[go: up one dir, main page]

0% found this document useful (0 votes)
23 views18 pages

Chapter - 6

This document covers web hosting and legal aspects related to website creation, including types of web hosting services, the domain registration process, and essential website policies. It outlines various hosting options such as free, shared, dedicated, cloud, and clustered hosting, along with key terms and features to consider when selecting an Internet Service Provider (ISP). Additionally, it emphasizes the importance of website policies, including copyright, privacy, and content moderation, to ensure transparency and legal compliance.

Uploaded by

Rohit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views18 pages

Chapter - 6

This document covers web hosting and legal aspects related to website creation, including types of web hosting services, the domain registration process, and essential website policies. It outlines various hosting options such as free, shared, dedicated, cloud, and clustered hosting, along with key terms and features to consider when selecting an Internet Service Provider (ISP). Additionally, it emphasizes the importance of website policies, including copyright, privacy, and content moderation, to ensure transparency and legal compliance.

Uploaded by

Rohit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

II

WEB HOSTING AND


LEGAL ASPECTS

6.1 INTRODUCTION

In the previous lesson, you learnt the importance of planning, designing, and
components of the website. This lesson focuses on learning website hosting
and domain registration process. In this lesson, you will learn about hosting
on website types of web hosting, the process of buying a domain & their
registration, website policies.

6.2 OBJECTIVES

After going through this lesson you will be able to:

• list the features ofISP


• define the process ofbuying a domain and their registration

• identify various website policies

• describe the website content cont ribution policy and content review policy

6.3 WEB HOSTING

A web hosting service is a type ofIntemet hosting service that provides individuals, -
organizations and users with online systems for storing information, images, videos,
or any content accessible via the web. Different types ofhosting services are there.
Web Hosting and Legal Aspects :: 123

6.3.1 TYPES OF HOSTING

• Free Web Hosting Service: As the name says, it is free, sometimes include
advertisement-supported web hosting, but it provides extremely limited
functionality as compared to paid hosting. Free web hosts will either provide
a sub-domain (yourname.example.com) or a directory (www.example.com/
-youmame ).

Table 6.1 : List of some free web hosts:

Host name Website


Netfinns www.netfinns.com
FreeServers www.freeservers.com
Tripod www.tripod.com
Webs.com www.webs.com

• Shared Web Hosting Service: It is a paid service. Web site is placed on


the server where numerous other websites are also hosted.

• Dedicated Web Hosting Service: It is paid service and here the user gets
his or her own Web server and gains full control over it. However, the
user does not own the server.

• Cloud Hosting: It is a new type of hosting platform that provides the user
powerful, scalable and reliable hosting based on clustered load-balanced
servers and utility billing. A cloud hosted website may be more reliable
than hosting alternatives since other computers in the cloud can
compensate when a single piece of hardware goes down.

• Clustered hosting: Here, multiple servers host the same content, with
an objective of better resource utilization. Clustered Servers are a perfect
solution as it provides high-available dedicated hosting, or creating a
scalable web hosting solution. A cluster may separate web serving from
database hosting capability.

6.4 TERMS ASSOCIATED WITH WEBSITE HOSTING

The commonly used terms associated with web hosting are, Web Hosting
Services, File Storage Space and Bandwidth.

- To make your website live, you transfer your website files to a Web server. A
Web server is a Computer connected to the Internet and running server
software. The software lets the computer use the Hypertext Transfer Protocol
(HTTP) to serve HTML files to Web browser clients. Unless your company
or organization has a Web server, you must use the services of a Web hosting
124 :: Certificate in Web Designing and Development

provider. After you choose a server to host your files, you will need to select file
transfer software and upload the files to the Web server.

Internet Service Provider

Web hosting service or Internet Service Provider (ISP) isthe company that hosts
your web pages on a Web server, so that they become available to anyone who
knows your URL. Web hosting services provide Web server space only, and
are capable of hosting a complex commercial site. ISPs provide dial-up access
and offer Web server space as part ofthe access package. Small websites (around
15-20 pages of content) do not need much more than 1- 2 MB of server space to
hold all ofthe HTML pages and graphics. Your ISP should provide at least 10MB
of space so your web page has room to grow. Larger or more complex sites need
more server space, especially if you have downloadable files, archives, lots of
graphic content, or databases.

Shopping for an ISP can be (1 confusing experience, as no two are exactly alike.
Do some research and learn about offerings from different vendors. The
following sections discuss the features you should seek in an ISP.

Easy Dial-Up

Choose an ISP that allows connection with their network by placing a local
phone call. Make sure that your provider has enough Points of Presence
(POP) to make dialing easy. Points of Presence (POPs) are dial-up access
points of service provider's network. The service provider should have at least
one POP available so you can dial a local number to access the network.

The number oftirnes your site is accessed by you or user is called bandwidth.
If you are expecting a lot of hits (millions of page views) to your site you will
need to get the most bandwidth you can afford.

Free Utility Software

ISP provides a File Transfer Protocol (FTP) application for uploading files.
Some ISPs provide HTML editors and other software as well.

Accessible Technical Support

Although technical support is not necessarily a feature, but it is an absolute


necessity. Make sure that ISP has competent, accessible customer service.

Additional E-mail Addresses

All access accounts come with at least one e-mail address, called a Post Office
Web Hosting and Legal Aspects :: 125

Protoco 13 (POP3) account. If you are part of a group, you may want an account
that has more than one mailbox so that each person receives his or her own e-
mail.

Personal versus Commercial Accounts

Personal ISP accounts generally are less expensive than a business account.
The personal account necessarily requires disk space, fewer features, and can
have more complex URL, such as www.webserver.com/users/yourname/.
Once you buy a domain name, your ISP usually upgrades you to a commercial
account. For commercial accounts pay more for their services, so make sure
you receive more facilities.

SQL Database Support

While planning for any type of e-commerce or customized data presentation,


you need database support. Databases that understand Structured Query
Language (SQL) are the most common and powerful type of database.

Secure Socket Layer (SSL)

Secure Socket Layer (SSL) is an Internet communications protocol that allows


encrypted transmission of data between the user and the server. SSL is
necessary if you are planning on setting up an electronic commerce site or
"\,
transmitting other sensitive data. Encrypting the data ensures the information
cannot be read if the transmission is intercepted.

Multimedia Capabilities

Streaming is a server-based technology that transmits audio video content in


a continuous stream to the user, allowing the content to be played while it is
downloading, rather than waiting for its complete download. The success of
these technologies depends on the speed and quality of the user's connection
to the Internet. The user needs the correct streaming media player to view the
content.

CGI Script Capabilities

- The Common Gateway Interface (CGI) is the communications bridge between


the Internet and the server, using the programs called scripts, CGI can collect
data sent by a user via the Hypertext Transfer Protocol (HTTP) and transfer
126 :: Certificate in Web Designing and Development

it to a variety of data processing programs including spreadsheets, databases,


or other softw arc running on the server. The data processing software then
can work with the data and send a response back to CGI, and then onto the
user, as shown in Figure 6.1 (Common Gateway Interface Architecture).

Users (Client)
Computer
Web Server
! ,.--- --...,
Common '--.. ----
Interface via +-+ Gateway
Database
HTTP Interface (CGI) '--..

Fig 6.1 Common Gateway Interface Architecture

The program that transfers the data is called a CGI script. You can write CGI scripts
in a variety of programming languages. If you are not already familiarwith writing
CGI scripts, enlist the assistance of a programmer, or you should have master
programming skills in addition to your HTML skills.

Buying a Domain Name

The Domain Name System (DNS) is a hierarchical distributed naming system


for computers, services, or any resource connected to the Internet or a private
network. It associates various information with domain names assigned to
each of the participating entities. A Domain Name Service resolves queries
for these names into IP addresses for the purpose oflocating computer services
and devices worldwide. By providing a worldwide, distributed keyword-based
redirection service, the Domain Name System is an essential component of
the functionality of the Internet.

Domain is the unique name for the computer to which you are connecting.
All Domain names have a 4-part number address like 207.46.130.150 but most
have a name using letters too, like www.microsoft.com. A dot character always
separates the parts of name.

There are four key steps to be followed to get a website:


,
1. "Decide on a name and search for the domain to see if it is available
2. If the domain name is available, register it.
3. Buy a web hosting account for the name and link it to the hosting account -
using the nameservers.
4. Install, Build and Configure the Website
Web Hosting and Legal Aspects :: 127

To find if a domain name is available, or to register your own domain name, a lot
of vendors are available in website search list. The following are the few examples
of domain seller sites.

1. http://www.net4.in

2. http://www.domainindia.org!

3. http://www.networksolutions.coml

These companies are responsible for registering .com, .net, and .org domain names.

The site contains a simple form that lets you enter a domain name to see if it is
already registered. Ifthe domain name is available, you can register online and the
payment can be made through your debit card, credit card or by any net-banking
payment method. Domain names currently must be renewed every two years.

For an additional fee, your ISP often can register your Website and provide network
so lutions with all the details, such as the server's primary and secondary Internet
Protocol (IP) addresses. If you prefer, you can save the cost of doing this by filling
out the online forms yourself, but you still need to contact your ISP to get the IP
addresses.

ISP Comparison Checklist

Use the following checklist when you compare ISPs.

• Is the ISP local or national?

• Does the ISP have enough local POPs in your area code?

• Is there space available on their Web server for your Web site?

• Does the ISP offer technical support? In the support available 24x7?

• How many email addresses do you get with an account?

• Does the ISP provide software such as an FTP client?

Upload a web page with FTP

To publish your pages on the web, you must send your files (HTMLcode, Image
etc) to the web host server. This is done using an FTP program.

FrP (File Transfer Protocol) is the simplest and most secure way to exchange files
over the Internet. The most common use for FTP is to download files from the
Internet. Because ofthis, FTP is the backbone ofthe MP3 music craze, and vital
to most online auction and game enthusiasts. In addition, the ability to transfer files
back -and- forth makes FTP essential for anyone creating a web page, amateurs
128 :: Certificate in Web Designing and Development

and professionals alike.

When downloading a file from the Internet you're actually transferring the file to
your computer from another computer over the Internet. You may not know the
location ofthe computer that the fileis coming from but you most likelyto know its
URL or Internet address.

An FTP address looks a lot like an HTTP, or Website address except it uses the
prefixftp: II instead of http://.

Most often, a computer with an FTP address is dedicated to receive an FTP


connection. Just as a Computer that is setup to host web pages is referred to
as a Webserver or Website, a computer dedicated to receive an FTP connection
is referred to as an FTP server or FTP site.

Now you will learn how to upload a file using FTP. There are lots ofFTP
software programs available, and they will work on similar principles. With
each you will need the IP address of your web host, your username and your
password.

There are a number of good free FTPtools (WSFTP, Cute-FTP etc) available
in Websites, so you can download and install in your computer. In fact, many
website design programs come with in-built FTP "publishing" tools. It is
very convenient to use a website design tool with built in FTP but you can
also get specialized FTP software.

INTEXT QUESTIONS 6.1

1. Write True and False for the following:

(a) The Secure Socket Layer (SSL) is an Internet communications


protocolthat allows encrypted transmission of data between the user
and the server.

(b) The Common Gateway Interface (CGI) is the communications bridge


between the Internet and the server.

(c) FTP (File Transfer Protocol) is NOT secure way to exchange files
over the Internet.

6.5 WEBSITE POLICIES

-
,
A website policy is a set of documents telling visitors to website what
information you collect and what you do with that information.

The reasons for developing a web site policy are


Web Hosting and Legal Aspects :: 129

1. Create a better electronic environment on the internet

2. Imply the laws I legislation that may pertain to your business

3. Create a transparent environment to users/stake holders

4. Set down the rules and regulations to operate and manage website
effectively.

By letting people know what information is collected and what is done with
that information, you can create a transparent environment in which' peoplel
consumers gain confidence. You can eliminate stress and concerns about abuse
of personal information.

National Informatics centre (NIC), India prepared guidelines on year 2009
titled as "Guidelines for Indian Government websites".

Table 6.2 : Guidelines for Indian Government web sites

S.No Website Policy


1 -Copyright Policy
2 Hyper linking Policy
3 Terms & Conditions
4 Privacy po licy
5 Content Contribution, Moderation and Approval Policy (CMAP)
6 Web Content Review Policy (CRP)
7 Content Archival Policy (CAP)
8 Website Security Policy
9 Website Monitoring Policy
10 Contingency Management

Which legal Pages Should Every Website Have? The short answer is, "It
depends". And, there is no rule saying that a website needs to have any legal
pages whatsoever. You need to take a look at your website and evaluate it (with
or without legal counsel), to determine if you need a specific type of legal page.
Here are some thoughts on most common types oflegal pages and when you

- might want or need them.


130 :: Certificate in Web Designing and Development

6.5.1 Copyright Policy

Copyright is the right of the owner to reproduce or permit someone else to


reproduce copyrighted works. Copyrightable works include:

• literary works such as articles, stories, journals, or computer programs


• pictures and graphics
• blueprints of architecture
• music and song lyrics
• plays and screenplays
• audiovisual recordings such as movies
• sound recordings

So the information, content available at your website must be backed up with


proper copyright policy explaining terms and conditions of their usage and
reference by others.

Note about Copyright violation The most common types of copyright


violation on the web are images being used on web sites other than the owners.
It does not matter if you copy the image to your web server or point to it on
their web server. If you use an image on your web site that you did not create,
you must get permission from the owner. It is also common for the text, HTML,
and script elements of a page to be taken and reused. If you have not sought
permission, you have violated the owner's copyright. Today, companies take
this type of violations very seriously.

Sample: Copyright Statement from Guidelines for Indian Government


Websites (GIGW) Manual

"Material featured on this site may be reproduced free of charge in any format or
media without requiring specific permission. This is subject to the material being
reproduced accurately and not being used in a derogatory manner or in a misleading
context. Where the material is being published or issued to others, the source must
be prominently acknowledged. However, the permission to reproduce this material
does not extend to any material on this site, which is explicitly identified as being
the copyright of a third party. Authorization to reproduce such material must be
obtained from the copyright holders concerned."

6.5.2 Hyperlinking Policy


A feature of an accessible site is to have access keys to various parts of the
pages. Adding an accessibility key can be helpful so that new customers know
the functionality and usage of each page on your site. Accessibility information
pages can also include links to contact pages when a page is inaccessible or
-
help finding alternatives for things like AlY streams.
Web Hosting and Legal Aspects :: 131

Every website must have a comprehensive and clear-cut hyperlinking policy


defined and spelt out for those who wish to hyperlink content from any of its
sections. The basic hyperlinking practices and rules should ideally be common
across the website.

'D~P*Y
•• ~ C If
.\
e ht1I .••...:J/negp.govjnJi~.php?option.conl_con\ent&view.artlcle&.d,,229&1temjd ••8S6 ••

Herne Ahoul NeGP What's N,·w? Conlact Us News ", ~ * (l) .~~
_ ...
P".,t S;,l Nov1!". 201.;

Policies
Hyperlinkmg Policy
Copyr.gm PvIocy
links to external websites/portets
Hypef1mk.ng Policy
N. many ~~ III th~ ~, you shalt rn:I Mli(.i to <:JINf_bses/porW!i ~ Iinb ha~ bee'! pIac~ !'or 'fOUl
Terms and CondItlOOS
COIWefWl'a. Depaftrrlenl of Ele<:troni(s a. InformiitlOfl TtdudoQv is f'OI. ,espo~ (Of the cootents and lellabilll'f of
PII~acy PolIty
the Iloked wecsnes and does not l'Ie(e!>Sarlty eoooese the ~ eXDlesscd in t~m. Mete pteseoce 01 the tlllk Of Its
eMAP
listing 00 ItlIS website should not be assumed as tndorsement of any 1onIl. WI! (ilonO( Quarant~ that these links wfJ
Content ReVIeW Poltcy woO; ilil ee time <lI1d we have no 'ontrol~ /Iva!\ablilty 01 linked peoes.
ccetem Arttllval Policy
Unks to NeGP-Webslte by other ••••ebsltes
SecUfrtyPoky
weesee MONlonng PoIoI;y We do 1"01 ~t 10 you IIfllInq (Ir~tIy 10 t!'lt ~,Iormatlon thill >$ hosk<I on thiIIi Silt' and no pOol pt',ml$SlOl'llS requut'd

foIlt.e 5<"!T'Ie.1ioWeVI:'< we woutIllkeyCutoll'lf(.llmus~1 art'o'lflUprOVldedtotNswt'bsltt' SOIMt you <iIrl be

lflfonnfod)l an\! lNI1oJ'"SOI updatestM~ 'JiG. Nl!!do 001: pc!1m;(cu eeces to ee loaded lr\(ofrall'1e'Son-.,uu, SIlo"

lht PdQ"!> bdongfIlIl rc ttMs ~e muslload into ill nrwIy opened IlrtJ¥Mf MOOow oIlhe USoeI'.

Fig 6.2: Screen shot ofHyperlinking Policy from National e-Govcrnance Plan
website.

Sample: Hyperlinking Policy from Guidelines for Indian Government


Websites (GIGW) Manual

We do not object to you linking directly to the information that is hosted on our
site and no prior permission is required for the same. However, we would like
you to inform us about any links provided to our site so that you can be informed
of any changes or updations therein. Also, we do not permit our pages to be
loaded into frames on your site. Our Department's pages must load into a newly
opened browser window of the user.

6.5.3 Terms and Conditions

Many websites include terms and conditions to use documents on their site.
This explains what actions are allowed and disallowed while using the website.
Clearly defined Terms & Conditions including well-worded disclaimers
regarding the usage of web sites must be present on every website.

Terms & Conditions shall address the following aspects:

• Ownership Details

• Usage Policy of Content


T

132 :: Certificate in Web Designing and Development

• Legal Aspects

• Responsibility towards hyper linked Sites

The below sample is one of the terms and conditions from GIGW manual,
available at: http://web.guidelines.gov.in

Sample: Terms and Conditions from Guidelines for Indian Government


Websites (GIGW) Manual

This website is designed, developed and maintained by (name of Department),


Government of India.

Though all efforts have been made to ensure the accuracy and currency of the
content on this website, the same should not be construed as a statement of law
or used for any legal purposes. In case of any ambiguity or doubts, users are
advised to verify/check with the Department(s) and/or other source(s), and to
obtain appropriate professional advice.

Under no circumstances will this Department be liable for any expense, loss or
damage including, without limitation, indirect or consequential loss or damage,
or any expense, loss or damage whatsoever arising from use, or loss of use, of
data, arising out of or in connection with the use of this website.

These terms and conditions shall be governed by and construed in accordance


with the Indian Laws. Any dispute arising under these terms and conditions shall
be subject to the jurisdiction of the courts of India.

The information posted on this website could include hypertext links or pointers
to information created and maintained by non-Government/private organizations.
(Name of Department) is providing these links and pointers solely for your
information and convenience. When you select a link to an outside website, you
are leaving the (Name of Department) website and are subject to the privacy
and security policies of the owners/sponsors of the outside website.

(Name of Department), does not guarantee the availability of such linked pages
at all times.

- 6.5.4. Privacy Policy

Privacy policies are one legal page that any site collecting any type of
information from their customers should have. A privacy policy should cover
the following:
Web Hosting and Legal Aspects :: 133

• Use of cookies and other trackers

• How do you use personal information collected

• To whom you distribute collected information to

• Contact information for erasing private information

• Information about third-party sites that might collect information (such as


advertisers)

• Editing dates when the document is changed

The following is a privacy policy statement from GIGW manual http://


web.guide1ines.gov.in

Sample: privacy policy from Guidelines for Indian Government Websites


(GIGW) Manual

We do not collect personal information for any purpose other than to respond to
you (for example, to respond to your queries). If you choose to provide us with
personal information like filling out a Contact Us form with an e-mail address
or postal address, and submitting it to us through the website, we use that
information to respond to your message, and to help you get the information
you have requested.

Our website never collects information or creates individual profiles for


commercial marketing. While you must provide an e-mail address for a localized
response to any incoming questions or comments to us, we recommend that you
do NOT include any other personal information.

6.5.5 Content Contribution, Moderation and Approval


Policy (CMAP)

Each and every bit of content published on website should be verified and
checked thoroughly by the experts. This policy needs three types of roles like
Content Contributor, Moderator and Approver. This will ensure all contents

- posted on the website are authentic, up-to-date and latest.

The web site must show the Content Contribution, Moderation and Approval
Policy (CMAP) stating the responsibility, authorization and workflow details
with regard to content publishing on the site.
134 :: Certificate in Web Designing and Development

Table 6.3 : Shows a sample CMAPpolicy.

S.No Content Element Moderator Approver Contributor

1 About Company Web Information Manager CFD Content Manager

2 IT Acts/Rules/Regulation Web Information Manager Director Content Manager

3 Pu bIicati ons/Reports Web Information Manager Director Content Manager


, -
4 Contact Details Web Information Manager Director Content Manager

5 What's New Web Information Manager Director Content Manager

6 Tenders /Recruitments Web Information Manager Admin & Finance Content Manager

6.5.6 Web Content Review Policy (CRP)

Every page of contents needs to be reviewed frequently within a specified time


period. For example, the review committee of the organization has to review the
web pages monthly/ quarterly or yearly basis. Also the Web Content Review Policy
must be published at their website.

The below is a sample of a Web Content Review Policy.

Web Content Review Policy (CRP)

The Content Administrators and Content Managers have been given the
responsibility of periodically (Monthly for Sr. No.4) reviewing the contents
of website in respect of their respecti ve domains. The Content Managers shall
put up the contents, which are to be uploadedl updated to the Content '
administrator for approval of the CEO, CGWB.

6.5.7 Content Archival Policy (CAP)

For time sensitive content which expires after a certain date (e.g. tender
notifications, announcements for conference registrations, contest entries etc.),
a policy on whether the content should be archived for future reference or
removed altogether from the website should be decided by the concerned
Department Manager after careful consideration about nature of content.
However, 'expired' content must not be presented or flashed on the website.
The Departments must have a clearly laid out Content Archival Policy (CAP)
-
clarifying the rules set in this regard.
Web Hosting and Legal Aspects :: 135

6.5.8 Website Security Policy

With cybercrimes on the rise, protecting your corporate information and assets
is vital. Your company should have a security policy document that outlines
what and how you plan to protect your company's information and assets.
You can prepare a security policy document in-house, or outsource the project
to security consultants.

The first step in any project to prepare a security policy document is to


determine what elements to include in your policy. Be sure to consider all the
key elements your IT staff manages. We recommend you cover each of the
areas listed below.

• Security accountability: Stipulate the security roles and responsibilities


of general users, key staff, and management. Creating accountability in
these three employee categories helps your organization understand and
manage expectations and provides a foundation for enforcing all other
ancillary policies and procedures. This section should also define various
classes of data, such as internal, external, general, and confidential. By
classifying the data, you can then make stipulations as to what types of
employees are responsible for, and allowed to modify or distribute,
particular classes of data. For example, you can send out memos that say,
''No confidential data may be circulated outside the company without
management sign-off."

• Network service policies: Define your remote network access policies


and your network intrusion detection systems. Generate policies for secure
remote access, IP address management and configuration, router and
switch security procedures, and access list (ACL) stipulations. Indicate
clearly, which key staff needs to review which change procedures before
they are. implemented. For example, your security team should review
all proposedACL changes before your network administrators implement
the changes.

• System policies: Define the host security configuration for all mission-
critical operating systems and servers. Include which services should be
running on which networks, account management policies, password
management 'policies, messaging, database, anti-virus, host-based
intrusion detection, and firewall policies.

- .• Physical security: Define how buildings and card-key readers should be


secured, where internal cameras should be installed, how visitors would
be handled, and what inventory rules and regulations your shipping and
receiving folks should follow. Though this might seem a bit ofa discussion
ofIT security, remember that no organization is secure from attack unless
it's physically secure too.
136 :: Certificate in Web Designing and Development

• Incident handling and response: Specify what procedures to follow in


the event of a security breach or incident. Include policies such as how
to evaluate a security incident, how the incident should be reported, how
the problem should be eradicated, and what key personnel your
organization should engage in the process.

• Behavior and acceptable use policies: Stipulate what type of behavior


is expected of employees and your management team, and what forms
and documents need to be read, reviewed, filled out, and followed.
Employees should be required to read and sign the acceptable use policy
so that management has the option to take disciplinary action in the event
that the policy is violated.

• Security training: Defme a security training plan for key staff who
manages day-to-day security operations in order to sustain your security
policy and keep your security staff current with the latest techniques.

Once you have established policies that suit your organization, you should
draft procedures that outline how to comply with the policies like how you.
secure operating systems, what files to edit and configure, what ports should
be open and closed on the firewall, how databases should be secured, and
what updates need to be applied on what timeframe. Include what jobs should
be run and when.

6.5.9 Web••ite Monitoring Policy


Web being a dynamic medium, changes in terms of technologies, access
.
devices and even the requirements and expectation levels of visitors happen
fairly frequently. Keeping this in mind, websites must have a website
monitoring policy in place. Websites must be monitored periodically in
accordance with the plan to address and fix the quality and compatibility issues
around the following parameters: -

a. Performance: Site download time should be optimized for a variety of


network connections as well as devices. All important pages of the website
should be tested for this.
b. Functionality: All modules of the website should be tested for their
functionality. Moreover, interactive components of the site such as
discussion boards, opinion polls, feedback forms etc. should be working
smoothly.
c. Broken Links: The website should be thoroughly reviewed to rule out the
presence of any broken links or errors. A number of tools and techniques
are now available to easily detect the broken links in a website
d. Traffic Analysis: The site traffic should be regularly monitored to analyze
the usage patterns as well as visitors' profile and preferences. TrafficAnalysis
tools also give reports on broken links.
Web Hosting and Legal Aspects :: 137

e. Feedback: Feedback from the visitors is the best way to judge a website's
performance and make necessary improvements. A proper mechanism for
feedback analysis should be in place to carry out the changes and
enhancements as suggested by the visitors.

6.5.10 Contingency Management Policy

It is very important that the website is fully functional at all times. Hence, all efforts
should be made to minimize the downtime ofthe website as far as possible. It is
therefore necessary that a proper Contingency Plan not be prepared ill advance
to handle any eventualities and restore the site in the shortest possible time. The
possible contingencies include:

Defacement of the website: All possible security measures not be taken for a
website to prevent any possible defacement/hacking by unscrupulous elements.
However, if despite the security measures in place, such an eventuality occurs, there
must be a proper contingency plan, which should immediately come into force.

Data Corruption: A proper mechanism has to be worked out, in consultation with


web hosting service provider to ensure that appropriate and regular back-ups of
the website data are being taken. These enable a fast recovery and uninterrupted
availability ofthe information to the citizens in view of any data corruption.

Hardware/Software Failure: Though such an occurrence is a rarity, still in case


the server on which the website is being hosted crashes due to some unforeseen
reason, the web hosting service provider must have enough redundant infrastructure
available to restore the website at the earliest.

Natural Disasters: There could be circumstances whereby due to some natural


calamity, the entire data center where the website is being hosted gets destroyed
or ceases to exist. A well planned contingency mechanism has to be in place for
such eventualities whereby it should be ensured that the Hosting Service Provider:
has a 'Disaster Recovery Centre (DRC)' set up at a geographically remote location
and the website is switched over to the DRC with minimum delay and restored on
the Net.

Apart from the above, a well defined contingency plan for all such eventualities

- must be in place within all organizations, so that the emergency information/contact


help-lines could be displayed on the website without any delay.

6.5.11 Website Disclaimer

A Website Disclaimer is a common method used to limit the liability ofthe owner
138 :: Certificate in Web Designing and Development

of the website. Providing a disclaimer is an approach that can be used to ensure a


website's information is not improperly relied upon.

For example, ifanyone is to rely on the website's information the site will not be
held responsible for any loss or other result. A disclaimer will also state that
information on the website may at anytime, be changed or updated, without notice.

Another important aspect ofwebsite disclaimers is when a website provides links


to others sites or articles, there will be a disclaimer providing that the expression
and content in these linked sites is not necessarily the views of that of website or
company. As a result, it is essential to post a website disclaimer to protect your
site from making any representations outside the scope of your control.

INTEXT QUESTIONS 6.2


2. Fill inthe blanks:

(a) policy is the right ofthe owner to reproduce or


permit someone else to reproduce copyrighted works .
..
r (b) Each and every bit of content published on website should be verified
and checked thoroughly by the expertise of organizations. This policy
needs three types of roles like Content Contributor, _
and -----

6.6 WHAT YOU HAVE LEARNT


In this lesson you have learnt about,

• features ofISP,

• types of web hosting,

• process of buying a domain and steps to publish the website.


f

• policies of website deigning.

6.7 TERMINAL QUESTIONS

1. What are the terms associated with Website hosting and Domain
Registration process? Explain in more details.

2. What do you know about "Guidelines for Indian Government websites''? List
out the various website policies in details.
Web Hosting and Legal Aspects :: 139

ANSWERS TO INTEXT QUESTIONS

[ill
1. (a) True

(b) True

(c) False

@]
2. (a) Copyright

(b) Moderator and Approver.

You might also like