Societal Impact Notes
Societal Impact Notes
●DIGITAL FOOTPRINT
A digital footprint – refers to the trail of data you leave while using the internet.
It includes websites you visit, emails you send, and information you submit online.
A digital footprint can be used to track a person’s online activities and devices.
Internet users create their digital footprint either actively or passively.
A passive footprint is made when information is collected from the user without the person
knowing this is happening.
An active digital footprint is where the user has deliberately shared information about
themselves either by using social media sites or by using websites.
Digital footprint examples
Online shopping
Making purchases from e-commerce websites
Online banking
Using a mobile banking app
Social media
Using social media on your computer or devices
Sharing information, data, and photos with your connections
Subscribing to an online news source
NETIQUETTE
It is the abbreviation of Internet etiquette or network etiquette, refers to online manners while
using internet or working online.
While online you should be courteous, truthful and respectful of others. It includes proper
manners for sending e-mail, conversing online, and so on.
Some basic rules of netiquette are:
● Be respectful
● Think about who can see what you have shared.
● Read first, then ask
● Pay attention to grammar and punctuation
● Respect the privacy of others
● Do not give out personal information
DATA PROTECTION
Data protection is a set of strategies and processes you can use to secure the privacy, availability,
and integrity of your data.
It is sometimes also called data security or information privacy.
A data protection strategy is vital for any organization that collects, handles, or stores sensitive
data.
Data Privacy v/s Data Protection
For data privacy, users can often control how much of their data is shared and with whom.
For data protection, it is up to the companies handling data to ensure that it remains private.
Data privacy is focused on defining who has access to data while data protection focuses on
applying those restrictions.
How we can protect our personal data online
● Through Encrypt our Data
● Keep Passwords Private
● Don't Overshare on Social Networking Sites
● Use Security Software
● Avoid Phishing Emails
● Be Wise About Wi-Fi
● Be Alert to Impersonators
● Safely Dispose of Personal Information
INTELLECTUAL PROPERTY RIGHTS (IPR)
Intellectual Property (IP) – is a property created by a person or group of persons using their own
intellect for ultimate use in commerce and which is already not available in the public domain.
Examples of Intellectual Property :- an invention relating to a product or any process, a new
design, a literary or artistic work and a trademark (a word, a symbol and / or a logo, etc.)
Intellectual Property Right (IPR) is the statutory right granted by the Government, to the owner(s)
of the intellectual property or applicant(s) of an intellectual property (IP) to exclude others from
exploiting the IP commercially for a given period of time, in lieu of the discloser of his/her IP in an
IPR application.
Copyright laws protect intellectual property
Copyright It is a legal concept, enacted by most governments giving creator of original work
exclusive rights to it, usually for a limited period.
Copyright infringement – When someone uses a copyrighted material without permission, it is
called Copyright infringement.
Patent – A patent is a grant of exclusive right to the inventor by the government. Patent give the
holder a right to exclude others from making, selling, using or importing a particular product or
service, in exchange for full public disclosure of their invention.
Trademark – A Trademark is a word, phrase, symbol, sound, colour and/or design that
identifies and distinguishes the products from those of others.
PLAGIARISM
Plagiarism It is stealing someone’s intellectual work and representing it as your own work without
citing the source of information.
Any of the following acts would be termed as Plagiarism:
● Using some other author’s work without giving credit to the author
● Using someone else’s work in incorrect form than intended originally by the author or creator.
● Modifying /lifting someone’s production such as music composition etc. without attributing
it to the creator of the work.
● Giving incorrect source of information.
LICENSING AND COPYRIGHT
Licenses are the permissions given to use a product or someone’s creation by the copyright
holder.
Copyright is a legal term to describe the rights of the creator of an original creative work such as
a literary work, an artistic work, a design, song, movie or software etc.
FREE AND OPEN-SOURCE SOFTWARE (FOSS)
OSS refers to Open Source Software, which refers to software whose source code is available to
customers and it can be modified and redistributed without any limitation.
Free and open-source software (FOSS) is software that can be classified as both free software and open-
source software. That is, anyone is freely licensed to use, copy, study, and change the software in any
way, and the source code is openly shared so that people are encouraged to voluntarily improve the
design of the software.
Free Software Foundation (FSF), defines free software as a matter of liberty not price, and it upholds
the Four Essential Freedoms.
Four essential freedoms of Free Software
• • The freedom to run the program as you wish, for any purpose (freedom 0).
• • The freedom to study how the program works and change it so it does your computing as you
wish (freedom 1). Access to the source code is a precondition for this.
• • The freedom to redistribute copies so you can help others (freedom 2).
• • The freedom to distribute copies of your modified versions to others (freedom 3). By doing this
you can give the whole community a chance to benefit from your changes. Access to the source code is
a precondition for this.
CYBER CRIME
Any criminal or illegal activity through an electric channel or through any computer network is
considered as cyber crime.
Eg: Cyber harassment and stalking, distribution of child pornography,types of spoofing, credit card
fraud ,. Etc
Classification of Cyber Crime:
1. Cyber Terrorism:
Cyber terrorism is the use of the computer and internet to perform violent acts that result in loss of life.
2. Cyber Extortion:
Cyber extortion occurs when a website, e-mail server or computer system is
subjected to or threatened with repeated denial of service or other attacks by
malicious hackers.
4. Internet Fraud:
Internet fraud is a type of fraud or deceit which makes use of the Internet and could include hiding of
information or providing incorrect information for the purpose of deceiving victims for money or
property.
5. Cyber Stalking:
This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and
emails. In this case, these stalkers know their victims and instead of offline stalking, they use the
Internet to stalk.
Cracking:Cracking is when someone performs a security hack for criminal or malicious reasons.
Software cracking : Software cracking is when someone alters a piece of software to disable or
entirely remove one or more of its features.
Network cracking : Network cracking is when someone breaks through the security of a LAN,
or “local area network.”
PHISHING:
It is an unlawful activity where fake websites or emails appear as original or authentic .This sites
when clicked by the user will collect sensitive and personal details like usernames, password,
credit card details etc.
CYBER BULLYING:
It is the use of technology to harass , threaten or humiliate a target .
Example: sharing of embarrassing photos or videos, posting false information, sending mean
text., etc.
OVERVIEW OF INDIAN IT ACT:
The Government of India’s – Information Technology Act, 2000 (also known as IT Act) , amended
in 2008, provides guidelines to the user on the processing , storage and transmission of sensitive
information
E-waste - HAZARDS AND MANAGEMENT:
Various forms of electric and electronic equipment which no longer satisfy their original purpose
are termed as Ewaste. This includes Desktop, Laptop, Projectors, Mobiles,etc
● HAZARDS:It consists of mixtures of various hazardous organic and inorganic materials
which when mixed with water/soil may create threat to the environment.
● MANAGEMENT: Sell back, gift/donate, reuse the parts giveaway to a certified e-waste
recycler
ABOUT HEALTH CONCERNS RELATED TO THE USE OF TECHNOLOGY:
There are positive as well as negative impact on health due to the use of these technologies.
● POSITIVE IMPACT
▪ Various health apps and gadgets are available to monitor and alert
▪ Online medical records can be maintained
● NEGATIVE IMPACT
▪ One may come across various health issues like eye strain, muscle problems, sleep
issues,etc
▪ Anti social behaviour, isolation, emotional issues, etc.