Professional Documents
Culture Documents
Unit 2 Og6/G) 6 / Fdflhs HFNSF) Pq/Bfol K - Of) U: ! Foa/ G) LTSTF Cyber Ethics
Unit 2 Og6/G) 6 / Fdflhs HFNSF) Pq/Bfol K - Of) U: ! Foa/ G) LTSTF Cyber Ethics
Chapter 5
OG6/g]6 / ;fdflhs ;~hfnsf] pQ/bfoL k|of]u Responsible use of internet and
social media
OG6/g]6 / ;fdflhs ;~hfnsf] ;b'kof]u / b'?kof]u b'j} x'g ;S5g\ . s'g} sDKo'6/
k|of]u u/]/ jf sDKo'6/nfO{ nlIft u/]/ ul/g] s'g} klg k|sf/sf u}/sfg'gL, cg}lts
jf c;fdflhs sfo{nfO{ ;fOa/ ck/fw elgG5 . OG6/g]6sf] b'?kof]un] ;dfhdf
JolStsf] dof{bfdf cfFr cfpg'sf ;fy} slxn]sfxLF uDeL/ cfk/flws 36gfx¿;d]t
36\g ;S5 . o;af6 JolStut, :yfgLo, ;+:yfut, /fli6«o :t/ jf cGt/f{li6«o :t/sf
eoª\s/ b'3{6gf klg x'g ;S5. uf]Ko ;"rgf rf]/L ug{', OG6/g]6 7uL ug'{,
x\oflsª ug'{, sDKo'6/ efO/;sf] cfj|md0f, 8/–qf; lbg] cflb sfo{ ;fOa/ ck/fw
x'g\ . OG6/g]6 / ;fdflhs ;~hfndf ul/g] c;n Jojxf/nfO{ ;fOa/ g} ltstf jf Cyber
Ethics elgG5 .
!= ;fOa/ g}ltstf Cyber Ethics
\\;fOa/ g}ltstf eGgfn] sDKo'6/ / OG6/g]6sf] k|of]u ubf{ o;;DaGwL gLlt
lgodx¿sf] kfngf ug]{ eGg] a'lemG5 . sDKo'6/ / OG6/g]6sf] k|of]u ubf{ k|
of]ustf{, k|f]u|fd/, ck/]6/ jf cGo hf];'s}n] sDKo'6/ g}ltstfsf] kfngf
ug'{kb{5 . sDKo'6/, :df6{kmf]g, 6\ofan]6 cflbsf] k|of]u u/L ;"rgf,
;km\6j]o/, jf s'g} klg JolStut jf ;fd"lxs /]s8{x¿ rf]/L ug{', laufl/lbg' jf
sDKo'6/ efO/;sf] k|of]u ug{'x'Fb}g .
;fOa/ g}ltstfcg';f/ ug{' gx'g] sfo{x¿ Activities that should not be done
according to cyber ethics
-s_ c¿sf kmfOn jf /]s8{x¿ vf]Hg', x]g'{, laufg'{, x6fpg', skL ug'{, k|of]u
ug'{
-v_ c¿sf] sDKo'6/ kf;j8{ rf]g'{ / k|of]u ug'{
-u_ u|fxsx¿sf] JolStut a}ª\s vftf x]g'{, rf]g'{, laufg'{, l8lh6n ;xL rf]g'{ /
k|of]u ug'{
-3_ efO/; agfP/ k|of]u ug'{
-ª_ sDKo'6/sf] uf]kgLotf eª\u ug'{
-r_ em'6f Joxf]/fsf ;"rgf lbg'
-5_ ljB'tLo :j¿kdf u}/sfg'gL s'/f k|sfzg ug'{
-h_ s'g} klg If]q jf ;ª\3;+:yfdf /x]sf JolStut jf ;fd"lxs /]s8{x¿ lagf cg'dlt
x]g{',
;Rofpg', rf]g'{ / laufg'{
-em_ ljBfno jf SofDk;sf ljBfyL{x¿sf] /]s8{ jf dfs{ n]h/ rf]g{', x6fpg',
;Rofpg' jf s'g}
lsl;dn] gf]S;fgL k'¥ofpg' cflb .
o:tf lj|mofsnfkx¿nfO{ lg?T;flxt kfg{ tyf ck/fwLx¿nfO{ sf/afxL u/L
;hfo lbg g]kfn ;/sf/n] ljB'tLo -On]S6«f]lgs_ sf/f]af/ P]g, @)^# (Electronic
Transaction Act, ETA) agfO{ nfu' u/]sf] 5 .
ljB'tLo -On]S6«f]lgs_ sf/f]af/ P]g, @)^# cg';f/ ug{ gx'g] s]xL
sfd / ;hfo
;fdflhs ;~hfnsf ;'/lIft k|of]u ug{] pkfox¿ Use of safety measures of social
media
!= cfkm\gf] ;fdflhs ;~hfnsf] k|fOe];L ;]l6ª (Privacy settings) ldnfpg]
@= s'g} :6f6; jf sd]G6 kf]:6 ug{' klxn] o;n] kl5 s'g} c;/ kfnf{ ls eGg]af/]df /fd|/L
;f]rljrf/ ug{] .
#= ;~hfndf /fd|f] k|lti7f k|fKt ug{ k|oTg ug{], g/fd|f] efiff jf ljifoj:t'n]
cfkm}FnfO{ xfgL
k'¥ofpg] ePsfn] o:tf sfo{df ;r]t /xg]
$= cfkm\gf] uf]Ko s'/f uf]Ko g} /fVg], ;~hfndf kf]:6 gug{]
%= cfkm\gf] sDKo'6/nfO{ PlG6efO/;, OG6/g]6 ;'/Iff cflb Install u/L ;'lIft /fVg]
^= s;}n] tkfO{FnfO{ s'g} g/fd|f] Jojxf/ u/]df tTsfn cfkm\gf] cleefjs, lzIfs jf k|x/Lsf]
;xof]u lng] &= alnof] kf;j8{ k|of]u ug{] / a]nf a]nfdf kl/jt{g ul//xg], Capital
letter,
Small letter, ;ª\s]t / ;ª\Vof ld;fP/ kf;j8{ /fVg]
*= s'g} zª\sf:kb ;Gb]z jf Od]n cfPdf To;nfO{ gvf]Ng]