Page 298 - Informatics_Practices_Fliipbook_Class12
P. 298
8.9.2 Cyberlaw
Cyber Laws are the statutory provisions against various forms of cybercrime. These laws define the crimes and the
corresponding penalties and punishments imposed against people who commit such crimes. For cyber security, an
amendment to the IT Act 2000 named the Information Technology Amendment Act, 2008 was also introduced.
8.9.3 Cyber Forensics
Cyber forensics aims to use the IT infrastructure to track cybercrimes and may include the following activities:
• Retrieve deleted data, chat histories, emails, and more.
• Record phone calls for use as evidence.
• Track who and when used the IT infrastructure such as computer, mobile app, or a website.
State whether the following statements are True or False.
1. Open data is freely available for download.
2. EULA is the legal definition between the licensor and the licensee.
3. Microsoft Office is an example of Free and Open Source software.
4. Creative Commons License allows the intellectual work to be used without contacting the creator.
5. GPL gives the permission to edit and redistribute the software.
6. Defaming someone online is not a cybercrime.
7. One may not update the operating system but should always update the antivirus regularly.
8. The IT Act 2000 does not validate digital signature.
9. Cyber forensics is also known as computer forensics.
8.10 Technology and Society
Information technology has impacted people's lives and changed how they learn, think, and communicate. People's
health has been hurt by the fact that they use technology too much, which makes them less active. IT makes people's
lives better, but e-waste is bad for the environment and could be a big problem for the next generation. Further, IT has
given birth to cybercrimes, a new form of crime.
8.10.1 E-waste Management
Electronic products that are no longer needed, are broken, or have reached the end of their useful lives are called
"e-waste." The e-waste includes smartphones, desktops, laptops, hard drives, cables, batteries, routers, switches,
and hubs which are no longer required. The poisonous substances that are released from the metals as a result of
chemical reactions in e-waste are harmful to our environment. E-waste management is a holistic approach to remove
electronic trash from the environment. It aims to reduce, reuse, and recycle electronic waste.
Proper Disposal of used Electronic Gadgets
The following methods can be used to dispose of the e-waste:
Landfills: This is the approach to e-waste disposal that is most frequently used. The e-waste is buried in deep dirt
trenches. But since e-waste contains dangerous materials such as lead, mercury, and other materials that leak into the
earth and destroy the soil and underground water, it is not considered a good practice to dispose of e-waste.
Incineration: The incineration process involves burning e-waste at high temperatures in incinerators. This reduces the
amount of trash, and the energy that is released can also be used. However, burning e-waste releases toxic chemicals
that are bad for the environment.
284 Touchpad Informatics Practices-XII

