Socieal Impacts

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

SOCIETY,LAW and ETHICS

Digital Footprint

Whenever we surf the Internet using smartphones, tablets, computers, etc., we leave a trail of data reflecting the
activities performed by us online. This is called as our digital footprint.
Active digital footprints includes data that we intentionally submit online. Eg:
● Eg: Posting on social media like FB, Instagram etc.
● Filling out online forms when signing upto receive emails or texts.
● Agreeing to install cookies when prompted by browser.
The digital data trail we leave online unintentionally is called passive digital footprints. Eg:
● Websites that install cookies without out knowledge.
● Apps and websites that uses geolocation to pinpoint our location.
● Our likes, shares and comments given on various platforms.
This includes the data generated when we visit a website, use a mobile App, browse Internet.
Most of our digital footprints are stored in servers where the applications are hosted. We may not have access to
remove or erase that data. Neither do we have any control on how that data will be used.
Digital Society and Netizen
Digital society reflects the growing trend of using digital technologies in all spheres of human activities. Anyone who
uses digital technology along with Internet is a digital citizen or a netizen. Being a good netizen means practicing safe,
ethical and legal use of digital technology. A responsible netizen must abide by net etiquettes, communication
etiquettes and social media etiquettes
Net Etiquettes
We need to exhibit proper manners and etiquettes while being online. One should be ethical, respectful and
responsible while surfing the Internet.
A) Be Ethical
• No copyright violation: we should not use copyrighted materials without the permission of the creator or
owner.
• Share the expertise :Prior to sharing information, we need to be sure that we have sufficient knowledge on
that topic. The information shared should be true. Also, we should verify that the information is not available
already on Internet.
B) Be Respectful
• Respect privacy: Our personal communication with a digital citizen may include images, documents, files,
etc., that are private to both. We should respect this privacy and should not share those images, documents,
files, etc., with any other digital citizen without each other’s’ consent.
• Respect diversity: in a group or public forum, we should respect the diversity of the people in terms of
knowledge, experience, culture and other aspects
C) Be Responsible
• Avoid cyber bullying: It implies repeatedly targeting someone with intentions to hurt or embarrass. Bullying
online can have very serious implications on the other person (victim). Also, remember our actions can be
traced back using our digital footprints.
• Don’t feed the troll: an Internet troll is a person who deliberately sows discord on the Internet by starting
quarrels or upsetting people, by posting inflammatory or off topic messages in an online community, just for
amusement. Since trolls thrive on attention, the best way to discourage trolls is not to pay any attention to
their comments.

1
Communication Etiquettes
Digital communication includes email, texting, instant messaging, talking on the cell phone, audio or video
conferencing, posting on forums, social networking sites, etc. Good communication require a digital citizen
to abide by the communication etiquettes.
A) Be Precise
• Respect time: we should not waste precious time in responding to unnecessary emails or comments
unless they have some relevance for us. Also, we should not always expect an instant response as the
recipient may have other priorities.
• Respect data limits: For concerns related to data and bandwidth, very large attachments may be
avoided. Rather send compressed files or link of the files through cloud shared storage
B) Be Polite
we should be polite and non-aggressive in our communication. We should avoid being abusive even if
we don’t agree with others’ point of view.
C) Be Credible
We should be cautious while making a comment, replying or writing an email or forum post as such acts
decide our credibility over a period of time. On various discussion forums, we usually try to go through
the previous comments of a person and judge their credibility before relying on that person’s comments
Social Media Etiquette
A) Be Secure
• Choose password wisely: Have strong and frequently changed password. Never share personal
credentials like username and password with others.
• Know who you befriend: we need to be careful while befriending unknown people as their intentions
possibly could be malicious and unsafe.
• Beware of fake information: With experience, we should be able to figure out whether a news,
message or post is genuine or fake. Thus, we should not blindly believe in everything that we come across
on such platforms.
B) Be Reliable
• Think before uploading: once uploaded, it is always there in the remote server even if we delete the
files. Hence we need to be cautious while uploading or sending sensitive or confidential files which have
a bearing on our privacy.

Data Protection
Elements of data that can cause substantial harm, embarrassment, inconvenience and unfairness to an
individual, if breached or compromised, is called sensitive data. Examples of sensitive data include

2
biometric information, health information, financial information, or other personal documents, images
or audios or videos.
All over the world, each country has its own data protection policies (laws). These policies are legal
documents that provide guidelines to the user on processing, storage and transmission of sensitive
information. The motive behind implementation of these policies is to ensure that sensitive information
is appropriately protected from modification or disclosure.
Intellectual Property Right (IPR)
If someone comes out with a new idea, this original idea is that person’s intellectual property. Intellectual
Property refers to the inventions, literary and artistic expressions, designs and symbols, names and
logos.The ownership of such concepts lies with the creator, or the holder of the intellectual property.
This enables the creator or copyright owner to earn recognition or financial benefit by using their creation
or invention.
Intellectual Property is legally protected through copyrights, patents, trademarks,etc.
A) Copyright
Copyright grants legal rights to creators for their original works like writing, photograph, audio
recordings, video, sculptures, architectural works, computer software, and other creative works like
literary and artistic work. Copyrights are automatically granted to creators and authors. Copyright law
gives the copyright holder a set of rights that they alone can avail legally. The rights include right to copy
(reproduce) a work, right to create derivative works based upon it, right to distribute copies of the work
to the public, and right to publicly display or perform the work. It prevents others from copying, using or
selling the work.
B) Patent
A patent is usually granted for inventions. Unlike copyright, the inventor needs to apply (file) for
patenting the invention. When a patent is granted, the owner gets an exclusive right to prevent others
from using, selling, or distributing the protected invention. Patent gives full control to the patentee to
decide whether or how the invention can be used by others. Thus it encourages inventors to share their
scientific or technological findings with others. A patent protects an invention for 20 years, after which
it can be freely used.
(C) Trademark
Trademark includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the
brand or commercial enterprise, from other brands or commercial enterprises. For example, no company
other than Nike can use the Nike brand to sell shoes or clothes. It also prevents others from using a
confusingly similar mark, including words or phrases. For example, confusing brands like “Nikke” cannot
be used. However,it may be possible to apply for the Nike trademark for unrelated goods like notebooks.
Executing IPR: say for a software
● Code of the software will be protected by a copyright
● Functional expression of the idea will be protected by a patent
● The name and logo of the software will come under a registered trademark
Licensing
Licensing and copyrights are two sides of the same coin.A license is a type of contract or a permission
agreement between the creators of an original work permitting someone to use their work, generally for
some price. Licensing is the legal term used to describe the terms under which people are allowed to use
the copyrighted material.
Software License;
End User License Agreement (EULA) of a software contains the dos and don’ts with respect to the
software being purchased. It covers all clauses of software purchase, viz., how many copies can be
installed, whether source is available, whether it can be modified and redistributed and so on.
Violation of IPR
(A) Plagiarism
Presenting someone else’s idea or work as one’s own idea or work is called plagiarism. If we copy some
contents from Internet, but do not mention the source or the original creator, then it is considered as an
3
act of plagiarism. Further, if someone derives an idea or a product from an already existing idea or product,
but instead presents it as a new idea, then also it is plagiarism. It is a serious ethical offense and sometimes
considered as an act of fraud. Even if we take contents that are open for public use, we should cite the
author or source to avoid plagiarism.
(B) Copyright Infringement
Copyright infringement is when we use other person’s work without obtaining their permission to use or
we have not paid for it, if it is being sold. Suppose we download an image from the Internet and use it in
our project. But if the owner of the copyright of the image does not permit its free usage, then using such
an image even after giving reference of the image in our project is a violation of copyright. Just because it
is on the Internet, does not mean that it is free for use. Hence, check the copyright status of writer’s work
before using it to avoid copyright infringement.
NOTE: Plagiarism is an ethical issue, whereas copyright infringement is a legal issue.
C) Trademark Infringement
Trademark Infringement means unauthorized use of other’s trademark on products and services. An
owner of a trademark may commence legal proceedings against someone who infringes its registered
trademark.
Software License
It can be classified into proprietary licenses, and Free and open source software licenses
In proprietary licenses, the exclusive right are reserved with the owner/developer/publisher. They
reserve all freedoms and rights to use and distribute the proprietary software.(Eg:like MS Windows,Adobe
photoshop etc.). Violation of this license amounts to copyright infringement.

Public access and Free and open source software (FOSS)


When authors share their copyrighted works with others under public license, it allows others to use and
even modify the content. Open source licenses help others to contribute to existing work or project
without seeking special individual permission to do so.
The GNU General Public License (GPL), Creative Commons (CC) and APACHE are popular categories of
public licenses.
CC is used for all kinds of creative works like websites, music, film, literature, etc. CC enables the free
distribution of an otherwise copyrighted work.CC licenses are a set of copyright licenses that give the
recipients, rights to copy, modify and redistribute the creative material, but giving the authors, the
liberty to decide the conditions of licensing.
GPL is primarily designed for providing public license to a software. It grants the recipients, rights to copy,
modify and redistribute the software and that the same rights are preserved in all derivative works.
GNU GPL is another free software license, which provides end users the freedom to run, study, share and
modify the software, besides getting regular updates.
Apache License is a permissive free software license written by the Apache Software Foundation. It allows
users to use the software for any purpose, to distribute it, to modify it, and to distribute modified versions
of the software under the terms of the license, without concern for royalties.

Many of the proprietary software that we use are sold commercially and their program code (source code)
are not shared or distributed. However, there are certain software available freely for anyone and their
source code is also open for anyone to access, modify, correct and improve. Free and open source
software (FOSS) has a large community of users and developers who are contributing continuously
towards adding new features or improving the existing features. For example, Linux kernel-based
operating systems like Ubuntu and Fedora come under FOSS. Some of the popular FOSS tools are office
packages, like Libre Office, browser like Mozilla Firefox, etc.
Software piracy is the unauthorized use or distribution of software. Those who purchase a license for a
copy of the software do not have the rights to make additional copies without the permission of the
copyright owner.

4
Cyber Crime
Criminal activities or offenses carried out in a digital environment can be considered as cybercrime. In
such crimes, either the computer itself is the target or the computer is used as a tool to commit a crime.
Cybercrimes are carried out against either an individual, or a group, or an organization or even against a
country, with the intent to directly or indirectly cause physical harm, financial loss or mental harassment.
A cybercriminal attacks a computer or a network to reach other computers in order to disable or damage
data or services.
Malware - software that is specifically designed to disrupt, damage, or gain unauthorized access to a
computer system.
1. Virus – They are often attached or concealed in a shared or downloaded file. When the host file
is accepted by the victim’s system, the virus remains dormant until the infected host file is
activated. Once activated the malicious code of virus run and replicate it to infect other files on
the system. They are very often designed to destroy personal file or seize control of someone’s
digital device.
2. Worm - worm is a standalone malware computer program that replicates itself in order to
spread to other computers. It often uses a computer network to spread itself. Computer worms
use recursive methods to copy themselves without host programs and distribute themselves
based on exploiting the advantages of exponential growth, thus controlling and infecting more
and more computers in a short time
3. Trojans -A Trojan Horse is a type of malware that downloads onto a computer disguised as a
legitimate program. They can be spread through email attachments, software downloads, or
infected websites, and can be difficult to detect and remove. Once installed, it steals sensitive
information, damages files, or gives the attacker further unauthorized access to their victim’s
system. Trojan Horses do not replicate themselves .
4. Adware - type of malware that displays unwanted advertisements on your computer or device.
Adware is commonly activated unknowingly when users are trying to install legitimate
applications that adware is bundled with. It generates two types of revenue for its developer.
one is for the display of the advertisement and another on a "pay-per-click" basis, if the user
clicks on the advertisement.
5. Ransomware
This is another kind of malware that gains access to the computer and blocks the user from
accessing, usually by encrypting the data. The attacker blackmails the victim to pay for getting
access to the data, or sometimes threatens to publish personal and sensitive information or
photographs unless a ransom is paid. Ransomware can get downloaded when the users visit
any malicious or unsecure websites or download software from doubtful repositories. Some
ransomware are sent as email attachments in spam mails. It can also reach our system when
we click on a malicious advertisement on the Internet.
Denial-of-service attack (DoS attack)
It is a cyber-attack in which the attacker seeks to make a machine or network resource unavailable to its
intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial
of service is typically accomplished by flooding the targeted machine or resource with superfluous
requests in an attempt to overload systems and prevent some or all legitimate requests from being
fulfilled.
Hacking
Hacking is the act of unauthorized access to a computer, computer network or any digital system. Hackers
usually have technical expertise of the hardware and software. They look for bugs to exploit and break
into the system.
a. White Hat Hackers
Hacking, when done with a positive intent, is called ethical hacking. Such ethical hackers are known
as white hat hackers. They are specialists in exploring any vulnerability or loophole by during testing
of the software. Thus, they help in improving the security of a software. An ethical hacker may exploit
5
a website in order to discover its security loopholes or vulnerabilities. He then reports his findings to
the website owner. Thus, ethical hacking is actually preparing the owner against any cyber-attack.
b.Black Hat Hackers/Crackers
A non-ethical hacker is the one who tries to gain unauthorized access to computers or networks in
order to steal sensitive data with the intent to damage or bring down systems. They are called black
hat hackers or crackers. They use their skill for illegal or malicious purposes. Such hackers try to break
through system securities for identity theft, monetary gain, to bring a competitor or rival site down,
to leak sensitive information, etc.
c.Grey hat hackers
They work both offensively and defensively at different times. Their behavior cannot be predicted.
Phishing and Fraud Emails
Phishing is an unlawful activity where fake websites or emails that look original or authentic are presented
to the user to fraudulently collect sensitive and personal details, particularly usernames, passwords,
banking and credit card details. The most common phishing method is through email spoofing where a
fake or a forged email address is used and the user presumes it to be from an authentic source. So you
might get an email from an address that looks similar to your bank or educational institution, asking for
your information, but if you look carefully you will see their URL address is fake. They will often use logos
of the original, making them difficult to detect from the real! Phishing attempts through phone calls or
text messages are also common these days.
Identity theft
Online identity theft is a crime in which an attacker uses fraud or deception to obtain personal or sensitive
information from a victim and misuses it to act in the victim's name.
Identity theft refers to a crime committed in order to obtain personal information such as passwords, ID
numbers, credit card numbers or national insurance numbers. Identity theft criminals then misuse this
personal or sensitive information and act fraudulently in the victim’s name, commonly to apply for a loans,
make an online purchase or to access the victim’s medical and financial data.
Eavesdropping
An eavesdropping attack occurs when a hacker intercepts, deletes, or modifies data that is transmitted
between two devices. Eavesdropping, also known as sniffing or snooping, relies on unsecured network
communications to access data in transit between devices.
Cyberbullying
Bullying that takes place over digital devices through the use of electronic means like Instant
messaging,apps, social media, forums, or gaming where people can view, participate in, or share content.
Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about
someone else. It can include sharing personal or private information about someone else causing
embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior.
To prevent cyber bullying
1. Manage privacy settings online
2. Protect your passwords
3. Keep clear records
4. Don’t respond or retaliate
5. Block cyberbullies via user settings
6. Report cyberbullying to site admins
7. Stay safe online
8. Ask when you think a friend might need help
9. Remember you aren’t alone
10. Contact law enforcement if you feel threatened

6
Cyber safety is the safe and responsible use of IT and communication technology. Following points can be
considered as safety measures to reduce the risk of cyber crime:
● Take regular backup of important data.
● Use an antivirus software and keep it updated always.
● Avoid installing pirated software.
● Always update the system software which include the Internet browser and other application
software
● Do not visit or download anything from untrusted websites.
● Use strong password for web login, and change it periodically
● While using someone else’s computer, don’t allow browser to save password or auto fill data, and
try to browse in your private browser window.
● For an unknown site, do not agree to use cookies when asked for through a Yes/No option.
● Perform online transaction like shopping, ticketing, and other such services only through well-known
and secure sites.
● Always secure wireless network at home with strong password and regularly change it.
Indian Information Technology Act (IT Act)
With the growth of Internet, many cases of cyber crimes, frauds, cyber attacks and cyber bullying are
reported. To deal with such menaces, many countries have come up with legal measures for protection of
sensitive personal data and to safeguard the rights of Internet users. The Government of India’s The
Information Technology Act, 2000 (also known as IT Act), amended in 2008, provides guidelines to the user
on the processing, storage and transmission of sensitive information. In many Indian states, there are cyber
cells in police stations where one can report any cyber crime. The act provides a legal framework for
electronic governance by giving recognition to electronic records and digital signatures. The act outlines
cyber crimes and penalties for them.
Cyber Appellate Tribunal has been established to resolve disputes arising from cyber crime, such as
tampering with computer source documents, hacking the computer system, using password of another
person, publishing sensitive personal data of others without their consent, etc. The act is needed so that
people can perform transactions over the Internet through credit cards without fear of misuse. Not only
people, the act empowers government departments also to accept filing, creation and storage of official
documents in the digital format.
E-waste: Hazards and Management
E-waste or Electronic waste includes electric or electronic gadgets and devices that are no longer in
use. Hence, discarded computers, laptops, mobile phones, televisions, tablets, music systems, speakers,
printers, scanners etc. constitute e-waste.E-waste is becoming one of the fastest growing environmental
hazards in the world today. The increased use of electronic equipment has also caused an exponential
increase in the number of discarded products. Lack of awareness and appropriate skill to manage it has
further worsened the problem. So, Waste Electrical and Electronic Equipment (WEEE) is becoming a major
concern for all countries across the world. Therefore, it is very important that e-waste is disposed of in such
a manner that it causes minimum damage to the environment and society.
Impact of e-waste on humans
Electronic waste contains toxic components that are dangerous to human health, such as mercury,
lead, cadmium etc. The negative health effects of these toxins on humans include brain, heart, liver, kidney
and skeletal system damage.
When e-waste such as electronic circuit boards are burnt for disposal, the elements contained in
them create a harmful chemical called beryllium which causes skin diseases, allergies and an increased risk
of lung cancer.
None of the electronic devices are manufactured without using plastics. When this plastic reacts with
air and moisture, it passes harmful chemicals into the soil and water resources. When consumed, it damages
the immune system of the body and also causes various psychological problems like stress and anxiety.
Children are particularly vulnerable to lead poisoning.
7
Impact of e-waste on environment
When e-waste is carelessly thrown or dumped in landfills or dumping grounds, certain elements or
metals used in production of electronic products cause air, water and soil pollution.When e-waste is exposed
to the heat, toxic chemicals are released into the air damaging the atmosphere; this is one of the biggest
environmental impacts of e-waste. Those toxic materials can then seep into the groundwater, affecting both
land and sea animals. Electronic waste can also contribute to air pollution.
Management of e-waste
E-waste management is the efficient disposal of e-waste. Some of the feasible methods of e-waste
management are Reduce,Reuse,Recycle
• Reduce: We should try to reduce the generation of e-waste by purchasing the electronic or
electrical devices only according to our need. Also, they should be used to their maximum capacity and
discarded only after their useful life has ended.
• Reuse: It is the process of re-using the electronic or electric waste after slight modification. The
electronic equipment that is still functioning should be donated or sold to someone who is still willing to use
it. The process of re-selling old electronic goods at lower prices is called refurbishing.
• Recycle: Recycling is the process of conversion of electronic devices into something that can be
used again and again in some or the other manner. Only those products should be recycled that cannot be
repaired, refurbished or re-used. To promote recycling of e-waste many companies and NGOs are providing
door-to-door pick up facilities for collecting the e-waste from homes and offices
E-waste Management in India
The Central Pollution Control Board (CPCB) has issued a formal set of guidelines for proper handling
and disposal of e-waste. According to these guidelines, the manufacturer of any electronic equipment will be
“personally” responsible for the final safe disposal of the product when it becomes an e-waste. The
Department of Information Technology (DIT), Ministry of Communication and Information Technology, has
also issued a comprehensive technical guide on “Environmental Management for Information Technology
Industry in India.” The industries have to follow these guidelines for recycling and reuse of e-waste.

You might also like