Unit 3 Notes: Society, Law, and Ethics
1. Society and Technology
Technology influences how people communicate and form
communities. Social media, for example, connects people globally
but can also lead to issues like reduced face-to-face interaction.
Impact: Technology can bring people closer (e.g., video calls) but
also raise concerns about overuse, privacy, and misinformation.
Example: Smartphones enable instant global communication, yet
excessive screen time may harm real-life relationships.
2. Law and Technology
Laws regulate technology to protect intellectual property, ensure
data privacy, and combat cybercrime.
Intellectual Property Rights (IPR) include:
o Copyright: Protects original works like books or music.
Example: Publishing a story without the author’s permission
is a copyright violation.
o Patents: Safeguard inventions, granting inventors exclusive
rights.
Example: A patented foldable smartphone design prevents
others from copying it.
o Trademarks: Protect logos or brand identifiers.
Example: The Nike “swoosh” ensures authenticity of their
products.
Why It Matters:
Protects creativity, fosters innovation, and ensures fair competition.
3. Ethics in Technology
Ethics guide decisions in areas like AI, data privacy, and equitable
access to technology.
AI Ethics: Addresses concerns over computers making critical
decisions, such as medical diagnoses.
Example: Should a self-driving car prioritize passenger safety or
pedestrians in emergencies?
Digital Divide: Highlights the gap between those with access to
technology and those without, raising questions about fairness.
Key Challenge: Balancing the benefits of technology (efficiency,
innovation) with moral responsibilities.
4. Digital Footprint
Your digital footprint is the trail of data left by your online activities.
o Active Footprint: Intentional actions like posting on social
media.
o Passive Footprint: Data collected without your direct input,
such as browsing history.
Why It Matters:
Affects privacy, reputation, and security.
Example: Employers may review social media profiles before hiring;
an embarrassing post could harm your chances.
Tips for Managing Your Footprint:
1. Think before you post: Avoid sharing sensitive or inappropriate
content.
2. Adjust privacy settings: Restrict who can view your profiles.
3. Regularly search your name: Identify and remove unwanted
information.
5. Cybercrime
Cybercrime includes hacking, phishing, ransomware, and
cyberbullying.
Types and Examples:
1. Hacking: Unauthorized access to computer systems.
Example: Breaking into email accounts to steal sensitive data.
2. Phishing: Fake emails or messages to steal personal information.
Example: Scammers pretending to be a bank to obtain passwords.
3. Ransomware: Malware locks files and demands payment to unlock
them.
Example: An attack encrypts your computer files, asking for
payment in cryptocurrency.
4. Cyberbullying: Harassment using digital platforms.
Example: Sending harmful messages on social media to intimidate
someone.
Why It Matters:
Awareness of these threats ensures you can protect yourself and
others online.
6. Open Source Software (OSS)
OSS allows users to inspect, modify, and distribute software freely,
encouraging collaboration.
Key Licenses:
o Creative Commons: Protects creative works while allowing
controlled sharing.
Example: An illustration shared under CC BY allows others to
reuse it with attribution.
o GPL (General Public License): Ensures modifications to
software remain open-source.
Example: Linux operating system is GPL-licensed.
o Apache License: Offers flexibility in combining open-source
and proprietary uses.
Why It Matters:
Promotes innovation, cost-efficiency, and community collaboration.
7. E-Waste Management
E-waste refers to discarded electronics like phones or computers.
Proper disposal protects the environment and allows recovery of
valuable materials like gold or silver.
How to Dispose E-Waste:
1. Recycling Programs: Local centers handle electronic waste safely.
2. Manufacturer Take-Back: Companies recycle old gadgets (e.g.,
trade-in programs for smartphones).
3. Donate: Working devices can benefit schools or charities.
Why It Matters:
Prevents harmful chemicals (e.g., mercury) from polluting the
environment and conserves resources.
8. The Information Technology Act (IT Act), 2000
Provides a legal framework for electronic transactions, cybercrime
regulation, and e-governance in India.
Key Elements:
o Legal recognition of electronic records and signatures.
o Facilitates e-governance by enabling secure online
transactions.
o Addresses cybercrime, including hacking and identity theft.
Real-World Example:
Electronic contracts are legally valid, ensuring businesses can operate
digitally without physical paperwork.
Why It Matters:
Builds trust in digital systems, supports cybersecurity, and promotes
e-commerce.
9. Technology and Society: Gender and Disability Issues
Technology should be accessible to everyone, but challenges exist.
Gender Issues:
Gender gap in tech fields due to stereotypes or lack of
encouragement.
Example: Few women in coding workshops may discourage
participation.
Disability Issues:
Accessibility challenges like lack of screen readers for visually
impaired users.
Example: A student with visual impairment needs text-to-speech
features to navigate websites.
Solutions:
1. Inclusive Design: Create tech that works for all users (e.g., websites
with screen readers).
2. Awareness: Train educators and developers on accessibility.
3. Encouragement: Promote participation through targeted programs
(e.g., coding workshops for girls).
Why It Matters:
Ensures equitable access to technology and benefits from diverse
perspectives.