You are on page 1of 54

Today’s Topic:

Unit III: Society, Law and Ethics

Unit III: Society, Law


and Ethics
CLASS XI COMPUTER SCIENCE
DIGITAL FOOTPRINT
✓ Digital footprint or digital shadow refers to one's unique set of traceable digital
activities, actions, contributions and communications manifested on the Internet
or digital devices.

✓ Digital footprints can be classified as either passive or active. The former is


composed of a user's web-browsing activity and information stored as cookies. The
latter is often released deliberately by a user to share information on websites or
social media.While the term usually applies to a person, a digital footprint can also
refer to a business, organization or corporation.
DIGITAL FOOTPRINT
Passive digital footprints is a data trail that an individual involuntarily leave
online. They can be stored in various ways depending on the situation.
A footprint may be stored in an online database as a "hit" in an online
environment. The footprint may track the user's IP address, when it was
created, where it came from, and the footprint later being analyzed.
In an offline environment, administrators can access and view the machine's
actions without seeing who performed them.
Active digital footprints are deliberate, as they are posted or shared
information willingly. They can also be stored in a variety of ways depending
on the situation. A footprint can be stored by a user being logged into a site
when making a post or change, with the registered name being connected to
the edit in an online environment. In an offline environment, a footprint may
be stored in files when the owner of the computer uses a keylogger.
Digital society and Netizen: net etiquettes,
Netiquette is a combination of the words network and etiquette and is
defined as a set of rules for acceptable online behavior.
Similarly, online ethics focuses on the acceptable use of online resources in
an online social environment.

The concept of a ’netizen’ which itself is a contraction of the words internet


and citizen and refers to both a person who uses the internet to participate
in society, and an individual who has accepted the responsibility of using the
internet in productive and socially responsible ways.
What Does Good Web Etiquette Look Like?
Underlying this overall concept of socially responsible internet use are a few
core pillars, though the details underneath each pillar are still subject to
debate.
For Society:

• Recognizing that the internet is an extension of society. The internet isn’t a


new world in which anything goes, but rather, a new dimension of the world
around us.
• Applying the same standards online as we do in public. In simple terms,
this means that the values society has in place against hate speech and
bigotry, child exploitation, and child pornography, copyright violations and
other forms of theft, remain intact. Values around courtesy, kindness,
openness, and treating others with the same respect we wish to receive
should also be adhered to.
What Does Good Web Etiquette Look Like?
Underlying this overall concept of socially responsible internet use are a
few core pillars, though the details underneath each pillar are still subject
to debate.
For Society:
• Refusing to empower abuse and harassment while online. Accepting that
the laws which are currently in place to protect the rights and dignity of
citizens apply online and that where needed, laws are updated to reflect
these rights in the extended environment. Theft, harassment, and bullying
while online is still theft, harassment, and bullying, period.
•Acknowledging cultural differences. Even when national boundaries no
longer apply, cultural respect and tolerance should remain. This requires
finding a way to accept that the social values and norms of some netizens
will not be the social values and norms of all netizens.
What Does Good Web Etiquette Look Like?
For Businesses:

For companies, being a good netizen, applying online ethics, and using
netiquette include:
Respecting rights of privacy for offline employees. Information possessed by
citizens in their offline interactions should be respected.

Maintaining transparency in information policies. By taking action so that


consumers can easily and quickly understand how that company is using
their information and protecting them from harm, companies can provide
users with a clear means of ownership and self-determination as to what is,
and isn’t shared about them, which strengthens the consumer relationship.
What Does Good Web Etiquette Look Like?
There are certain net etiquettes or netiquettes that have been created to
ensure that everyone is a responsible digital citizen (netizen).
1. Net Etiquettes
a) Ethics:
✓ Copyright Violation: Do not use copyrighted information without
proper license i.e. permission of the creator/owner. Creators such as Q-
Programming have put a lot of effort into sharing their content and
hence one should respect these efforts and not use materials without
proper authorization.
✓ Sharing Information: With access to unlimited online resources, we
should share useful information with others. However, make sure the
information you share is accurate and from a reputable source. A lot of
fake information is spread nowadays which can lead to consequences.
What Does Good Web Etiquette Look Like?
There are certain net etiquettes or netiquettes that have been created to
ensure that everyone is a responsible digital citizen (netizen).
1. Net Etiquettes
b) Respect:
✓ Privacy: Respect the privacy of your fellow netizens. Good digital
citizens understand that everyone has the same rights and freedoms. If
someone shares private information with you DO NOT send it to
anyone else without the sender's consent.
✓ Diversity: Public forums and chat sites have great diversity in
contributing members. Make sure you respect other people's cultures
and beliefs and expect that they do the same for you.
What Does Good Web Etiquette Look Like?
c) Responsibility:
✓ Cyber Bullying: Remember that anything you say online to someone
has the same effect as if you say it to their face. Many people say
offensive and hurtful things online thinking that they can't be held
accountable. However, remember that everything you say is part of
your digital footprint and can be easily traced back to you. Therefore,
be careful what you say on public forums as you can get in trouble, but
also, most importantly, you can cause harm to others.

✓ Trolling: Internet trolls are people who intentionally disrupt harmony


on online platforms. They thrive on attention and hence you should not
fuel them by supporting them or rebutting. Trolls can be like online
bullies they have fun when they make someone react to their
comments. The best thing you can do is ignore them.
What Does Good Web Etiquette Look Like?
2. Communication Etiquettes
a) Precision:
Time: Everyone is busy and therefore we should not waste our valuable
time on unnecessary emails and comments. Similarly, do not expect others
to respond to you instantly as they are also preoccupied.
Data Limits: Avoid sending large files over the internet as they use a lot of
data and bandwidth, which come with their respective costs. You should
make it a habit to send compressed files or links, using various free
services.
b) Politeness:
While talking to someone online in a synchronous/real-time or
asynchronous format, be polite and non-aggressive. Do not use slurs or
abuses even if you get worked up.
What Does Good Web Etiquette Look Like?
c) Credibility:
As discussed in a previous point, make sure whatever you write on the
internet is accurate and fact-checked. Spreading false information leads to
unnecessary confusion.
What Does Good Web Etiquette Look Like?
3. Social Media Etiquettes
Security:
• Passwords: Choose strong passwords to safeguard against data leaks or hackers.
Use a combination of numbers, alphabets, allowed symbols and cases to create a
password which is tough to crack. Also, avoid sharing your account information
with others.
• Friends: Social networking sites allow us to talk to anyone else on the platform. Be
wary, however, as not everyone is friendly. Some people may even have malicious
intentions. Be careful of who you interact with online and only converse with those
who you have met in real life
• Fake Information: There is a lot of fake information on the internet. This
information is easily spread via social networking sites. Therefore, when you see
something, make sure it is accurate. Experienced users are able to distinguish fake
news from real news. Those who don't can verify information from reputed
sources. Although platforms have algorithms to fact check, report any misleading
information to avoid further spread.
What Does Good Web Etiquette Look Like?
Reliability:
When you are about to upload something to the internet, pause for a
moment and think of the consequences your actions could have in the
future. Once you are sure what you are posting is acceptable, do so.
Remember, as discussed earlier, that even if you delete an upload, it will
still be stored on the service's servers.
DATA PROTECTION
Data protection is the process of safeguarding important data from
corruption, compromise or loss and providing the capability to restore the
data to a functional state should something happen to render the data
inaccessible or unusable.

Data protection assures that data is not corrupted, is accessible for


authorized purposes only, and is in compliance with applicable legal or
regulatory requirements. Protected data should be available when needed
and usable for its intended purpose.

The scope of data protection, however, goes beyond the notion of data
availability and usability to cover areas such as data immutability,
preservation, and deletion/destruction.
DATA PROTECTION
Data protection spans three broad categories, namely, traditional data
protection (such as backup and restore copies), data security, and data
privacy.
DATA PROTECTION
Principle of data protection
The principle of data protection is to deploy methodologies and
technologies to protect and make data available under all circumstances.

Storage technologies can be used to protect data by using disk, tape or


cloud backup to safely store copies of the data that can be used in the
event of data loss or interruption. Additional software tools (e.g. cloning,
mirroring, replication, snapshots, changed block tracking, etc.,) are
providing another layer of data protection in addition to traditional
backup. Technology advancements mean that it is now common practice
to provide continuous data protection which backs up the data whenever
a change is made so that recovery can be near-instantaneous.
DATA PROTECTION
Cloud backup is also becoming more prevalent as organizations
frequently move their backup data to public clouds or clouds maintained
by third-party service vendors. These backups can replace on-site disk
and tape libraries, or they can serve as additional protected copies of data
to provide a disaster recovery facility.
Intellectual Property Right (copyright, patent, trademark)
IP is protected in law by, for example, patents, copyright and trademarks,
which enable people to earn recognition or financial benefit from what
they invent or create. By striking the right balance between the interests
of innovators and the wider public interest, the IP system aims to foster an
environment in which creativity and innovation can flourish.

IPR
Intellectual Property Rights (IPRs) are legal rights that protect creations
and/or inventions resulting from intellectual activity in the industrial,
scientific, literary or artistic fields. The most common IPRs include
patents, copyrights, marks and trade secrets.
Intellectual Property Right (copyright, patent, trademark)
Four Types of Intellectual Property for Businesses
Copyrights, Patents, Trademarks, and Trade Secrets – Four Types of
Intellectual Properties
If you are a business owner, you should familiarize yourself with the four
types of intellectual property, otherwise known as IP. We speak with
many entrepreneurs who don’t know where to begin when it comes to
protecting their ideas and inventions. They need this information
frequently so we decided to create a quick and easy guide to educate them.
It was popular so we decided to post it to our blog. Let us know if you
found this useful and if there are any other guides you would like us to
make in the comment section below.
Intellectual Property Right (copyright, patent, trademark)
Type 1 – Copyrights
What are Copyrights? According to Copyright.Gov ‘s Guide to
copyrights, “Copyright is a form of protection provided by the laws of the
United States (title 17, U.S.Code) to the authors of “original works of
authorship,”” Copyrights protect writing, pictures, music, art, and other
forms of intellectual works. What this means for you is that if you wrote
something, or created a piece of work that you don’t want people to reuse
without your permission, you have the right to copyright that work. Now,
if people want to use, reuse, or re purpose your work, they must first
contact you to use it, attribute you as the owner, and use it for purposes
you deem appropriate. There is an exception to this rule, that is, Fair Use.
If someone wants to use a portion of your work for educational, parody,
commenting, or news purposes they can.
Intellectual Property Right (copyright, patent, trademark)
Type 2 – Patents
What are Patents? According to the United States Patent Office , “A
patent for an invention is the grant of a property right to the inventor”.
Generally this patent lasts for 20 years from when the inventor attempts
to patent their invention by filing with the US Government. The list of
things that can patented is fairly lengthy and open to interpretation but it
covers anyone who “invents or discovers any new and useful process,
machine, manufacture, or composition of matter, or any new and useful
improvement thereof, may obtain a patent,”.
Intellectual Property Right (copyright, patent, trademark)
Type 3 – Trademarks
What are Trademarks? According to the USPTO , a Trademark is a
“word, phrase, symbol, or design, or a combination thereof, that
identifies and distinguishes the source of the goods of one party from
those of others. ” For instance, if your company name, a logo, or your
company tagline can me trademarked. The trademark serves as a brand
identifier for your business or your products. Images, slogans, and colors
can all be trademarked. For instance, Tiffany Blue is a trademarked
color that is used by Tiffany & Co. in promotional materials as well as
boxes, bags, and more.
Intellectual Property Right (copyright, patent, trademark)
Type 4 – Trade Secrets
What are Trade Secrets? Generally, any piece of confidential corporate
information which gives any business a competitive advantage can be
considered a trade secret. For instance, Coca-Cola’s secret formula could
be considered a trade secret. Now, if I created a soda company and
produced identical soda to coca-cola, this would be an infringement of
Coke’s trade secret. This is a general example but trade secrets can even
defined as distribution methods (Walmart), Sales methods, consumer
information, ad campaigns and strategies, list of vendors, list of clients,
and production processes. Generally, trade secrets are leaked through
corporate (industrial) espionage, breach of contract, or something as
simple as leaving your prototype iPhone at a bar.
Violations of Intellectual Property
If a third party were to assume ownership, copy, or sell someone's
previously copywritten work, that would legally be considered a case of
copyright infringement. Copyright law can still be enforced if others try
to create simple deviations from the original source material.

When someone commits a violation or theft of intellectual property, it is


referred to as infringement, if occurring with patent copyright or a
trademark. The term misappropriation would be used if the theft or
violation occurs with trade secrets and can sometimes be considered a
criminal matter depending on the set of circumstances.
Plagiarism
Plagiarism is using someone else's work or ideas without giving proper
credit. In other words, because you are not giving attribution to the owner of
the original work or idea -- you are presenting the idea or thought as your
own.
•Plagiarism is a violation of academic norms but not illegal; copyright violation
is illegal but quite common in academia.
•Plagiarism is an offense against the author; copyright violation is an offense
against the copyright holder. In traditional academic publishing, they are
usually not the same person, because copyright transfer agreements (CTAs)
are so common.
•Plagiarism applies when ideas are copied; copyright violation occurs only
when a specific fixed expression (e.g., sequence of words, use of an image) is
copied.
•Avoiding plagiarism is about properly apportioning intellectual credit;
copyright is about maintaining revenue streams.
Copyright infringement typically involves someone using another person's
original creative work, or a copyrighted work, without permission.
There are many types and forms of copyright infringement. These are some
examples of activities that would constitute copyright infringement if you
carry them out without first obtaining permission from the owner, creator, or
holder of the copyrighted material:
Recording a film in a movie theater
Posting a video on your company's website which features copyrighted words
or songs
Using copyrighted images on your company's website
Using a musical group's copyrighted songs on your company's website
Modifying an image and then displaying it on your company's website
Creating merchandise for sale which features copyrighted words or images
Downloading music or films without paying for their use
Copying any literary or artistic work without a license or written agreement
Trademark infringement is the unauthorized use of a trademark or service mark on or
in connection with goods and/or services in a manner that is likely to cause confusion,
deception, or mistake about the source of the goods and/or services.

A registered trademark is a symbol, word, or combination that represents a company


or a product and differentiates it in the market. A registered service mark represents a
service.

Trademark Infringement
A trademark is a form of legal protection for brand names and symbols that identify
the source of a product or service. Trademarks can take the form of a word, slogan,
symbol, or design — or a combination of these.
What is open source software?
Open source software is software with source code that anyone can inspect, modify,
and enhance.

"Source code" is the part of software that most computer users don't ever see; it's the
code computer programmers can manipulate to change how a piece of software—a
"program" or "application"—works.

Open source software is different. Its authors make its source code available to others
who would like to view that code, copy it, learn from it, alter it, or share it. LibreOffice
and the GNU Image Manipulation Program are examples of open source software.
Licensing
Licensing involves obtaining permission from a company (licensor) to manufacture
and sell one or more of its products within a defined market area. The company that
obtains these rights (the licensee) usually agrees to pay a royalty fee to the original
owner.

Licensing is defined as a business arrangement, wherein a company authorizes


another company by issuing a license to temporarily access its intellectual property
rights, i.e. manufacturing process, brand name, copyright, trademark, patent,
technology, trade secret, etc. for adequate consideration and under specified
conditions.
Cyber Crime
What is meant by cyber crime?

cybercrime, also called computer crime, the use of a computer as an instrument to


further illegal ends, such as committing fraud, trafficking in child pornography and
intellectual property, stealing identities, or violating privacy. Cybercrime, especially
through the Internet, has grown in importance as the computer has become central to
commerce, entertainment, and government.

Types of Cyber Crimes:


crime of identity theft.
information held in digital depositories and the use of illegally obtained digital
information to blackmail a firm or individual,transaction-based crimes such as fraud,
trafficking in child pornography, digital piracy, money laundering, denial of service
attacks against specific sites to acts of cyberterrorism—that is, the use of the Internet
to cause public disturbances
Hacking
A commonly used hacking definition is the act of compromising digital devices and
networks through unauthorized access to an account or computer system. Hacking is
not always a malicious act, but it is most commonly associated with illegal activity and
data theft by cyber criminals.

Hacking refers to the misuse of devices like computers, smartphones, tablets, and
networks to cause damage to or corrupt systems, gather information on users, steal
data and documents, or disrupt data-related activity.

Types of Hacking/Hackers
There are typically four key drivers that lead to bad actors hacking websites or
systems: (1) financial gain through the theft of credit card details or by defrauding
financial services, (2) corporate espionage, (3) to gain notoriety or respect for their
hacking talents, and (4) state-sponsored hacking that aims to steal business
information and national intelligence. On top of that, there are politically motivated
hackers—or hacktivists—who aim to raise public attention by leaking sensitive
information, such as Anonymous, LulzSec, and WikiLeaks.
EAVESDROPPING
An eavesdropping attack, also known as a sniffing or snooping attack, is a theft of
information as it is transmitted over a network by a computer, smartphone, or another
connected device. The attack takes advantage of unsecured network communications
to access data as it is being sent or received by its user.

An eavesdropping attack, also known as a sniffing or snooping attack, is a theft of


information as it is transmitted over a network by a computer, smartphone, or another
connected device.

The attack takes advantage of unsecured network communications to access data as it


is being sent or received by its user.
An eavesdropping attack is the theft of information from a smartphone or other device
while the user is sending or receiving data over a network.
Eavesdropping attacks can be prevented by using a personal firewall, keeping
antivirus software updated, and using a virtual private network (VPN).
Avoiding public wi-fi networks and adopting strong passwords are other ways to
prevent eavesdropping attacks.
PHISHING
Phishing is a type of online scam where criminals impersonate legitimate organizations
via email, text message, advertisement or other means in order to steal sensitive
information.

Phishing is a type of online scam where criminals impersonate legitimate organizations


via email, text message, advertisement or other means in order to steal sensitive
information. This is usually done by including a link that will appear to take you to the
company’s website to fill in your information – but the website is a clever fake and the
information you provide goes straight to the crooks behind the scam.

The term “phishing” is a spin on the word fishing, because criminals are dangling a
fake “lure” (the legitimate-looking email, website or ad) hoping users will “bite” by
providing the information the criminals have requested – such as credit card numbers,
account numbers, passwords, usernames or other valuable information.
RANSOMWARE
Ransomware is malware that employs encryption to hold a victim’s information at
ransom. A user or organization’s critical data is encrypted so that they cannot access
files, databases, or applications.

A ransom is then demanded to provide access.

Ransomware is often designed to spread across a network and target database and file
servers, and can thus quickly paralyze an entire organization.

It is a growing threat, generating billions of dollars in payments to cybercriminals and


inflicting significant damage and expenses for businesses and governmental
organizations.
to better protect against computer crime.
1. Make sure your security software is current – and update it regularly.
Having the latest security software goes a long way toward protecting against viruses,
malware and other online threats.

2. Lock or log off your computer when you step away.


This ensures that no one else will have access to all your information.

3. Go offline when you don’t need an internet connection.


If your computer is always connected, it increases the chances that hackers and virus
scans can invade your computer.

4. Take advantage of security settings.


On your smartphone, on your tablet, on your computer – use PINs or passcodes to
protect someone from easily accessing all your information. For social media websites
and apps, be aware of your privacy settings and change them to your comfort level so
only the people you want to see information can see it.
to better protect against computer crime.
5. Consider sharing less online.
Including information like your birthdate and the city where you live on your social
media profiles can give criminals a more complete picture and make it easier for them
to steal your identity.

6. Think twice about using public Wi-Fi.


Hackers can easily connect to public Wi-Fi and watch your every move, including
what passwords and account information you enter while you’re connected. To keep
your information safe, either don’t use public Wi-Fi or avoid entering private
information and using apps that have passwords when you are on public Wi-Fi.

7. When in doubt, don’t click.


Cyber criminals can compromise your information through tweets, posts and online
advertising, in addition to emails. If it looks suspicious, just delete it. Beware of anyone
who implores you to act immediately.
Cyber Safety
https://www.opencolleges.edu.au/informed/cyber-safety/
Safely accessing websites: malware, viruses, Trojans,
adware
While accessing any website we should always be aware it’s safe and it does not
contain any harmful content in like virus and other malicious things always try to
access websites which has https:// in it rather http:// here “s” means secure. Let’s see
some of the possible threats which you might get while accessing websites.
Adware: Adware, or advertising-supported software, is software that generates
revenue for its developer by automatically generating online advertisements in the
user interface of the software or on a screen presented to the user during the
installation process. The software may generate two types of revenue: one is for the
display of the advertisement and another on a "pay-per-click" basis, if the user clicks
on the advertisement. The software may implement advertisements in a variety of
ways, including a static box display, a banner display, full screen, a video, pop-up ad or
in some other form.
Safely accessing websites: malware, viruses, Trojans,
adware
Some software developers offer their software free of charge, and rely on revenue from
advertising to recoup their expenses and generate income. Some also offer a version of
the software at a fee without advertising.
The software's functions may be designed to analyse the user's location and which
Internet sites the user visits and to present advertising pertinent to the types of goods
or services featured there. The term is sometimes used to refer to software that
displays unwanted advertisements known as malware.
Safely accessing websites: malware, viruses, Trojans,
adware
Malware: Malware, or malicious software, is any program or file that is harmful to a
computer user. Malware includes computer viruses, worms, Trojan horses and
spyware. These malicious programs can perform a variety of functions, including
stealing, encrypting or deleting sensitive data, altering or hijacking core computing
functions and monitoring users' computer activity without their permission.
Programs officially supplied by companies can be considered malware if they secretly
act against the interests of the computer user. For example, company ABC sold the
rootkit, which contained a Trojan horse embedded into CDs that silently installed and
concealed itself on purchasers' computers with the intention of preventing illicit
copying. It also reported on users' listening habits, and unintentionally created
vulnerabilities that were then exploited by unrelated malware.
One strategy for protecting against malware is to prevent the malware software from
gaining access to the target computer. For this reason, antivirus software, firewalls and
other strategies are used to help protect against the introduction of malware, in
addition to checking for the presence of malware and malicious activity and
recovering from attacks.
Safely accessing websites: malware, viruses, Trojans,
adware
Virus: A computer virus is a type of malicious code or program written to alter the
way a computer operates and that is designed to spread from one computer to another.
A virus operates by inserting or attaching itself to a legitimate program or document
that supports macros in order to execute its code. In the process a virus has the
potential to cause unexpected or damaging effects, such as harming the system
software by corrupting or destroying data. Once a virus has successfully attached to a
program, file, or document, the virus will lie dormant until circumstances cause the
computer or device to execute its code. In order for a virus to infect your computer,
you have to run the infected program, which in turn causes the virus code to be
executed. This means that a virus can remain dormant on your computer, without
showing major sings or symptoms. However, once the virus infects your computer, the
virus can infect other computers on the same network. Stealing passwords or data,
logging keystrokes, corrupting files, spamming your email contacts, and even taking
over your machine are just some of the devastating and irritating things a virus can
do.
Safely accessing websites: malware, viruses, Trojans,
adware
Trojans: In computing, a Trojan horse is a program that appears harmless, but is, in
fact, malicious. Unexpected changes to computer settings and unusual activity, even
when the computer should be idle, are strong indications that a Trojan is residing on a
computer.
A Trojan horse may also be referred to as a Trojan horse virus, but that is technically
incorrect. Unlike a computer virus, a Trojan horse is not able to replicate itself, nor
can it propagate without an end user's assistance. This is why attackers must use social
engineering tactics to trick the end user into executing the Trojan. Typically, the
malware programming is hidden in an innocent-looking email attachment or free
download. When the user clicks on the email attachment or downloads the free
program, the malware that is hidden inside is transferred to the user's computing
device. Once inside, the malicious code can execute whatever task the attacker
designed it to carry out.
E-waste management: proper disposal of used electronic
gadget
All electronic waste is made up of deadly chemicals such as lead, cadmium, beryllium,
mercury and brominated flame retardants. Disposing of gadgets and devices
improperly increases the chances of these dangerous chemicals contaminating the soil,
polluting the air and leaching into water bodies.

some eco-friendly waste disposal techniques that you can use to dispose of electronic
waste locally:
Give Your Electronic Waste to a Certified E-Waste Recycler
The positive aspect of e-waste recycling is that you have quite a few recycling options.
You need to find an e-waste recycler who is officially certified by the Basel Action
Network (BAN). BAN is a non-profit organization of recycling companies which are
dedicated to recycling e-waste in a safe and responsible way.
E-waste management: proper disposal of used electronic
gadget
Sell Off Your Outdated Technology
One man’s junk is another man’s treasure as the old saying goes. This can be applied
to helping you get rid of your old electronics. You can tap into online sites like
craigslist, eBay or even resort to having a garage sale as this will help you get rid of
your outdated electronics as well as earning some money.

Donating Your Outdated Technology


Old gadgets that you no longer need can be donated as they may be useful to others.
Your old computer may be useful to either an NGO or students. You should ask
yourself these 2 questions before disposing of your old electronics:

Is the electronic item working?


Does the computer have any of your personal information?
E-waste management: proper disposal of used electronic
gadget
Sell Off Your Outdated Technology
One man’s junk is another man’s treasure as the old saying goes. This can be applied
to helping you get rid of your old electronics. You can tap into online sites like
craigslist, eBay or even resort to having a garage sale as this will help you get rid of
your outdated electronics as well as earning some money.

Donating Your Outdated Technology


Old gadgets that you no longer need can be donated as they may be useful to others.
Your old computer may be useful to either an NGO or students. You should ask
yourself these 2 questions before disposing of your old electronics:

Is the electronic item working?


Does the computer have any of your personal information?
E-waste management: proper disposal of used electronic
gadget
Visit Civic Institutions

Enquire amongst your government, universities, and schools for any recycling
programs they run as a lot of organizations have started assigning a certain day and
place for environmentally conscious citizens to come and drop off their e-waste.

Give Back to Your Electronic Companies and Drop Off Points

A lot of electronic companies tend to have an exchange policy whereby they take back
your old gadgets when you buy a later version, sometimes offering you a discount on
your new purchase.
IT ACT
The Information Technology Act, 2000 also Known as an IT Act is an act proposed by
the Indian Parliament reported on 17th October 2000.

The main objective of this act is to carry lawful and trustworthy electronic, digital and
online transactions and alleviate or reduce cybercrimes.

The offences and the punishments in IT Act 2000 :


The offences and the punishments that falls under the IT Act, 2000 are as follows :-

Tampering with the computer source documents.


Directions of Controller to a subscriber to extend facilities to decrypt information.
Publishing of information which is obscene in electronic form.
Penalty for breach of confidentiality and privacy.
Hacking for malicious purposes.
IT ACT
Penalty for publishing Digital Signature Certificate false in certain particulars.
Penalty for misrepresentation.
Confiscation.
Power to investigate offences.
Protected System.
Penalties for confiscation not to interfere with other punishments.
Act to apply for offence or contravention committed outside India.
Publication for fraud purposes.
Power of Controller to give directions.
Technology & Society: Gender and disability issues while
teaching and using computers
Gender issues

It has been commonly observed that girls are under represented in Computer Science
Studies be it computer science major subject at high school or at college level.
There are far less girls than boys in computer science section.

Preconceived notions
Notions like boys are better at technical things, girls are good at humanities, arts etc.;
girls must take up a career keeping in mind that they have to raise a family; Teaching
is the best option for girls as it gives you half day off and ample number of holidays so
that you can take care of your family; have their impact on decision making of girls
while taking up subjects. Also parents play a major role while deciding the subjects.
Technology & Society: Gender and disability issues while
teaching and using computers
Lack of interest
During primitive years children often play games on the computers and smart phones.
Most of the games are boys centric that increase the interest of boys in computers.

Lack of motivation
Girls are pressurized to choose a career option which will give them work life balance
because they have to play an important family role in future. This theory discourages
girls from taking up technical subjects like computer science.

Lack of role models


Girls these days see less role models in the field of computer science. In every field
such as movies, advertisements, scientists etc we see more men than women. All these
things influence girls sub-psychology and they infer that computer science is for boys
and not to take that subject.
Technology & Society: Gender and disability issues while
teaching and using computers
Lack of encouragement in class
As there are lesser number of girls in a class , the teachers for most work –
assignments end choosing more boys. Also some teachers pin point on their roles in the
society. All this may play as hindrance and girls do not develop interest in Computer
Science.
Technology & Society: Gender and disability issues while
teaching and using computers
Disability Issues
Various disability issues faced in the teaching/learning computers with regard to the
disability are

Unavailability of teaching material / aids


Students with different disabilities need different types of teaching aids/ material. For
instance visually challenged students would want that there screen readers that could
read the digital content to them,
hearing impaired students would want lore of viual input than oratory, low vision
students may need Braille keyboards, braille monitors and printers
Technology & Society: Gender and disability issues while
teaching and using computers
Lack of special needs teachers
For different types of special needs, students require special needs teachers. For
example : a hearing impaired student needs a teacher who is able to converse in sign
language and would be able to convey and explain study material.

Lack of supporting curriculum


Curriculum should be designed while keeping focus on inclusive education. Sofwares
and programs should be so used so that disabled students can easily work on that.

You might also like