XII IP Unit IV Societal Impacts
XII IP Unit IV Societal Impacts
Introduction
We are living in an era called the information age where most of our activities are technology
influenced, but it has also raised specific issues & problems related to society, law and ethics.
Digital Footprint
Digital footprints are the records and traces individuals leave behind as they use the Internet. Digital
footprints are permanently stored, anything you do, publish or post online may be there
permanently, and won't be washed away. They are also known as 'Digital Tattoos'/ 'Digital
Shadow'/ 'Cyber shadow'/ 'Electronic Footprint'. These include:
Your interaction on social media
Your friend circle on social media sites
Sites you visit Be careful about
Online purchases • What you share online
Locations visited through Facebook checkins, etc. • Where you share
• With whom you share
There are two kinds of digital footprints we leave behind.
Active digital footprints which includes data that we
intentionally submit online. This would include emails we Be Smart about
write, or responses or posts we make on different websites
or mobile Apps, etc. • Sites you visit
The digital data trail we leave online unintentionally is • Emails you open
called passive digital footprints. This includes the data • Links you click
generated when we visit a website, use a mobile App,
browse Internet, etc.
Data Protection
Data protection is the process of safeguarding important information from corruption, compromise
or loss. Examples of sensitive data include biometric information, health information, financial
information or other personal documents, images, audios or videos. The importance of data
protection increases as the amount of data created and stored continues to grow.
Intellectual property
Intellectual property (IP) is a category of property that includes intangible creations of the human
intellect, and primarily encompasses copyrights, patents, and trademarks.
3. Copyrights: Copyright is a legal right that grants the creator of an original work exclusive
rights to determine whether, and under what conditions, this original work may be used by
others. They are automatically granted of the creators and authors. They can be used for:
Poems/ Thesis/Plays/ Literary/ musical/ dramatic works
Choreographic works
Paintings, graphic and sculptural works, architectural works
Motion pictures and other audio visual works, sound recordings
Computer programs, Software and Websites
Licensing:
A license is the legal term used to describe the terms under which people are allowed to
use the copyrighted material. End User License Agreement (EULA) contains the dos and
don’ts with respect to the software being purchased. It covers all clauses of software purchase,
viz., how many copies can be installed, whether source is available, whether it can be modified
and redistributed and so on.
Violation of IPR
Plagiarism
Plagiarism is the "stealing and publication" of someone else's intellectual work and representing it as
your own work without citing the source of information. Plagiarism takes many forms, but it falls
into three main categories: Using a source’s language without quoting, using information from a
source without attribution, paraphrasing a source in a form that stays too close to the original.
Copyright Infringement
Copyright infringement is when we use other person’s work without obtaining their permission to
use or we have not paid for it, if it is being sold. Example, we download an image from the Internet
and use it in our project.
Trademark Infringement
Trademark Infringement means unauthorised use of other’s trademark on products and services.
Free Software/Free and Open Source Software (FOSS)/FLOSS (Free Libre/Livre Open Source
Software)
It means software that is "Free" to use. This software can be studied, copied, redistributed freely and
even modified according to one's need without seeking any kind of permission. These provide 4
types of freedom as stated by Richard Stallman 1983.
Four kinds of freedom
► Freedom 0: to run the program for any purpose
► Freedom 1:to study how the program works
► Freedom 2: to redistribute copies.
► Freedom 3: to improve the program and release your improvements to the public.
Examples of free software: Linux, MySQL, Apache web server, OpenOffice.org office suite
Freeware
There do exist software which are actually "free" in the sense of price. These are known as Freeware.
But freeware may not come with the source code. This is done to prevent any sort of modification by
its users. Eg: Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Skype, Adobe Reader
Shareware
It contains Right to redistribute copies but after a certain period of time license fee should be paid.
Source code is not available. It limits functionality after a trial period of 1-3 months. Eg: WinZip,
Wondershare YouTube Downloader, Kaspersky Anti-virus, Norton Anti-virus
Cyber Crime
Cybercrime is defined as a crime in which a computer and internet is used in an illegitimate way to
harm the user. It is defined as a crime in which computer is the medium of crime (hacking, phishing,
spamming), or the computer is used as a tool to commit crimes (extortion, data breaches, theft).
1. Hacking: Hacking refers to gaining unauthorized access to a network or computer or digital files,
with an intention to steal or manipulate data or information to install malware.
Hacking, when done with a positive intent, is called ethical hacking. Such hackers are known as
white hat hackers and may exploit a website in order to discover its security loopholes or
vulnerabilities. A non-ethical hacker is the one who tries to steal sensitive data with the intent to
damage or bring down systems. They are called black hat hackers or crackers.
2. Phishing/ Information Theft: Phishing is the fraudulent act of acquiring private and sensitive
information, such as credit card numbers, personal identification and account usernames and passwords.
In phishing, an imposer uses an authentic looking email or website to trick recipients into giving out
sensitive personal information.
3. Identity Theft or Identity Fraud: Identity theft is the crime of obtaining the personal or financial
information of another person for the sole purpose of assuming that person's name or identity to
make transactions or use it to post inappropriate remarks, comments etc. Example: One Day Alex
forgot to sign out from his email account. In the morning, his twin brother, Flex started using the
computer. He used Alex’s email account to send inappropriate messages to his contacts.
4. Ransomware: This is another kind of cyber crime where the attacker gains access to the computer
and blocks the user from accessing, usually by encrypting the data. The attacker blackmails the
victim to pay for getting access to the data, or sometimes threatens to publish personal and
sensitive information or photographs unless a ransom is paid.
Vandana Dulani IP - Unit IV – Societal Impacts Page 4
Following points can be considered as safety measures to reduce the risk of cyber crime:
Take regular backup of important data.
Use antivirus software and keep it updated always.
Avoid installing pirated software. Always download software from secure (HTTPS) sites.
Avoid visiting non-verified sites for which the browser alerts
Use strong password for web login, and change it periodically.
Do not use same password for all the websites.
While using someone else’s computer, don’t save password or auto fill data
Perform online transactions only through well-known and secure sites.
Cyber Laws
The laws created to protect against cyber-crime are called as the Cyber Laws. Cyber law covers a
fairly broad area, encompassing several subtopics including freedom of expression, access to and
usage of the Internet, and online privacy. They are also referred to as the Law of the Internet.
Impact of e-waste
Harmful chemicals seep into the soil, causing soil pollution.
They contaminate the ground water and cause water pollution.
When dust particles loaded with heavy metals enter the atmosphere, it causes air pollution.
Lead used in devices, such as monitors and batteries causes lead poisoning which affects the
kidneys, brain and central nervous system.
Beryllium, created by burning of e-waste such as electronic circuit boards causes skin diseases,
allergies and an increased risk of lung cancer.
Burning of insulated wires to extract copper can cause neurological disorders.
Mercury from the e-waste causes respiratory disorders and brain damage.
Cadmium found in semiconductors and resistors can damage kidneys, liver and bones.
Plastic in the e-waste leaches into soil and water resources, and damages the immune system
of the body and also causes various psychological problems like stress and anxiety.
In India, the Environmental Protection Act, 1986, has been enacted to punish people responsible for
causing any form of pollution by paying for the damage done to the natural environment.
The Central Pollution Control Board (CPCB) has issued a formal set of guidelines for proper handling
and disposal of e-waste. According to this, the manufacturer will be responsible for the final safe
disposal of the product when it becomes an e-waste.
Ergonomics is a branch of science that deals with designing or arranging workplaces including
the furniture, equipments and systems so that it becomes safe and comfortable for the user.