0% found this document useful (0 votes)
46 views36 pages

Society, Law and Ethics

Uploaded by

Pritika Sachdeva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views36 pages

Society, Law and Ethics

Uploaded by

Pritika Sachdeva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 36

SOCIETY, LAW AND ETHICS

DIGITAL FOOTPRINTS
A digital footprint is data that is left behind when users have been
online. There are two types of digital footprints which are
active and passive.
An active digital footprint is where the user has
deliberately shared information about themselves either
by using social media sites or by using websites.
Examples of active digital footprints
▪ Posting on Instagram, Facebook, Instagram, Twitter,
and other social media platforms
▪ Filling out online forms, i.e. when signing up to receive
emails or texts
▪ Agreeing to install cookies on our devices when
prompted by the browser
DIGITAL FOOTPRINTS
A digital footprint is data that is left behind when users have been
online. There are two types of digital footprints which are
active and passive.
A passive digital footprint is made when
information is collected from the user without the
person knowing this is happening.
Examples of passive digital footprints
▪ Websites that install cookies in our device without
disclosing it to us
▪ Apps and websites that use geolocation to pinpoint our
location
▪ Social media news channels and advertisers that use
our likes, shares, and comments to profile us and to serve
HOW DIGITAL FOOTPRINT IS BEING USED FOR
MARKETING PURPOSES

Digital footprints are also known as cyber shadow,


electronic footprint, or digital shadow are
generally collected with the help of tracking cookies
these cookies are created while using popular sites.
Whatever we search is stored in these along with our
dates, GPS relevant data.
These are shared by actual site we are visiting to the
popular sites.
Popular sites in tern analyze these data and revert
back in the form of advertise later on.
For e.g. we search for a flight from x location to y
location for a particular date. Next day if we open
HOW TO MANAGE DIGITAL FOOTPRINTS

Enter name into several search


engines
Double-check privacy settings, but
don't trust them
Create strong, memorable passwords
Keep all our software up to date.
Review our mobile use. Delete useless
files(temp.)
NET OR COMMUNICATION ETIQUETTES
Netiquette is short for
"Internet etiquette“ or
communication etiquettes over
internet. It is Just like etiquette - a
code of polite behavior in society,
netiquette is a code of good
behavior on the Internet. It
includes several aspects of the
Internet, social media, email,
online chat, web forums, website
comments, multiplayer gaming,
NET OR COMMUNICATION ETIQUETTES
DATA PROTECTION
Data protection - refers to the
practices, safeguards, and binding
rules put in place to protect our
personal information and ensure that
it remain in control. In short, we
should be able to decide whether or
not we want to share some
information, who has access to it, for
how long, for what reason, and be
HOW WE CAN PROTECT OUR PERSONAL DATA ONLINE

▪ Through Encrypt our Data


▪ Keep Passwords Private
▪ Don't Overshare on Social
Networking Sites ▪ Use Security
Software
▪ Avoid Phishing Emails
▪ Be Wise About Wi-Fi
▪ Be Alert to Impersonators
▪ Safely Dispose of Personal
INTELLECTUAL PROPERTY
Intellectual Property (IP) – is a property created by a person
or group of persons using their own intellect for ultimate use in
commerce and which is already not available in the public domain.
Examples of IP Property which are, an invention relating to a
product or any process, a new design, a literary or artistic work
and a trademark (a word, a symbol and / or a logo, etc.)
Intellectual Property Right (IPR) is the statutory right granted by
the Government, to the owner(s) of the intellectual property or
applicant(s) of an intellectual property (IP) to exclude others from
exploiting the IP commercially for a given period of time, in lieu of
the discloser of his/her IP in an IPR application.
COPYRIGHT
Copyright grants legal rights to creators
for their original works like writing,
photograph, audio recordings, video,
sculptures, architectural works, computer
software, and other creative works like
literary and artistic work. Copyrights are
automatically granted to creators and
authors.
For example, writer Rudyard Kipling holds the
copyright to his novel, ‘The Jungle Book’, which
tells the story of Mowgli, the jungle boy. It would
be an infringement of the writer’s copyright if
someone used parts of the novel without
PATENT
A patent is usually granted for
inventions. Unlike copyright, the inventor
needs to apply (file) for patenting the
invention. When a patent is granted, the
owner gets an exclusive right to prevent
others from using, selling, or distributing
the protected invention. Patent gives full
control to the patentee to decide
whether or how the invention can be
used by others.
TRADEMARK
Trademark includes any visual symbol,
word, name, design, slogan, label, etc.,
that distinguishes the brand or
commercial enterprise, from other
brands or commercial enterprises.
For example, no company other than Nike can
use the Nike brand to sell shoes or clothes. It
also prevents others from using a confusingly
similar mark, including words or phrases. For
example, confusing brands like “Nikke” cannot
be used. However, it may be possible to apply
VIOLATION OF IPR
Violation of intellectual property right may happen in
one of the following ways:

(A) Plagiarism With the availability of


Internet, we can instantly copy or share
text, pictures and videos. Presenting
someone else’s idea or work as one’s
own idea or work is called plagiarism. If
we copy some contents from Internet,
but do not mention the source or the
VIOLATION OF IPR
(B) Copyright Infringement:
Copyright infringement is when
we use other person’s work
without obtaining their
permission to use or we have
not paid for it, if it is being sold.
Suppose we download an
image from the Internet and
use it in our project. But if the
owner of the copyright of the
image does not permit its free
usage, then using such an
VIOLATION OF IPR
(C) Trademark
Infringement

Trademark Infringement
means unauthorised use
of other’s trademark on
products and services. An
owner of a trademark
may commence legal
proceedings against
someone who infringes
OPEN SOURCE SOFTWARE AND
LICENSING
Open source licenses help others to contribute to existing work or
project without seeking special individual permission to do so. The
GNU General public license (GPL) and the Creative
Commons (CC) are two popular categories of public
licenses.
CC is used for all kind of creative works like websites,
music, film, literature, etc. CC enables the free distribution
of an otherwise copyrighted work. It is used when an
author wants to give people the right to share, use and
build upon a work that they have created. GPL is primarily
designed for providing public licence to a software. GNU GPL is
another free software license, which provides end users the
CYBER CRIME
Criminal activities or offences
carried out in a digital environment
can be considered as cyber crime. In
such crimes, either the computer
itself is the target or the computer is
used as a tool to commit a crime.
Cyber crimes are carried out against
either an individual, or a group, or an
organisation or even against a
country, with the intent to directly or
indirectly cause physical harm,
1. HACKING
Hacking is the act of unauthorised access to a computer,
computer network or any digital system. Hackers usually have
technical expertise of the hardware and software. They look for
bugs to exploit and break into the system.
Hacking, when done with a positive intent, is called
ethical hacking. Such ethical hackers are known as white
hat hackers.
A non-ethical hacker is the one who tries to gain unauthorised
access to computers or networks in order to steal sensitive data
with the intent to damage or bring down systems. They are
called black hat hackers.
2 PHISHING AND FRAUD
EMAILS
Phishing is an unlawful
activity where fake websites or
emails that look original or
authentic are presented to the
user to fraudulently collect
sensitive and personal details,
particularly usernames,
passwords, banking and credit
card details. The most common
phishing method is through
email spoofing where a fake or
2 PHISHING AND FRAUD
EMAILS
A) Identity Theft:
Identity thieves increasingly use personal
information stolen from computers or
computer networks, to commit fraud by
using the data gained unlawfully. A user’s
identifiable personal data like
demographic details, email ID, banking
credentials, passport, PAN, Aadhaar
number and various such personal data
are stolen and misused by the hacker on
behalf of the victim. This is one type of
3 RANSOMWARE
This is another kind of cyber crime where the attacker gains
access to the computer and blocks the user from accessing,
usually by encrypting the data.
The attacker blackmails the victim to pay for getting access to
the data, or sometimes threaten to publish personal and
sensitive information or photographs unless a ransom is paid.
Ransomware can get downloaded when the users visit any
malicious or unsecure websites or download software from
doubtful repositories. Some ransomware are sent as email
attachments in spam mails. It can also reach our system when
4 CYBER BULLYING
Cyberbullying is bullying that takes place over digital devices
like cell phones, computers, and tablets. Cyberbullying can
occur through SMS, Text, and apps, or online in social media,
forums, or gaming where people can view, participate in, or
share content.

Cyberbullying includes sending, posting, or sharing


negative, harmful, false, or mean content about
someone else. It can include sharing personal or private
information about someone else causing
https://www.csrindia.org/helpline-n
4 CYBER BULLYING
The most common places where cyberbullying occurs
are:
• Social Media, such as Facebook, Instagram, Snapchat, and Tik Tok
• Text messaging and messaging apps on mobile or tablet devices
• Instant messaging, direct messaging, and online chatting over the
internet
• Online forums, chat rooms, and message boards, such as Reddit
• Email
https://www.csrindia.org/helpline-n
4 CYBER BULLYING
4 CYBER BULLYING
COMBATTING AND PREVENTING CYBER
CRIME
• Take regular backup of important data
• Use an antivirus software and keep it updated always
• Avoid installing pirated software. Always download software from known and
secure (HTTPS) sites
• Do not visit or download anything from untrusted websites
• Usually the browser alerts users about doubtful websites whose security
certificate could not be verified; avoid visiting such sites.
• Use strong password for web login, and change it periodically. Do not use same
password for all the websites.
• While using someone else’s computer, don’t allow browser to save password or
auto fill data.For an unknown site, do not agree to use cookies when asked for,
through a Yes/No option.
• Perform online transaction like shopping, ticketing, and other such services only
through well-known and secure sites
CYBER SAFETY
Cyber security is the practice of defending computers, servers,
mobile devices, electronic systems, networks, and data from
malicious attacks. It's also known as information technology
security or electronic
CYBER AWARENESS AND HYGIENEinformation security.
FOR TEENS AND YOUNG ADULTS
Secure your online presence just like you secure yourself: If you have not selected the right
settings on your social media accounts, then photos and videos posted can be viewed, downloaded
and used by others without your knowledge.
Be selective about accepting friend request of strangers on social media
Remember to logout from social media websites after use
Secure your phone with password.
Be mindful of your appearance on video chat & video calls
If you notice your fake account has been created, you can immediately inform social media service
provider so that the account can be blocked.
There have been instances where video chats which were supposed to be private in nature have been
recorded and shared on social media groups and websites
CYBER SAFETY
CYBER AWARENESS AND HYGIENE FOR TEENS AND YOUNG ADULTS
Protect yourself from Cyber stalking:Cyber stalkers show advances on a person
repeatedly despite clear indication of disinterest by such person. They use internet, email,
social media or any other form of electronic communication for stalking.
Disable location services for social media sites, mobile devices etc.
Refrain from sharing your personal information like Phone number, e-mail address,
photographs with unknown persons
Beware of fake social media accounts- Not all the accounts are real and not all
information provided on accounts are true
Be cautious with sensitive Browsing
The deleted data on your communication devices can be recovered.
Report if you find content related to of Child Pornography (CP)/Child Sexual
Abuse Material (CSAM) or sexually explicit material.
You can also report it on National Cyber Crime Reporting Portal (www.cybercrime.gov.in)
ARE YOU REALLY YOU?
ARE YOU REALLY YOU?
 Some of your Gee, you sound
really cute and we
online “friends have the same
may not be who birthday! We must
they say they are. be destined to meet!
 Someone who tells
you “she” is a
teenager could be
a 40-year old man
posing as a
teenager.
Well, I don’t mind admitting I was
homecoming queen and maybe we
could celebrate our birthdays together.
ARE YOU REALLY YOU?
ARE YOU REALLY YOU?
 Some of your Gee, you sound
really cute and we
online “friends have the same
may not be who birthday! We must
they say they are. be destined to meet!
 Someone who tells
you “she” is a
teenager could be
a 40-year old man
posing as a
teenager.
Well, I don’t mind admitting I was
homecoming queen and maybe we
could celebrate our birthdays together.
MALWARE
Malware, or “malicious software,” is an umbrella term that describes any malicious program
or code that is harmful to systems.
Hostile, intrusive, and intentionally nasty, malware seeks to invade, damage, or disable
computers, computer systems, networks, tablets, and mobile devices, often by taking
partial control over a device’s operations. Like the human flu, it interferes with normal
functioning.
FEW TELLTALE SIGNS THAT YOU HAVE MALWARE ON YOUR SYSTEM:
1. Your computer slows down. One of malware’s side effects is to reduce the speed of
your operating system (OS).
2. Your screen is inundated with annoying ads. Unexpected pop-up ads are a typical sign of a
malware infection.
3. Your system crashes. This can come as a freeze or a BSOD (Blue Screen of Death), the latter
occurs on Windows systems after encountering a fatal error.
4. Your browser settings change. If you notice your homepage changed or you have new toolbars,
extensions, or plugins installed, then you might have some sort of malware infection.
5. Your antivirus product stops working and you cannot turn it back on, leaving you unprotected
TYPES OF MALWARE
Adware is unwanted software designed to throw advertisements up on your screen, most
often within a web browser.
Spyware is malware that secretly observes the computer user’s activities without
permission and reports it to the software’s author.
Worms are a type of malware similar to viruses. Like viruses, worms are self-replicating.
The big difference is that worms can spread across systems on their own, whereas viruses
need some sort of action from a user in order to initiate the infection.
A Trojan, or Trojan horse, is one of the most dangerous malware types. It usually
represents itself as something useful in order to trick you. Once it’s on your system, the
attackers behind the Trojan gain unauthorized access to the affected computer. From there,
Trojans can be used to steal financial information or install other forms of malware, often
ransomware.
Rootkit is a form of malware that provides the attacker with administrator privileges on
the infected system, also known as “root” access.
E-WASTE MANAGEMENT
E-waste management
INDIAN INFORMATION TECHNOLOGY ACT (IT
ACT)
INDIAN INFORMATION TECHNOLOGY ACT (IT
ACT)
The Government of India’s Information Technology Act, 2000
(also known as IT Act), amended in 2008, provides guidelines to
the user on the processing, storage and transmission of
sensitive information. In many Indian states, there are cyber
cells in police stations where one can report any cyber crime.
The act provides legal framework for electronic governance by
giving recognition to electronic records and digital signatures.
The act outlines cyber crimes and penalties for them.
Cyber Appellate Tribunal has been established to resolve
disputes arising from cyber crime, such as tampering with
computer source documents, hacking the computer system,

You might also like