Society Law and Ethics Class 11 Notes, In this chapter you will learn how to implement technology based on social and ethical considerations. This chapter includes digital privacy, cyber laws, cybercrime and how responsibly we can use the internet. These notes also help to understand the importance of ethics in computing.
Society Law and Ethics Class 11 Notes
Digital Footprints
The websites we visit, the emails we send, any information we post online, our IP address, and any work done on a computer are known as a digital footprint.
Example of digital footprint
- Search history
- Posting photos on Instagram or Facebook.
- Commenting on a YouTube video.
- Writing reviews for products online.
- Like/ dislike in social media
- Browser history
We leave two different types of digital footprints.
- Active digital footprint – When you share information, post pictures, give likes and comments or log in to the website, all this comes in an active digital footprint.
- Passive digital footprints – When the data is collected from your computer without your knowledge, like search history, cookies, tracking devices, location, etc.
Digital Society and Netizen
A netizen is an internet citizen who actively uses the internet or internet spaces. Responsible netizens usually respect others’ privacy and security, protect their privacy, think before posting, verify information, follow digital laws and ethics, etc.
Net Etiquettes
When we engage with others, we adhere to specific social norms. Similar to this, we must act appropriately and politely when using the internet. While online, one should behave ethically, respectfully, and responsibly.
Be Ethical
- No copyright violation – We should not use copyrighted materials without the permission of the creator or owner.
- Share the expertise – It is beneficial to share expertise and information online so that others can use it. However, we must be confident that we are sufficiently knowledgeable about a subject before sharing any information.
Be Respectful
- Respect privacy: As good digital citizens we have the right to privacy and the freedom of personal expression. At the same time, we have to understand that other digital citizens also have the same rights and freedoms.
- Respect diversity: in a group or public forum, we should respect the diversity of the people in terms of knowledge, experience, culture and other aspects.
Be Responsible
- Avoid cyber bullying: We have to avoid insulting, degrading or intimidating online behaviour like repeated posting of rumours, giving threats online, posting the victim’s personal information or sexual harassment. We need to realise that bullying online can have very serious implications on the other person (victim).
- Don’t feed the troll: An Internet troll is someone who intentionally sows conflict online by provoking arguments, upsetting people, or by publishing controversial or irrelevant statements in online communities for fun.
Communication Etiquettes
Email, texting, instant messaging, cell phone conversations, audio and video conferencing, forum posting, social networking site posting, etc. are all examples of digital communication. All of them are great opportunities to interact with others and share information, ideas, and knowledge.
Be Precise
- Respect time – we should not waste precious time in responding to unnecessary emails or comments unless they have some relevance for us.
- Respect data limits – For concerns related to data and bandwidth, very large attachments may be avoided. Rather send compressed files or link.
Be Polite
- we should be polite and non-aggressive in our communication. We should avoid being abusive even if we don’t agree with others’ point of view.
Be Credible
- We should be cautious while making a comment, replying or writing an email or forum post as such acts decide our credibility over a period of time.
Social Media Etiquettes
We are familiar with several social networking platforms and may even have an account there. These websites enable users to submit or upload photographs of their ideas and experiences. It has started to influence how politics, business, entertainment, education, and other things turn out. There are certain social media etiquettes we must adhere to as well.
Be Secure
- Choose password wisely – Users need to be aware of how to protect themselves and their accounts. Having a strong password that is updated periodically is the way to minimize the risk from hackers.
- Know who you befriend – We must take precautions while making friends with strangers because their motives may be dangerous and harmful.
- Beware of fake information – In social networks, fake posts, messages, and news are common. We should be aware of them as users.
Be Reliable
- Think before uploading – On social networks, almost anything can be uploaded. But keep in mind that once posted, the file remains on the remote server even if we delete it. Therefore, we must tread cautiously while transmitting or uploading private or sensitive files that could compromise our privacy.
Societal Impact Class 11 Notes
Data Protection
Every nation in the globe has its unique data protection legislation (laws). These policies, which are formal legal papers, give the user instructions on how to handle, store, and transmit sensitive data. The goal of putting these policies into place is to guarantee that sensitive data is properly protected from change or disclosure.
Intellectual Property Right (IPR)
It is the inventor’s intellectual property if they come up with a novel idea. Intellectual property includes innovations, literary and artistic works, visual arts, names, and logos. The originator or intellectual property owner is the rightful proprietor of such concepts.
Copyright
Copyright gives creators legal protection for their original works, including writing, photography, audio and video recordings, computer software, sculptures, architectural creations, and other types of creative output like literary and artistic works. Copyrights are automatically granted to creators and authors.
Patent
Inventions are granted a patent. In opposed to copyright, the creator must submit an application (file) to patent the innovation. After receiving a patent, the owner gains the only authority to prohibit anyone from making, using, or selling the invention.
Trademark
Any visual symbol, word, name, design, slogan, label, etc. that sets the brand or business apart from other brands or businesses is considered a trademark.
Violation of IPR
The following are some ways that intellectual property rights may be violated –
Plagiarism
Text, images, and videos may all be easily copied or shared. Plagiarism is the process of representing the thoughts or works of another person as one’s own. Plagiarism is defined as the act of taking someone else’s work and using it without crediting the author name or source.
Copyright Infringement
When we utilise someone else’s creative work without asking permission or, if the work is being sold, without paying for it, we are infringing their copyright.
Trademark Infringement
Unauthorized use of another’s trademark on goods and services is known as trademark infringement. Anyone who violates a trademark registered to them may face legal action from the trademark owner.
Open Source Software and Licensing
Open source software is freely available for anyone to use, modify, and distribute. Open-source software does not require any licence. There are different types of open source licences available.
- Creative Common License (CC): All types of creative works, like images, music, movies, books and text, can have a creative licence. Creative Commons licences give authority to use the creative works freely, but you have to give proper attribution. For example, Wikipedia articles use Creative Commons licensing.
- General Public License (GPL): Another free software licence, the GNU GPL, allows users to run, study, share, and modify the software while also receiving frequent updates. For example, The Linux operating system is licensed under GPL.
- Apache License: Allows users to freely modify and distribute software with minimal restriction. For example, Apache web server software uses the Apache licence.
Cyber Crime
To disrupt or harm data or services, a cybercriminal targets a computer or a network that connects it to other computers. Additionally, a cybercriminal could spread viruses and other malware in order to obtain private and confidential data for extortion and blackmail. Cybercrimes are committed with the goal to directly or indirectly cause physical harm, financial loss, or mental harassment against an individual, a group, an organisation, or even a country.
Hacking
Unauthorized access to a computer, computer network, or other digital system is known as hacking. Hackers frequently possess technical knowledge of both software and hardware. They search for bugs that they can use to access the system.
Eavesdropping
Eavesdropping, also known as sniffing or snooping, is the act of secretly listening to private online communications, such as email or phone calls. This can be done using spyware or an unsecured Wi-Fi network.
Phishing and Fraud Emails
Phishing is an illegal practise in which users are provided with false websites or emails that appear genuine or original in order to illegally obtain sensitive and personal information, including usernames, passwords, banking information, and credit card numbers.
Identity Theft – Identity thieves are increasingly leveraging personal data obtained illegally from computers or computer networks to conduct fraud.
Ransomware
The attacker gains access to the computer in this case and prevents the user from using it, typically by encrypting the data. When a ransom is not paid, the attacker may threaten to disclose the victim’s private and sensitive information or photos or use blackmail to force the victim to pay for access to the data.
Cyber trolls
People who post harmful comments online or spread false information or harass individuals are known as ‘cyber trolls’.
Cyber bullying
If any user using technology harasses others, threatens others, spreads rumours, posts embarrassing photos or sends abusive messages is known as cyberbullying.
Combatting and Preventing Cyber Crime
With the dual strategy of being cautious and seeking legal assistance, the difficulties of cybercrime can be reduced.
The following items can be thought of as safety precautions to lower the danger of cybercrime:
- Take regular backup of important data
- Use an antivirus software and keep it updated always
- Avoid installing pirated software. Always download software from known and secure (HTTPS) sites
- Always update the system software which include the Internet browser and other application software
- Do not visit or download anything from untrusted websites
- In most cases, the browser warns users about dubious websites whose security certificate could not be confirmed; stay away from such sites.
- For web logins, use strong passwords, and change them frequently. Use a different password for each website. Use a variety of alphanumeric character combinations, including special characters. Don’t include common names or words in your password
- Don’t let your browser remember your password or auto-fill information when using someone else’s computer, and attempt to browse in a private browser window.
Societal Impact Class 11 Notes
Indian Information Technology Act (IT Act)
The Information Technology Act, 2000 (commonly known as the IT Act) of the Government of India, as revised in 2008, offers instructions to the user on the handling, storing, and transfer of sensitive data.
There are cyber cells in police stations in various Indian states where one can report any cybercrime. By recognising digital signatures and electronic records, the legislation creates a legal framework for electronic government. The statute describes cybercrimes and their associated consequences.
Impact on Health
We are spending more time in front of screens, whether on our phones, laptops, desktop computers, televisions, gaming consoles, or music or sound equipment, as digital technologies have permeated several industries. However, conversing while hunched over might be detrimental to our health on both a physical and mental level.
The science of ergonomics is the design or arrangement of workplaces, including the systems, furniture, and equipment, to make them safe and comfortable for the user. We can lessen the burden on our bodies thanks to ergonomics, including weariness and ailments brought on by continuous use.
Computer Science Class 11 Notes important links
- Computer Systems and Organisation
- Introduction to problem solving
- Getting Started with Python
- Flow of Control statements in Python
- String in Python
- Lists in Python
- Tuples in Python
- Dictionary in Python
- Society, Law and Ethics
Disclaimer: We have taken an effort to provide you with the accurate handout of “Society Law and Ethics Class 11 Notes“. If you feel that there is any error or mistake, please contact me at anuraganand2017@gmail.com. The above CBSE study material present on our websites is for education purpose, not our copyrights. All the above content and Screenshot are taken from Computer Science Class 11 CBSE Textbook, Sample Paper, Old Sample Paper, Board Paper, NCERT Textbook and Support Material which is present in CBSEACADEMIC website, This Textbook and Support Material are legally copyright by Central Board of Secondary Education. We are only providing a medium and helping the students to improve the performances in the examination.
Images and content shown above are the property of individual organizations and are used here for reference purposes only.
For more information, refer to the official CBSE textbooks available at cbseacademic.nic.in