Page 432 - computer science (868) class 11
P. 432
14.2.2 Protection of an individual’s Right to Privacy
The word ‘privacy’ means free from any public attention, i.e., not being bothered or witnessed by other people. Every
individual has his/her own private surroundings that should be accessed solely by him/her.
Data Privacy
Information Technology has advanced by leaps and bounds and allowed us to do the unimaginable, just by sitting at
home like making-online transactions, attending online classes and seminars and so on.
However, for most of these, we require to have an account with a password. The account holder has the sole right to
access the details and anyone trying to access these accounts are going to be tried under the Law of Privacy Act.
Some of the situations violating the Privacy Act using the computer are:
• Accessing the personal details of other people such as passwords, etc.
• Stealing the financial information of others.
• Obtaining information regarding the assets of others.
• Accessing different social sites of others.
To protect Data Privacy, we need some solutions such as:
• A good Firewall
• Always take a backup of the data and have recovery options
• A strong Antivirus software
• A good data discovery and classification tool such as “Netwrix Data Classification”
• A data loss prevention system that will monitor sensitive data from being removed or copied by unauthorized
users.
14.3 NETIQUETTE
The word “etiquette” comes from the French word “estique,” meaning ‘to attach or stick’. It is the code of conduct,
expected from an individual by the society in which that person lives. In electronic media also, as we had established
earlier, we need to maintain a good code of conduct which can be referred to as Netiquette.
Some of the basic netiquettes are as follows:
• We should always remember that the privacy of a person is of utmost importance. So, we should respect it.
• We should not use abusive language while sending any email or using social media.
• We should not post any rude or nasty messages about others online.
• Sending any spam messages to others is not acceptable.
• Emoticons may be used in an appropriate manner and carefully so that it does not deliver the wrong messages
across to the receiver.
• We should try to reply to the messages of others whenever possible.
• The use of words such as “Please” or “Thank you” is to be done whenever solicited.
• We should avoid any form of sarcastic jokes/comments while posting on social media which may hurt the feelings
of anyone.
• We should not post any misinformation.
• We should always take care to avoid sharing other person’s personal or professional information.
14.3.1 Good Ethical Practices
Ethics are a set of moral principles that control a person’s behaviour or the conducting of an action.
Referring to electronic media, ethics need to be in place during the use of computers/laptops/mobiles, etc.
430430 Touchpad Computer Science-XI

