Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

VIVEKANAND SCHOOL

CLASS-XI
UNIT-III
SOCIETY, LAW AND ETHICS

CYBER SAFETY : is the safe and responsible use of Information and


Communication Technologies (ICT).
(OR)
It refers to safe and responsible use of internet to ensure safety and security of
personal information and not posing threat to anyone else’s information.
Safely browsing the web : Protecting yourself by securing your devices, software
and connection is important, but making the right choices when doing things on
the web can make a huge difference to your safety online.
Identity Protection : Fraudsters can acquire and use your personal details in a
variety of ways. Find out how to prevent and respond to the growing problem of
Identity theft.
Identity theft is a type of fraud that involves using someone else's identity to
steal money or gain other benefits.
CONFIDENTIALITY OF INFORMATION : It ensure that only authorized users get
access to sensitive and protected data.
Best practices used to ensure confidentiality are as follows:
1. Use firewall
2. Control browser setting to block tracking Browse privately wherever
possible
3. Be careful while posting on internet
4. Use safe sites (URL starts with https://)
5. Carefully handle emails
6. Do not give sensitive information on wireless network
7. Avoid using public computers
8. Do not save your login information
9. Never save passwords while working on a public computer.
10.Properly log out before you leave the computer.
11.Erase history and traces of your work (i.e. clear history and cookies).

CYBER-CRIME (COMPUTER CRIME) : Any criminal offence that is facilitated, by


or involves the use of electronic communications or information systems,
including any electronic device, computer or the internet is called as Cyber
Crime. ( it is a crime that involves a computer and a network)
(OR)
The use of computer is an instrument to further illegal ends such as:
Phishing, illegal downloading, child pornography, Scam, Cyber trolls, Cyber
Bullying, Cyber Stalking, Spreading Rumours online, Hacking etc

Hacking : refers to the misuse of devices like computers, smartphones, tablets,


and networks to cause damage to or corrupt systems, gather information on
users, steal data and documents or disrupt data related activity.
(OR) to use a computer to look at and /or change information that is stored on
another computer without permission.

Eavesdropping : The unauthorized monitoring of other people’s communications


is called Eavesdropping.
Example : Secretly listen to a conversion of others without their consent)
PHISHING : is the fraudulent practice of attempting to acquire sensitive information
from individuals over the internet by sending e-mails.
(OR)
Phishing is the fraudulent attempt to obtain information such as usernames,
passwords, bank account information and social security number.
CYBER TROLLS : Derogatory/provocative messages or comments posted online
targeting people are called cyber trolls.
CYBER BULLING : Harassing, demeaning, embarrassing, defaming or intimidating
some one using modern technology like internet, cell phones, instant messengers,
social networks etc., is called cyber Bulling.
(OR)
It is the use of technology to tease, humiliate, threaten and harass some one.
CYBER STALKING : is the use of internet or other electronic means to stalk or
harass an individual, or group of individuals, or an organization.
Ransomware : is a type of malicious software designed to block access to a
computer system until a sum of money is paid.
"Although ransomware is usually aimed at individuals, it's only a matter of time
before business is targeted as well"
How to protect yourself against cybercrime
1. Use a full-service internet security suite

2. Use strong passwords


Don’t repeat your passwords on different sites, and change your passwords
regularly. Make them complex. That means using a combination of at least 10
letters, numbers, and symbols. A password management application can help you
to keep your passwords locked down.
3. Keep your software updated
4. Manage your social media settings
5. Strengthen your home network
6. Talk to your children about the internet
You can teach your kids about acceptable use of the internet without shutting
down communication channels. Make sure they know that they can come to you
if they’re experiencing any kind of online harassment, stalking, or bullying.
7. Keep up to date on major security breaches
If you do business with a merchant or have an account on a website that’s been
impacted by a security breach, find out what information the hackers accessed
and change your password immediately.
8. Take measures to help protect yourself against identity theft
9. Know that identity theft can happen anywhere
It’s smart to know how to protect your identity even when traveling. There are a
lot of things you can do to help keep criminals from getting your private
information on the road. These include keeping your travel plans off social media
and being using a VPN when accessing the internet over your hotel’s Wi-Fi
network.
10. Keep an eye on the kids

11. Know what to do if you become a victim


Malware ( Malicious Software): Malware is intrusive software that is designed to
damage and destroy computers and computer systems without the users
consent.
Malware is a contraction for “malicious software.” Examples of common
malware includes viruses, worms, Trojan viruses, spyware, adware, and
ransomware.
Adware : Software that automatically displays or downloads advertising material
such as banners or pop-ups when a user is online.
It is a free software that is supported by advertisements.

VIRUSES : It is a malicious program that damages data and files and causes harm
to the computer system. It can spread with a host program. It replicates itself.
Trojan Horse : It is a computer program which carries out malicious operations
without user’s knowledge.
It damage the computer’s stored data. It is generally spread through e-mail
and exchange information between computers.
Worms : A worm is a malicious program but it copies itself across a network. It is
self contained and does not require a host. It can spread without a host program
INDIAN INFORMATION TECHNOLOGY ACT(IT Act):

The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is
an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is
the primary law in India dealing with cybercrime and electronic commerce.

The Information Technology Act, 2000 provides legal recognition to the


transaction done via electronic exchange of data and other electronic means of
communication or electronic commerce transactions. ... Give legal sanction and
also facilitate the electronic transfer of funds between banks and financial
institutions.
Digital Footprints : are the records and traces individuals leave behind as they use
the internet.
Example : Your interactions on social media your friend circle on social media
sites, sites you visit, online purchases, locations visited through face book, check
Instagram etc.
Digital footprints can be of two forms :
1. Active footprints : are formed by your online activity you do knowingly.
2. Passive footprints : are formed by any and every activity that you perform
online and you do not know about it(e.g. your searches, your online
payments, games you play and so on)

ETHICS:

Intellectual Property Rights : (IPR) are the rights of the owner of information to
decide how much information is to be exchanged, shared or distributed. Also it
gives the owner a right to decide the price for doing (exchanging / sharing/
distributing) so.
These rights can include copyright, patents, trademarks, and trade secrets.
Violation of IPR: the violation of IPR is called infringement or IPR infringement.
There are 3 forms of IPR infringement :
1. Plagiarism
2. Copyright infringement
3. Trademark infringement
Plagiarism : is stealing someone else’s intellectual work and representing it as
your own work giving credit to creator or without citing the source of
information.
Copyright infringement: refers to using copyrighted work without the consent or
permission of the copyright holder.
Example : selling of pirated books, copied/duplicated art work, pirated software
etc.
Trademark infringement: It is the unauthorized usage of a mark that is identical
or deceptively similar to a registered trademark.
OPEN SOURCE SOFTWARE AND LICENCES:
Open Source Software can be freely used (modifications allowed, constructing
business models, free redistribution) but it does not have to be free of cost.
Open Source licenses that comply with the open source. (i.e. they allow software
to be freely used, modified, and shared)
There are 3 open Licenses:
1. Creative Commons Licenses (CC Licenses): give permissions to copy,
modify, distribute the original works by attributing the creator of the work.
2. General Public License(GPL): It allows users legally copy, distribute and
modify software.
3. Apache License: It grants a number of rights to users. These rights can be
applied to both copyrights and patents.
E-waste management:

The reduced life spans of electrical, electronic and consumer electronic


devices are generating large quantities of E-Waste, which is growing rapidly
every year. E-waste management is also called urban mining. It is the
process of extracting the parts out of the e-waste to either sell or reuse.

Environmental effects of e-waste: The toxic materials from electronic


devices are released into bodies of water, groundwater, soil and air,
affecting both land and sea animals. When you throw out your e-waste they
wind up in landfills, causing toxic materials to seep into groundwater

The following are 7 ways to curb these environmental hazards, reduce


electronic waste, and save our planet:
1. Sell old Electronics. ...
2. Donate old Electronics. ...
3. Recycle and Dispose of E-Waste Properly. ...
4. Maintain your Electronics. ...
5. Repurpose or Re-evaluate. ...
6. Store Data Online. ...
7. Buy Energy Star Rated Electronics.

According to the EPA (Environmental Protection Agency), you can recycle


mercury-containing bulbs and tubes through
waste collection agencies, local retailers, and mail-back services (such as
Think Green from Waste Management). Unfortunately, incandescent
bulbs are not recyclable. They are non-toxic, though, so you can throw
them in the trash.

What should we do with our old electronics?


1. Don't trash them. First, we should never throw e-waste in the trash! ...
2. Pass them on for reuse. ...
3. Recycle them. ...
4. Find a good e-waste recycler. ...
5. Staples stores. ...
6. Best Buy stores. ...
7. Do a cell phone recycling drive and fundraiser in your school.
8. Learn to fix broken gadgets yourself.

Here are some are some eco-friendly waste disposal techniques


that you can use to dispose of electronic waste locally:
● Visit Civic Institutions.
● Donating Your Outdated Technology. ...
● Sell Off Your Outdated Technology. ...
● Give Your Electronic Waste to a Certified E-Waste Recycler. .

Where Does Our E-Waste Go?

● Electronic waste from equipment of all sizes includes dangerous


chemicals like lead, cadmium, beryllium, mercury, and brominated
flame retardants. When we dispose of gadgets and devices
improperly, these hazardous materials have a high risk of polluting
the air, contaminating soil, and leaching into water sources.
● When e-waste sits in a typical landfill, for example, water flows
through the landfill and picks up trace elements from these dangerous
minerals. Eventually the contaminated landfill water, called
“leachate,” gets through layers of natural and manufactured landfill
liner and other protection. When it reaches natural groundwater, it
introduces lethal toxicity.

Sadly, just a tiny amount of the ewaste generated is recycled A report by


the Comptroller & Auditor General found that 4 lakh tons of electronic waste
is generated in India every year. The Central Pollution Control Board
estimates that around 0.5 metric tons of e-waste is generated every day.

e-waste managed in india

Only 43 million tones (MT) of the waste is collected, 11.9 MT is treated and
31 MT is dumped in landfill sites. However, almost all municipal authorities
deposit solid waste at a dump yard within or outside the city haphazardly.
Experts believe that India is following a flawed system of waste disposal
and management..

Gender Discrimination in Education: Sex discrimination occurs when a


person is treated unequally due to their sex, the biological factor of being
female or male.

Gender roles are the patterns of behaviors, attitudes, and expectations


associated with a particular sex—with being either male or
female.Teachers are certainly not the primary cause of gender role
differences, but sometimes teachers influence them by their responses
to and choices made on behalf of students.

Several factors contribute to low success rates of people with disabilities


in postsecondary programs and careers in general. Some students with
disabilities experience isolation as a result of not being accepted by their
peers. They rarely have access to positive role models with disabilities .

You might also like