Page 393 - Computer Science Class 11 With Functions
P. 393

15                                  SOCIETY, LAW AND ETHICS














              Chapter Outline


              15.1 Digital Footprints                            15.2 Social Networks
              15.3 Cyber Threats                                 15.4 Malware
              15.5 Browsing the Web Safely                       15.6 Data Protection
              15.7 Open Data                                     15.8 Licensing
              15.9 Cybercrime                                    15.10 Indian Information Technology Act (IT Act) 2000
              15.11 Technology and Society




            Introduction

            We live in the age of information technology. The use of Internet-enabled devices has increased manifold over the past
            decade. This has led to an increase in web services for communication, resource sharing, and e-commerce. Technology
            has substantially changed the way we communicate with each other, share information, and do business. Many of us
            use services such as email, video conferencing, online shopping, social networking, and e-banking for our day-to-day
            work. In this chapter, we will study various types of social networks and their impacts on society.  However, one must
            be cautious while using online services. People with malicious intentions might harm you for personal gain, and some
            people may harm you just for fun. For example, an intruder might entice you to install a malicious app on your phone
            so they can steal your password and use it to make money or spread rumours on social media using your Facebook
            account. Similarly, a malicious app may harm you by installing malware on your system that could secretly spy on you.
            We will explore ways to protect ourselves from security breaches. To protect our intellectual resources, we will talk
            about security measures such as copyrights, patents, and trademarks in the context of cybercrimes like plagiarism,
            copyright infringement, and trademark violation. We will also study the Indian IT Act 2000, which provides a legal
            framework for the use of IT-enabled services and prescribes legal remedies and punishments for violating the law.

            15.1 Digital Footprints

            A digital footprint is a trail of personal data that one leaves behind while using the Internet. It could
            include things like the sites you visit, how long you stay on each site, and the personal information you
            use to log in to a portal. It includes information that you share voluntarily on social media posts, blog
            profiles, online forms, etc., as well as information that is collected without your knowledge through
            cookies or other tracking apps. Various applications may collect your footprint in two different ways.
            While the information you leave willingly is known as an active digital footprint, the information that
            companies collect without your knowledge or approval is known as a passive digital footprint.


                                                                                          Society, Law and Ethics  391
   388   389   390   391   392   393   394   395   396   397   398