Page 134 - ConceptGP_C7_Fb
P. 134

INFORMATION TECHNOLOGY AMENDMENT ACT, 2008
                  This law aims to protect data privacy and information security. It validates digital signatures and

                  contracts. According to this act, the owner of a given IP address will be held responsible for the
                  content accessed or distributed through it.


                  NATIONAL CYBER SECURITY POLICY, 2013
                  It is a policy in India that aims to protect public and private infrastructure from cyber-attacks and
                  safeguards personal, financial, and banking information.




                                                                                                        Life Skills & Values
                                                            Self Reflection

                     Your teacher asked everyone to write an essay as homework. Your friend was not interested in
                                                            Self Reflection
                     writing it. So he asked if he could copy yours and pretend it as his own and submit it. Do you think
                     it would be ethical for him to do so? What advice will you give him?






                         Hashtag

                       #Plagiarism: An act of copying information from the Internet and using it in our projects or works
                       #Phishing: An illegal practice of obtaining sensitive information from us through e-mails






                        REVISIT


                    ▶   The online or Internet-based illegal acts are called cyber-crimes.
                    ▶   Computer ethics are rules that govern our actions when we use computers and the Internet.
                    ▶   Spamming refers to the act of repeatedly sending unwanted e-mails called spam to a large number of recipients.
                    ▶   Hacking is an act of intruding into someone’s computer system for some unwanted purposes by identifying
                      the technical weak points of the security system.
                    ▶   Phishing is the illegal practice of obtaining sensitive information from us through e-mails.
                    ▶   Plagiarism is an act of copying information from the Internet and using it in our projects or works.
                    ▶   Software piracy is the unauthorized copying or stealing of software, movies, music or making these copies
                      available on the Internet.
                    ▶   Intellectual property rights are the exclusive rights given by the government to the owners of intellectual
                      creations.
                    ▶   Digital footprints or Digital Shadow are the traceable digital activities that we leave behind after surfing the
                      Internet.











                  132   Premium Edition-VII
   129   130   131   132   133   134   135   136   137   138   139