disposing of e-waste. Gender and disability issues associated with computers include fewer female role models and restricted access contributing to lower computer use among women and social isolation impacting academic success for those with disabilities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views3 pages

Veree Pwoli Sano Ahn Law Okke Ind

This document discusses various topics related to IT law, ethics, and society including intellectual property, plagiarism, digital rights management, licensing, open source software, privacy laws, cybercrime, e-waste management, and issues of gender and disability related to computer use. Some key points discussed are the definition of intellectual property, how to avoid plagiarism, what digital rights management is used for, common types of cybercrime like phishing and hacking, and the importance of properly disposing of e-waste. Gender and disability issues associated with computers include fewer female role models and restricted access contributing to lower computer use among women and social isolation impacting academic success for those with disabilities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

S l E

17.1 Introduction
ociety , aw and thics

IT plays a central role in commerce, industry, government , education, entertainment and society at large. But, like any
other technology , IT also has problematic implications and some negative impacts on society. It poses and creates
problems related to ethics and , in general contains three main types of ethical issues:
 Personal privacy
 Access right
 Harmful actions
17.2 Intellectual property rights
Intellectual property refers to creations of the intellect used in commerce i.e. inventions, literary and artistic works,
symbols , names, images and designs
It is usually divided into two branches.
1. INDUSTRIAL PROPERTY: which includes patents, trademarks, industrial designs, commercial names, designations
and geographic indications.
2. COPYRIGHT: which includes
a. Literary And Artistic Works such as novels, poems and plays, films , musical works
b. Artistic Works such as drawing ,paintings, photographs, sculptures and architectural designs
17.3 Plagiarism
It is stealing someone else’s intellectual work and representing it as your own work without citing the sources of
information.
Act of plagiarism involves lying, cheating, theft and dishonesty.
Plagiarism can be classified as
1. Accidental/ Unintentional
2. Deliberate/ Intentional
How to avoid plagiarism
1. Use your own words and ideas.
2. Always provides reference or give credit to the source from where you have received your information.

17.4 Digital Right Management


It is a term for access control technologies that are used by hardware manufacturers, publishers, copyright holders and
individuals to limit the use of digital content and devices.DRM is most commonly used by the entertainment industry,
online music stores, e-book publishers. DRM provides a better mechanism to safeguard the data.
17.5 Licensing
Software Licensing is the legal right to run or the privilege given to you by a company to access their application(or
program).

17.6 Open Source And Open Data


Open source software is a software which provides us the freedom to work , use , distribute and modify the source code.
Open data is all stored data which could be made accessible in public interest without any restriction on its usageand
distribution.
Features of open data
 Availability and access
 Reuse and redistribution
 Universal Participation
17.7 Privacy Laws
Privacy refers to the ability to control what information one reveals about oneself over the internet and to control who
can access that information. There are several threats to a users privacy on the internet , which are as follows:
1. User tracking done through
a. Internet Service Providers
b. Cookies
c. Data logging
d. Spyware programs
e. Web bug
f. Social engineering
g. Phishing
h. Malicious proxy server
i. Search engines
2. Illegal and harmful content
3. Online social networkings
“Privacy laws refers to laws that deals with regulating , storing and using personality identifiable information of
individuals, which can be collected by governments, public or private organizations or other individuals.”
The information technology act , 2000 has two sections relating to privacy:
Section 43A and section 72A
17.8 CyberCrime:
Cybercrime is defined as a crime in which a computer is the object of crime(hacking, phishing, spamming, hate crimes,
fraud). Common types of cybercrime are
1. Online bank information theft
2. Identity theft
3. Unauthorized computer access
4. Viruses and denial –of-computer(DoS) attacks
17.8.1 Phishing is an attempt to acquire sensitive information like usernames, passwords, and credit card
details. Phishing is typically carried out by email spoofing.
The protective measures to be followed against Phishing includes
1. Never open or download a file from an unsolicited email
2. Keep operating system updated
3. Use reputable antivirous program
4. Enable two –factor authentication whenever available
5. Look for HTTPS.
17.8.2 ILLEGAL DOWNLOADING IS obtaining files that you don’t have right to use from the internet.
Such as games, music, movies software etc.
17.8.3 CYBER SCAMS AND FRAUDS the term ‘ Internet fraud’ generally referes to
1. debit/credit card fraud 2. Non delivery of goods 3.online auction fraud
17.8.4 CYBER FORENSICS IT IS AN electronic discovery technique used to determine and reveal
technical criminal evidence. The various capabilities of cyber forensics are :
Recover deleted files, recover web pages, recover chat logs, discover documents hidden history, recover phone
details etc.
12.9 E-WASTE MANAGEMENTS
Eco friendly waste disposable technique :
1. Give your electronic waste to a certified e-waste recycler.
2. Sell off your outdated technology
3. Donating your outdated technology
12.10 Gender issues while teaching and using computers
Studies have shown that in many countries computer use in schools is dominated by men. Female teachers have less
regards for their own skills and knowledge than their male counterparts.
Female know less about information technology, enjoy using computer less than male students, and perceive more
problems with software.
Causes
1. Differences in parental support
2. Restricted access to computers
3. Fewer female role models and a casual approach towards computer activities in school.
Disability issues while teaching and using computers
Social isolation has a negative effect on personal as well as academic and career success.
Assignments no. 1
1. What do you understand by “privacy of data”?
2. If someone hacks your website, who would you complain to?
3. What is the importance of cyber law?
4. Write two application of cyber law.
5. List three points of network security components.
6. Name the crime for which cyber laws are enforced strictly in India.
7. Explain phishing.
8. What is meant by the term cyber forensics?
9. List some of the risks that internet users face.
10. What if I have already responded to a phishing email and fear I may be victim of identity theft?
11. How can we prevent identity thefts?
12. What are the different ways in which authentication of a person can be performed?
13. What do you mean by cyber security?
14. What do you understand by the term “open data”?
15. What are the different types of cyber crime?
16. What security measures should be taken against phishing attacks?
17. How is digital piracy related to illegal downloads?
18. Explain the term “web beacons”.
19. Explain gender and disability issues while teaching and using computer.
20. What are the possible causes that contribute to gender and disability issues?
21. What factors contribute to low success rates among people with disabilities in various professions?
22. Describe some common forms of student plagiarism.
23. What do you understand by biometric authentication?
24. Describe measures to recycle your e-waste safely.
Assignment no. 2
a) Which of the following is not an intellectual property?
(i) A poem written by a poet
(ii) An original painting made by a painter
(iii) Trademark of a Company
(iv) A remixed song
b) Jhilmalini has stolen a credit card. She used that credit card to purchase a laptop. What type of offence has
she committed?
c) Name the primary law in India dealing with cybercrime and electronic commerce.
d) Sutapa received an email from her bank stating that there is a problem with her account. The email provides
instructions and a link, by clicking on which she can logon to her account and fix the problem. Help Sutapa by
telling her the precautions she should take when she receives these type of emails.
e) Explain any two ways in which technology can help students with disabilities.
f) Explain the role of online social media campaigns, crowdsourcing and smart mobs in society.
g)Ms Samtha has many electronics gadgets which are not usable due to outdated hardware and software. Help her
to find any three best ways to dispose the used electronic gadgets.
Assignment no. 3
(a)Identify the type of cyber crime for the following situations:
(i) A person complains that Rs. 4.25 lacs have been fraudulently stolen from his/her account
online via some online transactions in two days using NET BANKING.
(ii) A person complaints that his/her debit/credit card is safe with him still some body has done
shopping/ATM transaction on this card.
(iii) A person complaints that somebody has created a fake profile on Facebook and defaming his/her
character with abusive comments and pictures.
(b) As a citizen of india , What advise you should give to others for e-waste disposal?
(c) What can be done to reduce the risk of identity theft? Write any two ways.
(d) Ravi received a mail form IRS department ( as shown above). On clicking “ Click- Here” ,he was
taken to a site designed to imitate an official-looking website, such as IRS.gov. He uploaded some
important information on it. Identify and explain the cybercrime being discussed in the above
scenario.
(e) Differentiate between open source and open data.
(f) Enumerate any two disability issues while teaching and using computers.

You might also like