You are on page 1of 25

Computer and Information Technology for (HKCEE) Core Module

15.1Intellectual Property Rights


15.2Data Privacy
15.3Unauthorised Access
15.4Indecent and Deceitful Materials
15.5Spam
15.6Ways to Protect Ourselves
Computer and Information
Technology for (HKCEE)
Core module: Part E

15.1 Intellectual Property Rights


Intellectual Property Rights (IPRs)
the rights to which creators are entitled for their
inventions, writing and works of art
Intellectual property laws
copyright law
protect forms of literacy expression
patent law
protect inventions
contract law
cover trade secrets

© Longman Hong Kong Education Page2


Computer and Information
Technology for (HKCEE)
Core module: Part E

15.1 Intellectual Property Rights


Copyrights
exclusive rights of authors to duplicate, publish
and sell their materials

drama computer
art programs
music
© Longman Hong Kong Education Page3
Computer and Information
Technology for (HKCEE)
Core module: Part E

15.1 Intellectual Property Rights


Seek permission of owner of rights in
material before
copying
distributing
downloading

© Longman Hong Kong Education Page4


Computer and Information
Technology for (HKCEE)
Core module: Part E

15.1 Intellectual Property Rights


Pirated software
illegal copies of software
Hong Kong Customs &
Excise Department
pursue and prosecute
software thieves in HK

© Longman Hong Kong Education Page5


Computer and Information
Technology for (HKCEE)
Core module: Part E

15.1 Intellectual Property Rights


Hong Kong’s Copyright Ordinance
prohibit the unauthorised copying and use of
software
protect copyright of software, manual and
related books
create penalties for unauthorised use and
duplication of software

© Longman Hong Kong Education Page6


Computer and Information
Technology for (HKCEE)
Core module: Part E

15.1 Intellectual Property Rights


Software license
legal contract defining the ways of using
software
Types of software license
single-user license
limit the use of software to one machine at a time
multiple-user license / site license
permit the use of software by more users at specific
location

© Longman Hong Kong Education Page7


Computer and Information
Technology for (HKCEE)
Core module: Part E

15.1 Intellectual Property Rights


Shareware
copyrighted software distributed free for trial period

WinZip
F-Prot Antivirus
© Longman Hong Kong Education Page8
Computer and Information
Technology for (HKCEE)
Core module: Part E

15.2 Data Privacy


Personal data
collected, recorded and stored by various
organisation
e.g. names, addresses, telephone numbers,
e-mail address
Trojan Horse
programs that steal personal data from one’s
computer
classified as computer virus

© Longman Hong Kong Education Page9


Computer and Information
Technology for (HKCEE)
Core module: Part E

15.2 Data Privacy


Non-personal data
definition: non-personally identifiable data
purpose: evaluate web sites
examples
type of Web browser used
OS used
number of visits
average times spent
pages viewed

© Longman Hong Kong Education Page10


Computer and Information
Technology for (HKCEE)
Core module: Part E

15.2 Data Privacy


Cookie
small text file storing information from the visited
Web sites

Options of
cookies

© Longman Hong Kong Education Page11


Computer and Information
Technology for (HKCEE)
Core module: Part E

15.3 Unauthorised Access


Unauthorised access
use of computer data for unapproved or illegal
activities
hacking
cracking

© Longman Hong Kong Education Page12


Computer and Information
Technology for (HKCEE)
Core module: Part E

15.3 Unauthorised Access


Hacking
gain unauthorised access to data held on a
computer system
Hacker
perform an act of hacking
Cracking
use hacking to practise illegal activities
Cracker
perform an act of cracking

© Longman Hong Kong Education Page13


Computer and Information
Technology for (HKCEE)
Core module: Part E

15.3 Unauthorised Access


Common types of hacking
break into computer networks
bypass password
deface or damage Internet Web sites
launch a denial of service attack on network
steal valuable information
password
credit card data

© Longman Hong Kong Education Page14


Computer and Information
Technology for (HKCEE)
Core module: Part E

15.3 Unauthorised Access


Protection from unauthorised access
Use anti-virus software with regular updating
Use a firewall with regular testing
Check for spy-ware on system
Use passwords and encryption correctly

© Longman Hong Kong Education Page15


Computer and Information
Technology for (HKCEE)
Core module: Part E

15.3 Unauthorised Access


Firewall
check incoming and outgoing data of computer so
that there is no unauthorised access
permit or exclude particular types of data
according to firewall policy
Firewall policy
balance the security and convenience of using
network

© Longman Hong Kong Education Page16


Computer and Information
Technology for (HKCEE)
Core module: Part E

15.4 Indecent and Deceitful Materials


Methods to prevent children from accessing
indecent materials on internet
education
parental guidance
legislation
Control of Obscene and Indecent Articles Ordinance
regulates indecent materials on internet
Hong Kong Internet Service Providers Association
handles complaints about indecent materials
using filtering software

© Longman Hong Kong Education Page17


Computer and Information
Technology for (HKCEE)
Core module: Part E

15.4 Indecent and Deceitful Materials


Filtering software for home computer users

Cyber Patrol Cyber Snoop

© Longman Hong Kong Education Page18


Computer and Information
Technology for (HKCEE)
Core module: Part E

15.4 Indecent and Deceitful Materials


Deceitful materials
untrue remarks or statements made with the intent
of deceiving or fooling others
Evaluating the materials on a Web site
authority
affiliation
hyperlinks
update
objectivity

© Longman Hong Kong Education Page19


Computer and Information
Technology for (HKCEE)
Core module: Part E

15.5 Spam
Spam
unwanted email or newsgroup posting
mostly advertising commercial products or services
Drawbacks of spam
occupy space in e-mail box
use up network bandwidth
users take time to remove unwanted e-mail
detract from the utility of newsgroup
subvert the ability of system administrator

© Longman Hong Kong Education Page20


Computer and Information
Technology for (HKCEE)
Core module: Part E

15.5 Spam
Spam-filtering software

MailWasher
SpamWeasel
© Longman Hong Kong Education Page21
Computer and Information
Technology for (HKCEE)
Core module: Part E

15.5 Spam
Spam-filtering software

SpamAgent MailShield

© Longman Hong Kong Education Page22


Computer and Information
Technology for (HKCEE)
Core module: Part E

15.6 Ways of Protect Ourselves


Ways to safeguard our personal data

Request in writing to Clear history file after


remove from mailing you finish browsing in
list public areas

Do not reply to spam Install a personal


for any reason firewall

Limit the amount of


information provided to
Web sites
© Longman Hong Kong Education Page23
Computer and Information
Technology for (HKCEE)
Core module: Part E

15.6 Ways of Protect Ourselves


Ways to safeguard our personal data

Install a cookie Turn off file and


manager to filter printer sharing on
cookies Internet connection

Do not install Take extra care


unknown program with login name
from Web sites and password

© Longman Hong Kong Education Page24


Computer and Information Technology for (HKCEE) Core Module

END

You might also like