You are on page 1of 17

INFORMATICS PRACTICES

(065)

Unit-4
SOCIETAL IMPACTS
(Session: 2023-24)
For
Class 12th
Submitted By: Submitted To:
Aashi Nagiya Manish Agarwal
SOCIETAL IMPACTS
DIGITAL FOOTPRINTS:
Digital Footprints is a data that is left behind when users a have been online.
There are two types of Digital Footprints
1. Active Digital Footprints
2. Passive Digital Footprints

ACTIVE DIGITAL FOOTPRINTS


An active digital footprint is where the users has deliberately shared information about
themselves. Either by using social media sites or by using websites.

EXAMPLE ACTIVE DIGITAL FOOTPRINTS


• Posting on Facebook, Instagram and Twitter or any other Social Media Platform.
• Filling out online forms, when signing up to receive emails or text.
• Agreed to install Cookies on our devices.

PASSIVE DIGITAL FOOTPRINTS


A passive digital footprint is made when information is collected from the user without
that person knowing, this is happening.

EXAMPLE PASSIVE DIGITAL FOOTPRINTS


• Website that install cookies on our devices without disclosing us.
• Apps. and Websites that use geolocation to pin point our location.
• Social Media news channel and advertisement that uses are likes, shares and
comments.
WHY SHOULD BE CARE ABOUT DIGITAL FOOTPRINT OR MANAGING OUR
DIGITAL FOOTPRINTS:

Following are the different reason or managing are digital footprints:


• To protect our images or reputation
• To prevent or financial losses
• To prosperous our freedom
• To make safe personal information

RISK DUE TO DIGITAL FOOTPRINT


1. Privacy Concern
2. Identify Theft
3. Fake Website
4. Scams

NETIQUETTE (NET OR COMMUNICATION ETIQUETTES)

Netiquette is a short form “Internet Etiquette” or “Communication Etiquette” over the


Internet. It is just like a human etiquette. A code of polite behavior in the society.
Similarly, Netiquette is a code of good behavior on the Internet.

Netiquette includes several aspects of internet, social media, e-mail, online chat,
website comment’s online gaming or any online type of online communication.
DO’S AND DON’T OF NETIQUETTES

DO’S DON’T

Protect personal information Respond to internet progress

Verify facts before responding or Posting of fencing commenting


reposting
Keep message and post brief Post privy and embarrassing images and
comments
Use discretion Stick to the topics

Obey copy writes law Spam other by sending large e-mails

To help others Talk behind other backs

Thanks others who help you online Express senseless or offensive opinion

DATA PROTECTION
Data protection refers to the practices safe guards and binding rules put in place to
protect our personal information and ensure that it remain in control

CONSEQUENCES OF UNPROTECTED DATA


• Physical data loss
• Hit with virus
• Targeted by the hackers
• Intellectual properties at work
• Damaged downtime
• Suffer from securities at risk
HOW WE CAN PROTECT PERSONAL DATA ONLINE?
• Use security software
• Keep your password private and strong
• Encrypt your data
• Don’t over share on social networking sites
• Avoid fishing and spam
• Be wise about Wi-Fi

INTELLECTUAL PROPERTIES (IP)


Intellectual properties (IP) is a property created by a person or a group of persons using
their own installed for ultimate use in comma and which is already not available in the
public domain.

EXAMPLE INTELLECTUAL PROPERTIES (IP)


Which is an invention relating to the product or any process a new design, a literacy, an
article work, an artistic work and trademark.
(Symbol, Logo, Name, etc.)

INTELLECTUAL PROPERTIES RIGHT (IPR)


IPR is the statutory right granted by the government to the owner of the intellectual
properties to exclude other from exploiting it commercially from a certain time period.

WHY SHOULD BE IP PROTECTED?


1. IP owners can sell or license the IP for commercial use.
2. IP is an asset and can be exploited by the owners for commercial benefited or
any manner
3. IPR certificate established legal and valid ownership about an IP
4. IP can be used to established the goodwill the granted value in the market.
KINDS OF IPR
1. PATENT (To protect the technology) by the Patent Act (1970)
2. TRADEMARK (To protect the company name, logo, Sign, label) by the Trademark
Act (1990)
3. DESIGN (To protect the ornament origami) by the Design Act (2000)
4. COPYWRITE (To protect the literacy and artistic work) by the Copywrite Act
(1957)
5. GEOGRAPHICAL INDICATION(GI)
(To protect the region-specific product) by the Geographical Indication Act
(1999)

PLAGIARISM
Plagiarism is the act of preventing the words, ideas, images, sounds or any creative
expression of other as it is your creation.
Or
The word plagiarism is derived from the Latin word Plagiaries, which means Kidnap or
abduct.
WHY PLAGIARISM IS IMPRORTANT?
• Plagiarism is a Cheating Process
• Plagiarism is a Data Thefting Process
• Plagiarism is an Academic Offense
• Plagiarism is an Academic Theft
• Plagiarism is a Stealing of Intellectual Property

TYPES OF PLAGIARISM
Mainly there are two types of plagiarism
1. Intentional Plagiarism
2. Unintentional Plagiarism

Intentional Plagiarism
• Cut and Paste from Electronic Resources
• Borrowing or Buying Assignment
• Copying others work
• Downloading Text, Article, Story, Essay, Poetry, Presentation etc.

Unintentional Plagiarism
• Not Knowing how to acknowledge, or in corporate sources of information
through proper summarizing or quotation.
• Careless copying or cutting from electronic database
• Failure to use our own vow
HOW TO AVOID PLAGIARISM
Following are the points to avoid Plagiarism:
1. Develop your writing skills
2. Take careful notes
3. Use your own ideas
4. Rewrite others ideas in your own words.

SOFTWARE LICENSE:
• A software licenses is a document that provides legally binding guidelines to
the person who hold it for the distribution of software.
• Software licenses typically provides and end users with right to make one or
more copies of the software without licensing term and conditions software,
the limitation of liabilities warranties and protection.

BENEFITS OF SOFTWARE LICENSE


1. The right software license can make our money
2. The license holder receives around the clock license support.
3. Using unlicensed software against the law.

SOFTWARE COPYRIGHT
Software Copyright is used by software developer’s, companies to prevent
unauthorized copying of this software.
Free and Open Source license also rely on copyright law to enforce this term.

PROTECTS OUR RIGHTS


• It protects software part, frequencies and organization
• It protects our software structure.
FOSS
• FOSS stands for free and open source software.
• FOSS is a kind of software that allow us not only freely run the program for any
purpose but also provided user accesses to its source code.
• It also allows us to modify as we wish, freely distribute copies of the digital
designs

FEATURES OR CRITERION FOR FOSS


1. Modify version can do redistribute
2. Source code must be included
3. Anyone must be allowed to modify take source code.
4. It must be free

EXAMPLES OF FOSS
Following are the examples of FOSS:
1. An operating system like Linux, Unix Buster
2. DBALS- like mongo dB, SQLite, MySQL
3. Programming language like Java, Python, PHP

TYPES OF SOFTWARE BASED ON USE


1. Free Software
2. Open Software
3. Proprietary Software

FREE SOFTWARE
Free Software are those which are freely accessible, freely used changed improved
copy and distribute. It provides all type of freedom to the user.
OPEN SOURCE SOFTWARE
It can be also used freely and it can also be changed improved, copied and
redistributed by the user but it may have some cost for the media and support for the
future development.

PROPRIETARY SOFTWARE
Any crime that involves a computer and a network is called cyber crime or digital or
computer crime.
In some other words, Cyber crime is a type of crime in which a computer is the object
of the crime like Hacking, Spamming, Fishing or used as a tool to commit an offence.

STEPS TO PROTECT AGAINST CYBER CRIME


1. Go Offline when you don’t need an Internet Work
2. Less amount of Sharing Online
3. Think and Check Properly when you are using any Other Personal or Public Wi-
Fi.
4. If any doubt, then don’t click or open any unknown or suspicious link or
website.
5. Make sure your security software installed and updated in your system.
6. Log off or log out your digital account or system when not in use or need.

HACKING
Hacking is the process of gaining unauthorized access into a company device or a group
of computer system this done through cracking of passwords and codes which given
access to system.
DIFFERENT BETWEEN HACKER AND CRACKER
The main different between Hacker and Cracker is that a break the security of a
computer system but a hacker as a person like to explore computer system and
connected devices.

TYPES OF HACKERS
Basically, there are two types of Hackers:
1. Black Hat Hacker
2. White Hat Hacker
3. Grey Hat Hacker

Black Hat Hacker


A black hat hacker is a person who uses their computer skills to do bad things, like
stealing information or causing harm to computers and networks. The is used
knowledge and software for the personal other

White Hat Hacker


Those are individual who used there hacking skills for defied purpose. In their work,
white hat hacker uses their knowledge and skill for the good work or vented for user.
Ethical Hacking are also known as White Hat Hacker.

Grey Hat Hacker


They are individual who work both affinely and defensively at the different times and
conditions. The Grey Hat Hacker behavior can’t be judged or predicted because some
time the hacker used this skill for the defensively word or sometimes use their work of
offensively work.
HACKING PROCESS
1. Digital Footprints
2. Scanning
3. Gaming Access
4. Maintaining Access

HOW TO PREVENT HACKING?


1. Do not click on the unknown or random e-mail attachment.
2. Never store or share the login information.
3. Download software from authorized website
4. Scan all types media and hard drive before using.
5. Make strong password and don’t disclosed.

PHISHING
It is a cyber attack that uses disguised e-mail as a weapon. The goal is to trick the e-
mail recipient into believing that the message is something we want or head.
The recipient filled or sent some sensitive information like phone number user id
password etc., then attacker use these.

HOW TO PREVENT PHISHING?


1. Watch out for the URL redirect that sent to the different website Wi-Fi identical
design.
2. Always check the spelling of URL before clicking
3. Don’t post any personal any personal data or information on the social media
like DOB (Date of Birth), Mobile Number, Vehicle Number, Aadhar Number, Pan
Card Number and Address etc.
CYBERBULLYING
It is the use of technology to harassed, threaten, or mimiliate a target.
Example of Cyberbullying is sending memes, texts, posting false information about the
person online or sharing embarrassing photos or videos.

TYPES OF CYBERBULLYING
There are different types of cyberbullying like:
1. Daxing
2. Harassment
3. Cyberstalking
4. Impersonation

HOW TO PREVENT CYBERBULLYING?


We should teach/ guide/ aware about the cyberbullying with the help of the following
precautions:
1. Watch for the following signs of cyberbullying in children.
2. Be aware in the online activities.
3. Avoidance of discussing what they are doing online.
4. Deactivating social media accounts
5. Be alert about the emotional responses.

CYBER LAW
• Cyber Law is a part of the legal system that deals with the cyber space internet
and with some other legal issues.
• Cyber Law covers a broad/ wide area like freedom of expressions, access to and
utilization of the internet and online security/ privacy.
• It is also called law of the web.
IMPORTANCE OF CYBER LAW
• Cyber Law plays a very important role in the current scenario and technology’s
world.
• It is important as it is concerned to almost all aspects of activities and
transactions that take place either on the internet or any other communication
devices.

IT ACT
• Information Technology (IT) Act of India is also known as ITA-2000 or it is also
called IT Act.
• It Act is an Act of Indian Parliament, it was notified on 17 October 2000. It is
most important law in India that deals with the digital crimes, cybercrime and
electronic commerce.
• It is based on the united nation model law recommended by the assembly of
UN in January 1997.

KEY POINT OF IT ACT/ KEY FEATURES OF IT ACT


1. Digital Signature are given legal validity with in the IT Act.
2. Email is now considered valid and legal form of commination.
3. Issues digital certificate by the certifying authorities to new business of the
companies.
4. Its case of any harm or loss done to the company by criminals the IT Act provide
a remedy to the company in the form of money
OFFENCE AND PENALTY (BY IT ACT):
Following are the Penalty by the IT Act according to the Offence,

SECTION OFFENCE PENALTY


67 A Publishing Images Imprisonment up to 7
containing Sexual years or fine up to Rs.10
Material lakh

67 B Publishing child Imprisonment into 5 years


Pornography or fine up to Rs. 10 lakhs
on first convection and
imprisonment up to 7
years or and fine up to Rs.
10 lakhs on second
convection.

67 C • Failure to maintain • Imprisonment up


record to 3 year or/ and
with fine
• Failure or refusal • Imprisonment up
to comply with to 3 years and / or
orders fine up Rs. 20 lakhs

69 Failure or Refusal to Imprisonment up to 7


descript data year and possible fine

70 Securing access to a Imprisonment up to 10


protected system year and / or a fine

71 Misrepresentation Imprisonment up to 3
year or/ and with fine up
to Rs. 1 lakhs
E-WASTE
• Whenever electronic devices cover up it working life or become now usable due
to some technological advancement or become a non-functional is called E-
waste or such kind of electronic material comes under the categories of
electronic wastes.
• Managing such kind of non-functional electronic devices is named as E-waste
management.

E-WASTE/ E-WASTE HAZARDS


The E-waste Hazards can be categorized in two parts,
1. Environment
2. Human Health

On Environmental:
1. Air Pollution
2. Ground Water Pollution
3. Acidification of Soil
4. Land fill with lead and heavy mental

HUMAN HEALTH
1. Chronic Damage of the Brain
2. DNA Damage
3. Lung Cancer
4. Asthmatic Bronchitis
WAYS TO DISPOSE OF E-WASTE
1. Sale of your outdated technology.
2. Give your electronic waste to a certified e-waste cycle.
3. Visit civics institution.
4. Donating your outdated technology.

AWARENESS OF HEALTH
Awareness of Health concern related to the uses of technology

1. Physical Problem:
I. Loss of attention and stress
II. Sleeping disorder
III. Decrease of productivity
IV. Repetitive strain injury
V. Computer vision syndrome
VI. Various type of radiation
VII. Different types of medical syndrome.

2. Psychological Problem:

I. Computer Anxiety
II. Fear of Technology
III. Internet Addiction
a) Infornography
b) You Tube Addiction
c) Google Staking
d) Egosurfing
e) Blog Streaking
f) Wikipedia

You might also like