You are on page 1of 4

Intellectual property rights- are the rights given to persons over the creations of their minds.

They usually give the


creator an exclusive right over the use of his/her creation for a certain period of time.
Intellectual property is divided into two category
Industrial property –Includes inventions, trademarks, industrial designs, commercial names, designations, geographic
locations
Copyright -includes literacy and artistic works such as novels, poems, and plays, films musical works such as drawing,
painting, photographs etc.

Plagiarism- copying someone else work and then showing it off as one owns.

Digital rights management (DRM) is a systematic approach to copyright protection for digital media. The purpose of
DRM is to prevent unauthorized redistribution of digital media and restrict the ways consumers can copy content
they've purchased
Software licensing- is the legal right to use document any application. Common example of licensing is proprietary
software

GNU General Public License


Copy the Software: There’s no limit to where you can copy and howsoever many times.
Distribution: You can distribute as whatever form of distribution you want.
Charge a Fee: You can charge someone for the software, but remember to give them a copy of GNU GPL which would
tell them that they could get the software free from elsewhere. This also gives a chance for you to tell them why you are
charging for it.
Change the Codebase Howsoever: If you want to make changes to it, you can. Remove or add features howsoever you
want. The only condition is that your project should also be released under GNU GPL.

CREATIVE COMMONS
Accreditation: Author must be attributed as the creator of the work. Then, work can be modified, distributed, copied,
and used otherwise.
Shared with CC: The work can be modified, distributed but only under CC License.
Non-Commercial: Work can be modified, distributed but not for commercial purposes.
No Derivative Works: You can copy and distribute the licensed work, but you can’t modify it in any way or create work
based on the origin

APACHE LICENSE
Rights are Never Ending: Once the rights under Apache License have been granted, you can continue to use them
forever, there’s no need of renewing it.

Worldwide Authority of Rights: Even if rights are granted for one country, automatically, they’re granted in all countries.
Rights for No Fee or Royalty: No charge, neither up front nor per usage or on any other basis applicable.

Rights are Irrevocable: No can tell you license can’t be in use anymore

Open source and open data -open source software provides freedom to use free of cost, modify the source code and
redistribute to others.

Open data -it is all stored data which could be made accessible in public interest without any restriction on its usage and
distribution. It has following features.
1. Availability and access
2. Reuse and redistribution
3. Universal participation
Privacy law refers to the laws that deal with the regulation, storing, and using of personally identifiable information of
individuals, which can be collected by governments, public or private organizations, or other individuals. Threats to
privacy--.User tracking by-cookies, ISP, Spyware programs phishing etc.

Cybercrime- is a crime that involves a computer and a network. The computer may have been used in the commission of
a crime, or it may be the target
Cybercrime is defined as a crime where a computer is the object of the crime or is used as a tool to commit an offense.

Phishing is the fraudulent use of electronic communications to deceive and take advantage of users. Phishing attacks
attempt to gain sensitive, confidential information such as usernames, passwords, credit card information, network
credentials etc.
Illegal downloading is obtaining files that you don’t have the right to use from the internet.
Illegal downloading and file sharing of copyrighted music, movies or other entertainment files is intellectual
property/copyright infringement

Cyber scams and frauds –refers to any scheme that uses one or more components of internet to perform fraudulent
Activities.
1) Credit/debit card fraud- Use of Credit/debit card to acquire money without proper authorization.
2) Non delivery of goods after online payment
3) Phishing
4) Identity theft- Use of another person’s personal information for the purpose of fraudulent practices.
5) Auction fraud- People has been encouraged to participate in online auction and when money has been paid
imposter will send lower standard item
Child pornography-publishing and transmitting obscene material about children in electronic form
Provision under cyber law to stop it are-
1) Conviction with 2 to 5 year of imprisonment and fine of 1 lakh.
2) Subsequent convictions with an imprisonment of 7-10 years and also a fine which may extend upto 10 lakh

Cyber forensics- it’s an electronic discovery technique used to determine and reveal technical criminal evidence. The
various capabilities of cyber forensics are
Recover deleted files, recover chat logs recover phone records, find malware and data collected

The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21
of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce.

67A Publishing images containing sexual acts .If a person publishes or transmits images containing a sexual explicit
act or conduct. Imprisonment up to seven years, or/and with fine up to ₹1,000,000

67B Publishing child porn or predating children online Imprisonment up to five years, or/and with fine up to
₹1,000,000 on first conviction. Imprisonment up to seven years, or/and with fine up to ₹1,000,000 on second conviction.
67C Failure to maintain records Persons deemed as intermediatary (such as an ISP) must maintain required
records for stipulated time. Failure is an offence. Imprisonment up to three years, or/and with fine.
68 Failure/refusal to comply with orders-any person who fails to comply with any such order shall be guilty of an
offence. Imprisonment up to three years, or/and with fine up to ₹200,000

69 Failure/refusal to decrypt data. Imprisonment up to seven years and possible fine.

70 Securing access or attempting to secure access to a protected system-Imprisonment up to ten years, or/and
with fine.
71 Misrepresentation-If anyone makes any misrepresentation to, or suppresses any material fact from, for
obtaining any license or Digital Signature Certificate. Imprisonment up to three years, or/and with fine up to
₹100,000

Biometrics- is the science and technology to analyze human body characteristic to authenticate the person.
Different way to authenticate 0- Password, Biometrics ,OTP, Token.
Impact of technology change on society
1) Technology has contributed to growth of industries or to the process of industrialization.
2) Technology and urbanization-The growth of industries has contributed to growth of cities.
3) Technology and unemployment-Technology is taking away jobs by labour saving machine.
4) Changes in social institutions- Technology has altered our modes of life .The institution of family, religion, morality
have been altered.

E Waste management- All electronic waste is made up of deadly chemicals .Disposing of gadgets and devices improperly
increases the chance of these dangerous chemicals contaminating the soil, polluting the air and leaching into water
bodies.Some eco-friendly waste disposal techniques are
1. Give your E waste to certified E-waste Recycler
2. Sell off /donate your outdated technology
3. Visit Civic institutions Enquire among university and schools for any re cycling programs
4. Give back to your electronic companies.

Gender and disability issues while teaching and using objects


Studies have shown that in many countries computer use in schools is dominated by men. Female teachers had less
regard for their own skills and knowledge
Different types of disabilities
Dyslexia is a learning disorder that affects your ability to read, spell, write, and speak.
dyscalculia-- brain-related condition that makes basic arithmetic hard to learn.
Dysgraphia is a specific learning disability that affects written expression. Dysgraphia can appear as difficulties with
spelling, poor handwriting and trouble putting thoughts on paper.
Vision problems
Hearing problems
How ICT can help
1.sticky keys-It serializes keystrokes instead of pressing multiple keys at a time, allowing the user to press and release a
modifier key, such as Shift, Ctrl, Alt, or the Windows key, and have it remain active until any other key is pressed
2. When Toggle Keys is turned on, computer will provide sound cues when the locking keys ( Caps Lock, Num Lock, or
Scroll Lock) are pressed.
3. filter key-it is an accessibility function that tells the keyboard to ignore brief or repeated keystrokes
4. Use of multimedia such as audio video and can encourage interaction
can learn word recognition and writing through through use of pictures and symbols through software like word
processor

You might also like