Page 15 - Modular_V1.1_Flipbook
P. 15
Don't click any link in a Spam e-mail otherwise you will invite many such e-mails in your
inbox.
Don’t reply to a Spam e-mail.
Don't forward an e-mail received from someone you don't know to a list of people.
Clickipedia
Private Browsing allows you to browse the Internet without saving any information about
which sites and pages you've visited.
Individual Right to Privacy
We all know that technology is become an important part everywhere these days. That’s why
the definition of privacy is also changed. The Right to Privacy may be defined as to right of
individuals, people to know and decide when, how and to what extent their information could
be shared with others. Privacy issues arise when information which is collected for one specific
purpose is being shared with the other companies without informing authorised owner.
Steps to Protect Privacy
Don’t fill your personal information on every site.
Turn on Private Browsing.
Use two-factor authentication is an extra layer of security that not only requires user name
and password but PIN number or some information which only user can have. All e-mail
service providers these days provide such authentication.
Prefer to use cash on delivery option rather than card payment in online shopping.
Don’t share your credit card PIN with others for purchasing as it can be misused by
others.
Software Piracy
Software piracy means illegal use of software. This means that you have not bought software or
you don’t have permission to use it. An example of Software Piracy is when you download a copy
of Flash from a file-sharing website without paying for it.
We break the Software Piracy Law when we:
Purchase a Software for single computer and use it on multiple computers.
Install unauthorised copies of Software on a computer.
Distribute a copy of software without permission of the creator.
Measures to Prevent Software Piracy
To prevent software piracy, we can take the following measures:
Always purchase license of Software if you want to use it.
Ethics and Safety Measures in Computing 13

