Header Ads Widget

Responsive Advertisement

Class 12 Societal Impact Notes Term 1


Hello friends in this article we will discussed important topic for class 12 term 1 and it would be 10 marks upcoming examination. Just read out this article it would help you to get 9-10 marks in Upcoming class 12 Informative practice Term 1 board Examination. We will share more important MCQ related to this topic this will helps you in your examination.


Societal Impacts :In recent years, the world around us has seen a lot of changes due to use of Digital Technologies’. These changes have made a dramatic impact on our lives, making things more convenient, faster, and easier to handle. In the past, a letter would take days to reach, and every recipient would get his or her own copy and respond separately. Today, one can sent and receive emails to more than one person at a time. The instantaneous nature of electronic communications has made us more efficient and productive.

In this chapter 

    • » Introduction 
    • » Digital Footprint 
    • » Digital Society and Netizen 
    • » Data Protection 
    • » Cyber Crime 
    • » Indian IT Act 
    • » Impact on Health

Digital Footprints: Have you ever searched online for any information ?  Have you ever purchased an online ticket, or responded to your friend’s email, or checked the score of a game online? Whenever we surf the internet using smartphones, tablets, computers, etc,. We leave a trail of data reflecting the activities by us online, which is our digital footprint. Out digital footprint can be created and used with or without our knowledge. It includes websites we visit, emails we sent, and any information we submit online, etc. along with the computer’s IP address, location, and other device specific details. Such data could be used for targeted advertisement or could also be misused or exploited. Thus it is good to be aware of the data trail we might be leaving behind.

There are two kind of digital footprints we leave behind. Active Digital Footprint : Which includes data that we intentionally submit online. This would include emails we write, or responses or post we make on different websites or mobile Apps, etc. Passive Digital Footprint : The digital data trail we leave online unintentionally is called passive digital footprints. This includes the data generated when we visit a website, use a mobile App, browse internet, etc. Every one who is connected to the internet may have a digital footprint. With more usage, the trail grows. On examining the browser setting we an find out how it stores our browsing history, cookies, passwords, auto fills, and many other types of data. Besides browser, most of our digital footprints are stored in server side.

Digital Society : As our society is inclined towards using more and more digital technologies, we end up managing most of our tasks digitally. In this era of digital society, our daily activities like communication, social networking, banking, shopping, entertainment, education, transportation, etc, are increasingly being driven by online transaction. Any who uses digital technology along with internet is digital citizen or a netizen. Being  a good citizen means practicing safe, ethical and legal use of digital technology. A responsible netizen must abide by net Etiquettes, communication Etiquettes and social media etiquettes.

Net Etiquettes : We follow certain Etiquetts during our social interactions. Similarly, we need to exhibit proper manners and Etiquettes while being online. One should be ethical, respectful and responsible while surfing the internet. Be Ethical: No copyright violation Share the expertise: It is good to share information and knowledge on Internet so that others can access it. Be respectful: Respect privacy: As good digital citizens we have the right to privacy and the freedom of personal expression. At the same time, we have to understand that other  digital citizens also have the same rights and freedoms. Respect Diversity: In a group or public forum, we should respect the diversity of the people in terms of knowledge, Experience, culture and other aspects. Be Responsible: Avoid cyber bullying: Any insulting, degrading or intimidating online behaviour like repeated posting of rumours, giving threats online.

Communication Etiquettes: Digital communication includes email. Teting, instant messaging talking on the cell phone, audio or video conferencing, posting on forums, social networking sites etc. All these are great ways to connect with people in order to exchange ideas,  share data and knowledge.



Social Media Etiquettes: In the current digital era, we are familiar with different kinds social media and we may have an account on facebook, Google+, twitter, Instagram, Pinterest, or Youtube channel. Social Media are websites or applications that enable their users to participate in social networking by creating and sharing content with other in the community. These platforms encourage users to share their thoughts and experiences through posts or pictures. In this way users can interact with other online users of those social media apps or channel

Data Protection: In this digital age, data or information protection is mainly about the privacy of data stored digitally. Elements of data that can cause substantial harm, embarrassment, inconvenience and unfairness and unfairness to an individual if breached or compromised, is called sensitive data. Example of sensitive data include biometric information, health information, financial information, or other personal documents, images or audios or videos. Privacy of sensitive data can be implemented by encryption. Authentication, and other secure methods to ensure that such data is accessible only to the authorised user and is for a legitimate purpose. Intellectual Property Right (IPR): When someone owns a house or a motorcycle, we say that the person owns that property. Similarly, if someone comes out with a new idea, this original idea is that person’s intellectual property. Intellectual property refers to the inventions, literary and artistic expressions, designs and symbols, names and logos. The ownership of such concepts lies with the creator, or the holder of the intellectual property.


CopyRight: Copyright grants legal rights to creators for their original works like writing, photograph, audio recordings, videos etc. Copyrights are automatically granted to creators and authors. Copyright law gives the copyright holder a set of rights that they alone can avail legally. The rights include right to copy (reproduce) a work, right to create derivative works based upon it, right to distribute copies of the work to the public. It prevents others from copying, using or selling the work.

Patent: A patent is usually granted for inventions. Unlike copyright, the inventor needs to apply for patenting the inventions. When a patent is granted, the owner gets an exclusive right to prevent others from using, selling, or distrbuting the protected invention. Patent gives full to the patentee to decide whether or how the invention can be used by others. Thus is encourages inventors to share their scientific or technological finding with others. Patent protects an inventions for 20 years, after which is can be freely used. Trademarks: Includes any visual symbol, word, name, deign, slogan, label, etc. that distinguishes the brand or commercial enterprise, from other brands or commercial enterprises. Licensing: We have studied about copyright in the previous section. Licensing and copyrights are two sides of the same coin. A license is a type of contract or a permission agreement between the creator of an original work permitting someone to use their work, generally for some price.

Violation of Intellectual Property Right: Plagiarism: With the availability of Internet, we can instantly copy or share text, pictures and videos, Presenting someone else’s idea or works as one’s own ideas or work is called plagiarism. If we copy some contents from Internet, but do not mention the source or the original creator. Copyright Infringement: Copyright infringement is when we use other person’s work without obtaining their permission to use or we have not paid for it, if it is being sold. Suppose we download an image from the internet and use it in our project. But if the owner of the copyright of the image does not permit it free usage, Then using such as image even after giving reference of the image in our project is a violation of copyright. Trademarks Infringement: Trademarks infringement means unauthorised use of other’s trademark on products and service. An owner of a trademark may commerce legal proceedings against someone who infringes its registered trademark

Public access and open source software: Copyright sometimes put restriction on the usage of the copyrighted works b anyone else. Of others are allowed to use and built upon the existing work, it will encourage collaboration and would result in new innovations in the same direction. Licenses provide rules and guidelines for others to use the existing work. When authors share their copyrighted works. When authors share their copyrighted works with others under public license, it allows others to use and even modify the content. Open source licenses help others to contribute to existing work or project without seeking special individual permission to do so.

Free and open-source software (FOSS) is software that is both free software and open-source software where anyone is freely licensed to use, copy, study, and change the software in any way, and the source code is openly shared so that people are encouraged to voluntarily improve the design of the software. This is in contrast to proprietary software, where the software is under restrictive copyright licensing and the source code is usually hidden from the users.



Popular categories of Public Licenses: The GNU General Public License (GPL) and the Creative Commas (CC) are two popular categories of public license. CC is used for all kind of creative works like websites, music, film, literature etc. CC enables the free distribution of an otherwise copyrighted work. It is used when an author wants to give people the right to share, use and build upon a work that they have created. GPL is primarily designed for providing public license to software.

GNU CPL is another free software license, which provides end users the freedom to run, study, share and modify the software, besides getting regular updates. Users or companies who distribute GPL licensed works may charge a fee for copies or give them free of charge. This distinguishes the GPL license from freeware software license. Creative Commas: Creative Commons is a non-profit organisation that aims to build a publically accessible global platform where a range of creative and academic works are shared freely. Any one across the globe can access them, share them, and even use them for creating their own work out of it without infringing the copyright their own work out of it without infringing the copyright or intellectual property rights of the owners.

Cyber Crime: Criminal activities or offences carried out in a digital environment can be considered as cyber crime. In such crimes, either the computer itself is the target or the computer is used as a tool to commit a crime. Cyber  crimes are carried out against either an individual, or a group, or an organisation or even against a country, with the intent of directly or indirectly cause physical harm, financial loss or mental harassment. In other word: Cyber crime is defined as a crime is which computer is the medium of crime (hacking, phishing, spamming) or the computer is used as a tool to commit crimes.

Hacking : Hacking is the act of unauthorised access to a computer, computer networks or any digital system, Hackers usually have technical expertise of the hardware and software. They look for bugs to exploit and break into the system. Hacking when done with a positive intent, is called ethical hacking. Such ethical hackers are known as white hat hackers. They are specialists in exploring any vulnerability or loophole by during testing of the software. Thus are specialists in exploring software. A non-ethical hacker is the one who tries to gain unautheorised access to computers or networks in order to steal sensitive data with the intent to damage or bring down systems. They are called black hat hackers or crackers. Their primary focus is on security cracking and data stealing. The use their skill for illegal or malicious purposes. Such hackers try to break through system security for identity theft, monetary gain, to bring a competitor or rival site down, to leak sensitive information, etc

Phishing and Fraud Emails Phishing is an unlawful activity where fake websites or emails that look original or authentic are presented to the user to fraudulently collect sensitive and personal details, particularly usernames, passwords, banking and credit card details. The most common phishing method is through email spoofing where a fake or forged email address is used and the user presumes it to be from an authentic source. So you might get an email from an address that looks similar to your bank or educational institution, asking for your information, but if you look carefully you will see their URL address is fake. They will often use logo’s of the original, making them difficult to detect from the real! Phishing attempts through phone calls or text messages are also common these days. 
(A) Identity Theft Identity thieves increasingly use personal information stolen from computers or computer networks, to commit fraud by using the data gained unlawfully. A user’s identifiable personal data like demographic details, email ID, banking credentials, passport, PAN, Aadhaar number and various such personal data are stolen and misused by the hacker on behalf of the victim. This is one type of phishing attack where the intention is largely for monetary gain.

Ransomware This is another kind of cyber crime where the attacker gains access to the computer and blocks the user from accessing, usually by encrypting the data. The attacker blackmails the victim to pay for getting access to the data, or sometimes threaten to publish personal and sensitive information or photographs unless a ransom is paid. Ransomware can get downloaded when the users visit any malicious or unsecure websites or download software from doubtful repositories. Some ransomware are sent as email attachments in spam mails. It can also reach our system when we click on a malicious advertisement on the Internet. 

Combatting and Preventing Cyber Crime The challenges of cyber crime can be mitigated with the twin approach of being alert and taking legal help. Following points can be considered as safety measures to reduce the risk of cyber crime: 
  • Take regular backup of important data 
  • Use an antivirus software and keep it updated always 
  • Avoid installing pirated software. Always download software from known and secure (HTTPS) sites 
  • Always update the system software which include the Internet browser and other application software 
  • Do not visit or download anything from untrusted websites 
  • Usually the browser alerts users about doubtful websites whose security certificate could not be verified; avoid visiting such sites
  • Use strong password for web login, and change it periodically. Do not use same password for all the websites. Use different combinations of alphanumeric characters including special characters. Ignore common words or names in password 
  • While using someone else’s computer, don’t allow browser to save password or auto fill data, and try to browse in your private browser window
Indian Information Technology Act (IT Act) 
With the growth of Internet, many cases of cyber crimes, frauds, cyber attacks and cyber bullying are reported. The nature of fraudulent activities and crimes keeps changing. To deal with such menaces, many countries have come up with legal measures for protection of sensitive personal data and to safeguard the rights of Internet users. The Government of India’s Information Technology Act, 2000 (also known as IT Act), amended in 2008, provides guidelines to the user on the processing, storage and transmission of sensitive information. In many Indian states, there are cyber cells in police stations where one can report any cyber crime. The act provides legal framework for electronic governance by giving recognition to electronic records and digital signatures. The act outlines cyber crimes and penalties for them.

Digital signatures are the digital equivalent of a paper certificate. Digital signatures work on a unique digital ID issued by a Certified Authority (CA) to the user. Signing a document digitally means attaching that user's identity which can be used to authenticate. A licensed CA who has been granted a license to issue it under section 24 of the indian IT-Act 2000, can issue the digital signature.

Impact on Health As digital technologies have penetrated into different fields, we are spending more time in front of screens, be it mobile, laptop, desktop, television, gaming console, music or sound device. But interacting in an improper posture can be bad for us — both physically, and mentally. Besides, spending too much time on Internet can be addictive and can have a negative impact on our physical and psychological well being 




Device Safety: Ensures Good Health of a Computer System 

  • √ Regularly clean it to keep the dust off. Use a liquid solution specifically formulated for the cleaning of electronic screens. 
  • √ Wipe monitor’s screen often using the regular microfibre soft cloth (the one used for spectacles). 
  • √ Keep it away from direct heat, sunlight and put it in a room with enough ventilation for air circulation. 
  • √ Do not eat food or drink over the keyboard. Food crumbs that fall into the gaps between the keys or spilled over liquid can cause issues to the devices.



Copyright vs Trademark vs Patent

CATEGORIESCOPYRIGHTTRADEMARKPATENT
Governed UnderThe Copyright Act, 1957Trade Marks Act, 1999The Patents Act, 1970
Types of Protection & WorksProtection of original creative expressions like literary works, artistic works, dramatic works etc.Protection of unique name that makes a brand distinct from other. Can include name, slogans, logo, shape, colour etc.Protection of inventions that are novel, original and has industrial utility.
Validity and ReachValid for life time of the author + 60 years after his/her death.

Protection available in most of the countries in the world.

Validity for 10 years can be made perpetual by renewing the trademark every 10 years. Territorial in nature to claim rights should be applied to each country individually.Validity for 20 years starting from the day the application is first made. It is also a territorial right and therefore it is effective only within the territory of India. Separate patents required to be filed for each country where protection is required.
SecuresCopyright secures Creative or intellectual creations.Trademarks secure the branding under which products and services are sold.Patent secures inventions that are useful for the world and has some use.

E.g. New invention in pharmaceutical industry.

Right comes into ExistenceExclusive rights over the copyright are created the moment the authorship creates the work.Once the trademark gets registered the applicant of the mark can claim complete right over the said mark. Registration usually takes 12-18 months.Patent registration takes about 2-3 years in all. But the owner can stop anyone else from claiming right over a particular patent the moment he applies for provisional patent.
Provisional Application RequirementNo provisional application required.Trademark registration does not include provisional application, but it requires a trademark search.A provisional application gets you 12 months of time to file a complete specification, and a priority date claim.
Symbolic RepresentationNo symbolic representation to show registration.Used when registration is in process: ™

Used when registration is complete: ®

No symbolic representation to show registration.





scoietal impact notes, class 12,python notes, ip python class 12 important notes, term 1 important notes, ip class 12, important notes class 12, i.p notes class 12, ip notes pdf class 12, ip pdf class 12th











Post a Comment

0 Comments