Professional Documents
Culture Documents
Intellectual Property (IP) – is a property created by a person or group of persons using their
own intellect for ultimate use in commerce and which is already not available in the public
domain.
Examples of IP Property which are, an invention relating to a product or any process, a
new design, a literary or artistic work and a trademark (a word, a symbol and / or a logo,
etc.),
Intellectual Property statutory right granted by the Government, to the owner(s) of the
intellectual property or applicant(s) of an intellectual property (IP) to exclude others from
exploiting the IP commercially for a given period of time, in lieu of the discloser of his/her IP in
an IPR application.
IP owner may intend to stop others from manufacturing and selling products and
services which are dully protected by him
IP can be used to establish the goodwill and brand value in the market.
IP can be mention in resumes of it’s creator and thus show competence of it’s
creator
IPR certificate establishes legal and valid ownership about an intellectual property
Kinds of IPRs
• Patent (to protect technologies - The Patent Act)
• Trade Mark (to protect words, signs, logos, labels – The Trade Mark Act)
• Design (to protect outer ornamental configuration – The Designs Act)
• Geographical Indications (GI) (to protect region specific product –The
Geographical Indications of Goods Act)
• Copyright (to protect literary and artistic work –The
Copyright Act)
Plagiarism
Plagiarism is “the act of presenting the words, ideas, images, sounds, or the creative
expression of others as it is your creation or your own.”
The word plagiarism is derived from the Latin word plagiare, which means to kidnap or
abduct
Why is it important to understand Plagiarism?
• Plagiarism is stealing of intellectual property
• Plagiarism is cheating
• Plagiarism is an Academic offence
• Plagiarism is Academic theft!
• Intentional Plagiarism
• Unintentional Plagiarism
(i) Copying other’s work (i) Not knowing how to acknowledge
(ii) Borrowing/buying or incorporate sources of information
assignments through proper paraphrasing,
summarizing and quotation
(iii) Cut , paste from
(ii) Careless copying or cutting
electronic resources
and pasting from electronic databases
(iv) Downloading essays/text from
(iii) Quoting excessively
the Internet and presenting as
(iv) Failure to use our own “voice”
our own work
Licensing
A software license is a document that provides legally binding guidelines to the
person who holds it for the use and distribution of software.
It typically provide end users with the right to make one or more copies of the software
without violating copyrights. It also defines the responsibilities of the parties entering
into the license agreement and may impose restrictions on how the software can be
used. Software licensing terms and conditions usually include fair use of the software,
the limitations of liability, warranties and disclaimers and protections.
Benefits of Using Licensed Software
• Using Unlicensed Software Against the Law
• The Right Software License Can Save our Money
• We can Receive Around-The-Clock License Support
CC licenses allow the creator of the work to select how they want others to use the
work. When a creator releases their work under a CC license, members of the public
know what they can and can’t do with the work. This means that they only need to
seek the creator’s permission when they want to use the work in a way not permitted
by the license.
The great thing is that all CC licenses allow works to be used for educational
purposes. As a result, teachers and students can freely copy, share and sometimes
modify and remix a CC work without having seeking the permission of the creator.
• Our original Copyright is protected and can be modified within the parameters of
the Creative Commons licensing regime.
• if someone profits from our work (provided we have not given a Non-
commercial license/ attribute license), we can’t ask for compensation or a
license fee
GPL - General Public License(GNU GPL), is the most commonly used free
software license, written by Richard Stallman in 1989 of Free Software Foundation
for GNU Project. This license allows software to be freely used(means freedom for
use,not price wise free), modified, and redistributed by anyone. WordPress is also
an example of software released under the GPL license, that’s why it can be used,
modified, and extended by anyone.
The GPL itself is under the copyright ownership of the Free Software Foundation
(FSF), a tax-exempt charity organization founded by Stallman's GNU project in
Apache License
The Apache License is a free and open source software (FOSS) licensing
agreement from the Apache Software Foundation (ASF). Beginning in
1995, the Apache Group (later the Apache Software Foundation) Their
initial license was essentially the same as the old BSD license. Apache did
likewise and created the Apache License v1.1 - a slight variation on the
modified BSD license. In 2004 Apache decided to depart from the BSD
model a little more radically, and produced the Apache License v2.
Main Features Of The Apache License
• copy, modify and distribute the covered software in source and/or
binary forms
• exercise patent rights that would normally only extend to the licensor
provided that:
• all copies, modified or unmodified, are accompanied by a copy of the
license
• all modifications are clearly marked as being the work of the modifier
• all notices of copyright, trademark andpatent rights are reproduced
accurately in distributed copies
In general, open source means any program whose source code is made
available publically for use or modification as users or other developers see fit.
Open source software is usually made freely available. Example of open source
software are:
Operating system – linux,Ubuntu
dbms – mysql,mongodb
Programming language – java,php,python
internet browser/webserver –chromium,firfox/ apache http server,apache
tomcat
Open Data
Open data is data which can be accessed, used and shared by any one to bring
about social, economic and environmental benefits. Open data becomes usable
when made available in a common , machine-readable format.
Following criteria must be met for open data
• Must be licensed to permit people to use and share.
• It should not have limitation to use in any form
• It must be free to use but cost should be reasonable
• It can be reused and re distributed.
Open Government Data refers to the information collected, produced or paid for
by the public bodies (PSI) and made freely available for re-use for any purpose.
The 5 basic principles of open data decided in G8 summit in 2013 are
(i) Open data by default
(ii) Should be in quality and in quality as well
(iii)Usable by all
(iv)Release data for improved governance
(v)Release data for innovation
Privacy threats
Privacy Laws
The (Indian) Information Technology Act, 2000 deals with the issues relating to
payment of compensation (Civil) and punishment (Criminal) in case of wrongful
disclosure and misuse of personal data and violation of contractual terms in
respect of personal data.
1. Under section 43A of the (Indian) Information Technology Act, 2000, a
body corporate who is possessing, dealing or handling any sensitive
personal data or informationThe Government has notified the Information
Technology Rules, 2011. The Rules only deals with protection of
Computer Fraud
Computer fraud is using a computer and/or internet to take or alter electronic
data, or to gain unlawful use of a computer/internet.
Illegal computer activities include phishing, social engineering, viruses, and
DDoS attacks.
Cyber
Crime
Any crime that involves a computer and a network is called a “Computer Crime”
or “Cyber Crime.
Or in other term ,it is a crime in which a computer is the object of the crime
(hacking, phishing, spamming) or is used as a tool to commit an offense (child
pornography, hate crimes).
Phishing
Phishing is a cyber attack that uses disguised email as a weapon.The attackers
masquerade as a trusted entity of some kind, The goal is to trick the email
recipient into believing that the message is something they want or need —
recipient fills/send sensitive information like account no, username ,password etc.
,then attacker use these.
How to prevent phishing
• Always check the spelling of the URLs before click
• Watch out for URL redirects, that sent to a different website with identical
design
• If receive an email from that seems suspicious, contact that source with a
new email, rather than just hitting reply
• Don't post personal data, like your birthday, vacation plans, or your address
or phone number, publicly on social media
Illegal Downloading
Illegal downloading is obtaining files or computer resources that we do not have
the right to use from the Internet. Copyright laws prohibit Internet users from
obtaining copies of media that we do not legally purchase. These laws exist to
prevent digital piracy, much of which is generally conducted through Internet file
sharing.
How to prevent illegal downloading
movie piracy has actually decreased significantly through BitTorrent and other
traceable methods, as the adoption curve of Netflix (and other) streaming options
has increased. The answer there is simple - make it cheaper and easier to access
media in a "legal" manner, and more people will utilize those paths than the
"illegal" paths.
Child Pornography
Child pornography is a crime in India. IT Act, 2000 & Indian Penal Code, 1860 provides
protection from child pornography.The newly passed Information Technology Bill is set to make
it illegal to not only create and transmit child pornography in any electronic form, but even to
browse it.
Cyber Forensics
IT ACT 2000
The Information Technology Act, 2000 provides legal recognition to the
transaction done via an electronic exchange of data and other electronic
means of communication or electronic commerce transactions.Some of
sections under it act 2000 are given below.
67C Failure to maintain records Imprisonment up to three years, or/and with fine.
68 Failure/refusal to comply with orders Imprisonment up to three years, or/and with fine
up to Rs.200,000
69 Failure/refusal to decrypt data Imprisonment up to seven years and possible fine.
Technology and society: understanding of societal issues and cultural changes induced by
technology.
Science and technology are essential ingredients of modern life. They transcend local boundaries
and touches lives of everyone. Evolution of mankind can be seen in terms of technological
evolution as well. Invention of fire and wheel changed the face of mankind. Various historical
epochs - hunter-gatherers, agrarian society and industrialist society are distinguished from each
other in term of technological advancement.
The technological factors represent the conditions created by men that have a profound influence
on his life. Technology is product of civilization. According to Karl Marx even the formation of
social relations and mental conceptions and attitudes are dependent upon technology.
Veblen has regarded technology as the sole explanation of social change.W.F Ogburn says
technology changes society by changing our environments to which we in turn adapt. This change
is usually in the material environment and the adjustment that we make with these changes often
modifies customs and social institutions.
Transformation in the economy and the evolution of the new social classes:
The introduction of the factory system of production has turned the agricultural economy into
industrial economy. The industrial or the capitalist economy has divided the social organization
into two predominant classes-the capitalist class and the working class. These two classes are
always at conflict due to mutually opposite interest. In the course of time an intermediary class
called the middle class has evolved.
With new cheap devices, society has reaped tremendous benefits. This explosive growth in the
electronics industry, however, has led to a rapidly escalating issue of end-of-life (EOL) electronics
or e-waste. In landfills or primitive recycling operations, toxic materials can be released from old
electronic devices into the environment.
E-waste is growing, and with that surge comes the need for effective electronics recycling
programs. According to a January 2019 report from the World Economic Forum, E-waste is now
the fastest-growing waste stream in the world, with an estimated waste stream of 48.5 million
tonnes in 2018.
People still seek information on TV recycling, computer recycling, and other programs that will
help them responsibly get rid of unwanted equipment while minimizing any risk of data or identity
theft.
The safe recycling of electronics is receiving increased attention from policymakers, industry, and
consumers alike. This trend is good news because many consumers are still not sure how to safely
dispose of old computers, smartphones or other electronic devices. According to one report, nearly
75 percent of old electronics continues to be stored in households because of the unavailability of
convenient recycling options.
This article looks at some of the basic questions, such as defining e-waste, exploring why it is
important, how consumers can recycle, state legislation, and the issue of the international shipment
of hazardous e-waste.
What Is E-Waste
These EOL electronic devices, also known as e-waste and e-scrap, includes such items as dated
computer equipment, stereos, televisions, and mobile phones. Such things can often be refurbished
or recycled, yet a significant amount still finds its way to the landfill. Soberingly, only 20% of
global e-waste is formally recycled the remaining 80% often incinerated or dumped in landfills.
"Many thousands of tonnes also find their way around the world to be pulled apart by hand or
burned by the world’s poorest workers," the World Economic Forum notes.
Rich Source of Raw Materials Internationally, only 10-15 percent of the gold in e-waste
is successfully recovered while the rest is lost. Ironically, electronic waste contains deposits of
precious metal estimated to be between 40 and 50 times richer than ores mined from the earth,
according to the United Nations.
Solid Waste Management Because the explosion of growth in the electronics industry,
combined with short product life cycle has led to a rapid escalation in the generation of solid
waste.
Toxic Materials Because old electronic devices contain toxic substances such as lead,
mercury, cadmium and chromium, proper processing is essential to ensure that these materials are
not released into the environment. They may also contain other heavy metals and potentially toxic
chemical flame retardants.
International Movement of Hazardous Waste The uncontrolled movement of e-waste to
countries where cheap labor and primitive approaches to recycling have resulted in health risks to
residents exposed to the release of toxins continues to an issue of concern.
Consumers have access to recycling opportunities, depending on where they live. Thinking
regarding the electronics recycling hierarchy, the best choice is to donate computer equipment that
can be refurbished or reused as is, provided that personal information is scrubbed from devices.
Other recycling opportunities include authorized electronics recycler locations, electronics
recycling events, or retailer take back programs such as those offered by Staples, Office Depot
or BestBuy. Additionally, other programs are available to help consumers with the recycling of
cell phones and batteries, such as through Call2Recycle.
Whether or not you are allowed to throw EOL electronic devices into the trash, may depend on
equipment and location. Refer to specific state legislation, but please recycle. Note that some
communities or cities will have policies that ban e-waste even if there is no such ban at the state
level. Be sure to enlist the use of recyclers who are certified through either of the voluntary
certification programs that have been established to ensure responsible recycling, including
R2/RIOS and e-stewards.
In the United States, 26 states have mandated electronics recycling. Almost all of these policies
require manufacturer responsibility to fund the recycling effort. California, by contrast, utilizes an
advanced recycling fee (ARF) paid by consumers to support the recycling of old televisions,
computer monitors, and DVD players. There is no federal law on electronics recycling.
Although technology has been a scapegoat for many identity thefts, in many ways technology has
provided some of the most solid defenses against the rising tide of identity theft. Radio-frequency
identification (RFID) tags, data encryption, and similar high-tech innovations have gone a long
way to securing personal information. The federal government is even considering using biometric
ID cards to combat illegal immigration. In fact, it's easy to make the argument that the problem
isn't in the technology, but in our lack of interest in protecting personal information because
biometric ID use is not a widespread as it possibly could be.
The idea of somebody stealing your biometric information isn't as far-fetched as you might hope. It
has already been shown how simple it would be to plant false DNA evidence. One article even
goes so far as to say that "any biology undergraduate can perform this."
Victims of identity theft report that it can take a minimum of three to five years to fix an identity
theft problem. You may be able to get a new credit card in two weeks once you have all the
information to the bank or credit issuing authority, but who will issue you a new set of fingerprints
to replace the stolen ones?
In the end, we will probably see the same problems arise even with widespread use of biometric
identification technology, and some think the problem may get even worse. It is because the way
biometrics work isn't any different from credit cards.
Because we can touch our credit cards, it's easy to think of credit as a tangible item. The plastic is
what makes it real, but that's not the whole story behind credit. Today, credit is nothing more than
a long string of numbers stored in a computer somewhere. When you swipe your card at the local
merchant, the information stored on your card is converted into another number and sent to your
bank. If the numbers match up, you get to walk home with a new purchase.
Biometric identification works similarly, but you're using your fingerprint instead of a card. It will
still be turned into a string of numbers and run through a computer network. So does it matter
where the string of numbers comes from when an identity thief gets hold of it?
Despite what some experts say, a database is a database. A hacker can still steal data from a
computer or network; it doesn't matter if that data is a credit card number or a digital voice print.
As far as security is concerned, many experts agree that maintaining "token" forms of
identification are probably superior. Token identification is a card, password, personal
identification number (PIN), etc. It is something that can be canceled or changed if it is lost,
misplaced or stolen. On the other hand, biometric identification can't be lost, misplaced, or loaned
to a friend, but it also can't be replaced if it's compromised either. This reality, combined with
certain privacy issues (tracking, profiling, consumer-related privacy issues, etc.), is making experts
give serious consideration to whether biometrics are a viable option on a large scale.
Biometrics have a few quirks of their own, too. For example, broad smiles showing teeth are now
banned for passport photos. It is because smiling may distort other facial features that are
considered essential for biometric identification. Facial recognition software may not adjust well
for smiling subjects because the facial muscles, especially eyes, are different when you are
smiling.
But the biggest consideration is that a biometric identity system is only going to be as good as the
information that's put into it in the first place. In other words, your fingerprint won't tell anyone
who you are, all it can do is keep you from using somebody else's identity once you are in that
system. In fact, identity theft expert John Sileo said, "If we implement biometrics without doing
our due diligence on protecting the identity, we are doomed to repeat history—and our thumbprint
will become just another Social Security Number."
A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single
entity within a given system. UIDs make it possible to address that entity, so that it can be
accessed and interacted with.