Unit 4:: Societal Impacts
Unit 4:: Societal Impacts
Unit 4:: Societal Impacts
Societal Impacts
Marks :8
Unit 4: Societal Impacts( Marks: 8)
Digital footprint, Net and communication etiquettes, data protection,
intellectual property rights (IPR), plagiarism, licensing and copyright, free
and open source software (FOSS), cybercrime and cyber laws, hacking,
phishing, cyber bullying, overview of Indian IT Act.
E-waste: hazards and management.
Awareness about health concerns related to the usage of technology.
Digital Footprints:
• Digital Footprints are the records and traces of individuals’ activities which
we leave behind when we visit any website (or use any online application or
Examples:
• Websites that install cookies in user’s device without their disclosure.
• Apps and websites that use geo-location to detect user’s location.
• Social media news channels and advertisers that use comments, likes and
shares of the user to know about their profiles and areas of interest,
based on which they serve the advertisements as per the user
requirements.
Following measures to be adapted to mange digital footprints:
• Anyone who uses digital technology along with Internet is a digital citizen or a
netizen.
• Being a good netizen means practicing safe, ethical and legal use of digital
technology.
We should respect the privacy and should not share those images, documents,
files, etc., with any other digital citizen without others’ consent.
rumours, giving threats online, posting the victim’s personal information, sexual harassment
An Internet troll is a person who deliberately sows discord on the Internet by starting
sites, etc.
• Good communication over email, chat room and other such forums require a
(C) Be Credible
comments of a person and judge their credibility before relying on that person’s
comments.
Social Media Etiquettes
The minimum one can do is to have strong and frequently changed password.
Never share personal credentials like username and password with others.
unsafe.
• Beware of fake information:
should not blindly believe in everything that we come across on such platforms,
we should apply our knowledge and experience to validate such news, message or
post.
(B) Be Reliable
we can upload almost anything on social network. However, remember that once
uploaded, it is always there in the remote server even if we delete the files. Hence
data.
• Copyright grants legal rights to creators for their original works like writing, photograph,
audio recordings, video, sculptures, architectural works, computer software, and other
Book’, which tells the story of Mowgli, the jungle boy. It would be an infringement
of the writer’s copyright if someone used parts of the novel without permission.
To use other’s copyrighted material, one needs to obtain a license from them.
(B) Patent
• When a patent is granted, the owner gets an exclusive right to prevent others from
using, selling, or distributing the protected invention. Patent gives full control to the
• A patent protects an invention for 20 years, after which it can be freely used.
• Trademark includes any visual symbol, word, name, design, slogan, label, etc.,
that distinguishes the brand or commercial enterprise, from other brands or
commercial enterprises.
• For example, no company other than Nike can use the Nike brand to sell shoes
or clothes.
• Confusing brands like “Nikke” cannot be used.
• However, it may be possible to apply for the Nike trademark for unrelated
goods like notebooks.
• Validity for 10 years can be made perpetual by renewing the trademark every
10 years
NOTE:
* The name and logo of the software will come under a registered trademark
Licensing
an original work permitting someone to use their work, generally for some price;
whereas copyright is the legal rights of the creator for the protection of original
• Only the copyright owner of a work can enter into a license agreement.
• End User License Agreement (EULA) contains the dos and don’ts with respect to
the software being purchased.
• It covers all clauses of software purchase, viz., how many copies can be installed,
whether source is available, whether it can be modified and redistributed and so
on.
• A software license is an agreement that provides legally binding guidelines
pertaining to the authorized use of digital material. The digital material may
include any software or any form of art, literature, photos, etc., in digital form.
• Failure to follow such guidelines is considered as an infringement of Intellectual
Property Rights (IPR), and is a criminal offence
Violation of IPR
A) Plagiarism:
• Plagiarism is stealing someone’s intellectual work and representing it as our own
work without giving credit to the creator or without citing the source of information.
• If we copy some contents from Internet, but do not mention the source or the
original creator, then it is considered as an act of plagiarism.
How to avoid plagiarism:
• Use your own words and ideas.
• Always provide reference to the source from where the
information is received. citation
• Use online tools to check for plagiarism.
(B) Copyright Infringement
their permission to use or we have not paid for it, if it is being sold.
• To download an image from the Internet and use it in our project check the
Copyright sometimes put restriction on the usage of the copyrighted works by anyone
else.
• When authors share their copyrighted works with others under public license, it allows
• Open source licenses help others to contribute to existing work or project without
• The GNU General Public License (GPL) and the Creative Commons (CC) are two popular
• For example, Linux kernel-based operating systems like Ubuntu and Fedora
Those who purchase a license for a copy of the software do not have the rights
free of charge.
• A CC license is used when an author wants to give other people the right to
share, use, and build upon a work that the author has created.
2.Shared with CC: The work can be modified, distributed but only under CC License.
3.Non-Commercial: Work can be modified, distributed but not for commercial purposes.
4.No Derivative Works: You can copy and distribute the licensed work, but you can’t modify it in any
digital system.
• Hacking, when done with a positive intent, is called ethical hacking are also known
as white hat hackers who helps in improving the security of the software.
• An ethical hacker may exploit a website in order to discover its security loopholes or
vulnerabilities. He then reports his findings to the website owner. Thus, ethical
computers or networks in order to steal sensitive data with the intent to damage
• Such hackers try to break through system securities for identity theft, monetary
gain, to bring a competitor or rival site down, to leak sensitive information, etc.
2) Phishing and Fraud Emails
• Phishing is an unlawful activity where fake websites or emails that look original or
authentic are presented to the user to fraudulently collect sensitive and personal
• The most common phishing method is through email spoofing where a fake or
forged email address is used and the user presumes it to be from an authentic
source.
• email from an address that looks similar to your bank or educational
institution, asking for your information, They will often use logo’s of the
• A user’s identifiable personal data like demographic details, email ID, banking
credentials, passport, PAN, Aadhaar number and various such personal data are
• This is one type of phishing attack where the intention is largely for monetary gain.
Types of Identity Theft
• Financial identity theft: when the stolen identity is used for financial
gain.
• This is another kind of cyber crime where the attacker gains access to the computer
and blocks the user from accessing, usually by encrypting the data.
• The attacker blackmails the victim to pay for getting access to the data, or sometimes
ransom is paid.
• Ransomware can get downloaded when the users visit any malicious or unsecure
cyber crime:
• Take regular backup of important data.
• Use an antivirus software and keep it updated always.
• Avoid installing pirated software.
• Always download software from known and secure (HTTPS) sites.
• Always update the system software which include the Internet browser and other
application software
• Do not visit or download anything from untrusted websites.
• Usually the browser alerts users about doubtful websites whose security certificate could
not be verified; avoid visiting such sites.
• Use strong password for web login, and change it periodically. Do not use same
password for all the websites. Use different combinations of alphanumeric characters
• While using someone else’s computer, don’t allow browser to save password or auto fill
Yes/No option.
• Perform online transaction like shopping, ticketing, and other such services only
• Always secure wireless network at home with strong password and regularly
change it.
Indian Information Technology Act (IT Act) /ITA 2000 Act
• To safeguard the rights of Internet users, the Government of India’s The Information
Technology Act, 2000 amended in 2008, provides guidelines to the user on the processing,
storage and transmission of sensitive information.
• In many Indian states, there are cyber cells in police stations where one can report any
cyber crime.
• The act outlines cyber crimes and penalties for them.
• Cyber Appellate Tribunal has been established to resolve disputes arising from cyber
crime, such as tampering with computer source documents, hacking the computer system,
using password of another person, publishing sensitive personal data of others without
their consent, etc.
• The act is needed so that people can perform transactions over the Internet through credit
cards without fear of misuse.
• Not only people, the act empowers government departments also to accept filing, creation
and storage of official documents in the digital format.
SECTION OFFENCE PENALTY
67A Publishing images containing sexual Imprisonment up to 7 years, and/or
acts fine up to ₹ 10,00,000.
67B Publishing child porn or predating Imprisonment up to 5 years and/or
children online fine up to ₹ 10,00,000 on 1st
conviction. Imprisonment up to 7
years and/or fine up to ₹ 10,00,000
on 2nd conviction.
67C Failure to maintain records Imprisonment up to 3 years and/or
fine up to ₹ 2,00,000.
68 Failure/refusal to comply with Imprisonment up to 7 years and/or
orders possible fine.
69 Failure/refusal to decrypt data Imprisonment up to 3 years and/or
fine up to ₹ 1,00,000.
70 Securing access or attempting to Imprisonment up to ten years
secure access to a protected system and/or fine.
71 Misrepresentation Imprisonment up to 3 years and/or
fine up to ₹ 1,00,000.
IT ACT, 2000 (Cyber law) of India
Electronic Record:
Information captured through electronic means and which may or may not have a paper
record to back it up. Also called machine readable record.
Digital Signature:
Digital signature is basically a way to ensure that an electronic document (e-mail,
spreadsheet, text file, etc.) is authentic.
Authentic means that you know who created the document and you know that it has not
been altered in any way since that person created it.
• Digital signatures are the digital equivalent of a paper certificate.
• Digital signatures work on a unique digital ID issued by an Certificate Authority (CA)
to the user.
• Signing a document digitally means attaching that user's identify, which can be used
to authenticate.
• A licensed Certifying Authority (CA) who has been granted a license to issue it under
Section 24 of the Indian IT-Act 2000, can issue the digital signature
E-waste: Hazards and Management:
E-waste or Electronic waste includes electric or electronic gadgets and devices that are no longer in
use. Hence, discarded computers, laptops, mobile phones, televisions, tablets, music systems,
speakers, printers, scanners etc. constitute e-waste when they are near or end of their useful life.
Of all the different types of waste, electronic waste has the characteristics of:
(a) the fastest growing segment of waste
(b) most valuable due to its basic consumption
(c) very hazardous if not handled carefully.
So, Waste Electrical and Electronic Equipment (WEEE) is becoming a major concern for all countries
across the world. Globally, e-waste constitutes more than 5 per cent of the municipal solid waste
Impact of e-waste on environment
emission of gases and fumes into the atmosphere, discharge of liquid waste
causes water pollution as the water becomes unfit for humans, animals
• When dust particles loaded with heavy metals enters the atmosphere, it
• One of the most widely used metals in electronic devices (such as monitors and
batteries) is lead. When lead enters the human body through contaminated food,
water, air or soil, it causes lead poisoning which affects the kidneys, brain and central
electronic or electrical devices only according to our need. Also, they should be
used to their maximum capacity and discarded only after their useful life has
ended. Good maintenance of electronics devices also increases the life of the
devices
• Reuse: It is the process of re-using the electronic or electric waste after slight
sold to someone who is still willing to use it. The process of re-selling old electronic
that can be used again and again in some or the other manner. Only those products
of e-waste many companies and NGOs are providing door-to-door pick up facilities for
In India, the Environmental Protection Act, 1986, has been enacted to punish people
responsible for causing any form of pollution by paying for the damage done to the
natural environment. According to this act, “Polluter pays Principle”, any one causing
disposal of e-waste. According to these guidelines, the manufacturer of any electronic equipment will be
“personally” responsible for the final safe disposal of the product when it becomes an e-waste.
The Department of Information Technology (DIT), Ministry of Communication and Information Technology,
has also issued a comprehensive technical guide on “Environmental Management for Information Technology
Industry in India.” The industries have to follow these guidelines for recycling and reuse of e-waste. In order to
make the consumers aware of the recycling of e-waste, prominent smartphone and computer manufacturing
• Too much time on Internet can be addictive and can have a negative impact
avoided Ergonomically maintaining the viewing distance and angle, along with the
position.
• However, to get rid of dry, watering, or itchy eyes, it is better to periodically focus
keyboard) not aligned ergonomically, can give rise to a painful condition of wrists
and fingers, and may require medical help in the long run.
• Stress, physical fatigue and obesity are the other related impacts the body may
people in her new city and school. But all of a sudden , someone posting negative,
demeaning comments on her social networking profile, school site’s forum etc..,
She is also getting repeated mails from unknown people. Every time she online, she
b) What action should she take to stop it ? She must immediately bring it to the
notice of her parents and school authorities. And she can report the crime in cyber
police.
Sachin has copied a logo for his project from online and pasted this in his
project report. What is this act of him called? How can it be avoided?
Plagiarism reference or citation
Malini has stolen a credit card. She used that credit card to purchase a laptop.
What type of offence has she committed?
Credit card fraud