Legal, Ethical Nonsense Flashcards

1
Q

What do existing intellectual property rights stop people stealing/copying?

A

Names of products
Inventions
Design/Look of Products
Things that are written, made or produced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give examples of intellectual property rights

A

Copyright
Patents
Design and trade marks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the only things that intellectual property rights apply to?

A

Something that is unique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is covered under automatic UK protection?

A

Copyright

Design Right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What needs to be applied for?

A

Trademarks
Registered Designs
Patents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a patent?

A

A licence conferring a right/title for a set period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a registered design protect?

A

External appearance of a design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a trademarks?

A

Symbol, word, words legally registered for representation of a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What criteria has to met for intellectual property rights to be conferred on a property?

A
  • IF they have created the item and its meets the requirements for a patent/design
  • IF they have purchased the property rights from the previous product owner
  • IF they have a brand that can be trademarked
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How long does it take for a trademark application?

A

4 months

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are examples of things that can be protected under a trademark?

A

Product names
Logos
Jingles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How long does it take to apply for a patent?

A

5 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is covered under a registered design?

A

Appearance of the product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is covered under patents?

A

Inventions and Products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give examples of intellectual property right infringements

A
  • Selling a product similar to right holder
  • Offers registered design commercially
  • Uses a trademark similar to yours
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the ways to resolve a copyright infringement?

A

Take legal action
Use mediation
Reach an agreement with infringing party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is one way an agreement will be met with an infringing party?

A

IP licence agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What can data collected from things like social media be used to do?

A

Profile our behaviours
Suggest other products
Steal Identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Give three data principles

A
  1. Data must be processed fairly and accurately
  2. Processed for lawful purposes
  3. Adequate, relevant and not excessive
  4. Accurate and up to date
  5. Not kept for longer than necessary
  6. Processed in accordance to individual rights
  7. Kept Secure
  8. Not transferred outside Europe Economic Area without adequate protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an intelligent system?

A

A system with artificial intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the benefits of intelligent systems?

A

Safer performance of difficult tasks
Faster responses in crisis situations
More efficent resource management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An increase in ______ and ______ makes it possible to process increasing amounts of data in a short time

A

Processor Power
Data Storage
Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is an Intelligent Agent?

A

Autonomous Entity which observes through sensors and acts upon an environment using actuators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What do data centres require?

A

Specialized cooling systems, large amounts of energy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are data centres?

A

Large groups of networked computer servers typically used for remote storage and processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Give examples of European regulations which apply to computing products

A

RoHS, REACH and WEEE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What do European regulations ensure?

A

Hazardous materials included in devices are disposed of properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A freelance graphic artist has been contracted by a company to create new characters for a game. Describe how the company would protect its interests when writing contract for this work

A

Company should ensure it owns any intellectual property rights in relation to the work contracted to this freelance artist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Explain how a company should use tracking information of it’s customers/users to influence developments of products in the future

A

Cookies can be used to gather information about customer’s profile/frequencies of visits to the site
Indicate what age groups are using the site, can then focus on target areas to attract that age group

30
Q

Explain two ways analytics could be used to inform decisions about an online marketing campaign for a new range

A

Evaluating visitor stats from company’s websites to help decide most effective product placement points
Social media analytics to assess success of previous competitions

31
Q

Define Online Marketing

A

An umbrella term for the use of targeted and interactive marketing of products using digital technologies to generate sales

32
Q

Users interacting with advertisements or signing-up for free trials of services or membership of web sites will provide marketers with what?

A

Contact information for direct marketing via e-mail/instant message or SMS

33
Q

What is web profiling?

A

Use of persistent or permanent cookies to track a user’s overall activity online

34
Q

Who usually uses cookie profiling?

A

Marketers who buy advertising rights on thousands of websites in order to create a single “profile” of a user

35
Q

What is the only way for marketers to target potential customers and obtain a possible product purchase from them?

A

Cookie Tracking

36
Q

What are Analytics?

A

Tool used by web services companies, individuals and businesses to understand the behaviour of users.

37
Q

Give example of information collected by analytics

A

Number of visits

Time spent on the website

38
Q

What is Cyber Security?

A

Body of technologies, processes and practices designed to protect computers and data from attack or unauthorized access.

39
Q

What are the three main areas in Cyber Risks?

A

Cyber Crime
Cyber War
Cyber Terror

40
Q

What is the intent of cyber crime?

A

Intent on extracting money, data or causing disruption

41
Q

Who carries out cyber crime?

A

Individuals working alone or in organised groups

42
Q

Give examples of forms of cyber crime

A

Acquisition of credit/debit card data

Impairing operations of website

43
Q

Define Cyber War

A

A nation state conducting sabotage and espionage against another nation in order to cause disruption or extract data

44
Q

Who carries out cyber terror?

A

An organisation working independently of a nation state

45
Q

Define Cyber Terror

A

An organisation working independently of a nation state conducting terrorist activities through the medium of cyberspace

46
Q

Give examples of organisation that have to consider measures against cyber war/terror

A

Governments
Those within critical national infrastructure
High profile institutions

47
Q

Define a Virus

A

A small piece of software program that can replicate itself and spread from one computer to another by attaching itself to another file and it gains access to steal information/files

48
Q

What is the aim of a worm?

A

Seek to damage networks and deliver payloads with allow remote control of computer

49
Q

Define Spyware

A

Installed by clicking links/downloading infected software. Takes control of your computer and collects information without your knowledge

50
Q

What is the technique of a worm?

A

Self replicating
Do not need another file
Find vulnerabilities in system

51
Q

What is the aim of trojan?

A

To create a backdoor on your computer by which information can be stolen

52
Q

What is the technique used for a trojan?

A

A software program appears to perform one function but actually does not

53
Q

Describe Pharming

A

An attack to redirect a website’s traffic to a different, fake website, where the individuals’ information is then compromised.

54
Q

What is the method for phishing?

A

An attempt to acquire users’ information by masquerading as a legitimate entity

55
Q

What is a drive by attack?

A

Opportunistic attacks against specific weaknesses within a system

56
Q

What is a MITM attack?

A

Middleman impersonates each endpoint and is thus able to manipulate both victims

57
Q

What is social engineering?

A

Exploiting the weakness of the individual by making them click malicious links, or by physically gaining access to a computer through deception

58
Q

Give examples of social engineering

A

Phishing and Pharming

59
Q

Give examples of tools to prevent cybercrime

A
  • Regularly update anti-virus software to prevent attacks
  • Secure Passwords
  • Biometrics for entry to devices
  • Educating users to the dangers
60
Q

What is the difference between Cyber Resilience and Cyber Security?

A

Cyber Resilience ensures that an organisation can continue to function effectively even if it has suffered from an attack
Cyber Security is trying to prevent the attacks

61
Q

What is the ‘RIGHT TO BE FORGOTTEN’

A

Ruling which forces Internet search providers to remove search results which point to articles/information which relate to personal data about an individual which should no longer appear

62
Q

Define Social Media

A

Range of online communications tools focused on communities of users and their interactions

63
Q

Give examples of legal issues with social media

A
  • Libel
  • Malicious Communication
  • Breach of Copyright
64
Q

What is Libel?

A

A published false statement that is damaging to a person’s reputation

65
Q

What is Cyberbullying?

A

Abuse of another person using threats, insults and hurtful remarks and messages over the internet.

66
Q

What is the idea behind big data?

A

Many things we do in our lives leave a digital trace (or data), which we (and others) can use and analyse

67
Q

What have advances in big data allowed us to do?

A

Decode Human DNA

Accurately predict human interactions

68
Q

Define Big Data

A

Refers to our ability to collect and analyse the vast amounts of data we are now generating in the world

69
Q

Give some examples of big data uses

A
  • Supermarkets are combining their loyalty card data with social media information to detect and leverage changing buying patterns. For example, it is easy for retailers to predict that a woman is pregnant simply based on the changing buying patterns.
  • Google’s self-driving car is analysing a gigantic amount of data from sensor and cameras in real time to stay on the road safely
70
Q

Describe Design Right

A

Automatically gain Design Right protection on the design of her program.
protects design for 10 years after it was first sold or 15 years after it was created - whichever is
earliest