Legal, Ethical Nonsense Flashcards
What do existing intellectual property rights stop people stealing/copying?
Names of products
Inventions
Design/Look of Products
Things that are written, made or produced
Give examples of intellectual property rights
Copyright
Patents
Design and trade marks
What are the only things that intellectual property rights apply to?
Something that is unique
What is covered under automatic UK protection?
Copyright
Design Right
What needs to be applied for?
Trademarks
Registered Designs
Patents
What is a patent?
A licence conferring a right/title for a set period
What does a registered design protect?
External appearance of a design
What is a trademarks?
Symbol, word, words legally registered for representation of a company
What criteria has to met for intellectual property rights to be conferred on a property?
- IF they have created the item and its meets the requirements for a patent/design
- IF they have purchased the property rights from the previous product owner
- IF they have a brand that can be trademarked
How long does it take for a trademark application?
4 months
What are examples of things that can be protected under a trademark?
Product names
Logos
Jingles
How long does it take to apply for a patent?
5 years
What is covered under a registered design?
Appearance of the product
What is covered under patents?
Inventions and Products
Give examples of intellectual property right infringements
- Selling a product similar to right holder
- Offers registered design commercially
- Uses a trademark similar to yours
What are the ways to resolve a copyright infringement?
Take legal action
Use mediation
Reach an agreement with infringing party
What is one way an agreement will be met with an infringing party?
IP licence agreement
What can data collected from things like social media be used to do?
Profile our behaviours
Suggest other products
Steal Identity
Give three data principles
- Data must be processed fairly and accurately
- Processed for lawful purposes
- Adequate, relevant and not excessive
- Accurate and up to date
- Not kept for longer than necessary
- Processed in accordance to individual rights
- Kept Secure
- Not transferred outside Europe Economic Area without adequate protection
What is an intelligent system?
A system with artificial intelligence
What are the benefits of intelligent systems?
Safer performance of difficult tasks
Faster responses in crisis situations
More efficent resource management
An increase in ______ and ______ makes it possible to process increasing amounts of data in a short time
Processor Power
Data Storage
Connectivity
What is an Intelligent Agent?
Autonomous Entity which observes through sensors and acts upon an environment using actuators
What do data centres require?
Specialized cooling systems, large amounts of energy
What are data centres?
Large groups of networked computer servers typically used for remote storage and processing
Give examples of European regulations which apply to computing products
RoHS, REACH and WEEE
What do European regulations ensure?
Hazardous materials included in devices are disposed of properly
A freelance graphic artist has been contracted by a company to create new characters for a game. Describe how the company would protect its interests when writing contract for this work
Company should ensure it owns any intellectual property rights in relation to the work contracted to this freelance artist
Explain how a company should use tracking information of it’s customers/users to influence developments of products in the future
Cookies can be used to gather information about customer’s profile/frequencies of visits to the site
Indicate what age groups are using the site, can then focus on target areas to attract that age group
Explain two ways analytics could be used to inform decisions about an online marketing campaign for a new range
Evaluating visitor stats from company’s websites to help decide most effective product placement points
Social media analytics to assess success of previous competitions
Define Online Marketing
An umbrella term for the use of targeted and interactive marketing of products using digital technologies to generate sales
Users interacting with advertisements or signing-up for free trials of services or membership of web sites will provide marketers with what?
Contact information for direct marketing via e-mail/instant message or SMS
What is web profiling?
Use of persistent or permanent cookies to track a user’s overall activity online
Who usually uses cookie profiling?
Marketers who buy advertising rights on thousands of websites in order to create a single “profile” of a user
What is the only way for marketers to target potential customers and obtain a possible product purchase from them?
Cookie Tracking
What are Analytics?
Tool used by web services companies, individuals and businesses to understand the behaviour of users.
Give example of information collected by analytics
Number of visits
Time spent on the website
What is Cyber Security?
Body of technologies, processes and practices designed to protect computers and data from attack or unauthorized access.
What are the three main areas in Cyber Risks?
Cyber Crime
Cyber War
Cyber Terror
What is the intent of cyber crime?
Intent on extracting money, data or causing disruption
Who carries out cyber crime?
Individuals working alone or in organised groups
Give examples of forms of cyber crime
Acquisition of credit/debit card data
Impairing operations of website
Define Cyber War
A nation state conducting sabotage and espionage against another nation in order to cause disruption or extract data
Who carries out cyber terror?
An organisation working independently of a nation state
Define Cyber Terror
An organisation working independently of a nation state conducting terrorist activities through the medium of cyberspace
Give examples of organisation that have to consider measures against cyber war/terror
Governments
Those within critical national infrastructure
High profile institutions
Define a Virus
A small piece of software program that can replicate itself and spread from one computer to another by attaching itself to another file and it gains access to steal information/files
What is the aim of a worm?
Seek to damage networks and deliver payloads with allow remote control of computer
Define Spyware
Installed by clicking links/downloading infected software. Takes control of your computer and collects information without your knowledge
What is the technique of a worm?
Self replicating
Do not need another file
Find vulnerabilities in system
What is the aim of trojan?
To create a backdoor on your computer by which information can be stolen
What is the technique used for a trojan?
A software program appears to perform one function but actually does not
Describe Pharming
An attack to redirect a website’s traffic to a different, fake website, where the individuals’ information is then compromised.
What is the method for phishing?
An attempt to acquire users’ information by masquerading as a legitimate entity
What is a drive by attack?
Opportunistic attacks against specific weaknesses within a system
What is a MITM attack?
Middleman impersonates each endpoint and is thus able to manipulate both victims
What is social engineering?
Exploiting the weakness of the individual by making them click malicious links, or by physically gaining access to a computer through deception
Give examples of social engineering
Phishing and Pharming
Give examples of tools to prevent cybercrime
- Regularly update anti-virus software to prevent attacks
- Secure Passwords
- Biometrics for entry to devices
- Educating users to the dangers
What is the difference between Cyber Resilience and Cyber Security?
Cyber Resilience ensures that an organisation can continue to function effectively even if it has suffered from an attack
Cyber Security is trying to prevent the attacks
What is the ‘RIGHT TO BE FORGOTTEN’
Ruling which forces Internet search providers to remove search results which point to articles/information which relate to personal data about an individual which should no longer appear
Define Social Media
Range of online communications tools focused on communities of users and their interactions
Give examples of legal issues with social media
- Libel
- Malicious Communication
- Breach of Copyright
What is Libel?
A published false statement that is damaging to a person’s reputation
What is Cyberbullying?
Abuse of another person using threats, insults and hurtful remarks and messages over the internet.
What is the idea behind big data?
Many things we do in our lives leave a digital trace (or data), which we (and others) can use and analyse
What have advances in big data allowed us to do?
Decode Human DNA
Accurately predict human interactions
Define Big Data
Refers to our ability to collect and analyse the vast amounts of data we are now generating in the world
Give some examples of big data uses
- Supermarkets are combining their loyalty card data with social media information to detect and leverage changing buying patterns. For example, it is easy for retailers to predict that a woman is pregnant simply based on the changing buying patterns.
- Google’s self-driving car is analysing a gigantic amount of data from sensor and cameras in real time to stay on the road safely
Describe Design Right
Automatically gain Design Right protection on the design of her program.
protects design for 10 years after it was first sold or 15 years after it was created - whichever is
earliest