Page 129 - Trackpad_V1_Book 7_Flipbook
P. 129

INFORMATION TECHNOLOGY AMENDMENT ACT, 2008
                 This law aims to protect data privacy and information security. It validates digital signatures and

                 contracts. According to this act, the owner of a given IP address will be held responsible for the
                 content accessed or distributed through it.


                 NATIONAL CYBER SECURITY POLICY, 2013
                 It is a policy in India that aims to protect public and private infrastructure from cyber-attacks and
                 safeguards personal, financial, and banking information.




                                                                                                       Life Skills & Values
                                                          Self Reflection

                    Your teacher asked everyone to write an essay as homework. Your friend was not interested in
                                                          Self Reflection
                    writing it. So he asked if he could copy yours and pretend it as his own and submit it. Do you think
                    it would be ethical for him to do so? What advice will you give him?






                        Hashtag

                      #Plagiarism: An act of copying information from the Internet and using it in our projects or works
                      #Phishing: An illegal practise of obtaining sensitive information from us through e-mails






                      REVISIT


                   ▶     The online or Internet based illegal acts are called cyber-crimes.
                   ▶     Computer ethics are rules that govern our actions when we use computers and the Internet.
                   ▶     Spamming refers to the act of repeatedly sending unwanted e-mails called spams to a large number of recipients.
                   ▶     Hacking is an act of intruding into someone’s computer system for some unwanted purposes by identifying
                       the technical weak points of the security system.
                   ▶     Phishing is the illegal practice of obtaining sensitive information from us through e-mails.
                   ▶     Plagiarism is an act of copying information from the Internet and using it in our projects or works.
                   ▶     Software piracy is unauthorized copying or stealing of software, movies, music or making these copies
                       available on the Internet.
                   ▶     Intellectual property rights are the exclusive rights given by the government to the owners of intellectual
                       creations.
                   ▶     Digital footprints or Digital Shadow are the traceable digital activities that we leave behind after surfing the
                       Internet.











                                                                                                   Cyber Security  127
   124   125   126   127   128   129   130   131   132   133   134