Page 129 - Trackpad_V5_Book 7
P. 129

INFORMATION TECHNOLOGY AMENDMENT ACT, 2008

            This law aims to protect data privacy and information security. It validates digital signatures and
            contracts. According to this act, the owner of a given IP address will be held responsible for the
            content accessed or distributed through it.


            NATIONAL CYBER SECURITY POLICY, 2013
            It is a policy in India that aims to protect public and private infrastructure from cyber-attacks and
            safeguards personal, financial, and banking information.





                                                                                                    21 st
                                                      Self Reflection                            Century   #Flexibility
                                                                                                   Skills
               Your teacher asked everyone to write an essay as homework. Your friend was not interested in
                                                      Self Reflection
               writing it. So he asked if he could copy yours and pretend it as his own and submit it. Do you think
               it would be ethical for him to do so? What advice will you give him?






                   Hashtag


                 #Plagiarism: An act of copying information from the Internet and using it in our projects or works
                 #Phishing: An illegal practice of obtaining sensitive information from us through e-mails





                  REVISIT


              ▶   The online or Internet-based illegal acts are called cyber-crimes.
              ▶   Computer ethics are rules that govern our actions when we use computers and the Internet.
              ▶   Spamming refers to the act of repeatedly sending unwanted e-mails called spam to a large number of recipients.
              ▶   Hacking is an act of intruding into someone’s computer system for some unwanted purposes by identifying
                the technical weak points of the security system.
              ▶   Phishing is the illegal practice of obtaining sensitive information from us through e-mails.
              ▶   Plagiarism is an act of copying information from the Internet and using it in our projects or works.
              ▶   Software piracy is the unauthorized copying or stealing of software, movies, music or making these copies
                available on the Internet.
              ▶   Intellectual property rights are the exclusive rights given by the government to the owners of intellectual
                creations.
              ▶   Digital footprints or Digital Shadow are the traceable digital activities that we leave behind after surfing the
                Internet.










                                                                                              Cyber Security  127
   124   125   126   127   128   129   130   131   132   133   134