Professional Documents
Culture Documents
Societal Impact Ip
Societal Impact Ip
IMPACT
① Digital footprint also known as digital dossier
created
_•
Body of data
while
using internet
Digital footprint
F.
Passive
Active
-3 Collected without
owner
knowing
→ owner purposely sharing
information about oneself
→ search engine → Email
② Net etiquette
Netiquette → net + eetiquete
I
code
of good behaviour on
internet
Practises ,
Safegauod precaution to protect
,
→
It difficult for people
is to maintain control of
Personal
information ,
thats
why data
Protection is important .
INTELLECTUAL
PROPERTY RIGHT
→
Intangible property by individual / Corporation
created
for their benefit
is unethical to else
& ÷ , gt copy or steal effort of someone .
It
→ A
Industrial Copyright
Protect
literary
Property & artistic work
↳ ex
copying paper written by other people
-
or
-÷
-
accidental intentional
/ unintentional
Intentional
→ not
→
copying
knowing we are
copying & not
other
→ less
work
→ serious
giving credit
serious implication
↳ can
you copy , modify or one distribute
↳ where & how time can install
many you
↳ can code
you
look at
underlying source .
license
I Propeoietooy
Endo sike
aight software
in are
retained with
owner / developer / published .
→ 05s →
open source software
→
available
source code are
publicly
↳ it allows
copying studying ,
&
modifying .
⇐ Copyleft LICENSE
→
offer right to
modify & distribute the
version but work derived
modified any
from copyleft must be
copyleft too
⑥ COPYRIGHT
Protection
of software from someone else
↳ copy
↳ modify
↳ Distribute
① CYBER CRIME
→ crime done technical device which
using
target computer system & data possessed by
them
types
→ access
Identity theft → unauthorised computer
→ online
predatory crimes
-
--
Target computer network advance other
or devices criminal
'
actin -
↳ er . virus of
1-jex.ph/0s?ng ,
cyber stalking
-
,
etc
CYBER LAWS
Part
of overall
legal system
•
daw internet
Cyber law
of
•
a.k.a
IMPORTANCE :
HACk1NG_
in computer to
① Identifying weakness use
its to
weakness
gain access
①
using computer to commit fraud lent act
PHISHING
↳ attempt to capture Password & credit card
detail by including URL in email that
link to
fake website controlled attacker
CYBER BULLYING
Harrasement & Bullying executed through
device
Digital
It causes :
→
Nasty or false information
INDIAN IT ACT 2000
Moct,2ooo~wmm}
majoramendmenfmmg
Decurion]
↳ Force in
2009
f- WASTE
all electronic device
waste
from
HAZARI
↳ contain toxic chemical
↳ contaminated water
↳
improper e-waste recycle create
hazardous & toxic compounds
↳
Damage to immune
system
MANAGEMENT
↳
Dismantling
metal
↳ separation
of & plastic
↳ Reese
↳
Recovery of valuable material
↳ Disposal
of dangerous material