NAVODAYA VIDYALAYA SAMITI� NOIDA
E-CONTENT
COMPUTER SCIENCE CLASS XI
Society law and ethics (sle-1)
IPR,LICENSING,OPEN SOURCE , PRIVACY LAWS,
CYBER CRIME-CONVERTED
-DESIGNED BY :-
B.KAVITHA,PGTIT
JNV VATTEM
MAHABUBNAGAR(DIST)
Intellectual property rights
Intellectual property rights
Why should an IP be protected?
Intellectual property rights
Kinds of IPRs
Intellectual property rights
Plagiarism
Why is it important to understand Plagiarism?
Plagiarism
Two Types of Plagiarism
Plagiarism
How to avoid plagiarism
Digital rights management
HOW DIGITAL RIGHTS MANAGEMENT WORKS
Digital rights management
Different ways to protect your content, software, or product
CHALLENGES OF DIGITAL RIGHTS MANAGEMENT
Digital rights management
BENEFITS OF DIGITAL RIGHTS MANAGEMENT
Licensing
Benefits of Using Licensed Software
Licensing
Licensing
The Pros of using a Creative Commons License
The Cons of using a Creative Commons License
Licensing
Core values of GPL software are
Licensing
Advantages of publishing software under GPL (General Public License):
Disadvantage of using the GPL license.
Licensing
The Apache License is a free and open source software (FOSS) licensing agreement from the Apache Software Foundation (ASF). Beginning in 1995, the Apache Group (later the Apache Software Foundation) Their initial license was essentially the same as the old BSD license. Apache did likewise and created the Apache License v1.1 - a slight variation on the modified BSD license. In 2004 Apache decided to depart from the BSD model a little more radically, and produced the Apache License v2.
Main Features Of The Apache License
Open Source
Following criteria must be met for open source
Example of Open source software
Firefox/ apache http server,
apache tomcat
In general, open source means any program whose source code is made available publically for use or modification as users or other developers see fit. Open source software is usually made freely available.
Open Source
Following criteria must be met for open data
The 5 basic principles of open data decided in G8 summit in 2013 are
Open data is data which can be accessed, used and shared by any one to bring about social, economic and environmental benefits. Open data becomes usable when made available in a common , machine-readable format.
Open Government Data refers to the information collected, produced or paid for by the public bodies (PSI) and made freely available for re-use for any purpose.
Privacy Laws
Privacy Laws
Privacy threats
Privacy Laws
The (Indian) Information Technology Act, 2000 section 43A of the (Indian) Inform deals with the issues relating to payment of compensation (Civil) and punishment (Criminal) in case of wrongful disclosure and misuse of personal data and violation of contractual terms in respect of personal data.
Under section 72A of the (Indian) Information Technology Act, 2000, disclosure of information, knowingly and intentionally, without the consent of the person concerned and in breach of the lawful contract is punishable with imprisonment for a term extending to three years and fine extending to Rs 5,00,000
Fraud
Cyber crime
STEPS TO PROTECT YOURSELF AGAINST CYBER CRIME
Cyber crime
Cyber crime
movie piracy has actually decreased significantly through Bit Torrent and other traceable methods, as the adoption curve of Netflix (and other) streaming options has increased. The answer there is simple - make it cheaper and easier to access media in a "legal" manner, and more people will utilize those paths than the "illegal" paths.
Cyber crime
Cyber crime
Common types of online scams include:
Cyber crime
Cyber forensics is a way or an electronic discovery technique which is used to determine and reveal technical criminal evidence. Various capabilities of cyber forensics are.
IT Act 2000
SECTION | OFFENCE | PENALTY |
67A | Publishing images containing sexual acts | Imprisonment up to seven years, or/and with fine up to Rs. 1,000,000 |
67B | Publishing child porn or predating children online | Imprisonment up to five years, or/and with fine up to Rs.1,000,000 on first conviction. Imprisonment up to seven years, or/and with fine up to Rs.1,000,000 on second conviction. |
67C | Failure to maintain records | Imprisonment up to three years, or/and with fine. |
68 | Failure/refusal to comply with orders | Imprisonment up to three years, or/and with fine up to Rs.200,000 |
69 | Failure/refusal to decrypt data | Imprisonment up to seven years and possible fine. |
70 | Securing access or attempting to secure access to a protected system | Imprisonment up to ten years, or/and with fine. |
71 | Misrepresentation | Imprisonment up to three years, or/and with fine up to Rs.100,000 |
BIBLIOGRAPHY:
1. Computer Science Textbook for class XI
by NCERT
2. Computer Science with Python
by Sumitha Arora
3. Computer Science with Python
by Preeti Arora