Professional Documents
Culture Documents
For companies, being a good netizen, applying online ethics, and using
netiquette include:
Respecting rights of privacy for offline employees. Information possessed by
citizens in their offline interactions should be respected.
The scope of data protection, however, goes beyond the notion of data
availability and usability to cover areas such as data immutability,
preservation, and deletion/destruction.
DATA PROTECTION
Data protection spans three broad categories, namely, traditional data
protection (such as backup and restore copies), data security, and data
privacy.
DATA PROTECTION
Principle of data protection
The principle of data protection is to deploy methodologies and
technologies to protect and make data available under all circumstances.
IPR
Intellectual Property Rights (IPRs) are legal rights that protect creations
and/or inventions resulting from intellectual activity in the industrial,
scientific, literary or artistic fields. The most common IPRs include
patents, copyrights, marks and trade secrets.
Intellectual Property Right (copyright, patent, trademark)
Four Types of Intellectual Property for Businesses
Copyrights, Patents, Trademarks, and Trade Secrets – Four Types of
Intellectual Properties
If you are a business owner, you should familiarize yourself with the four
types of intellectual property, otherwise known as IP. We speak with
many entrepreneurs who don’t know where to begin when it comes to
protecting their ideas and inventions. They need this information
frequently so we decided to create a quick and easy guide to educate them.
It was popular so we decided to post it to our blog. Let us know if you
found this useful and if there are any other guides you would like us to
make in the comment section below.
Intellectual Property Right (copyright, patent, trademark)
Type 1 – Copyrights
What are Copyrights? According to Copyright.Gov ‘s Guide to
copyrights, “Copyright is a form of protection provided by the laws of the
United States (title 17, U.S.Code) to the authors of “original works of
authorship,”” Copyrights protect writing, pictures, music, art, and other
forms of intellectual works. What this means for you is that if you wrote
something, or created a piece of work that you don’t want people to reuse
without your permission, you have the right to copyright that work. Now,
if people want to use, reuse, or re purpose your work, they must first
contact you to use it, attribute you as the owner, and use it for purposes
you deem appropriate. There is an exception to this rule, that is, Fair Use.
If someone wants to use a portion of your work for educational, parody,
commenting, or news purposes they can.
Intellectual Property Right (copyright, patent, trademark)
Type 2 – Patents
What are Patents? According to the United States Patent Office , “A
patent for an invention is the grant of a property right to the inventor”.
Generally this patent lasts for 20 years from when the inventor attempts
to patent their invention by filing with the US Government. The list of
things that can patented is fairly lengthy and open to interpretation but it
covers anyone who “invents or discovers any new and useful process,
machine, manufacture, or composition of matter, or any new and useful
improvement thereof, may obtain a patent,”.
Intellectual Property Right (copyright, patent, trademark)
Type 3 – Trademarks
What are Trademarks? According to the USPTO , a Trademark is a
“word, phrase, symbol, or design, or a combination thereof, that
identifies and distinguishes the source of the goods of one party from
those of others. ” For instance, if your company name, a logo, or your
company tagline can me trademarked. The trademark serves as a brand
identifier for your business or your products. Images, slogans, and colors
can all be trademarked. For instance, Tiffany Blue is a trademarked
color that is used by Tiffany & Co. in promotional materials as well as
boxes, bags, and more.
Intellectual Property Right (copyright, patent, trademark)
Type 4 – Trade Secrets
What are Trade Secrets? Generally, any piece of confidential corporate
information which gives any business a competitive advantage can be
considered a trade secret. For instance, Coca-Cola’s secret formula could
be considered a trade secret. Now, if I created a soda company and
produced identical soda to coca-cola, this would be an infringement of
Coke’s trade secret. This is a general example but trade secrets can even
defined as distribution methods (Walmart), Sales methods, consumer
information, ad campaigns and strategies, list of vendors, list of clients,
and production processes. Generally, trade secrets are leaked through
corporate (industrial) espionage, breach of contract, or something as
simple as leaving your prototype iPhone at a bar.
Violations of Intellectual Property
If a third party were to assume ownership, copy, or sell someone's
previously copywritten work, that would legally be considered a case of
copyright infringement. Copyright law can still be enforced if others try
to create simple deviations from the original source material.
Trademark Infringement
A trademark is a form of legal protection for brand names and symbols that identify
the source of a product or service. Trademarks can take the form of a word, slogan,
symbol, or design — or a combination of these.
What is open source software?
Open source software is software with source code that anyone can inspect, modify,
and enhance.
"Source code" is the part of software that most computer users don't ever see; it's the
code computer programmers can manipulate to change how a piece of software—a
"program" or "application"—works.
Open source software is different. Its authors make its source code available to others
who would like to view that code, copy it, learn from it, alter it, or share it. LibreOffice
and the GNU Image Manipulation Program are examples of open source software.
Licensing
Licensing involves obtaining permission from a company (licensor) to manufacture
and sell one or more of its products within a defined market area. The company that
obtains these rights (the licensee) usually agrees to pay a royalty fee to the original
owner.
Hacking refers to the misuse of devices like computers, smartphones, tablets, and
networks to cause damage to or corrupt systems, gather information on users, steal
data and documents, or disrupt data-related activity.
Types of Hacking/Hackers
There are typically four key drivers that lead to bad actors hacking websites or
systems: (1) financial gain through the theft of credit card details or by defrauding
financial services, (2) corporate espionage, (3) to gain notoriety or respect for their
hacking talents, and (4) state-sponsored hacking that aims to steal business
information and national intelligence. On top of that, there are politically motivated
hackers—or hacktivists—who aim to raise public attention by leaking sensitive
information, such as Anonymous, LulzSec, and WikiLeaks.
EAVESDROPPING
An eavesdropping attack, also known as a sniffing or snooping attack, is a theft of
information as it is transmitted over a network by a computer, smartphone, or another
connected device. The attack takes advantage of unsecured network communications
to access data as it is being sent or received by its user.
The term “phishing” is a spin on the word fishing, because criminals are dangling a
fake “lure” (the legitimate-looking email, website or ad) hoping users will “bite” by
providing the information the criminals have requested – such as credit card numbers,
account numbers, passwords, usernames or other valuable information.
RANSOMWARE
Ransomware is malware that employs encryption to hold a victim’s information at
ransom. A user or organization’s critical data is encrypted so that they cannot access
files, databases, or applications.
Ransomware is often designed to spread across a network and target database and file
servers, and can thus quickly paralyze an entire organization.
some eco-friendly waste disposal techniques that you can use to dispose of electronic
waste locally:
Give Your Electronic Waste to a Certified E-Waste Recycler
The positive aspect of e-waste recycling is that you have quite a few recycling options.
You need to find an e-waste recycler who is officially certified by the Basel Action
Network (BAN). BAN is a non-profit organization of recycling companies which are
dedicated to recycling e-waste in a safe and responsible way.
E-waste management: proper disposal of used electronic
gadget
Sell Off Your Outdated Technology
One man’s junk is another man’s treasure as the old saying goes. This can be applied
to helping you get rid of your old electronics. You can tap into online sites like
craigslist, eBay or even resort to having a garage sale as this will help you get rid of
your outdated electronics as well as earning some money.
Enquire amongst your government, universities, and schools for any recycling
programs they run as a lot of organizations have started assigning a certain day and
place for environmentally conscious citizens to come and drop off their e-waste.
A lot of electronic companies tend to have an exchange policy whereby they take back
your old gadgets when you buy a later version, sometimes offering you a discount on
your new purchase.
IT ACT
The Information Technology Act, 2000 also Known as an IT Act is an act proposed by
the Indian Parliament reported on 17th October 2000.
The main objective of this act is to carry lawful and trustworthy electronic, digital and
online transactions and alleviate or reduce cybercrimes.
It has been commonly observed that girls are under represented in Computer Science
Studies be it computer science major subject at high school or at college level.
There are far less girls than boys in computer science section.
Preconceived notions
Notions like boys are better at technical things, girls are good at humanities, arts etc.;
girls must take up a career keeping in mind that they have to raise a family; Teaching
is the best option for girls as it gives you half day off and ample number of holidays so
that you can take care of your family; have their impact on decision making of girls
while taking up subjects. Also parents play a major role while deciding the subjects.
Technology & Society: Gender and disability issues while
teaching and using computers
Lack of interest
During primitive years children often play games on the computers and smart phones.
Most of the games are boys centric that increase the interest of boys in computers.
Lack of motivation
Girls are pressurized to choose a career option which will give them work life balance
because they have to play an important family role in future. This theory discourages
girls from taking up technical subjects like computer science.