Page 53 - iPlus_Ver_2.0_class_7
P. 53
Information Technology Amendment Act, 2008
This law aims to protect data privacy and information security. It validates digital signatures and
contracts. According to this act, the owner of a given IP address will be held responsible for the
content accessed or distributed through it.
National Cybersecurity Policy, 2013
It is a policy in India that aims to protect public and private infrastructure from cyber-attacks and
safeguards personal, financial, and banking information.
To Sum Up
The Internet is also called "the NET" or "Network of Networks", which means
International Network.
Computer ethics are the common guidelines that we need to follow while using the
computer.
Internet ethics are the good practices that one should follow while using the Internet.
An action which is not considered morally right or good for a person, a profession, or
an industry is an unethical practice.
Exercise
Section A (Objective)
A. Tick (3) the correct option.
1. A digital footprint is also known as .................................
a. digital diary b. digital dossier
c. database d. None of these
2. Why do hackers break into the others’ computer system?
a. To steal important data b. To protect the system
c. Both a and b d. None of these
3. Use of the electronic devices to harass or embarrass others is called .................................
a. hacking b. spamming
c. cyberbullying d. social networking
4. Which type of cybercrime is referred to sending of bulk mail by an identified or unidentified source?
a. Hacking b. Spamming
c. Phishing d. None of these
51
Ethics and Safety Measures in Computing

