Society - Law and Ethics (SLE-2) (15 Theory)
Society - Law and Ethics (SLE-2) (15 Theory)
Society - Law and Ethics (SLE-2) (15 Theory)
32
distinguishes products or services of a particular trader from similar products or services of
other traders
58
❖ trade secrets. A trade secret is a formula, practice, process, design, instrument, pattern, or
compilation of information which is not generally known or reasonably ascertainable, by which
36
a business can obtain an economic advantage over competitors and customers (Coca Cola).
Advantage : investments in intellectual goods suffer from problems of appropriation:
49
(i.e. a producer of information or literature can usually do very little to stop their
first buyer from replicating it and selling it at a lower price )
96
unlimited number of people can "consume"
Dis. Advt. :
intellectual property presents difficulties when compared with traditional property like
land or goods
A
RW
intellectual property is "indivisible
PLAGIARISM: is the "wrongful appropriation" and "stealing and publication" of another author's
KA
DIGITAL PROPERTY RIGHTS are those human rights and legal rights that allow individuals to
access, use, create, and publish digital media or to access and use computers, other electronic devices,
M.
Types of Software
BY
●
● is a non-free computer software
● copyright of the source code
AR
● rights to study,
● change, and distribute the software to anyone
● Right to Redistribute
freedom to run, study, share, and modify the software)
Examples of free software license / open-source licenses
Apache License,
BSD license,
GNU General Public License,
GNU Lesser General Public License,
MIT License, Eclipse Public License Mozilla Public License. Creative
Commons Creative Commons (CC) is an American non-profit organization
Data Privacy : Information privacy is the relationship between the collection and dissemination
of data, technology, the public expectation of privacy, legal and political issues surrounding them. It is
also known as data privacy[2] or data protection
Privacy laws : Privacy law refers to the laws that deal with the regulation, storing, and using
of personally identifiable information of individuals, which can be collected bygovernments, public or
private organisations, or other individuals.
32
Online fraud : Internet fraud is a type of fraud which makes use of the Internet and could involve
hiding of information or providing incorrect information for the purpose of tricking victims out of
58
money, property, and inheritance.
● Charity fraud
36
● Gambling fraud
● Online gift card fraud
49
CYBERCRIME- a crime that involves a computer and a network. The computer may have been used
96
in the commission of a crime, or it may be the target.[
Examples
o Phishing is the fraudulent attempt to obtain sensitive information such as usernames,
A
passwords and credit card details by disguising one-self as a trust worthy entity in an electronic
RW
communication
o Illegal downloading is obtaining files that you don't have the right to use from the internet.
o Digital piracy involves illegally sharing copyrighted media such as games, music, movies, TV
KA
o scams :
M.
o Identity Theft. : also known as identity fraud, is a crime in which an imposter obtains key
pieces of personally identifiable information, such as Social Security or driver's license numbers,
in order to impersonate someone else
BY
o Transaction Fraud. A fraudulent transaction is one unauthorized by the credit card holder.
Such transactions are categorized as lost, stolen, not received, issued on a fraudulent
o Hacking.: the gaining of unauthorized access to data in a system or computer
ED
o Crackng The term “cracking” means trying to get into computer systems in order to steal,
corrupt, or illegitimately view data..
AR
o Software Piracy: illegally copying software that does not belong to you in a manner that violates the
copyright. A example of software piracy is when you download a copy of Microsoft Word from a file-sharing
EP
CYBER FORENSICS, : Computer forensics is the application of investigation and analysis techniques
to gather and preserve evidence from a particular computing device in a way that is suitable for
presentation in a court of law.
Computer Forensics : Lab experts forensically analyse all types of data stored in computer hard
drives, USB memory sticks, cloud spaces, social media, cameras and mobile phones to find relevant
digital evidence
is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law
in India dealing with cybercrime and electronic commerce .
INFORMATION TECHNOLOGY ACT, 2008 (AMENDMENT) :
Child pornography is any kind of representation of sexually explicit or obscene images of a
minor under 18 years old.
32
● Online Grooming
● Cyberbullying
58
● Cyber-suicide
● Internet addiction
36
● Online scams
● Electronic Gambling
49
E-WASTE MANAGEMENT:
96
Electronic waste or e-waste describes discarded electrical or electronic devices. Used electronics
A
which are destined for refurbishment, reuse, resale, salvage recycling through material recovery, or
RW
disposal are also considered e-waste.
● Land Filling
● Recycling of e-waste. ...
L.
Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of
personally identifiable information, such as Social Security or driver's license numbers, in order to
EP
● Data Breaches
● •Internet Hacking
● •Malware Activity
● •Credit Card Theft
● •Mail Theft
● •Phishing and Spam Attacks
● •Wi-Fi Hacking
● •Mobile Phone Theft
● •ATM Skimmers
Protection of Identity Theft : UNIQUE IDS, : Aadhar, Voter-ID Card , and biometrics.
● Biometrics is the science of analysing physical or behavioural characteristics specific to each
individual in order to be able to authenticate their identity.
GENDER AND DISABILITY ISSUES WHILE TEACHING AND USING COMPUTERS.
Gender Issues
● Preconceived notions–Notions like“boys are better at technical and girls are good at
humanities
● Lack of interest
● Lack of motivation
● Not girl friendly work culture
● Lack of encouragement in class
32
● Race, Class, Gender, and Disability
DISABILITY ISSUES
58
● 1.Unavailability of teaching materials/aids
● 2.Lack of special needs teachers
36
● 3.Lack of supporting curriculum
POSSIBLE SOLUTION
49
● Enough teaching aids must be prepared for specially abled students
● Must employ special needs teachers
● Curriculum should be designed with students with specially abled students in
96
mind.
● Computermultimedia
M.
● Socialnetworking
● Videogames
● •Blogs
BY
● Interactive
● Easily Sharable
EP
32
● Step5-Tracking and Monitoring campaign/ads
Disadvantages/ limitations of online campaign
58
● Customers Ignore Ads
● Viewing Problems
36
● Expensive Ad Prices
● Consumers Get Distracted
49
● Too Many Options
● Face-to-Face Contact is Limited
A 96
RW
KA
L.
M.
BY
ED
AR
EP
PR