You are on page 1of 10

SOCIETAL 10

IMPACT
① Digital footprint also known as digital dossier

created
_•
Body of data

while
using internet

Digital footprint

F.
Passive
Active
-3 Collected without
owner
knowing
→ owner purposely sharing
information about oneself
→ search engine → Email

② Net etiquette
Netiquette → net + eetiquete
I
code
of good behaviour on
internet

There should be manner while using internet


③ DATA PROTECTION

Practises ,
Safegauod precaution to protect
,

Your personal information & ensure we remain


in it
control
of .


It difficult for people
is to maintain control of
Personal
information ,
thats
why data
Protection is important .

INTELLECTUAL
PROPERTY RIGHT

Intangible property by individual / Corporation
created
for their benefit
is unethical to else
& ÷ , gt copy or steal effort of someone .

It
→ A

Industrial Copyright
Protect
literary
Property & artistic work

majorly speak about protect


Invention

↳ Include patent , design ,


etc
④ PLAGIARISM
Not
giving author credit after copying author work

↳ ex
copying paper written by other people
-

& claim it as written


by you

or

-

accidental intentional
/ unintentional
Intentional
→ not

copying
knowing we are
copying & not
other
→ less
work
→ serious
giving credit

serious implication

⑤ LICENSING & COPYRIGHT


Legal permission to use 08 Redistribution of
software
It include :

↳ can
you copy , modify or one distribute
↳ where & how time can install
many you
↳ can code
you
look at
underlying source .
license
I Propeoietooy
Endo sike
aight software
in are
retained with
owner / developer / published .

freedom & to use & distribute


Reserve all
Right

2) open & Free source license


→ can be
safely run
,
adapt Ee one distribute
without restrain
legal .

→ 05s →
open source software

available
source code are
publicly
↳ it allows
copying studying ,
&

modifying .

→ Foss → Free & open source software


Permissive License
→ offer right to
modify & distribute the
modified version while also permitting
to not show source code for derived
WOOK .

⇐ Copyleft LICENSE

offer right to
modify & distribute the
version but work derived
modified any
from copyleft must be
copyleft too

⑥ COPYRIGHT
Protection
of software from someone else

using & copying it without our permission


HOLDER of COPYRIGHT can :

↳ copy
↳ modify
↳ Distribute
① CYBER CRIME
→ crime done technical device which
using
target computer system & data possessed by
them

types
→ access
Identity theft → unauthorised computer
→ online
predatory crimes

-
--
Target computer network advance other
or devices criminal
'

actin -

↳ er . virus of
1-jex.ph/0s?ng ,

cyber stalking
-

,
etc
CYBER LAWS
Part
of overall
legal system

daw internet
Cyber law
of

a.k.a

IMPORTANCE :

① cover all transaction


② Keep eyes on all activities over internet

HACk1NG_
in computer to
① Identifying weakness use

its to
weakness
gain access


using computer to commit fraud lent act

PHISHING
↳ attempt to capture Password & credit card
detail by including URL in email that
link to
fake website controlled attacker
CYBER BULLYING
Harrasement & Bullying executed through
device
Digital
It causes :

→ humilaton through hateful comment



Posting sending & sharing negative
,


Nasty or false information
INDIAN IT ACT 2000

Moct,2ooo~wmm}
majoramendmenfmmg
Decurion]
↳ Force in
2009
f- WASTE
all electronic device
waste
from
HAZARI
↳ contain toxic chemical
↳ contaminated water

improper e-waste recycle create
hazardous & toxic compounds

Damage to immune
system

MANAGEMENT

Dismantling
metal
↳ separation
of & plastic
↳ Reese

Recovery of valuable material
↳ Disposal
of dangerous material

You might also like