Society Law and Ethics Class 11 Notes

Course 11 Computer Practices Students should refer to the following concepts and opinions for corporate law and ethics in Standard 11. These 11th Grade Computer Science Practices exam notes are very useful for upcoming tests and exams, and will help you get good grades in the 11 CS Societal Impact NCERT Chapter 11 Notes Unit 3 with Privacy, Cybercrime, Cybersecurity, Electronic Waste, IT Act 2000, Technology and Society, and Digital Footprints. These Class 1 Corporate Law and Ethics scores are very concise and concise to help students easily understand each concept and get the best exam scores. Download CBSE Class 11 Information Practice Law And Ethics Notes in PDF format. All revision notes for Grade 11 computer practices have been designed in accordance with the latest curriculum and the chapters of your computer practice manual have been updated to Standard 11. Our teachers have designed these concept notes for the benefit of Grade 11 students. You should use these notes chapter by chapter for daily review. These study notes can also be used to learn each chapter and its important and difficult topics or rehearsals right before your exams to help you get better scores on upcoming exams. You can also use printable notes for Class 11 computer practices to revise difficult topics faster and rank higher. After reading these notes, you also refer to the MCQ questions for class 11 IT practices on our website The digital society thus reflects the growing trend to use digital technologies in all areas of human activity. But while we`re online, we all need to be aware of how to behave, how best to interact with others, and what ethics, morals, and values to cultivate.

We must be polite and not aggressive in our communication. We must avoid being abusive, even if we do not agree with the point of view of others. A responsible internet user must adhere to network tags, communication labels and social media etiquette. i) No Copyright Infringement: We must not use copyrighted material without the permission of the author or owner. However, it may be possible to register the Nike trademark for unrelated products such as laptops. The best way to discourage trolls is to pay no attention to their comments. Sensitive data protection can be implemented through encryption, authentication, and other secure methods to ensure that only that data is accessible. Data elements that can cause significant harm, embarrassment, inconvenience, and injustice to a person if breached or compromised are called sensitive data. Examples of sensitive data include biometric information, health information, financial information or other personal documents, images, audios or videos. Around the world, each country has its own privacy policies (laws).

These policies are legal documents that give the user guidelines for the processing, storage, and transfer of sensitive information. Intellectual property refers to inventions, literary and artistic expressions, designs, names and logos. Anyone who uses digital technology with the Internet is a digital citizen or Internet user. Being a good Internet user means practicing the safe, ethical and legal use of digital technologies. A responsible internet user must adhere to network tags, communication labels and social media etiquette. Respect time: We should not waste valuable time responding to unnecessary emails or comments unless they are relevant to us, steal personal information such as bank details, voter card, email ID, passport, PAN, etc. of a person illegally by criminals and misuse for various illegal and criminal activities. ii) Sharing expertise: It is good to share information and knowledge on the Internet so that others can access it.

Respect data limits: Very large attachments can be avoided if there are data and bandwidth concerns. Send compressed files instead. A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication is successful, the affected areas are “infected” with a computer virus. Malware is intrusive software designed to damage and destroy computers and computer systems. Malware is a contraction of “malware”. Examples of common malware include viruses, worms, Trojans, spyware, adware, and ransomware. Whether the communication is synchronous (real-time such as chat, audio/video calls) or asynchronous (such as emails, forum posts or comments), most of our digital footprints are stored on the servers hosting the applications.

We may not have access to remove or delete this data, nor may we have control over how this data is used. So as soon as a data trail is generated, even if we later try to delete data about our online activities, the digital fingerprints remain. Active fingerprints: Active digital fingerprints that contain data that we intentionally submit online. This includes emails we write or replies or messages we post on various websites or mobile apps, etc. All our online activities leave a trail of data on the Internet as well as on the computing device we use. Let`s say we upload an image to the Internet and use it in our project. However, if the copyright owner of the image does not allow its free use, the use of such an image constitutes copyright infringement even after specifying the image in our project. A Trojan or Trojan horse is a type of code or malware that looks legitimate but can take control of your computer. A Trojan horse is designed to damage, disrupt, steal or generally perform any other malicious action on your data or network. Copyright grants creators legal rights to their original works such as writings, photographs, audio recordings, videos, sculptures, architectural works, computer software, and other creative works such as literary and artistic works. A patent protects an invention for 20 years, after which it can be used freely. The Government of India`s Information Technology Act 2000 (also known as the Information Technology Act), amended in 2008, provides the user with guidelines for the processing, storage and transmission of sensitive information.

In many Indian states, there are cyber cells in police stations where you can report any cybercrime. The law provides a legal framework for e-governance by recognizing electronic records and digital signatures. The law describes cybercrime and the penalties that flow from it. There are two types of digital footprints that we leave behind. Active and passive digital fingerprints. Intellectual property is legally protected by copyrights, patents, trademarks, etc. Anyone who uses digital technology with the Internet is a digital citizen or Internet user. We should be careful when commenting, replying or writing an email or forum post, as such actions determine our credibility over a period of time. “Responsible, safe, positive, legal and ethical use of the Internet (digital technology)” Choose the password wisely: it is crucial for social media users.

Never share personal login information such as username and password with anyone. A trademark owner can take legal action against someone who infringes their trademark. Therefore, check the copyright status of the author`s work before using it to avoid plagiarism. Dismantling: removal of parts containing hazardous substances (CFCs, mercury); Removal of easily accessible parts containing valuable substances. (copper and other precious metals). Ownership of these concepts belongs to the creator or owner of the intellectual property. This allows the creator or copyright owner to obtain recognition or financial benefit through the use of their creation or invention. We must respect this privacy and not share these images, documents, files, etc. with other digital citizens without everyone`s consent. Know who you`re friends with: Social networks usually encourage you to connect (make friends) with users, sometimes even those we don`t know or have met. However, we need to be careful when befriending strangers, as their intentions could potentially be malicious and uncertain.

It prevents others from copying, using or selling the work. self-expression. At the same time, we need to understand that other digital citizens also have the same rights and freedoms. For example, no company other than Bata can use the Bata brand to sell shoes or clothing. Infringement of intellectual property rights can occur in one of the following ways: Trademark infringement means the unauthorized use of someone else`s trademark on products and services. Cyberbullying: This means repeatedly targeting, hurting, or embarrassing someone with the intention of doing so. The most popular way to manage e-waste is RRR, beware of fake news: fake news, news and posts are common on social networks. As users, we need to be aware of this. With experience, we should be able to know whether a message, message or message is authentic or false. Therefore, we should not blindly believe everything we encounter on such platforms, it is a serious ethical offense and is sometimes considered an act of fraud. Even if we take content that is open to the public, we need to cite the author or source to avoid plagiarism. The digital fingerprint can be used to track the user, their location, device, and other usage details.