Ipr

12
Intellectual property (IP) rights are legally recognized exclusive rights to creations of the mind. Under intellectual property laws, owners are granted certain exclusive rights to a variety of intangible assets , such as musical, literary, and artistic works; discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property rights include copyright , trademarks , patents , industrial design rights , trade dress , and in some jurisdictions trade secrets . Intellectual Property Rights

Transcript of Ipr

Page 1: Ipr

Intellectual property (IP) rights are legally recognized exclusive rights to creations of the mind. Under intellectual property laws, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property rights include copyright, trademarks, patents, industrial design rights, trade dress, and in some jurisdictions trade secrets.

Intellectual Property Rights

Page 2: Ipr

•A patent is a set of exclusive rights granted to an inventor or assignee for a limited period of time in exchange for detailed public disclosure of an invention. •Patents are a form of intellectual property.•The procedure for granting patents, requirements placed on the patentee, and the extent of the exclusive rights vary widely between countries according to national laws and international agreements. •The exclusive right granted to a patentee in most countries is the right to prevent others from commercially making, using, selling, importing, or distributing a patented invention without permission

Page 3: Ipr

•Copyright is a legal right that grants the creator of an original work exclusive rights to its use and distribution, usually for a limited time, with the intention of enabling the creator (e.g. the photographer of a photograph or the author of a book) to receive compensation for their intellectual effort.•Copyright is a form of intellectual property applicable to any expressible form of an idea or information. It is often shared, then percentage holders are commonly called rightsholders.

Page 4: Ipr

•A trademark, is a recognizable sign, design or expression which identifies products or services of a particular source from those of othersThe trademark owner can be an individual, business organization, or any legal entity. A trademark may be located on a package, a label, a voucher or on the product itself. For the sake of corporate identity trademarks are also being displayed on company buildings•Trademarks are used to claim exclusive properties of products or services.•The usage of trademarks by its owner can cause legal issues if this usage makes them guilty of false advertising or if the trademark is offensive•The unauthorized usage of trademarks by producing and trading counterfeit consumer goods is known as brand piracy.•The owner of a trademark may pursue legal action against trademark infringement.

Page 5: Ipr

Computer crime, or Cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.

Netcrime is criminal exploitation of the Internet.

Cybercrimes are defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)

Issues surrounding these types of crimes have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

Cyber Laws

Page 6: Ipr

Section Offence Punishment

65

Tampering with computer source documents - Intentional concealment, destruction or alteration of source code when the computer source code is required to be kept or maintained by law for the time being in force

Imprisonment up to three years, or/and with fine up to 2 lakh rupees

66 HackingImprisonment up to three years, or/and with fine up to 5 lakh rupees

66-A

Sending offensive message through electronic means - Sending any information through an electronic message that is grossly offensive or has menacing character and might cause insult, injury, criminal intimidation, enmity, hatred, or ill will, etc. or sending such mail intended to deceive or to mislead the addressee or recipient about the origin of such messages

Imprisonment up to three years, and with fine.

Offences(IT Act 2000)

Page 7: Ipr

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority

Network Security Measures

Page 8: Ipr

Network security starts with authenticating, commonly with a username and a password. Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software help detect and inhibit the action of such malware. Communication between two hosts using a network may be encrypted to maintain privacy.A home or small office may only require basic security while large businesses may require high-maintenance and advanced software and hardware to prevent malicious attacks from hacking..

Page 9: Ipr

Classical hypertext navigation, with HTML alone, provides "static" content, meaning that the user requests a web page and simply views the page and the information on that page.However, a web page can also provide a "live", "dynamic", or "interactive" user experience. Content (text, images, form fields, etc.) on a web page can change, in response to different contexts or conditions.There are two ways to create this kind of effect:Using client-side scripting to change interface behaviors within a specific web page, in response to mouse or keyboard actions or at specified timing events. In this case the dynamic behavior occurs within the presentation.Using server-side scripting to change the supplied page to the browser. Server responses may be determined by such conditions as data in a posted HTML form, parameters in the URL, the type of browser being used, the passage of time, or a database or server state.Client-side scripting languages like JavaScript or ActionScript, used for Dynamic HTML (DHTML) and Flash technologies respectively, are frequently used to orchestrate media types (sound, animations, changing text, etc.) of the presentation. Web pages that use to the second method are often created with the help of server-side languages such as PHP, Perl, ASP, ASP.NET, JSP, ColdFusion and other languages.

Static vs Dynamic Web pages

Page 10: Ipr

Wi-Fi, is a local area wireless technology that allows an electronic device to exchange data or connect to the internet using radio waves. "Wi-Fi" is used in general English as a synonym for "WLAN". Many devices can use Wi-Fi, e.g., personal computers, video-game consoles, smartphones, digital cameras, tablet computers and digital audio players. These can connect to a network resource such as the Internet via a wireless network access point. Such an access point (or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors. Hotspot coverage can comprise an area as small as a single room with walls that block radio waves, or as large as many square kilometres achieved by using multiple overlapping access points

Wireless Technologies

Page 11: Ipr

WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide 30 to 40 megabit-per-second data rates, with the 2011 update providing up to 1 Gbit/s for fixed stations. WiMAX is described as "a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL". It is similar to Wi-Fi, but it can enable usage at much greater distances.

Page 12: Ipr

Wireless local loop (WLL), is a term for the use of a wireless communications link as the connection for delivering plain old telephone service (POTS) or Internet access (marketed under the term "broadband") to telecommunications customers. Various types of WLL systems and technologies exist.Other terms for this type of access include Broadband Wireless Access (BWA), Radio In The Loop (RITL), Fixed-Radio Access (FRA), Fixed Wireless Access (FWA) and Metro Wireless (MW).