Chapter 6 Flashcards
protect individuals online from predation.
Computer Ethics
refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names, and images used in commerce.
Intellectual Property
What are the 4 main types of Intellectual Property:
*Patents
*Trademarks
*Copyrights
*Trade Secrets
Used to protect inventive ideas or processes. It is what most often come to mind when thinking of IP protection.
Patent
are used to protect newly engineered plant species or strains
Patents
Patents result from the following stages:
*conceptualization
*Invention Disclosure
*Patent Application
*Maintenance
*cost
is the overarching name for activities that include management of paperwork and meeting filing deadlines specified by the government patent office.
Docketing
it protects words, phrases, symbols, sounds, smells, and color schemes. Often considered assets that describe or otherwise identify the source of underlying products or services that a company provides.
Trademark
do not protect ideas, but rather the manner in which ideas are expressed. “original works of authorship”
Copyright
allow the owner of the protected materials to control reproduction, performance, new versioning or adaptation of works.
Copyright
are proprietary procedures, systems, formulas, strategies, or other information that is confidential and exclusive to the company using them.
Trade Secret
It means respecting other users’ views and displaying common courtesy when posting your views to online discussion groups.
Netiquette
refers to the instruction, communication with, storing data, in retrieving data from, or otherwise making use of any resources of a computer system.
Access
refers to the modification or change, in form or substance, of an existing computer data or program.
Alteration
refers to the transmission of information through ICT media, including voice, video, and other forms of data.
Communication
refers to an electronic, magnetic, optical, electrochemical, or other data processing or communication device.
Computer
refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system.
Computer Data
refers to a set of instructions executed by the computer to achieve intended results.
Computer Program
refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data.
Computer System
refers to a computer or a computer network, the electronic medium in which online communication takes place.
Cyber
refers to the collection of tools, policies, risk management approaches, actions, training used to protect the cyber environment
Cybersecurity
refers to a presentation of information, knowledge, facts, concepts, or instructions which are processed and are intended for use in a computer system.
Database
refers to listening to, recording, monitoring or surveillance of the content of communications.
Interception
refers to any information contained in the form of computer data or any other form that is held by a service provider.
Subscriber’s Information
the access to the whole or any part of a computer system without right.
illegal Access
the interception made by technical means without right of any non-public transmission.
Illegal Interception
the intentional or reckless alteration, damaging, deletion, or deterioration of computer data.
Data Interference
the intentional alteration or reckless hindering or interference with the functioning of a computer or computer network.
System Interference
the acquisition of a domain name over the internet in bad faith to profit.
Cybersquatting
the willful engagement, maintenance, control or operation, directly or indirectly, of any lascivious exhibition of sexual organ or sexual activity.
Cybersex