Unit 3 - Society Laws and Ethics
Unit 3 - Society Laws and Ethics
Ethics
Digital Footprint
A digital footprint, sometimes called digital dossier is a body
of data that you create while using the Internet. It includes
the websites you visit, emails you send, and information you
submit to online services and can be traced back by an
individual.
It is of two types-
Intellectuals Property
Rights (IPR)
Intellectual property refers to intangible property
that hasbeen created by individuals and corporations for
their benefit or usage such as copyright, trademark,
patent and digital data. It is therefore unethical to copy
or steal the creativity and efforts of someone else.
INDUSTRIAL PROPERTY
Which include inventions (patents), commercial names,
industrial designs, trademarks, geographic indications and
designations etc.
Plagiarism
Plagiarism means not giving authors credit after
copying
that author’s work.
It can be classified as
1. Accidental/unintentional
2. Deliberate/intentional
Accidental/unintentional Deliberate/intentional
Plagiarism Plagiarism
copyleft
licenses
permissive
licenses
PROPRIETARY LICENSES
Exclusive rights in the software are retained with the owner
/developer/publisher. They reserve all the freedom and
rights to use and distribute this proprietary software.
PERMISSIVE LICENSES
Permissive licenses provide a royalty-free license to o
d
virtually anything with the source code.
COPYLEFT LICENSE
In the case of copyleft licenses, source code has to be
provided.
copyright
It is a form of protection given to the authors of “original
works of authorship”. This is given in the field of literature,
dramatics, music, software, art etc. This protection applies to
published as well as unpublished work.
Cyber Laws
Cyber law is the part of overall legal system that deals with
the Internet, cyberspace, and their respective legal issue.
Cyber law covers broad area including freedom of expression,
access to and usage of the Internet, and online privacy.
Generally cyber law is known as “Law of the Internet”.
Hacking
Hacking is identifying weakness in computer systems or
networks to exploit its weaknesses to gain access. Example
of Hacking, Using password cracking algorithm to gain
access to a system
Phishing
Phishing is an attempt to capture a user’s login password and
credit card details by including a URL in a spam e-mail that
links to a fake website controlled by the attacker as a
trustworthy entity.
• How to be safe while browsing web • Not every site you visit is
safe. • Every post or activity we do online is visible to others. •
Not everything you see or is promised online is true.
Identity Protection :
Confidentiality of Information :
Trojan :
The cyber laws in India and the provision for legal action and
punishment have been explained -
E-Waste Hazards
Mostly all electronic waste comprises of toxic chemicals
such as lead, beryllium, mercury etc.
Improper disposing of gadgets and devices increases
the amount of these toxic chemicals thus contaminated
the soil, causing air and water pollution.
The contaminated water which is highly polluted it thus
making it harmful for drinking purposes.
Improper e-waste recycling, such as by open burning
and acid baths creates hazardous and toxic compounds
like- dioxins, furans and acids.
Damage to the immune system
Skin disease.
Multi ailments.
Skin problems
E-Waste Management
E-waste management requires proper recycling and
recovery of the disposed material. The recycling and
recovery process includes following steps-
1. Neck strain
2. Vision Problem
3. Sense of isolation
4. Sleeping disorder
5. Stress
6. Loss of attention
7. Problem in social relationships of individuals.
8. Computer anxiety
9. Internet addiction etc.