2. DIGITAL FOOTPRINTS
• The websites we visit, emails we send, any information we post online, etc., as
well as the IP address, location, and other device-specific information of the
computer this is known as digital footprint. or you can say data left behind by
users after they utilise the internet is known as a digital footprint.
• Example of digital footprint
a. Search history
b. Photos and Videos
c. Like/ dislike in social media
d. Browser history
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
3. DIGITAL FOOTPRINTS
• We leave two different types of digital footprints.
• Active digital footprint – data that we consciously submit online is
included in our active digital footprints.
This would include any emails we send, comments or postings we make on
various websites or apps, etc.
• Passive digital footprints – are the traces of data we unwittingly leave
online. Included in this are the data produced when we access a website,
utilise a mobile app, explore the internet, etc.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
4. Digital Society and Netizen
• A digital citizen, often known as a netizen, is someone who uses digital
technology and the Internet. A good netizen uses digital technology in a safe,
moral, and legal manner. Internet etiquette, communication etiquette, and social
media etiquette must all be followed by a responsible netizen.
• Net Etiquettes – When we engage with others, we adhere to specific social
norms. Similar to this, we must act appropriately and politely when using the
internet. While online, one should behave ethically, respectfully, and responsibly.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
5. Digital Society and Netizen
• Be Ethical
No copyright violation – We should not use copyrighted materials without
the permission of the creator or owner.
Share the expertise – It is beneficial to share expertise and information
online so that others can use it. However, we must be confident that we are
sufficiently knowledgeable about a subject before sharing any information.
• Be Respectful
Respect privacy – As good digital citizens we have the right to privacy and
the freedom of personal expression. At the same time, we have to
understand that other digital citizens also have the same rights and
freedoms.
Respect diversity – in a group or public forum, we should respect the
diversity of the people in terms of knowledge, experience, culture and other
aspects.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
6. Digital Society and Netizen
• Be Responsible
Avoid cyber bullying – We have to avoid insulting, degrading or intimidating
online behaviour like repeated posting of rumours, giving threats online,
posting the victim’s personal information or sexual harassment. We need to
realise that bullying online can have very serious implications on the other
person (victim).
Don’t feed the troll – An Internet troll is someone who intentionally sows
conflict online by provoking arguments, upsetting people, or by publishing
controversial or irrelevant statements in online communities for fun.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
7. Communication Etiquettes
• Email, texting, instant messaging, cell phone conversations, audio and video conferencing,
forum posting, social networking site posting, etc. are all examples of digital
communication. All of them are great opportunities to interact with others and share
information, ideas, and knowledge.
• Be Precise
Respect time – we should not waste precious time in responding to unnecessary
emails or comments unless they have some relevance for us.
Respect data limits – For concerns related to data and bandwidth, very large
attachments may be avoided. Rather send compressed files or link.
• Be Polite
We should be polite and non-aggressive in our communication. We should avoid being
abusive even if we don’t agree with others’ point of view.
• Be Credible
We should be cautious while making a comment, replying or writing an email or forum
post as such acts decide our credibility over a period of time.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
8. Social Media Etiquettes
• We are familiar with several social networking platforms and may even have an
account there. These websites enable users to submit or upload photographs of
their ideas and experiences. It has started to influence how politics, business,
entertainment, education, and other things turn out. There are certain social
media etiquettes we must adhere to as well.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
9. Social Media Etiquettes
• Be Secure
Choose password wisely – Users need to be aware of how to protect themselves
and their accounts. Having a strong password that is updated periodically is the
way to minimize the risk from hackers.
Know who you befriend – We must take precautions while making friends with
strangers because their motives may be dangerous and harmful.
Beware of fake information – In social networks, fake posts, messages, and news
are common. We should be aware of them as users.
• Be Reliable
Think before uploading – On social networks, almost anything can be uploaded.
But keep in mind that once posted, the file remains on the remote server even if
we delete it. Therefore, we must tread cautiously while transmitting or uploading
private or sensitive files that could compromise our privacy.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
10. Data Protection
• Every nation in the globe has its unique data protection legislation (laws). These
policies, which are formal legal papers, give the user instructions on how to
handle, store, and transmit sensitive data. The goal of putting these policies into
place is to guarantee that sensitive data is properly protected from change or
disclosure.
• Intellectual Property Right (IPR) - It is the inventor’s intellectual property if they
come up with a novel idea. Intellectual property includes innovations, literary and
artistic works, visual arts, names, and logos. The originator or intellectual
property owner is the rightful proprietor of such concepts.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
11. Data Protection
• Copyright
Copyright gives creators legal protection for their original works, including
writing, photography, audio and video recordings, computer software,
sculptures, architectural creations, and other types of creative output like
literary and artistic works. Copyrights are automatically granted to creators
and authors.
• Patent
Inventions are granted a patent. In opposed to copyright, the creator must
submit an application (file) to patent the innovation. After receiving a patent,
the owner gains the only authority to prohibit anyone from making, using, or
selling the invention.
• Trademark
Any visual symbol, word, name, design, slogan, label, etc. that sets the brand
or business apart from other brands or businesses is considered a trademark.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
12. Violation of IPR
• The following are some ways that intellectual property rights may be violated –
• Plagiarism
Text, images, and videos may all be easily copied or shared. Plagiarism is the
process of representing the thoughts or works of another person as one’s
own. Plagiarism is defined as the act of taking someone else’s work and
using it without crediting the author name or source.
• Copyright Infringement
When we utilise someone else’s creative work without asking permission or,
if the work is being sold, without paying for it, we are infringing their
copyright.
• Trademark Infringement
Unauthorized use of another’s trademark on goods and services is known as
trademark infringement. Anyone who violates a trademark registered to
them may face legal action from the trademark owner.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
13. Public Access and Open Source Software
• Two well-known types of public licences are the GNU General Public License
(GPL) and Creative Commons (CC).
• Creative Common License – All types of creative works, including websites,
music, movies, books, etc., use Creative Commons. CC makes it possible to
distribute a copyrighted work freely.
• General Public License – Another free software licence, the GNU GPL, allows
users to run, study, share, and modify the software while also receiving frequent
updates.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
14. Cyber Crime
• To disrupt or harm data or services, a cybercriminal targets a computer or a
network that connects it to other computers. Additionally, a cybercriminal could
spread viruses and other malware in order to obtain private and confidential data
for extortion and blackmail. Cybercrimes are committed with the goal to directly
or indirectly cause physical harm, financial loss, or mental harassment against an
individual, a group, an organisation, or even a country.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
15. Cyber Crime
• Hacking
• Unauthorized access to a computer, computer network, or other digital system is
known as hacking. Hackers frequently possess technical knowledge of both
software and hardware. They search for bugs that they can use to access the
system.
• Phishing and Fraud Emails
• Phishing is an illegal practise in which users are provided with false websites or
emails that appear genuine or original in order to illegally obtain sensitive and
personal information, including usernames, passwords, banking information, and
credit card numbers.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
16. Cyber Crime
• Identity Theft Identity thieves are increasingly leveraging personal data obtained
illegally from computers or computer networks to conduct fraud.
• Ransomware
• The attacker gains access to the computer in this case and prevents the user from
using it, typically by encrypting the data. When a ransom is not paid, the attacker
may threaten to disclose the victim’s private and sensitive information or photos
or use blackmail to force the victim to pay for access to the data.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
17. Cyber Crime
• Combatting and Preventing Cyber Crime
• With the dual strategy of being cautious and seeking legal assistance, the
difficulties of cybercrime can be reduced.
The following items can be thought of as safety precautions to lower the danger
of cybercrime:
• Take regular backup of important data
• Use an antivirus software and keep it updated always
• Avoid installing pirated software. Always download software from known and
secure (HTTPS) sites
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
18. Cyber Crime
• Combatting and Preventing Cyber Crime
• Always update the system software which include the Internet browser and other
application software
• Do not visit or download anything from untrusted websites
• In most cases, the browser warns users about dubious websites whose security certificate
could not be confirmed; stay away from such sites.
• For web logins, use strong passwords, and change them frequently. Use a different
password for each website. Use a variety of alphanumeric character combinations,
including special characters. Don’t include common names or words in your password
• Don’t let your browser remember your password or auto-fill information when using
someone else’s computer, and attempt to browse in a private browser window.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
19. Indian Information Technology Act (IT Act)
• The Information Technology Act, 2000 (commonly known as the IT Act) of the
Government of India, as revised in 2008, offers instructions to the user on the
handling, storing, and transfer of sensitive data.
• There are cyber cells in police stations in various Indian states where one can
report any cybercrime. By recognising digital signatures and electronic records,
the legislation creates a legal framework for electronic government. The statute
describes cybercrimes and their associated consequences.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
20. Impact on Health
• We are spending more time in front of screens, whether on our phones, laptops,
desktop computers, televisions, gaming consoles, or music or sound equipment,
as digital technologies have permeated several industries. However, conversing
while hunched over might be detrimental to our health on both a physical and
mental level.
• The science of ergonomics is the design or arrangement of workplaces, including
the systems, furniture, and equipment, to make them safe and comfortable for
the user. We can lessen the burden on our bodies thanks to ergonomics,
including weariness and ailments brought on by continuous use.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.