Professional Documents
Culture Documents
Mbeya Campus
LAW 110 - Introduction to Information
Technology and Computer Application Law
Academic Year:2019/2020
1 LAW 110_LLB1_MZUMBE
GROUP ONE
LAW 110_LLB1_MZUMBE 2
GROUP TWO
LAW 110_LLB1_MZUMBE 3
GROUP THREE
LAW 110_LLB1_MZUMBE 4
GROUP FOUR
LAW 110_LLB1_MZUMBE 5
GROUP FIVE
LAW 110_LLB1_MZUMBE 6
GROUP SIX
LAW 110_LLB1_MZUMBE 7
GROUP SEVEN
LAW 110_LLB1_MZUMBE 8
GROUP Eight
LAW 110_LLB1_MZUMBE 9
GROUP NINE
Briefly narrate the following with examples;
Law of Copyrights
Law of patents
Patent Law
trade secrets Law
trademark law
LAW 110_LLB1_MZUMBE 10
GROUP TEN
LAW 110_LLB1_MZUMBE 11
GROUP ELEVEN
Explain different kinds of threats to information
security
What are the information security goals? Why different
goals is needed
LAW 110_LLB1_MZUMBE 12
GROUP TWELVE
LAW 110_LLB1_MZUMBE 13
GROUP THIRTEEN
LAW 110_LLB1_MZUMBE 14
GROUP FOURTEEN
LAW 110_LLB1_MZUMBE 15
GROUP FIFTEEN
Explain the different types of computer crime and the
difficulties of discovery and prosecution
LAW 110_LLB1_MZUMBE 16
GROUP SIXTEEN
Describe the aspects of securing corporate data,
including software and data security, disaster recovery
plans, and security legislation.
LAW 110_LLB1_MZUMBE 17
GROUP SEVENTEEN
What are the main security expectations of customers
and suppliers when conducting e-business with any
business organization?
LAW 110_LLB1_MZUMBE 18
GROUP EIGHTEEN
Describe in general terms how viruses work, the damage
they can cause, and procedures used to prevent this
damage.
LAW 110_LLB1_MZUMBE 19
GROUP NINETEEN
Describe in general terms how viruses work, the damage
they can cause, and procedures used to prevent this
damage.
LAW 110_LLB1_MZUMBE 20
GROUP TWENTY
Explain the threats to personal privacy posed by
computers and the Internet.
Describe actions you can take to maximize your privacy
LAW 110_LLB1_MZUMBE 21