society, law and ethics notes class 12

Contents show

Society, Law And ethics Notes class 12 computer science with python


society, law and ethics notes class 12

society, law and ethics notes class 12

Ethical issues:-

law and ethics notes

Ethical issues occurs when an activity creates a conflict with a society ‘s moral principles .

Intellectual property rights (IPR):-

Intellectual Property Rights (IPR) are the rights of owner of information to  decide how much information is to be exchanged,
shared or distributed.
also, it gives the owner a right to decide the price.

What is Plagiarism:-     

(society, law and ethics notes )

Plagiarism is stealing someone else’s intellectual work and representing it as your own work without citing the source of information.
Plagiarism - Society, Law And Ethics

Plagiarism – Society, Law And Ethics


Digital rights management (DRM):-

Digital rights management (DRM) is a way to protect copyrights for digital  media.
This approach includes the use of technologies that limit the copying  and use of copyrighted works and proprietary software.

Ways of DRM: (law and ethics notes)

1. restrict users from editing /saving/printing/sharing your content.
2. setting an expiry date on your document or media.
3. lock access only to certain IP addresses, locations, or devices .
4. watermark artworks for ownership and identity.

Licensing (creative commons , GPL and Apache):-

A creative commons(CC)license enables the free distribution of a copyrighted ” work” .
It is used when an author wants to give other people the rights to share , use, and build upon a work that the author have created.

What is Open source:-

Open source software refers to program whose source code is available for use or modification with nominal or free of cost.
ex: Linux , my SQL, android, Apache web-server etc.
Open source

Software Open source

Open data:-

Open data is a data that can be freely used, shared and build-on by anyone, anywhere , for any purpose.


Privacy is the protection of personal information given online. it governs how data is converted, shared and used.



1. Online privacy:-

This includes all personal data that is given out during online interactions.

2. Financing privacy:-

Any financial information  shared online or offline is sensitive as it can be utilized to commit fraud.

3. Medical privacy:-

Any details of medical treatment and history is privileged information and cannot be disclosed to a third party.
Residential and geographic records:-
Share of address online can be a potential risk and needs protection. From unauthorized access.

4.Political privacy:-

This has become a growing concern that political preferences should be privileged information.
Privacy laws:-
regulation that protects a person’s right to be left alone, and release of other personal information.
ex. data protection law of India(2018)

Fraud(cyber-phishing, illegal downloads, child pornography, scams)

Cyber crime:-

When computer is the object of the crime for hacking, phishing, spamming or is used as a tool to commit an offense is known as cyber crime.


phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card number etc.

Ways of phishing:-

1. vishing:-

vishing refers to phishing done over phone calls.

2. smishing:-

SMS phishing or smishing is one of the easiest type of phishing attacks. engine phishing.


4.whaling:-attempts against a high profits targets.


Illegal downloads:-

It is a process for obtaining files you do not have the right to use from the Internet. Digital Privacy involves the illegal sharing of copyrighted media such as games, music, movies, TV shows and software

Child pornography:-

Exploiting a person who is under the age of 18 years using a photo/video by sexual activity.


A scam is a form of fraud that uses the Internet and may involve the concealment of information or provide incorrect information in order to defraud victims of money, property.

Cyber Forensics:-

Cyber ​​Forensics is an electronic discovery method used to determine and disclose technical evidence.

It usually involves the release of electronic data for legal purposes.


The salient features of IT acts as follows:-

1. The digital signature has been replaced by an electronic signature.

2. Explain in detail the charges and violations.

3. outlines ways to manage cybercrime.


Technology and society:-

1. Social and technical issues.

2.cyber structure.

3. sports addiction. and fitness.


Cultural Changes Induced By Technology:-

1. Mass market and services access.
2. Fast communication.
3. Social human relationship affected.

General benefits of technology:- enable greater efficiency in economic and social process. enhances the effectiveness of cooperation between different stake holder. increases the volume and range of information available to people, business and government.

Economic benefits of technology:- transition of information.
2.ease and availability. banking/wallets/credit cards/debit card/payment. market.
5.ease of access to various govt. and private service.

E-waste Management:-

E-waste management is also called urban mining.
It is the process of exacting the part out of the e-waste to either sell or reuse electronic products include computers, TV, fax machine etc.
Society, Law And Ethics

E-waste – Society, Law And Ethics


Proper Disposal Of Used Electronic Gadgets:-

1.Give back to electronic companies and drop off points.
2.Visit civil institution.
3. Donate outdated products.
4. Sell of outdated products.
5. Give electronic waste to certified E-waste recycles.

Top E-waste Management Forms of India

1. Eco reco
2. ECs environment
3. Exigo recycling
4. Entra carbon
5. green waves
6.GS international etc.

Identity Thefts:-

Identity Theft is when someone steals our personal information and uses it without our permission that most breaches includes full name, social security no. and credit card no. etc.

unique Ids:-

A unique identification (UID) is a numeric of alphanumeric string that is associated with a single person .
ex:- driving license no. , Adhar no., PAN no., passport no., etc..


 It is the measurement and statically analysis of people s unique physical and behavioural characteristics.

Types of Bio-metrics:-

1. Facial recognition
2. Finger print
3. Iris recognition
4. Palm / finger/ retina vein recognition
5. Retina scanning
6. Voice recognition
7. DNA matching etc.

Gender And Disabilities Issues While Teaching And Using Computer
Gender Issues And Solution


 1.  Lack of interest
 2. Preconceived notions
 3. Lack of motivation
 4. The Lack of role models
 5. Lack of encouragement in class ,etc.


1. Motivation and encouragement program.
2. More representation of female in TV cinema, advertisement etc.
3. More availability of female tours.

Disability Issues And Solutions:-


1. Unavailability of teaching.
2. Lack of special needs teachers.
3. Lack of supporting curriculum.


1. Providing teaching aids for specially abled children.
2. Employment of special needs teachers.
3. Strengthens hardware and software for special abled children.
ex. Microsoft narrator, Constance, Ubuntu, B-linux screen readers etc.
law and ethics notes 

Society, Law and Ethics Practice Questions


Q 1. The information/art/work that exists in digital form is called ______ ?

(a) e-work                         (b) e-asset
(c) digital property         (e) e-property

Ans. (c) digital property

Q 2. Which of the following is/are example of online fraud ?

(i) Sita placed an order online and made full payment but no good were delivered to her.
(ii) Tim ordered a phone online with full advance payment but he received same brand phone of old model.
(iii) Your peer picked your credit card and made payment with it.
(iv) All of the above.

ans. (i) Sita placed an order online and made full payment but no good were delivered to her.
(ii) Tim ordered a phone online with full advance payment but he received same brand phone of old model.

Q 3. What do you understand by plagiarism ? Why is it punishable offence ?

Ans. Plagiarism is the act of using or stealing someone else’s intellectual work, ideas etc. and passing it as your own work. In other words, plagiarism is a failure in giving credit to its source.
Plagiarism is a fraud and violation of Intellectual property rights. Since intellectual property holds a legal entity status, violating its owner’s right is a legally punishable offence.

Q4. List a table differences between Free software and Open source software.

Free SoftwareOpen Source Software
Freedom to run program for any purposeIt has distribution of license.
Freedom to study about programAvailability of source code.
Freedom to distribute copies of softwareFree distribution
Freedom to modify/improve program and release improvements to public.Integrity of Authors Source code.

Q5. Why should intellectual property rights be protected.

Ans. The intellectual property rights must be protected because protecting them
  • encourages individuals and businesses to create new software and new software applications, as well as improving existing applications,
  • ensures new ideas and technologies are widely distributed,
  • promotes investments in the national economy.

For More Questions visit :- society,law and ethics important questions

Science Society Law and Ethics


To Learn The Chapter From Video