Scoiety Laws and Ethics - Ekansh Mehta Xi
Scoiety Laws and Ethics - Ekansh Mehta Xi
ETHICS
By- EKANSH
MEHTA
XI- RUBY
22
Acknowledgement
I would like to express my greatest gratitude to all those who directly
or indirectly helped and supported me throughout the project.
Firstly, I am highly indebted to my Computer teacher Mrs. Seema
Narang for his guidance and constant supervision as well as for
providing necessary information regarding the project. I would also
like to extend my gratitude to our principal Rev. Dr, Jas Elanjikal for
giving me a chance to work on this project.
Finally, I would like to thank my parents, friends for their continued
support and coordination in this project.
INTRODUCTION
The digital world is changing at
a tremendous pace. New
communication technologies
have opened up new
possibilities. However, by using
them you also expose yourself,
and others, to various risks.
Many people have trouble
assessing these risks, especially
with regard to the subject of
safe digital communication. This
is particularly true of people
working in regimes with high
levels of censorship. Your data
• Information Technology (IT) plays
a central role in commerce,
industry, government, education,
entertainment and society at
large. Its economic and social
benefits hardly need explanation.
DIGITAL FOOTPRINTS
• Digital Footprints is the term used to describe the
trail, traces or "footprints" that people leave online
while using smartphones, tablets, computers, etc.
Digital footprints are recorded with each and every
online activity that we perform-be it interactions on
the social media, chatting and connecting with friends
on the social media sites, online shopping, or
locations through Facebook check-ins, etc.
• These digital footprints can be
compared to footprints that you
leave behind when walking along
a beach. Every step that you take
leaves an impression D on the
sandy surface that allows another
person to see and follow your
marks. Digital footprints are also
termed as Digital Tattoos.
However, a beach footprint gets
washed away after some time
whereas digital footprints stay
forever and cannot
be done away with.
TYPES OF DIGITAL FOOT
PRINTS
Digital footprints are classified
into two types:
1. Active digital footprints
2. Passive digital footprints
1.Active digital footprints
An active digital footprint is created when a user intentionally shares
their personal information either through social media platforms or
websites and apps. Examples of active digital footprints are:
(a) Sharing of personal information on Facebook, Instagram, Twitter
and other social media platforms.
(b) Working with online forms, such as signing up while logging on to
mail accounts to send or receive emails or text messages.
(c) Accidental/intentional acceptance to install cookies on users'
respective devices when prompted by the browser
2.Passive digital footprints
A passive digital footprint is created when information is collected from
the user without their knowledge. Examples of passive digital
footprints are:
(a) Websites that install cookies in a user's device without disclosing it.
(b) Apps and websites that use geo-location to detect a user's location.
(c) Social media news channels and advertisers that use comments,
likes and shares of the user to know about their profiles and areas of
interest, based on which they send advertisements as per the user's
requirements and interests.
How digital footprints are used
for marketing purposes
Digital footprints, also known as cyber shadow,
electronic footprints or digital shadow, are
generally collected with the help of tracking
cookies. These cookies store valuable information
about users' online behavior, preferences and
interests and companies use this information to
create targeted advertising campaigns and
personalized content that are more likely to be
converted into sales.
We should manage our digital
footprints in the following ways:
1, Making personal information safe
2. Preventing financial loss.
3. Preserving our freedom
4. Double-checking privacy settings
5. Creating strong, memorable passwords
6. Keeping all software up to date
7. Reviewing mobile use and deleting useless files (temp)
8. Building reputation through behaviour
DIGITAL SOCIETY AND NETIZEN
Today, we are living in a digital society in which every aspect of our lives
is being profoundly affected by the digitalization of data. We perform
most of our activities like shopping, education, social networking,
entertainment, health care, paying our bills, etc., using these
technologies. 'Netizen' itself is a contraction of the words 'internet' and
'citizen' and refers to both a person who uses the internet to participate in
society and an individual who has accepted the responsibility of using the
internet in productive and socially responsible ways. Being a responsible
netizen, we must respect anyone using internet. A responsible netizen
must abide by net etiquette, communication etiquette and social
media etiquette.
Intellectual Property
Rights(IPR)
• These are the rights of the owner of information to
information
decide how is to be exchanged , shared or
much
• distributed.
/sharing/distributing .
It gives the owner a right to decide the price for
• Examples of IP- Property which are an invention
exchanging
relating to product or any process, anew design, a literary
or artistic work and a
trademark (a word, a symbol and / or a logo, etc.),
KINDS OF IPR
are:
•Copyright © (to protect
ornamental configuration)
Why should an IP be protected?
• IP is an assets and can be exploited by the owner for commercial
gains any manner
• IP owner may intend to stop others from manufacturing and selling
products and services which are dully protected by him
• IP owner can sell and/or license the IP for commercial gains
• IP can be used to establish the goodwill and brand value in the
market.
• IP can be mention in resumes of it’s creator and thus show
competence of it’s creator
Copyright
• © the rights of the creator of an
It is a legal term to describe
original creative work such as literary work, artistic
work, a design , song, movie or software etc.
• Original work of ownership such as books, articles,
songs, photographs, sculptures , choreography, sound
recordings, motion pictures and other works.
• A work must be original, creative and fixed in a
tangible medium Terms of protection-author’s life
+60 more years in India
Patent
•
s
It refers to a collection of exclusive rights given to
the inventor for their invention.
• Inventions such as processes, machines,
manufactures, composition of
• matter as well as improvements to these.
• An invention must be new and useful.
Terms of protection-20 years
Trademark
•
™
These are some registered words, slogans, logos, shapes ,
colours and sound excused to distinguish the goods or
services of one trader from another.
• Any word , phrase , symbol, design that distinguishes the
source of the goods of one party from those of others.
• A mark must be distinctive –means must be capable of
identifying the source of a particular good
Terms of protection-For as long as the mark is used in
commerce
Violation of IPR
• Violation of IPR is called IPR
infringement.
THREE FORMS OF IPR
INFRINGEMENT ARE:
(i) Plagiarism
(ii)Copyright infringement
(iii)Trademark Infringement
Plagiarism
• “the act of presenting the words, ideas, images, sounds, or
the creative expression of others as it is your creation or
your own.”
• Plagiarism is stealing someone else’s intellectual
work and representing it as your own work
without citing the source of information.
So Plagiarismis -
• Plagiarismis stealing of intellectual
property
• Plagiarism is Academic theft!
•Examples
Plagiarismof isplagiarism
an Academic
: offence
•Giving incorrect source of information-wrongful citation.
•Modifying / lifting someone’s production such as music-
composition etc
without
Using attributing
some otheritauthor’s
to the creator of the work.
work without giving credit
•
•Failure
to the in givingcollaborative
author. credit or acknowledging
effort. the contribution
of others in a
Copyright
infringement
Copyright infringement refers to using copyrighted work
without the consent or permission of the copyright holder.
Examples of Copyright infringement :
•Selling pirated books
•Selling copied/duplicated art work
•Selling pirated software
•Online piracy and many other such
•Performing a play in public without obtaining permission
from the acts playright
Trademark
infringement
It is the unauthorized usage of a mark that is identical or
deceptively similar to a registered trademark.
All types of IPR infringements are crimes and the owner
can initiate a legal action against the people/companies
who do it.
Digital Property Rights(Digital
It refers to any information about you or created by you
Assests)
that exists in digital form or on an electronic storage
device.
Examples of Digital property include : Any online personal
accounts such as
• Social media accounts
• Photo and video sharing accounts
• Email and communication accounts
• Shopping accounts
• Video gaming accounts
• Online storage accounts , website, blogs etc
BIBLIOGRAPHY
• ALL THE CONTENTS USED IN THE POWERPOINT
PRSENTATION ARE TAKEN FROM A BOOK OF
COMPUTER SCIENCE BY PREETI ARORA