0% found this document useful (0 votes)
3 views15 pages

Cs Project

The document discusses various issues related to society, law, and ethics in the context of information technology, highlighting problems such as plagiarism, cybercrime, and privacy concerns. It emphasizes the importance of intellectual property rights and digital rights management, as well as the role of privacy laws and the Information Technology Act, 2000 in safeguarding individual rights. The interplay of society, law, and ethics is presented as essential for governance, justice, and social progress.

Uploaded by

randomid.2506
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views15 pages

Cs Project

The document discusses various issues related to society, law, and ethics in the context of information technology, highlighting problems such as plagiarism, cybercrime, and privacy concerns. It emphasizes the importance of intellectual property rights and digital rights management, as well as the role of privacy laws and the Information Technology Act, 2000 in safeguarding individual rights. The interplay of society, law, and ethics is presented as essential for governance, justice, and social progress.

Uploaded by

randomid.2506
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

PRESENTATION

TITLE

Society law
and ethics
INTRODUCTION 2
ISSUES RELATED 3

TO CYBER ETHICS

THERE ARE MANY ADVANTAGES OF LIVING IN AN IT WORLD BUT ON


CONTRARY, THERE ARE MANY PROBLEMS WHICH OUR SOCIETY IS
FACING TODAY. THE CRIMES LIKE ABDUCTION, FRAUD ETC., HAVE
INCREASED LEAPS AND BOUNDS. HENCE, THERE ARE SO MANY ETHICAL
ISSUES AS FAR AS IT IS CONCERNED.

SOME OF THEM ARE AS FOLLOWS:


1. Plagiarism
2. Intellectual Property Rights (IPR)
3. cybercrime
4. Privacy
5. Digital Right Management
➢ PLAGIARISM 4

PLAGIARISM IS AN ACT OF COPYING ANOTHER PERSON’S IDEA,


WORDS OR WORK AND PRETEND THAT THEY ARE OUR OWN. THE
INTENTIONS BEHIND PLAGIARISM COULD BE MALICIOUS OR IT
COULD BE DONE ACCIDENTLY LIKE COPYING DATA FROM OTHER’S
COMPUTER WITHOUT HIS/HER PERMISSION AND REDISTRIBUTING
FURTHER.
▪ PLAGIARISM CAN BE CLASSIFIED AS
ACCIDENTAL/UNINTENTIONAL OR
DELIBERATE/INTENTIONAL.

• Unintentional • Intentional
unintentional/accidental Intentional plagiarism includes
plagiarism involves careless copying someone else's work, cutting
paraphrasing (changing the words and pasting blocks of text or any kind
of media (audio, video files or movie
or sentence construction of a
clips) from electronic sources without
copied document), quoting text documenting and at the same time
excessively along with poor publishing it on the web without the
documentation. permission of developers/creators
HOW TO AVOID PLAGARISM?

(i) To avoid plagiarism, instead of copying the language of the


book as it is, try to put it in your own language/words.

(ii)One should have a clear understanding of plagiarism and its


consequences, so that no one can perform it unintentionally.

(iii) If copying someone else’s work in our task, word for word,
then do not forget enclosing it in quotes and also mention its
source.
(iv) Another way is to credit the author has write which was
use full for your task and not taking credit for it yourself.
Advantages of using licensed
software
LICENSING
Software Licensing is the legal right to run or the 1. By using licensed software, you
are able to contribute to the
privilege given to you by a company to access their
further development of the
application (or program). program you are using. It also
helps the economy generate not
just computer-related p jobs, but
opportunities for other
people/businesses whose work is
much dependent on "written"
technology
2. Apart from the legal obligation
to use licensed software, it comes
with outright support not found
in "pirated software.
➢CYBERCRIME:-Cybercrime is defined as a crime in which a computer is the bject of the crime7
(hacking, phishing, spamming) or is used as tool to commit an offence (child pornography, hate
crimes).
criminals can also use computer for communication and document or data storage . Criminal who
performs these illegal activities are often reffered as hackers

PHISHING ILLEGAL DOWNLOADING CHILD PORNOGRAPHY


• Child pornography is publishing
• Phishing is an attempt to • Illegal downloading is and transmitting obscene
acquire sensitive obtaining files that you material about children in
electronic form. In recent years,
information such as don't have the right to use
child pornography has increased
usernames, passwords and from the internet. Illegal due to easy access to the internet
credit card details (and downloading is the root and easily available videos on
sometimes, indirectly, cause of digital piracy. the internet. Child pornography
money) by masquerading as is the most heinous crime which
a trustworthy entity in an moccurs and has led to various
electronic communication other crimes such as sex tourism,
sexual abuse of the child, etc
Presentation title 8

UNIQUE ID AND
BIOMETRIC
Biometrics is the science and technology of measuring and analyzing
biological data Biometrics refers to technologies that measure and
analyze human body characteristics such as DNA, fingerprints, eye
retinas and irises, voice patterns, facial patterns and hand
measurements for authentication purposes. It provides the most
accurate and unique method of identification.

Aadhaar Card is the best available combination of unique IDs and


biometric system as it provides unique identification and
authentication through identification number along with thumb
impressions and iris patterns.
➢ PRIVACY AND There are several threats to a user’s
privacy on the internet , which are as
PRIVACY follows :
1. User tracking
LAWS 2. Illegal and harmful content
3. Online social networking

To provide protection from these online privacy threats ,


privacy laws were made which prohibit disclosure or misuse
of information about private individual.

Privacy laws refer to laws that deal with regulating st using


personally identifiable Information of individuals, which can
be collected by governments, public or private organizations
or other individuals.
Presentation title 10

THE INFORMATION TECHNOLOGY


ACT,200
• The IT Act, 2000 has provisions that permit the interception, monitoring and decryptions of digital
communications. It provides for collection and monitoring of traffic data. It allows the government to set a
national encryption standard. Projects like the Central Monitoring System, S. C NATGRID, Phone & Internet
Interception used by police are some crucial measures taken up by the Government of India for safeguarding
privacy laws.
• Section 43A, which deals with implementation of reasonable security practices for sensitive personal data or
information and provides for compensation to a person aks affected by wrongful loss or wrongful gain.
• Section 72A, which provides for imprisonment for a period of up to 3 years and/or a fine of up to 5,00,000 to
a person who causes wrongful loss or wrongful gain by disclosing personal information about another person
while providing services under the terms of lawful contract.
➢ INTELLECTUAL
PROPERTY RIGHTS(IPR)

Intellectual property refers to creation of the intellect; inventions, literary and artistic works , symbols ,
names, images and designs used in commerce are part of it.
IP is usually divided into two branches namely industrial properties which, broadly speaking , protects
invention and copyright, literary and artistic works.

(a)Industrial property:- which includes invention , trademarks , industrial design , commercial names ,
designations and geographic indication.

(b) Copyright :- it includes literary and artistic works such as novels, poems and plays, films, musical
works, artistic works such as drawings, painting,photographs and sculptures and architectural designs.

Copyrights are automatically granted to creators and authors. Copyrights law gives the copyright holder a
set of rights that they alone can avail legally. It prevents others from copying, using or selling the work. To
use other’s copyrighted material, one needs to obtain a license from them.
➢ DIGITAL RIGHTS
MANAGEMENT
Digital Rights Management (DRM) is a term for access
control technologies that are used by hardware manufacturers,
publishers, copyright holders and individuals to limit the use of
digital content and devices. The term is used to describe any
technology that inhibits the use of digital content that is not
desired or intended by the content provider.

DRM technologies have enabled publishers to enforce access


policies that not only disallow daily copyright infringements but
also prevent lawful, fair use of copyrighted works, or even
impose purch restrictions on non-copyrighted works that they
distribute
Presentation title 13

SUMMARY
Society forms the foundation of shared norms and values,
while law provides the framework for regulating behavior
and resolving disputes. Ethics, rooted in moral principles,
guides individual and collective conduct. Together, they
shape governance, justice, and societal progress, navigating
complex dilemmas and adapting to changing contexts. Their
interplay reflects cultural dynamics and evolving values,
influencing social cohesion and individual responsibility in
diverse communities
Presentation title
SUBMITTED BY- 14

• PRIYANSHI • SACHIN

• SIDHARTH • ARMAN
• SUMBITTED TO
MR.DEVINDER SIR

• SUMBITTED ON
13th Feb,2024
THANK YOU

You might also like