Society, Law, and Ethics – The “Real World” Guide


1. Digital Footprint: The “Permanent Tattoo” of the Web

Most students think Incognito Mode deletes their footprint. It doesn’t. It only stops the browser from saving history; the ISP and Server still see everything. This is a common interview trick question.

A Digital Footprint is not just your history; it is your reputation. In the exam, they often ask you to classify scenarios into Active or Passive footprints.

The “Active vs. Passive” Litmus Test

  • Active Footprint: You knowingly pressed a button.
    • Example: Uploading a photo to Facebook, sending an email, filling a Google Form.
  • Passive Footprint: You did nothing, but data was collected anyway.
    • Example: Your GPS location simply by having Maps open, your IP address logged by a server, Facebook tracking your likes to show ads.

Exam Trap: “Is browsing a website active or passive?”

  • Answer: It creates a Passive footprint (Server logs/Cookies) unless you post a comment (Active).

2. Intellectual Property Rights (IPR): The Most Confusing Topic

Many of candidates fail to distinguish between FOSS, Freeware, and Shareware. Let’s fix this once and for all using the “Restaurant Analogy”.

2.1 The “Source Code” Distinction

IPR isn’t just about ownership; in CS, it’s about Source Code Access.

Software TypeThe “Restaurant” AnalogySource Code?Cost?Example
ProprietaryFine Dining: You pay for the meal. You eat it. You cannot see the recipe (kitchen). You cannot take it home to copy.ClosedPaidMS Office, Photoshop
FreewareFree Samples: The food is free. But the kitchen (recipe) is still closed. You can’t change the taste.ClosedFreeAdobe Reader, Skype
SharewareTrial Offer: “First month free, then pay.” If you don’t pay, the food is taken away.ClosedTrialWinZip, Antivirus Trials
FOSSCommunity Potluck: The food is there. The Recipe is taped to the wall. You can eat, copy the recipe, change it (add salt), and serve your own version.OpenFree/PaidLinux, Python, Firefox

2.2 The “Free” in FOSS (Richard Stallman’s Rule)

In FOSS (Free and Open Source Software), “Free” means Freedom, not “Free Drink”.

  • You are free to Run it.
  • You are free to Study it (Open Source).
  • You are free to Change it.
  • You are free to Redistribute it.

Real Exam Question (KVS Pattern):

Q: “If software is free of cost, is it always Open Source?”

  • My Answer: Absolutely NO. Example: Google Chrome is free (Freeware), but you cannot see its code. Chromium is Open Source.

3. Cyber Crime: Beyond the Definitions

Case Study questions are common here. You will be given a scenario and asked to name the crime

3.1 Phishing vs. Pharming vs. Hacking

Students often mix these up. Here is the distinction I use in class:

  1. Hacking: Breaking the lock. (Technical skill used to bypass security).
  2. Phishing: Tricking you into opening the door.
    • Scenario: You get an email: “Your SBI account is blocked. Click here.” You click, see a fake SBI site, and type your password. The hacker didn’t “hack” SBI; they hacked you.
  3. Pharming: Changing the road signs.
    • Scenario: You type www.sbi.co.in, but malware on your PC redirects you to a fake site automatically. You didn’t click a link; the DNS was poisoned.

3.2 Cyber Bullying & Stalking

  • Bullying: Usually peer-to-peer (Student to Student). Insults, rumors.
  • Stalking: Obsessive monitoring. Adults targeting victims.
  • Note: Both are punishable under the IT Act.

4. The Indian IT Act, 2000: What You Actually Need to Know

You don’t need to be a lawyer, but you MUST know the “Famous Sections”. I’ve seen Section 66A and 66F appear repeatedly in PGT interviews

The Information Technology Act, 2000 provides legal recognition to e-commerce and digital signatures.

The “Hit List” of Sections:

  • Section 43:Damage to Computer Systems. (Civil Offence).
    • In Practice: If you accidentally break a school computer or infect it with a virus, you pay a fine (Compensation). You don’t go to jail.
  • Section 66:Computer Related Offences. (Criminal Offence).
    • In Practice: Hacking with dishonest intent. This brings Jail time (up to 3 years).
  • Section 66C:Identity Theft.
    • Scenario: Creating a fake Instagram profile using someone else’s name and photo.
  • Section 66E:Violation of Privacy.
    • Scenario: Capturing/Publishing private images without consent.
  • Section 66F:Cyber Terrorism.
    • Severity: Life Imprisonment. Used for attacks that threaten national sovereignty (e.g., hacking a power grid).

5. E-Waste: The Silent Syllabus Killer

(Teacher’s Insight: This looks like a “General Knowledge” topic, so students skip it. But marks are lost here on technical questions about “Which element causes what damage?”.)

E-Waste refers to discarded electronic devices.

  • The Hazard List (Memorize this):
    • Lead: Found in CRT Monitors / Solder. Damages Central Nervous System.
    • Cadmium: Found in Chip Resistors / Batteries. Damages Kidneys.
    • Mercury: Found in Flat Screens / CFLs. Damages Brain/Fetus.

Practical Tip:

Never write “Throw in dustbin” as a disposal method in exams. The only correct answer is “Give to a certified E-Waste Recycler.”


6. Teacher’s Exam Corner: How to Score Full Marks

Here are the specific patterns I’ve noticed in recent NVS/KVS papers for this unit:

  1. The “Situation” Question:
    • Q: “Ravi copies a few lines of code from an Open Source project but doesn’t give credit. Is this plagiarism or copyright infringement?”
    • Expert Answer: If the license requires attribution (like CC-BY) and he removes it, it is Copyright Infringement. If he claims the code is his own idea, it is Plagiarism. (Plagiarism is ethical; Copyright is legal).
  2. The “License” Question:
    • Q: “Which license allows you to modify software but forces you to keep the same license for the new version?”
    • Expert Answer: GPL (General Public License) or CC-SA (ShareAlike). This is often called “Copyleft”.
  3. The “netiquette” Question:
    • Q: “Why is typing in ALL CAPS considered rude?”
    • Expert Answer: In digital culture, it represents SHOUTING or aggression.
SRIRAM
SRIRAM

Sriram is a seasoned Computer Science educator and mentor. He is UGC NET Qualified twice (2014 & 2019) and holds State Eligibility Test (SET) qualifications for both Andhra Pradesh (AP) and Telangana (TG). With years of experience teaching programming languages, he simplifies complex CS concepts for aspirants of UGC NET Computer Science, KVS, NVS, EMRS, and other competitive exams.

Leave a Reply

Your email address will not be published. Required fields are marked *