Society, Law and Ethics
Society, Law and Ethics
DIGITAL FOOTPRINTS
A digital footprint is data that is left behind when users have been
online. There are two types of digital footprints which are
active and passive.
An active digital footprint is where the user has
deliberately shared information about themselves either
by using social media sites or by using websites.
Examples of active digital footprints
▪ Posting on Instagram, Facebook, Instagram, Twitter,
and other social media platforms
▪ Filling out online forms, i.e. when signing up to receive
emails or texts
▪ Agreeing to install cookies on our devices when
prompted by the browser
DIGITAL FOOTPRINTS
A digital footprint is data that is left behind when users have been
online. There are two types of digital footprints which are
active and passive.
A passive digital footprint is made when
information is collected from the user without the
person knowing this is happening.
Examples of passive digital footprints
▪ Websites that install cookies in our device without
disclosing it to us
▪ Apps and websites that use geolocation to pinpoint our
location
▪ Social media news channels and advertisers that use
our likes, shares, and comments to profile us and to serve
HOW DIGITAL FOOTPRINT IS BEING USED FOR
MARKETING PURPOSES
Trademark Infringement
means unauthorised use
of other’s trademark on
products and services. An
owner of a trademark
may commence legal
proceedings against
someone who infringes
OPEN SOURCE SOFTWARE AND
LICENSING
Open source licenses help others to contribute to existing work or
project without seeking special individual permission to do so. The
GNU General public license (GPL) and the Creative
Commons (CC) are two popular categories of public
licenses.
CC is used for all kind of creative works like websites,
music, film, literature, etc. CC enables the free distribution
of an otherwise copyrighted work. It is used when an
author wants to give people the right to share, use and
build upon a work that they have created. GPL is primarily
designed for providing public licence to a software. GNU GPL is
another free software license, which provides end users the
CYBER CRIME
Criminal activities or offences
carried out in a digital environment
can be considered as cyber crime. In
such crimes, either the computer
itself is the target or the computer is
used as a tool to commit a crime.
Cyber crimes are carried out against
either an individual, or a group, or an
organisation or even against a
country, with the intent to directly or
indirectly cause physical harm,
1. HACKING
Hacking is the act of unauthorised access to a computer,
computer network or any digital system. Hackers usually have
technical expertise of the hardware and software. They look for
bugs to exploit and break into the system.
Hacking, when done with a positive intent, is called
ethical hacking. Such ethical hackers are known as white
hat hackers.
A non-ethical hacker is the one who tries to gain unauthorised
access to computers or networks in order to steal sensitive data
with the intent to damage or bring down systems. They are
called black hat hackers.
2 PHISHING AND FRAUD
EMAILS
Phishing is an unlawful
activity where fake websites or
emails that look original or
authentic are presented to the
user to fraudulently collect
sensitive and personal details,
particularly usernames,
passwords, banking and credit
card details. The most common
phishing method is through
email spoofing where a fake or
2 PHISHING AND FRAUD
EMAILS
A) Identity Theft:
Identity thieves increasingly use personal
information stolen from computers or
computer networks, to commit fraud by
using the data gained unlawfully. A user’s
identifiable personal data like
demographic details, email ID, banking
credentials, passport, PAN, Aadhaar
number and various such personal data
are stolen and misused by the hacker on
behalf of the victim. This is one type of
3 RANSOMWARE
This is another kind of cyber crime where the attacker gains
access to the computer and blocks the user from accessing,
usually by encrypting the data.
The attacker blackmails the victim to pay for getting access to
the data, or sometimes threaten to publish personal and
sensitive information or photographs unless a ransom is paid.
Ransomware can get downloaded when the users visit any
malicious or unsecure websites or download software from
doubtful repositories. Some ransomware are sent as email
attachments in spam mails. It can also reach our system when
4 CYBER BULLYING
Cyberbullying is bullying that takes place over digital devices
like cell phones, computers, and tablets. Cyberbullying can
occur through SMS, Text, and apps, or online in social media,
forums, or gaming where people can view, participate in, or
share content.