Page 298 - Informatics_Practices_Fliipbook_Class12
P. 298

8.9.2 Cyberlaw

        Cyber Laws are the statutory provisions against various forms of cybercrime. These laws define the crimes and the
        corresponding penalties and punishments imposed against people who commit such crimes. For cyber security, an
        amendment to the IT Act 2000 named the Information Technology Amendment Act, 2008 was also introduced.

        8.9.3 Cyber Forensics

        Cyber forensics aims to use the IT infrastructure to  track cybercrimes and may include the following activities:
        •  Retrieve deleted data, chat histories, emails, and more.
        •  Record phone calls for use as evidence.

        •  Track who and when used the IT infrastructure such as computer, mobile app, or a website.


                 State whether the following statements are True or False.
                 1.  Open data is freely available for download.
                 2.  EULA is the legal definition between the licensor and the licensee.
                 3.  Microsoft Office is an example of Free and Open Source software.
                 4.  Creative Commons License allows the intellectual work to be used without contacting the creator.
                 5.  GPL gives the permission to edit and redistribute the software.
                 6.  Defaming someone online is not a cybercrime.
                 7.  One may not update the operating system but should always update the antivirus regularly.
                 8.  The IT Act 2000 does not validate digital signature.

                 9.  Cyber forensics is also known as computer forensics.



        8.10 Technology and Society

        Information technology has impacted people's lives and changed how they learn, think, and communicate. People's
        health has been hurt by the fact that they use technology too much,  which makes them less active. IT makes people's
        lives better, but e-waste is bad for the environment and could be a big problem for the next generation. Further, IT has
        given birth to cybercrimes, a new form of crime.

        8.10.1 E-waste Management

        Electronic products that are no longer needed, are broken, or have reached the end of their useful lives are called
        "e-waste." The e-waste  includes smartphones, desktops, laptops, hard drives, cables, batteries, routers, switches,
        and hubs which are no longer required. The poisonous substances that are released from the metals as a result of
        chemical reactions in e-waste are harmful to our environment. E-waste management is a holistic approach to remove
        electronic trash from the environment. It aims to reduce, reuse, and recycle electronic waste.

        Proper Disposal of used Electronic Gadgets

        The following methods can be used to dispose of the e-waste:
        Landfills: This is the approach to e-waste disposal that is most frequently used. The e-waste is buried in deep dirt
        trenches. But since e-waste contains dangerous materials such as lead, mercury, and other materials that leak into the
        earth and destroy the soil and underground water, it is not considered a good practice to dispose of e-waste.
        Incineration: The incineration process involves burning e-waste at high temperatures in incinerators. This reduces the
        amount of trash, and the energy that is released can also be used. However, burning e-waste releases toxic chemicals
        that are bad for the environment.


          284  Touchpad Informatics Practices-XII
   293   294   295   296   297   298   299   300   301   302   303