Legal and ethical issues in Information and communication technology (ICT)

by Yuvi - February 12, 2022

Information and communication technology ( ICT ) – Legal and ethical issues

Use of computers and Internet is increasing day-by-day. Millions of computer systems are networked and vast amount of information is handled by more people.

  • Our society is acting as information society.
  • There are many threats in this information society.
  • It may be difficult to have peaceful life and to secure dignity.
  • Hence, information society insists moralities for the users.
  • Keeping confidentiality of the password and information, copyright, authentic access of data are some essential morals for the computer users.

Need for Ethics Culture

The next step of the moralities is to follow the ethics. It is useful to streamline the processing of information in the appropriate order. In our country to follow the law and order, “Information Technology Act 2000” is passed. Every computer user and professional must know clauses covered under this act.

  • To get appropriate use of computers, information transfer, it is necessary to promote culture of ethics.
  • It safeguards privacy of the user, protects interests of creator of the knowledge base and gives many more advantages.
  • Hacking of the data, virus infections, loss of data, unauthorized access, and unauthorized use of passwords are the major threats of Information ‘technology.

In order to overcome with these threats, ethics culture is necessary for the safety.

Ethics for Computer Users

The following two important ethical issues are discussed below: .

1. Software Piracy

Many computer users use unauthorized softwares. Unauthorized duplication, copying of software is called pirated software.

The use of pirated software is the violation of the IT Act 2000. One should use legal software i.e. license of software. It is useful from the point of safety. The pirated or illegal software may damage the operations useful from the point of safety of the computers even data also.

2. Unauthorized Access:

The information must be accessed by the authentic user. It is essential to keep the information secure and confidential.  Unauthorized access to such information is dangerous from the point of safety.  Security of the information is necessary and for this only authorized users should access it.

Cyber laws

Information Technology Act 2000 is an act to provide legal recognition for transaction carried out by means of electronic data interchange (EDI) and other means of electronic communication. It is useful for paperless transactions. The Act 2000 consist thirteen chapters and four schedules. The legal aspects of the Act are to protect privacy, security and control over electronic commerce, .

Copyright

The software piracy is increased due to internet. The protection of Intellectual property is carried out by copyright. The right exists with the original producer and owner has right to implement conditions to reproduce it. By copyright, one gets license to use, reproduce or earn royalty.

Hacking

Hacker is someone involved in computer security/insecurity. The computer security hacking is to gain unauthorized access to computer or website. It can be cracking password. The hackers try to hack information. One can protect information by using firewall or by updated antivirus programme. Hacker tries to access any file on your computer. It can be used to steal personal information such as password or credit card information. Hacking is unauthorized use of computer and/or network resources.

Share on: Share YogiRaj B.Ed Study Notes on twitter Share YogiRaj B.Ed Study Notes on facebook Share YogiRaj B.Ed Study Notes on WhatsApp
Popular Posts

What is Education?

August 11, 2023

Uses of evaluation

October 1, 2022

Types of feedback

August 13, 2022
Latest Posts

Table of 14

April 11, 2024

Tables 11 to 20

March 11, 2024

Tense Chart

December 22, 2023

Table of 13

December 20, 2023

Table of 3

December 19, 2023
Search this Blog
Categories