0% found this document useful (0 votes)
75 views24 pages

Rohan Mehra

This document discusses the societal impact of digital technology. It covers topics like digital footprints, the rise of a digital society and netizens. It also discusses data protection, intellectual property rights, and cyber crimes like hacking, phishing, and ransomware. The document emphasizes the importance of data protection and following netiquettes when online. It explains that intellectual property is legally protected through copyrights and patents. The Information Technology Act of 2000 is mentioned as the primary law dealing with cyber crimes and electronic commerce in India.

Uploaded by

Rohan Mehra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views24 pages

Rohan Mehra

This document discusses the societal impact of digital technology. It covers topics like digital footprints, the rise of a digital society and netizens. It also discusses data protection, intellectual property rights, and cyber crimes like hacking, phishing, and ransomware. The document emphasizes the importance of data protection and following netiquettes when online. It explains that intellectual property is legally protected through copyrights and patents. The Information Technology Act of 2000 is mentioned as the primary law dealing with cyber crimes and electronic commerce in India.

Uploaded by

Rohan Mehra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Societal Impact

By-Rohan Mehra
11-A
CONTENT

• DIGITAL FOOTPRINTS
• DIGITAL SOCIETY AND NITIZEN
• Data PROTECTION
• INTEELECTUAL PROPERTY RIGHTS
• VIOLATION OF IPR
• CYBER CRIME
• PREVENTING CYBER CRIME
• IT ACT ,2000
Digital Footprints
DIGITAL
FOOTPRINTS
• A digital footprint is the impression you create on the internet
through your online activity, which includes browsing, interactions
with others, and publication of content. In other words, it is the trail
of data- intentional and unintentional-you leave behind while surfing
the internet.
Types of Digital Footprints
• Active Digital Footprints
An active digital footprint is created when a user intentionally shares their
personal information either through social media platforms or websites and apps.
E.g.-Sharing of personal information on Facebook, Instagram, Twitter and other
social media platforms.

• Passive Digital Footprints


A passive digital footprint is created when information is collected from the user
without their knowledge.
E.g. Websites that install cookies in a user’s device without disclosing it.
DIGITAL SOCIETY AND NITIZENS
Digital Society- It reflects the growing trend of using digital technologies
in all spheres of human activities.

Digital Netizens- Anyone who uses digital technology along with


internet is a digital citizen or nitizens.
NET
ETIQUETTES
• It is a short form of “internet etiquette” or communication etiquettes
over the internet.
• It is a code of good behaviour while working on the internet.
• It includes several aspects of the internet, such as social media, email,
online chat, web forums and other types of online communication.
COMMUNICATION
ETIQUETTES
• Digital Communication:- refers to rules t b followed while sending
email, posting on social media sites, etc.
• All these are a great way to connect in order to exchange ideas, share
data and knowledge, etc.
DATA
PROTECTION
DATA
PROTECTION
• Addresses the practices, safeguards, and binding rules put in place to protect our personal
information and ensure that it remains safe while working online.
• Secures sensitive data-from databases to big data, cloud, etc.

One must ensure that there shouldn’t be any kind of unprotected data it may contribute t several
serious issues:
1.Physical data loss
2.Attack by a virus
3.Targeted by hackers
4.DDoS(Distributed denial of service) attacks
5. Loss of Money
6.Intellectual property at risk
• It is mandatory to protect data. This can be achieved by taking proper
and careful measures while working online in following ways:
1.Through Data Encryption
2.Not sharing private information such as passwords, credit card and
credentials.
3.Adopting complete security mechanism for protection against
possible threats.
4.Avoiding opening phishing emails.
5.Being alert to impersonators.
Intellectual Property Rights
• Intellectual Property refers to the inventions, literary and artistic
expressions, designs and symbols, names and logos.
• The ownership of such concepts lies with the creator, or the holder of
the intellectual property. This enables the creator or copyright owner
to earn recognition or financial benefit by using their creation or
invention.
• Intellectual Property is legally protected through copyrights, patents,
trademarks,etc.
Types of Intellectual Property
1. Patents:- It is usually granted for new inventions. When patent is
granted, the patent holder neds to pay periodic government
renewal fees. An approved patent is for limited time period.
2. Copyright:-It is a legal concept enacted by most governments, giving
the creator of the original work exclusive rights to it, usually for a
limited period.
3. Trademark-It includes any visual symbol, word, name, design,
slogan, label, etc that distinguishes a brand or commercial
enterprise from other brands.
Violation of IPR

An owner of trademark may commence legal proceedings against


someone who infringes its registered trademark.
• Plagiarism-Plagiarism is copying someone else’s work and then
passing it off as one’s own.
• Copyright- Copyright infringement is the use or production of
copyrighted material without the permission of the copyright holder.
• Trademark Infrigement-It is defined as the unauthorized use of a
trademark or service mark on or in connection with goods and/or
services in a manner that is likely tpo cause confusion.
CYBER
CRIME
• Cybercrime is defined as a crime in which a computer is the object of
the crime(hacking, phishing, spamming) or is used as a tool to commit
an offence(hate crimes, etc.)
Preventing Cyber Crime
• Download applications from trusted sources.
• Keep your applications and operating system (e.g. Windows,
Mac, Linux) current with the latest system updates.
• Turn on automatic updates to prevent potential attacks on older
software.
• Make regular back-ups of all your important data, and store it in
another location.
Hacking
It is an act of unauthorized access to a computer, computer network or
any digital system. Hackers usually have technical expertise of the
hardware and software. Hacking is the process of finding some security
holes in a computer system or network in order to gain access to
personal or corporate information. The process of gaining illegal access
to a computer system, on a group of computer systems, is known as
hacking. The hacker is the individual who performs hacking.
Phishing/ Fraud Emails
Phishing is an attempt to acquire sensitive information such as
usernames, passwords and credit card details by masquerading as a
trustworthy entity in an electronic communication.

Phishing is an unlawful activity where fake websites or emails that look


original or authentic are presented to the user fraudulently collect
sensitive and personal details, particularly usernames , passwords ,
banking and credit card details.
Ransomware
Ransomware is malicious software that infects your computer and
displays messages demanding a fee to be paid in order to access your
system. This class of malware is a criminal moneymaking scheme that
can be installed through deceptive links in an email message, instant
message or website. It has the ability to lock a computer screen or
encrypt important, predetermined files with a password.
Information Technology Act, 2000
Information Technology Act, 2000
The information Technology Act , 2000 is an Act of the Indian
Parliament(No. 21 of 2000) notified on 17 October , 2000. It is the
primary law in India dealing with cybercrime and electronic commerce.

The IT Act is a set of recent legal enactments, currently existing in India,


which provide legal support to computer users against cybercrime.

A major amendment was made to the IT Act in 2208. It introduced


Section 66A which penalized sending of “offensive messages”. The Act
was passed in December 2008 and came into force in October 2009.
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy