Professional Documents
Culture Documents
Cyber Safety 2024
Cyber Safety 2024
CLASS-XI
UNIT-III
SOCIETY, LAW AND ETHICS
VIRUSES : It is a malicious program that damages data and files and causes harm
to the computer system. It can spread with a host program. It replicates itself.
Trojan Horse : It is a computer program which carries out malicious operations
without user’s knowledge.
It damage the computer’s stored data. It is generally spread through e-mail
and exchange information between computers.
Worms : A worm is a malicious program but it copies itself across a network. It is
self contained and does not require a host. It can spread without a host program
INDIAN INFORMATION TECHNOLOGY ACT(IT Act):
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is
an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is
the primary law in India dealing with cybercrime and electronic commerce.
ETHICS:
Intellectual Property Rights : (IPR) are the rights of the owner of information to
decide how much information is to be exchanged, shared or distributed. Also it
gives the owner a right to decide the price for doing (exchanging / sharing/
distributing) so.
These rights can include copyright, patents, trademarks, and trade secrets.
Violation of IPR: the violation of IPR is called infringement or IPR infringement.
There are 3 forms of IPR infringement :
1. Plagiarism
2. Copyright infringement
3. Trademark infringement
Plagiarism : is stealing someone else’s intellectual work and representing it as
your own work giving credit to creator or without citing the source of
information.
Copyright infringement: refers to using copyrighted work without the consent or
permission of the copyright holder.
Example : selling of pirated books, copied/duplicated art work, pirated software
etc.
Trademark infringement: It is the unauthorized usage of a mark that is identical
or deceptively similar to a registered trademark.
OPEN SOURCE SOFTWARE AND LICENCES:
Open Source Software can be freely used (modifications allowed, constructing
business models, free redistribution) but it does not have to be free of cost.
Open Source licenses that comply with the open source. (i.e. they allow software
to be freely used, modified, and shared)
There are 3 open Licenses:
1. Creative Commons Licenses (CC Licenses): give permissions to copy,
modify, distribute the original works by attributing the creator of the work.
2. General Public License(GPL): It allows users legally copy, distribute and
modify software.
3. Apache License: It grants a number of rights to users. These rights can be
applied to both copyrights and patents.
E-waste management:
Only 43 million tones (MT) of the waste is collected, 11.9 MT is treated and
31 MT is dumped in landfill sites. However, almost all municipal authorities
deposit solid waste at a dump yard within or outside the city haphazardly.
Experts believe that India is following a flawed system of waste disposal
and management..