0% found this document useful (0 votes)
15 views16 pages

Dharsan Ip

The document discusses the societal impacts of digital footprints, including active and passive types, and emphasizes the importance of managing them to protect personal information and prevent risks such as identity theft. It also covers netiquette, data protection, intellectual property rights, plagiarism, software licensing, and cybercrime, providing guidelines for prevention and legal implications. Additionally, it highlights the hazards of e-waste and health concerns related to technology use.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
15 views16 pages

Dharsan Ip

The document discusses the societal impacts of digital footprints, including active and passive types, and emphasizes the importance of managing them to protect personal information and prevent risks such as identity theft. It also covers netiquette, data protection, intellectual property rights, plagiarism, software licensing, and cybercrime, providing guidelines for prevention and legal implications. Additionally, it highlights the hazards of e-waste and health concerns related to technology use.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 16
SOCIETAL IMPACTS DIGITAL FOOTPRINTS: ital Footprints is a data that is left behind when users a have been online. There are two types of Digital Footprints 1. Active Digital Footprints 2. Passive Digital Footprints ACTIVE DIGITAL FOOTPRINTS An active digital footprint is where the users has deliberately shared information about themselves. Either by using social media sites or by using websites. EXAMPLE ACTIVE DIGITAL FOOTPRINTS ‘© Posting on Facebook, Instagram and Twitter or any other Social Media Platform. ‘Filling out online forms, when signing up to receive emails or text. ‘© Agreed to install Cookies on our devices. PASSIVE DIGITAL FOOTPRINTS. A passive digital footprint is made when information is collected from the user without that person knowing, this is happening. EXAMPLE PASSIVE DIGITAL FOOTPRINTS Website that install cookies on our devices without disclosing us. Apps. and Websites that use geolocation to pin point our location. Social Media news channel and advertisement that uses are likes, shares and comments. WHY SHOULD BE CARE ABOUT DIGITAL FOOTPRINT OR MANAGING OUR DIGITAL FOOTPRINTS: Following are the different reason or managing are digital footprints: «To protect our images or reputation + Toprevent or financial losses * To prosperous our freedom ‘© Tomake safe personal information RISK DUE TO DIGITAL FOOTPRINT |. Privacy Concern . Identify Theft }. Fake Website 1. 2. 3. 4. . Scams. NETIQUETTE (NET OR COMMUNICATION ETIQUETTES) Netiquette is a short form “Internet Etiquette” or “Communication Etiquette” over the Internet. It is just like a human etiquette. A code of polite behavior in the society. Similarly, Netiquette is a code of good behavior on the Internet. Netiquette includes several aspects of internet, social media, e-mail, online chat, website comment’s online gaming or any online type of online communication. DO’S AND DON’T OF NETIQUETTES Do’s DON’T Protect personal information Respond to internet progress Verify facts before responding or reposting Posting of fencing commenting Keep message and post brief Post privy and embarrassing images and comments Use discretion Stick to the topics ‘Obey copy writes law ‘Spam other by sending large e-mails To help others Talk behind other backs Thanks others who help you online Express senseless or offensive opinion DATA PROTECTION Data protection refers to the practices safe guards and binding rules put in place to protect our personal information and ensure that it remain in control CONSEQUENCES OF UNPROTECTED DATA ‘Physical data loss Hi virus Targeted by the hackers Intellectual properties at work Damaged downtime Suffer from securities at risk HOW WE CAN PROTECT PERSONAL DATA ONLINE? Use security software keep your password private and strong Encrypt your data Don’t over share on social networking sites Avoid fishing and spam Be wise about Wi-Fi INTELLECTUAL PROPERTIES (IP) Intellectual properties (IP) is a property created by a person or a group of persons using their own installed for ultimate use in comma and which is already not available in the public domain. EXAMPLE INTELLECTUAL PROPERTIES (IP) Which is an invention relating to the product or any process a new design, a literacy, an article work, an artistic work and trademark. (symbol, Logo, Name, etc.) INTELLECTUAL PROPERTIES RIGHT (IPR) IPR is the statutory right granted by the government to the owner of the intellectual properties to exclude other from exploiting it commercially from a certain time period. ‘WHY SHOULD BE IP PROTECTED? . IP owners can sell or license the IP for commercial use. . IP is an asset and can be exploited by the owners for commercial benefited or any manner . IPR certificate established legal and valid ownership about an IP |. IP can be used to established the goodwill the granted value in the market. KINDS OF IPR 1. PATENT (To protect the technology) by the Patent Act (1970) 2, TRADEMARK (To protect the company name, logo, Sign, label) by the Trademark Act (1990) 3. DESIGN (To protect the ornament origami) by the Design Act (2000) 4, COPYWRITE (To protect the literacy and artistic work) by the Copywrite Act (1957) 5. GEOGRAPHICAL INDICATION(G!) (To protect the region-specific product) by the Geographical Indication Act (1999) PLAGIARISM Plagiarism is the act of preventing the words, ideas, images, sounds or any creative expression of other as it is your creation. or The word plagiarism is derived from the Latin word Plagiaries, which means Kidnap or abduct. WHY PLAGIARISM IS IMPRORTANT? Plagiarism is a Cheating Process Plagiarism is a Data Thefting Process Plagiarism is an Academic Offense Plagiarism is an Academic Theft Plagiarism is a Stealing of Intellectual Property TYPES OF PLAGIARISM Mainly there are two types of plagiarism 1. Intentional Plagiarism 2. Unintentional Plagiarism Intentional Plagiarism ‘© Cut and Paste from Electronic Resources ‘© Borrowing or Buying Assignment * Copying others work * Downloading Text, Article, Story, Essay, Poetry, Presentation etc. Unintentional Plagiarism Not Knowing how to acknowledge, or in corporate sources of information through proper summarizing or quotation. Careless copying or cutting from electronic database Failure to use our own vow HOW TO AVOID PLAGIARISM Following are the points to avoid Plagiarism: |. Develop your writing skills . Take careful notes . Use your own ideas |. Rewrite others ideas in your own words. SOFTWARE LICENSE: ‘+ Asoftware licenses is a document that provides legally binding guidelines to the person who hold it for the distribution of software. ‘* Software licenses typically provides and end users with right to make one or more copies of the software without licensing term and conditions software, the limitation of liabilities warranties and protection. BENEFITS OF SOFTWARE LICENSE 1. The right software license can make our money 2. The license holder receives around the clock license support. 3. Using unlicensed software against the law. SOFTWARE COPYRIGHT Software Copyright is used by software developer's, companies to prevent unauthorized copying of this software. Free and Open Source license also rely on copyright law to enforce this term. PROTECTS OUR RIGHTS ‘+ Itprotects software part, frequencies and organization ‘It protects our software structure. FOSS * FOSS stands for free and open source software. + FOSSis a kind of software that allow us not only freely run the program for any purpose but also provided user accesses to its source code, * Italso allows us to modify as we wish, freely distribute copies of the digital designs FEATURES OR CRITERION FOR FOSS . Modify version can do redistribute |. Source code must be included |. Anyone must be allowed to modify take source code. . It must be free EXAMPLES OF FOSS Following are the examples of FOSS: 1. An operating system like Linux, Unix Buster 2. DBALS- like mongo dB, SQLite, MySQL 3. Programming language like Java, Python, PHP. TYPES OF SOFTWARE BASED ON USE 1. Free Software 2. Open Software 3. Proprietary Software FREE SOFTWARE Free Software are those which are freely accessible, freely used changed improved copy and distribute. It provides all type of freedom to the user. OPEN SOURCE SOFTWARE Itcan be also used freely and it can also be changed improved, copied and redistributed by the user but it may have some cost for the media and support for the future development. PROPRIETARY SOFTWARE Any crime that involves a computer and a network is called cyber crime or digital or computer crime. In some other words, Cyber crime is a type of crime in which a computer is the object of the crime like Hacking, Spamming, Fishing or used as a tool to commit an offence. STEPS TO PROTECT AGAINST CYBER CRIME 1. Go Offline when you don’t need an Internet Work 2. Less amount of Sharing Online 3. Think and Check Properly when you are using any Other Personal or Public Wi- Fi. . If any doubt, then don’t click or open any unknown or suspicious link or website. . Make sure your security software installed and updated in your system. . Log off or log out your digital account or system when not in use or need. HACKING Hacking is the process of gaining unauthorized access into a company device or a group of computer system this done through cracking of passwords and codes which given access to system. DIFFERENT BETWEEN HACKER AND CRACKER The main different between Hacker and Cracker is that a break the security of a computer system but a hacker as a person like to explore computer system and connected devices. TYPES OF HACKERS Basically, there are two types of Hackers: 1. Black Hat Hacker 2. White Hat Hacker 3. Grey Hat Hacker Black Hat Hacker A black hat hacker is a person who uses their computer skills to do bad things, like stealing information or causing harm to computers and networks. The is used knowledge and software for the personal other White Hat Hacker Those are individual who used there hacking skills for defied purpose. In their work, white hat hacker uses their knowledge and skill for the good work or vented for user. Ethical Hacking are also known as White Hat Hacker. Grey Hat Hacker They are individual who work both affinely and defensively at the different times and conditions. The Grey Hat Hacker behavior can’t be judged or predicted because some time the hacker used this skill for the defensively word or sometimes use their work of offensively work. HACKING PROCESS 1. Digital Footprints Scanning Gaming Access a yeN Maintaining Access HOW TO PREVENT HACKING? 1. Do not click on the unknown or random e-mail attachment. 2. Never store or share the login information. 3. Download software from authorized website 4, Scan all types media and hard drive before using. 5. Make strong password and don’t disclosed. PHISHING Itis a cyber attack that uses disguised e-mail as a weapon. The goal is to trick the e- mail recipient into believing that the message is something we want or head. The reci nt filled or sent some sensiti formation like phone number user id password etc., then attacker use these. HOW TO PREVENT PHISHING? 1, Watch out for the URL redirect that sent to the different website Wi-Fi identical design. 2. Always check the spelling of URL before clicking 3. Don’t post any personal any personal data or information on the social media like DOB (Date of Birth), Mobile Number, Vehicle Number, Aadhar Number, Pan Card Number and Address etc. CYBERBULLYING It is the use of technology to harassed, threaten, or mimiliate a target. Example of Cyberbullying is sending memes, texts, posting false information about the person online or sharing embarrassing photos or videos. TYPES OF CYBERBULLYING There are different types of cyberbullying like: 1. Daxing 2. Harassment 3. Cyberstalking 4, Impersonation HOW TO PREVENT CYBERBULLYING? We should teach/ guide/ aware about the cyberbullying with the help of the following precautions: 1. Watch for the following signs of cyberbullying in children. 2. Be aware in the online activities. 3. Avoidance of discussing what they are doing online. 4. Deactivating social media accounts 5. Be alert about the emotional responses. CYBER LAW * Cyber Law is a part of the legal system that deals with the cyber space internet and with some other legal issues. Cyber Law covers a broad/ wide area like freedom of expressions, access to and utilization of the internet and online security/ privacy. Itis also called law of the web. IMPORTANCE OF CYBER LAW * Cyber Law plays a very important role in the current scenario and technology's world. * Itisimportant as it is concerned to almost all aspects of activities and transactions that take place either on the internet or any other communication devices. IT ACT * Information Technology (IT) Act of India is also known as ITA-2000 or it is also called IT Act. * It Act is an Act of Indian Parliament, it was notified on 17 October 2000. It is most important law in India that deals with the digital crimes, cybercrime and electronic commerce. * Itis based on the united nation model law recommended by the assembly of UN in January 1997. KEY POINT OF IT ACT/ KEY FEATURES OF IT ACT 1. Digital signature are given legal validity with in the IT Act. 2. Email is now considered valid and legal form of commination. 3. Issues digital certificate by the certifying authorities to new business of the companies. 4, Its case of any harm or loss done to the company by criminals the IT Act provide a remedy to the company in the form of money OFFENCE AND PENALTY (BY IT ACT): Following are the Penalty by the IT Act according to the Offence, SECTION OFFENCE PENALTY 67A Publishing Images containing Sexual Material Publishing child Pornography Imprisonment up to 7 years or fine up to Rs.10 lakh Imprisonment into 5 years or fine up to Rs. 10 lakhs on first convection and imprisonment up to 7 years or and fine up to Rs. 10 lakhs on second convection. Failure to maintain record Failure or refusal to comply with orders © Imprisonment up to 3 year or/and with fine Imprisonment up to 3 years and / or fine up Rs. 20 lakhs Failure or Refusal to descript data Imprisonment up to 7 year and possible fine Securing access toa protected system Imprisonment up to 10 year and / or a fine Misrepresentation Imprisonment up to 3 year or/ and with fine up. to Rs. 1 lakhs E-WASTE * Whenever electronic devices cover up it working life or become now usable due to some technological advancement or become a non-functional is called E- waste or such kind of electronic material comes under the categories of electronic wastes. Managing such kind of non-functional electronic devices is named as E-waste management. E-WASTE/ E-WASTE HAZARDS The E-waste Hazards can be categorized in two parts, 1, Environment 2. Human Health On Environmental: Air Pollution Ground Water Pollution Acidification of Soil Land fill with lead and heavy mental HUMAN HEALTH 1. Chronic Damage of the Brain 2. _DNADamage 3. Lung Cancer 4. Asthmatic Bronchitis WAYS TO DISPOSE OF E-WASTE ._ Sale of your outdated technology. 1 2. Give your electronic waste to a certified e-waste cycle. 3. . Visit civics institution. 4, Donating your outdated technology. AWARENESS OF HEALTH Awareness of Health concern related to the uses of technology 1. Physical Problem: 1. Loss of attention and stress Il, Sleeping disorder II, Decrease of productivity IV. Repetitive strain injury V. Computer vision syndrome VI. Various type of radiation VII. Different types of medical syndrome. 2. Psychological Problem: 1. Computer Anxiety Il. Fear of Technology II, Internet Addiction a) Infornography b) You Tube Addiction ©) Google staking d) Egosurfing e) Blog Streaking f) Wikipedia

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy