Professional Documents
Culture Documents
SMA/IT/00834/019
CIT 407 IT AND SOCIETY
ASSIGNMENT ONE
(a) Use the scenario below in which copyrighted works are duplicated and determine if
they made fair use of the work:
Answer
I think there is fair work in the copyrighted materials since the students can download and use them for
assignments. This is because the lecture gave them permission by giving passwords.
(c) State and explain the three ways in which the Kenya government has imposed censorship
on copyrighted material.
Answer :
1 Penalties are set out by relevant authority to people found out copying copyrighted materials.
2 Imposes liability on intermediaries for content on their platforms if the “infringing nature of the material is
apparent,” should be stricken entirely. We recommend that any “constructive knowledge” requirements such
as these be eliminated.
3 Restrictions on Private Broadcasting Return to contents In Kenyan law there is no prohibition of private
radio or television, yet the government still retains an effective monopoly over broadcasting.
ii) social media platforms : We are living in times where most people can access the internet through mobile
phones and computers. Social media has become part and parcel of normal life. You may be surprised by the
number of people who use the many social media platforms.
1. Patents
Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter,
or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and
requirements of this title.
2. Trademarks
Trademarks protect logos, sounds, words, colors, or symbols used by a company to distinguish its service or
product.
3. Copyrights
Copyright law protects the rights of the original creator of original works of intellectual property. Unlike
patents, copyrights must be tangible. For instance, you can’t copyright an idea. But you can write down an
original speech, poem, or song and get a copyright.
4. Trade Secrets
Trade secrets are a company’s intellectual property that isn’t public, has economic value, and carries
information. They may be a formula, recipe, or process used to gain a competitive advantage.
To qualify as a trade secret, companies must work to protect proprietary information actively. Once the
information is public knowledge, then it’s no longer protected under trade secrets laws.
Assignment Two
Answer
Coming up with software that block people from using office internet for personal entertainment during work
hours.
Coming up with rules that hinder other people from going to other peoples privacy.
Ii Briefly discuss three ways how the Internet is a challenge to the protection of individual privacy in an
organization
2) Information Mishandling
There are various sites on the internet that need your personal information to get access to their services.
These sites often store cookies and save your personal information and later use it for various purposes. Most
of the time this information is not encrypted and can be accessed by anyone. This mishandling of personal
information may lead to serious consequences. The modern trend of e-banking and e-business portals have
multiplied the risks associated with online privacy. By sharing your bank details and crucial files on the
internet, you are paving ways for burglars and making yourself vulnerable to Cyber criminals.
3) Location Tracking
Most of the internet users proudly upload their social media posts highlighting their current location along
with tagging friends and family members. It's fun and exciting to share your life events with friends and
family, but this data does not remain restricted to your expected audience only.
Iii Name and briefly explain any three management actions that can reduce injuries resulting from ICT usage
1 Wrist pains This is a problem caused by using uncomfortable mouse . So management can come with
comfortable mouse
2 back pains this is caused by poor chair and poor sitting posture Management can bring new comfortable
chairs to Computer labs
3 Eye problems due to straining and old screens . The management can come up with anti-screen which
protect users of computers
Development of internet in Kenya has been influenced more by supply of Internet Technologies than by
demand for specific services by users. Discuss THREE reasons and cite examples to support your arguments,
where necessary.
Answer
1 readily available technologies like websites which makes every people to write and post content online
which is. readily available. Example When you search a question a question on any web browser you get a
lot of responses
2 Readily available internet and internet services provides .High-technology companies are those whose
competitive strategy is driven primarily by technology. The availability of technology is a necessary
condition for starting and developing a technology-based firm. Example companies like safaricom and airtel
provide readily available internet the people use to browse freely
i). Outline the privacy problems raised by tracking visitor’s activities at its Web site.
1 Login details Through tracking website you can get login in details like username and password which
hackers can use to steal your account.
2 Location sometimes your location an be traced and people can steal the information to track where you are
and risk your life.
ii Discuss any challenges of Intellectual property (IP) faced by Dirt Bikes on the use of the Web Site
1. Choosing the wrong names for products and services.
Among the earliest mistakes made by a start-up company is not paying attention to its product and service
names. All too often, the founders consider alternative product and service names solely from a marketing
perspective, giving little thought to the name's legal consequences. This approach can lead both to liability
and marketing setbacks if the names selected are "confusingly similar" to those already in use by another
company.