UNIT III
UNIT III
• Soft lifting- when someone purchases one software and downloads it onto multiple
computers, even though the software licence states it should be downloaded once only.
• Software Counterfeiting- Counterfeiting occurs when software programs are illegally
duplicated and sold with the appearance of authenticity.
• Online Piracy- illegal software is acquired from online sites, which is mainly achieved
through the P2P(Peer to Peer) file-sharing system. Peer-to-peer (P2P) file sharing is a
technology that allows users to share digital files, such as music, videos, and documents,
directly with other computers on a network.
• Client-Server overuse- more copies of the software are installed than it has licensed for. It
mostly happens in institutions and organisations.
• Hard-disk Loading- happens in PC resell shops. The shop owner buys a legal copy of the
software and reproduces its copies on multiple computers by installing it.
The consequences of Software piracy
• Sec.67 - Punishment for publishing or transmitting obscene material in electronic form – for
first conviction- imprisonment for 3 years and fine up to 5 lakh. second or subsequent
conviction- imprisonment of 5 years and also with a fine of up to 10 lakh.
• Adopts the technology that makes communication or transactions legally binding – In the
form of data, encryption based on asymmetric i.e. cryptography & Public key.
•Internet Censorship- The government regulates and blocks internet content through DNS
(Domain Name System) filtering, educating users, and court orders.
•Digital Personal Data Protection Act, 2023- This act protects individuals' personal data by
establishing principles such as obtaining consent for data use, limiting data collection, and
implementing security measures.
•National Information Security Policy & Guidelines- This policy protects information under
the control of the government and public sector organisations.
•Internet Governance- The Indian government retains supreme rights and control on matters
relating to national security.
• Policy on Use of IT Resources of Government of India 2014- It covers access to the
internet and intranet, monitoring and privacy, and the use of IT devices.
• Government provides IT resources to its employees to enhance their efficiency and
productivity.
• Designated Nodal Officer as identified by each organization.
• Implementing Agency
• Access to Government Wireless Networks
• Filtering and blocking of sites
• Monitoring and Privacy
• E-mail Access from the Government Network
• Control of Social Media Sites from Government
• Security Incident Management Process