Society Law and

Download as pdf or txt
Download as pdf or txt
You are on page 1of 35

Licensing

LICENSING

software licensing is the legal right to run or


the privilege given to you by a company to
access their application or program.
ADVANTAGES OF SOFTWARE
LICENSING

1. by using licensed software,you are able to contribute to the


further development of the program . it also helps the economy
to generate computer related jobs but opportunities for other
people whose work is highly dependable on "written
technology"
2.appart from the legal obligations to use licensed software. it
comes with outright support not found in "pirated" software.
TYPES OF LICENSE:

PROPRIETARY LICENSE
- A proprietary license model is based on the concept that the
software company creates software and maintains control over its
code, features and use
- One issue with this proprietary license model is that it is not
protected by law.

- FREE AND OPEN SOURCE LICENSE


these are licenses that comply with the Open Source i.e, they allow
software to be freely used, modified, and shared.
GENERAL PUBLIC LICENSE:
there is no limit to copying your code.we can copy it
as much as times we want.

CREATIVE COMMONS LICENSE(CC):


It has four basic parts:
1.accreditation
2.shared with CC
3.non-commercial
4.no derivative works
APACHE LICENSE:
this licence offers the following features:
1.rights are never ending.
2.worldwide authority of rights.
3.rights for no fee or royalty.
4.rights are irrevocable.
Op en
s our c e a n d
op e n d a t a
OPEN SOURCE AND OPEN DATA

Open source licenses are licenses that comply


with the Open Source , they allow software to be
freely used, modified, and shared.

open data: it is an all stored data which could be


made accessible in public intrests without any
restrictions on its usage and distribution.
FEATURES OF OPEN SOURCE AND DATA

AVAILIBILITY AND ACCESS:the data must be available as a


whole and at no more than a reasonable reproduction
cost,preferably by downloading from the internet.

REUSE AND REDISTRIBUTION:the data must be provided


under terms that permit reuse and redistribution.

UNIVERSAL PARTICIPATION:Everyone should be able to


use,reuse and redistribute — there should be no
discrimination
Privacy
laws
PRIVACY LAWS
some key aspects of privacy laws in India as of my last update:
- Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data
or Information) Rules, 2011
- Consent
- Reasonable Security Practices
- Collection Limitation
- Disclosure of Information
- Rights of the Data Subject
- International Data Transfers
- Data Breach Notification
- Illegal harmful content
- Online social networks
ercrime
Cyb Cybercrime is criminal activity that either
targets or uses a computer, a computer
network or a networked device. Most
cybercrime is committed by cybercriminals
or hackers who want to make money. T
TYPES OF CYBERCRIME:
• Online Banking
• Identity Theft
• Information Theft
• Unauthorized Computer Access
ACTIVITIES:
1) Target computer networks or devices: Include virus
& DOS attacks
2) Cyberstalking, Phishing, Frauds, Identity theft
It refers to the act of gaining unauthorized

Hacking access to computer systems or networks


with the intent of exploring, exploiting, or
manipulating them.

Ethical Hacking: Positive intent ( mending


loopholes )
Unethical Hacking: Negative intent ( steal
information )
Types of hackers
1. BLACK HAT HACKERS: individuals who engage in hacking
activities for malicious purposes.
Financial gain, data theft, disruption, political or
ideological reasons
2. White Hat Hackers: individuals who use their skill for
defensive purposes
Enhancing cybersecurity, identifying and fixing
vulnerabilities, helping organizations improve their security
posture
3. Grey Hat Hackers: fall somewhere between white hat and black hat
hackers
Raising awareness about security weaknesses, seeking
acknowledgment, or simply for the thrill of exploration.
Eavesdropping
Eavesdropping
An eavesdropping attack occurs when a hacker intercepts, deletes,
or modifies data that is transmitted between two devices
-SNIFFING/SNOOPING
-unsecured network
-
Phishing /
fraud em ails
preventive measures
Never download a file from an unknown
email
Keep your OS updated
Use a trusted antivirus program
(Eg: McAfee, Malwarebytes )
Two-factor authentication
Look for a reputable security mark
before entering credentials in websites
check for HTTPS in address bar
Ransomware
RANSOMWARE
Ransomware is a type of malware
that infects the computer and
demands a fee to be paid in order
to access the system.
-criminal money making scheme
-fake messages
Illega l
down lo ading
ILLEGAL DOWNLOADING
Illegal downloading refers to the act
of downloading or sharing
copyrighted material.
-root cause of digital piracy
-should be obtained from reputed
dealers who have rights to sell

Discouraged - incurs heavy losses to


developers / producers
- unethical act
ChilD
pornography
child pornography
ng an d tran sm itti ng ob sc en e m at eria l
It is the publishi
ren in elec tron ic form . In re ce nt ye ar s, ch ild
about child
s in crea se d du e to ea st inte rn et ac ce ss
pornography ha
og ra ph y la w s pr ov id e se vere pe na ltie s fo r
Child porn
producers and distributors
Cyber sc am s
and fr au ds
cyberscams and frauds
"internet fraud" generally covers cybercrime activity that
takes place over the internet or on email, activities like:

- Credit/debut card fraud


- service fraud
- spoofing/phishing scam
- identity theft
- auction fraud
Pr ev en tin g
c yb er cr ime
Preventing cybercrime
Steps to overcome cybercrime:
- Use a full-service internet security suit
- Use strong passwords
- Keep your software updated
- Secure your wireless network
- protect your e-identity
- Avoid being scammed
A- always think before you click on a link or file of unknown origin.
Thank you
by:Mishthy
Neeyanth
Ramla
Tanishka

You might also like