You are on page 1of 3

DENNIS KIRIMI GITOBU

SMA/IT/00834/019
CIT 407 IT AND SOCIETY

ASSIGNMENT ONE
(a) Use the scenario below in which copyrighted works are duplicated and determine if
they made fair use of the work:

Answer
I think there is fair work in the copyrighted materials since the students can download and use them for
assignments. This is because the lecture gave them permission by giving passwords.

(c) State and explain the three ways in which the Kenya government has imposed censorship
on copyrighted material.

Answer :
1 Penalties are set out by relevant authority to people found out copying copyrighted materials.

2 Imposes liability on intermediaries for content on their platforms if the “infringing nature of the material is
apparent,” should be stricken entirely. We recommend that any “constructive knowledge” requirements such
as these be eliminated.

3 Restrictions on Private Broadcasting Return to contents In Kenyan law there is no prohibition of private
radio or television, yet the government still retains an effective monopoly over broadcasting.

(d) Discuss the impact of technology on entertainment.


i) Due to rapid growth of technology , entertainment is readily available .In the past used to discs and radio
cassets which was used for music production but now we have music readily available in the internet where
its is readily available.

ii) social media platforms : We are living in times where most people can access the internet through mobile
phones and computers. Social media has become part and parcel of normal life. You may be surprised by the
number of people who use the many social media platforms.

(e)Write short notes on the various types of intellectual Property.

1. Patents
Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter,
or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and
requirements of this title.

2. Trademarks
Trademarks protect logos, sounds, words, colors, or symbols used by a company to distinguish its service or
product.

3. Copyrights
Copyright law protects the rights of the original creator of original works of intellectual property. Unlike
patents, copyrights must be tangible. For instance, you can’t copyright an idea. But you can write down an
original speech, poem, or song and get a copyright.
4. Trade Secrets
Trade secrets are a company’s intellectual property that isn’t public, has economic value, and carries
information. They may be a formula, recipe, or process used to gain a competitive advantage.
To qualify as a trade secret, companies must work to protect proprietary information actively. Once the
information is public knowledge, then it’s no longer protected under trade secrets laws.
Assignment Two

QUESTION ONE [10 marks]

i Explain the key technological issues that heighten ethical concerns

Answer
Coming up with software that block people from using office internet for personal entertainment during work
hours.
Coming up with rules that hinder other people from going to other peoples privacy.

Ii Briefly discuss three ways how the Internet is a challenge to the protection of individual privacy in an
organization

1) Spying and Snooping


When you are online, you are spied by a number of trackers for various purposes. Trackers keep a record of
your search history and track all your online activities through various means. Most of the time, this tracking
is for advertisement purposes only and it allows advertisers to show ads according to your taste and interests.
But sometimes this information is used by Cyber criminals to carry out unauthorized and illegal activities
risking your online existence.

2) Information Mishandling
There are various sites on the internet that need your personal information to get access to their services.
These sites often store cookies and save your personal information and later use it for various purposes. Most
of the time this information is not encrypted and can be accessed by anyone. This mishandling of personal
information may lead to serious consequences. The modern trend of e-banking and e-business portals have
multiplied the risks associated with online privacy. By sharing your bank details and crucial files on the
internet, you are paving ways for burglars and making yourself vulnerable to Cyber criminals.

3) Location Tracking
Most of the internet users proudly upload their social media posts highlighting their current location along
with tagging friends and family members. It's fun and exciting to share your life events with friends and
family, but this data does not remain restricted to your expected audience only.

Iii Name and briefly explain any three management actions that can reduce injuries resulting from ICT usage

1 Wrist pains This is a problem caused by using uncomfortable mouse . So management can come with
comfortable mouse

2 back pains this is caused by poor chair and poor sitting posture Management can bring new comfortable
chairs to Computer labs

3 Eye problems due to straining and old screens . The management can come up with anti-screen which
protect users of computers

QUESTION TWO [10 marks]

Development of internet in Kenya has been influenced more by supply of Internet Technologies than by
demand for specific services by users. Discuss THREE reasons and cite examples to support your arguments,
where necessary.
Answer
1 readily available technologies like websites which makes every people to write and post content online
which is. readily available. Example When you search a question a question on any web browser you get a
lot of responses
2 Readily available internet and internet services provides .High-technology companies are those whose
competitive strategy is driven primarily by technology. The availability of technology is a necessary
condition for starting and developing a technology-based firm. Example companies like safaricom and airtel
provide readily available internet the people use to browse freely

3 The Government as Market Simulator


There are different government actions directly affecting the market that may be an important incentive for
the creation of new companies.

QUESTION THREE [10 marks]

i). Outline the privacy problems raised by tracking visitor’s activities at its Web site.

1 Login details Through tracking website you can get login in details like username and password which
hackers can use to steal your account.
2 Location sometimes your location an be traced and people can steal the information to track where you are
and risk your life.

ii Discuss any challenges of Intellectual property (IP) faced by Dirt Bikes on the use of the Web Site
1. Choosing the wrong names for products and services.
Among the earliest mistakes made by a start-up company is not paying attention to its product and service
names. All too often, the founders consider alternative product and service names solely from a marketing
perspective, giving little thought to the name's legal consequences. This approach can lead both to liability
and marketing setbacks if the names selected are "confusingly similar" to those already in use by another
company.

2. Failing to document ownership of technology developed by persons other than employees.


Start-ups often utilize technology that was developed by a company's founders prior to its formal formation.
And sometimes, due to limited and uncertain financial resources, consultants rather than company employees
do early technology development. Even if these people eventually join the company, ownership of the
technology they developed prior to their employment must be dealt with separately, as intellectual property
developed by consultants. The key issue in this area is ownership of the developed property, and mistakes are
common because the law is counter-intuitive.

3. Entering into Problematic Exclusive Licensing Arrangements.


Early-stage companies often enter into license agreements with others to facilitate their growth. Frequently a
business makes the mistake of granting exclusive, long-term licenses without appropriate controls and limits
on the licensee. Granting exclusive licenses without a strategic plan often can restrict a company's ability to
exploit its intellectual property.

4. Failing to identify and protect intellectual property.


Start-up companies necessarily focus on technology development and marketing in the early days. The
importance of implementing an intellectual property protection plan is often marginalized, based on the
rationale that until the marketplace validates the technology and there is something of value to protect,
exploring plan options would be premature. However, this can have very serious and sometimes irreversible
consequences.

You might also like