0% found this document useful (0 votes)
6 views9 pages

Soc Term1

The document discusses the concept of digital footprints, types of digital footprints, and their management, emphasizing the importance of responsible online behavior. It also covers data protection, intellectual property rights, and cyber crimes, detailing various types of violations and prevention measures. Additionally, it highlights the significance of cyber laws, including the Information Technology Act of 2000, and the role of software licensing and copyright in protecting digital content.

Uploaded by

rizafatin07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views9 pages

Soc Term1

The document discusses the concept of digital footprints, types of digital footprints, and their management, emphasizing the importance of responsible online behavior. It also covers data protection, intellectual property rights, and cyber crimes, detailing various types of violations and prevention measures. Additionally, it highlights the significance of cyber laws, including the Information Technology Act of 2000, and the role of software licensing and copyright in protecting digital content.

Uploaded by

rizafatin07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

M.E.

S INDIAN SCHOOL, DOHA- QATAR


Notes-2022- 2023

Section : GIRLS’ Date:16-5-22


Class &Div. : XII-O,P,Q Subject: IP

Lesson / Topic: SOCIETAL IMPACTS


xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Digital Footprint

• Digital footprint means collection of data or records generated after any activity
done by an individual on internet.
• Now a days Digital Footprint plays an important role in making an Individual’s reputation
• Everyone who is connected to internet has Digital Footprint
• Digital Footprints are permanent
• Digital Footprints are also called Digital tattoos.
Types of Digital Footprint

Active Digital Footprint : collection of data or records generated after any activity intentionally
done by an individual on internet. Exp-

• Sharing any information on Social Media sites


• Filling Online forms
• login to any type of account such as email, shopping id etc.
• sending and receiving mails
• accepting cookies knowingly
Passive Digital Footprint : Data or records are generated from individual without their
knowledge. Exp-

• Turning on Geo location


• cookies installed automatically without concern of user
• like or dislike any activity on social media sites
How to manage Digital Footprint

• Aware with your Digital Footprint


• Responsible E-behaviour
• Clean Digital Footprint
• Limited access of Information
• Careful Posting
• Double check Privacy Setting
• Delete unwanted internet files

F 061, Rev 01, dtd10th March 2020


Net and communication Etiquettes

“ Responsible, Safe, positive, legal and ethical use of Internet (digital technology) “

Do’s Dont’s

Respect other’s Privacy Do not violate copyright laws.

Respect other’s diversity Respond to Internet Trollers

Avoid Cyber Bullying Spamming

Careful while sharing information Share personal and sensitive information

Update credentials regularly practice unauthentic sites

Aware with digital footprint Use sarcasm

Digital Communication Etiquette

• Don’t respond to junk mails or spam.


• Avoid including large attachments
• Do not use abusive language during communication
• Avoid using sarcasm.
• Be careful and responsible while making any comment
• Do not connect with unknowns
• Keep accounts secured with strong password and update regularly

F 061, Rev 01, dtd10th March 2020


Data Protection

• Security and control on data stored digitally to avoid any inconvenience, harm, loss or
embarrassment
• Each country has its own data protection law to ensure right protection of data from any
changes or breach.
Protection measures of data

• Strong data encryption


• do not share sensitive and personal information
• check your data status regularly
• share information on social media carefully and responsibly and avoid oversharing
• ensure proper security measures for your system
• avoid opening unknown and unauthenticated mails
• avoid unexpected verification calls
• take data backups regularly
• take digital breaks occasionally

Intellectual Property Rights

• Intellectual property refers to the products developed by a person or organization by his


reasoning power or intelligence. For example, literary works, inventions, artwork, research,
software, information etc.
• Intellectual Property Rights stipulates that the creator has full rights over an intellectual
property and can protect it. He can decide how much intellectual property can be used and
he can take it financially if he wants.
• IPR also enables the creator or copyright owner to earn recognition or financial benefit by
using their creation or invention.
• Intellectual Property is legally protected through
• Copyrights
• Patents
• Trademarks

Types of IPR

Copyright

• It protects form of expression of Idea.


• It protects any original literary, artistic, dramatic, musical, creative work.
• Copyright lasts for 60 years.
• It is automatically granted to creator or authors.
Patent

• It protects functional expression of Idea.


• It protects inventions

F 061, Rev 01, dtd10th March 2020


• It is applied in Industries, Machines, Processes, manufactures etc.
• It is registered right, which means one need to legally register and get patent from govt
agencies.
Trademark

• A trademark is a word, symbol, design, label or phrase that identifies specific product and
distinguish it from similar products.
• It should be unique

IPR Violations

• Plagiarism
• Copyright Infringement
• Trademark Infringement
Plagiarism

Copying or stealing Intellectual properties without giving credit to its creator or owner.

Act termed as Plagiarism

• Presenting someone else’s idea or work as one’s own idea or work


• Using someone else’s work without giving credit to him/her
• providing incorrect source of information
• using someone else’s work wrongly intended originally something else
• modifying someone else’s work without attributing to creator
How to avoid plagiarism

• Use your own ideas

• Cite the sources-When someone else's ideas are used,

• Always acknowledge the sources and tell your reader where the ideas are from.

• Rewrite other's ideas in your own words

• Take careful notes

• Develop your writing skills to avoid Plagiarism

Copyright Infringement

Unauthorized use of copyright protected property without the permission of copyright


holder

Copyright Infringement Examples

• using copyright images in your document


• using someone’s song as background in your work

F 061, Rev 01, dtd10th March 2020


• download movie from unauthorized source
• record TV program and distributing with others
Trademark Infringement

Unauthorized use of Trademark of others in any product or service.

Cyber Crime

• Any Criminal offence involves the use of computer, Internet ,communication System or
digital technology in any which ways.
• Cyber crime can be categorized in two ways
• Crime that targets computer or technology. For exp – Hacking, Phishing, Virus, DoS etc.
• Crime that uses computer or technology. for exp – Identity theft, Cyber bullying, Illegal
downloads, Spamming etc.
Types of Cyber Crime

• Hacking
• Phishing
• Identity theft
• Cyber Bullying
• Cyber Stalking
• Illegal Download
• Dos Attack
• Online Scam
• Plagiarism
• Spamming
• Trolling
Hacking

• Gaining unauthorized and illegal access of any computer information system with the
intention of stealing or damaging that information system.
• Hacking with positive intent is called ethical hacking
• Ethical hackers are also known as White hat hackers
• Hackers practice hacking with negative intentions (Non-ethical) are known as Black hat
hackers.
Preventing Hacking

• Install Antivirus in System


• Update System regularly
• Use Secure Wi-Fi
• Keep strong password for accounts and change it frequently
• Avoid clicking and opening unknown and suspicious mails
• Must use authorized software and applications
• Do safe browsing
Phishing

• The illegal process of obtaining sensitive information of a user by impersonating as a


legitimate entity is called phishing.

F 061, Rev 01, dtd10th March 2020


• Phishing is carried out using emails, text messages or phone calls. most commonly email is
involved in such illegal activities
• Phishing is practiced to get
• User Credentials
• Social ID
• Bank Details
• Debit/Credit card details
• Personal Info
Prevent Phishing

• Ignore unknown and suspicious mail


• Do not open Unwanted and unknown attachments
• Do not click on suspicious links
• use anti phishing toolbar
• check email timings
Identity Theft

Stealing personal information such as Bank details, Voter ID, email ID, Passport, PAN etc of a person
illegally by criminals and misuse it in various illegal and criminal activities.

Identity Theft are of following types-

• Financial Identity Theft


• Medical Identity Theft
• Criminal Identity Theft

Cyber Bullying
Cyber bullying is the attack upon an individual or group through the use of electronic means such
as instant messaging, social media, email and other forms of online communication with the intent
to abuse, intimidate or overpower.
Following acts are considered as cyber bullying:
• Posting any kind of humiliating content about the victim.
• Hacking the victim’s account.
• Sending or posting vulgar messages online.
• Threatening to commit acts of violence.
• Stalking by means of calls, messages,

Cyberstalking – Tracking and monitoring a person’s online activity and using the internet to stalk
or harass an individual.

Internet Troll
Someone who leaves an intentionally annoying or offensive message on the internet, in order to
upset someone or to get attention or cause trouble
Preventing Cyber Crime
• Install Antivirus in System
• Update System regularly
• Use Secure Wi-Fi

F 061, Rev 01, dtd10th March 2020


• Keep strong password for accounts and change it frequently
• Avoid clicking and opening unknown and suspicious mails
• Must use authorized software and applications
• Do safe browsing
• Do not open Unwanted and unknown attachments
• Do not click on suspicious links
• use anti phishing toolbar
• Do not share your personal info with anyone
• do not browse untrusted websites
• ignore cookies of unknown sites
• do online transaction with secured and authentic websites

Spamming is the use of electronic messaging systems like e-mails and other digital delivery
systems and broadcast media to send unwanted bulk messages indiscriminately

Virus
A computer program that can copy itself and infect a computer without permission or knowledge of
the user. A virus might corrupt or delete data on a computer, use e-mail programs to spread itself
to other computers, or even erase everything on a hard disk
Worms
A computer worm is a standalone malware computer program that replicates itself in order to
spread to other computers.[1] It often uses a computer network to spread itself, relying on security
failures on the target computer to access it.

CYBER LAW AND INFORMATION TECHNOLOGY ACT, 2000


Cyber law is the part of the legal system that deals with cyberspace, internet and legal issues. It
covers a broad area, like freedom of expression, access to and utilization of internet, and online
security or online privacy. It is commonly known as the law of the web.

Importance of Cyber Law Cyber law plays a very important role in this new approach to
technology. It is important as it is concerned with almost all aspects of activities and transactions
that take place either on the internet or other communication devices. Whether we are aware of it
or not, each action and each reaction in cyberspace has some legal and cyber-legal views.

Information Technology Act, 2000 The Information Technology Act, 2000 (also known as ITA-2000,
or the IT Act) is an Act of the Indian Parliament (No. 21 of 2000) notified on 17 October, 2000. It is
the primary law in India dealing with cybercrime and electronic commerce. The original Act
contained 94 Sections, divided into 13 Chapters and 4 Schedules. The laws apply to the whole of
India. Persons of other nationalities can also be indicted under the law if the crime involves a
computer or network located in India.
IT Act Amendments Information Technology Act is a set of recent legal enactments, currently
existing in India, which provide legal support to computer users against cybercrime. The cyber
police work as a detector to discover cybercrimes. They have the authority in respect of all the
offences committed under TITA (The Information Technology Act, 2000), Central Act. No.21 of 2000
or crimes related to Intellectual Property Rights. The cyber laws in India and the provisions for legal
action and punishment have been explained below:

F 061, Rev 01, dtd10th March 2020


A major amendment was made to the IT Act in 2008. It introduced Section 66A which penalized
sending of “offensive messages”. It also introduced Section 69, which gave authorities the power of
“interception or monitoring or decryption of any information through any computer resource.

Digital signatures are the digital equivalent of a paper certificate. Digital signatures work on a
unique digital ID issued by an Certificate Authority (CA) to the user. Signing a document digitally
means attaching that user's identify, which can be used to authenticate. A licensed Certifying
Authority (CA) who has been granted a license to issue it under Section 24 of the Indian IT-Act
2000, can issue the digital signature
Licensing and copyright
A Software license is a legal permission or right to use or redistribution of that software. The software
can run on a certain number of computers as per license agreement.
PROPRIETARY LICENSES:-
Exclusive rights in the software are retained with the owner /developer /publisher. They reserve all
the freedom and rights to use and distribute this proprietary software.
PERMISSIVE LICENSES :-
Permissive licenses provide a royalty-free license to do virtually anything with the source code.
They permit using, copying, modifying, merging, publishing, distributing, sublicense and/or selling ,but
distribution can only be made without the source code as source code modifications can lead to
permissive license violation.
COPYLEFT LICENSE
In the case of copyleft licenses, source code has to be provided.
Distribution and modification of source code is permitted.
Example:
General Public License (GPL),
Creative Commons License (CC),
Lesser General Public License (LGPL),
Mozilla public License (MPL) etc.

COPYRIGHT
It is a form of protection given to the authors of “original works of authorship”. This is given in the field of
literature, dramatics, music, software, art etc. This protection applies to published as well as unpublished
work.
Software copyright is used by software developers and proprietary software companies to prevent the
unauthorized copying of their software. Free and open source licenses also rely on copyright law to

F 061, Rev 01, dtd10th March 2020


enforce their terms. Copyright protects your software from someone else copying it and using it without
your permission. When you hold the copyright to software, you can-
• Make copies of it.
• Distribute it.
Modify it

F 061, Rev 01, dtd10th March 2020

You might also like