Legal and ethical issues in Information and communication technology (ICT)


Information and communication technology ( ICT ) – Legal and ethical issues

Use of computers and Internet is increasing day-by-day. Millions of computer systems are networked and vast amount of information is handled by more people.

  • Our society is acting as information society.
  • There are many threats in this information society.
  • It may be difficult to have peaceful life and to secure dignity.
  • Hence, information society insists moralities for the users.
  • Keeping confidentiality of the password and information, copyright, authentic access of data are some essential morals for the computer users.

Need for Ethics Culture

The next step of the moralities is to follow the ethics. It is useful to streamline the processing of information in the appropriate order. In our country to follow the law and order, “Information Technology Act 2000” is passed. Every computer user and professional must know clauses covered under this act.

  • To get appropriate use of computers, information transfer, it is necessary to promote culture of ethics.
  • It safeguards privacy of the user, protects interests of creator of the knowledge base and gives many more advantages.
  • Hacking of the data, virus infections, loss of data, unauthorized access, and unauthorized use of passwords are the major threats of Information ‘technology.

In order to overcome with these threats, ethics culture is necessary for the safety.

Ethics for Computer Users

The following two important ethical issues are discussed below: .

1. Software Piracy

Many computer users use unauthorized softwares. Unauthorized duplication, copying of software is called pirated software.

The use of pirated software is the violation of the IT Act 2000. One should use legal software i.e. license of software. It is useful from the point of safety. The pirated or illegal software may damage the operations useful from the point of safety of the computers even data also.

2. Unauthorized Access:

The information must be accessed by the authentic user. It is essential to keep the information secure and confidential.  Unauthorized access to such information is dangerous from the point of safety.  Security of the information is necessary and for this only authorized users should access it.

Cyber laws

Information Technology Act 2000 is an act to provide legal recognition for transaction carried out by means of electronic data interchange (EDI) and other means of electronic communication. It is useful for paperless transactions. The Act 2000 consist thirteen chapters and four schedules. The legal aspects of the Act are to protect privacy, security and control over electronic commerce, .

Copyright

The software piracy is increased due to internet. The protection of Intellectual property is carried out by copyright. The right exists with the original producer and owner has right to implement conditions to reproduce it. By copyright, one gets license to use, reproduce or earn royalty.

Hacking

Hacker is someone involved in computer security/insecurity. The computer security hacking is to gain unauthorized access to computer or website. It can be cracking password. The hackers try to hack information. One can protect information by using firewall or by updated antivirus programme. Hacker tries to access any file on your computer. It can be used to steal personal information such as password or credit card information. Hacking is unauthorized use of computer and/or network resources.

Share on: Share YogiRaj B.Ed Study Notes on twitter Share YogiRaj B.Ed Study Notes on facebook Share YogiRaj B.Ed Study Notes on WhatsApp
What is netiquette | Net Safety | Netiquette meaning
What is netiquette | Net Safety | Netiquette meaning

What is netiquette
The education system is adapting technology very rapidly and internet is one of the main and major resource of education now a days. It is necessary to follow some rules when using internet to keep your value information safe and secure.

Read full article
Self Evaluation
Self Evaluation

What is self evaluation
Self evaluation is a process which deals with the value of self confidence. We should be aware of the fact that working alone has its own value and importance though it is often under rated. It is linked with introspection, self-discovery and self realization

Read full article
Scope of Information and communication technology ( ICT ) in education
Scope of Information and communication technology ( ICT ) in education

ICT has caused a complete paradigm shift in the field of education and holds the potential to revolutionize the education process.
Teaching-learning processInformation and communication technology ( ICT ) has side-lined the traditional methods of teaching.

Read full article
Anatomy of the Constitution | Constitution of the United States
Anatomy of the Constitution | Constitution of the United States

Anatomy of the Constitution of the United States
The U.S. Constitution is the document that creates United States government. The contents of the Constitution create the three branches of United States government and give directions for how the federal government works.

Read full article