Ip Theory 2
Ip Theory 2
Ip Theory 2
Cyber Safety
Cyber safety is the act all about the responsible and safe use of Internet services by dealing with the risk which
is associated using the Internet. This behaviour helps us to protect our personal information and minimize the
danger online.
When we use Internet we need to be careful about sharing our personal information. Share your personal
information only with the trustworthy sources. If someone succeeds in stealing your personal information it
could create great danger.
Digital Footprint
Digital footprint is data that is left behind when users have been online.
Digital Tattoos: Digital footprints are also termed as Digital Tattoos.
Whatever a person does online , creates a trail or shadow. These trails or traces are termed as digital
footprint.
Digital footprint includes e-mail you sent, information you shared, websites you visited and the activities you
took part online.
Digital footprint is used for several reason for example marketers use your digital footprint to find out what
kind of product you have interested in and a interviewer what kind of activities the candidates perform online,
it gives better idea about the candidate’s personality.
https://onlinenotepad.org/notepad 1/12
3/14/24, 4:46 PM Online Notepad
1.Be ethical
2.Be respectful
3.Be responsible
Good netiquette:
(i) Don’t send same message again and again, it creates negative effect and irritate other people, no matter how
good this message is.
(ii) Always take permission of other person before sharing their personal information, photos etc.
(iii) Never make bad comments about anyone on social media.
(iv) Never post abusive content on social media.
Do’s
Keep messages and posts brief.
Reread your posts or emails to make sure they say what you intend.
Remember that you leave a digital footprint.
Use discretion.
Include a subject line in an email.
Protect personal information.
Obey copyright laws.
Stay focused and stick to the topic.
Don’ts
Post inflammatory/offensive comments.
Write in ALL CAPS. It is considered as SHOUTING on the net.
Respond to internet trollers/personal attacks.
Post private or embarrassing images/comments.
Use sarcasm.
Violet copyright laws.
Exclude people or talk behind their backs.
Spam others by sending large number of unsolicited e-mails.
https://onlinenotepad.org/notepad 2/12
3/14/24, 4:46 PM Online Notepad
Data protection
It is the process of safeguarding important information from corruption, compromise or loss.
Ability to decide whether or not you want to share some information, who has access to it, for how long, for
what reason and be able to modify some of this information and more.
A large part of a data protection strategy is ensuring that data can be restored quickly after any corruption or
loss.
Protecting data from compromise and ensuring data privacy are other key components of data protection.
There are two key areas of data management used in data protection-
(i) Data life cycle management is the process of automating the movement of critical data to online and offline
storage.
(ii) Information life cycle management is a comprehensive strategy for valuing, cataloguing and protecting
information assets from application and user errors, malware and virus attacks, machine failure or facility
outage and disruptions.
https://onlinenotepad.org/notepad 3/12
3/14/24, 4:46 PM Online Notepad
Intellectual Property
When someone owns a house or a motorcycle, we say that the person owns that property.
Similarly, if someone comes out with a new idea, this original idea is that person’s intellectual property.
Intellectual property refers to the inventions, literary and artistic expressions, designs and symbols, names
and logos.
The ownership of such concepts lies with the creator or the holder of the intellectual property.
This enables the creator or copyright owner to earn recognition or financial benefit by using their creations or
inventions.
Intellectual property is legally protected through copyright patents, trademarks etc.
(i) Copyright:
It grants legal rights to creators for their original works like writing, photograph, audio recordings, video,
sculptures, architectural works, computer software, and other creative works like literary and artistic work.
Copyrights are automatically granted to creators and authors.
Copyright law gives the copyright holder a set of rights, that they alone can avail legally.
The rights include right to copy a work,
right to create derivative works based upon it,
right to distribute copies of the work to the public and right to publicly display or perform the work.
It prevents others from copying, using or selling the work. For example, any writer holds the copyright to his
book.
It would be an infringement of the writer’s copyright if someone used parts of his book without permission.
To use other’s copyrighted material, one needs to obtain a license from them.
(ii) Patent:
It is usually granted for inventions.
The inventor needs to file for patenting the invention.
When a patent is granted, the owner gets an exclusive right to prevent others from using selling or distributing
the protected invention.
Patent gives full control to the patentee to decide whether or how the invention can be used by others.
A patent protects an invention for 20 years, after which it can be freely used.
Recognition and financial benefits right the environment and provide motivation for more creativity and
innovation.
(iii) Trademark:
It includes any visual symbol, word, name, design, slogan, label etc., that distinguishes the brand or commercial
enterprise, from other brands or commercial enterprise.
For example, no company other than ABC can use the ABC brand to sell shoes or clothes.
It also prevents others from using a confusingly similar mark, including words or phrases.
https://onlinenotepad.org/notepad 4/12
3/14/24, 4:46 PM Online Notepad
Violation of IPR-
Violation of IPR may happen in one of the following ways:
(i) Plagiarism:
Presenting someone else’s idea or works as one’s own idea or work is called plagiarism.
If we copy some contents from Internet, but do not mention the source or the original creator, then it is
considered as an act of plagiarism.
If someone derives an idea or a product from an already existing idea or product, but instead presents it as a
new idea then also it is plagiarism.
It is a serious ethical offense and sometimes considered as an act of fraud.
Even if we take contents that are open for public use, we should cite the author or sources to avoid plagiarism.
Types of Plagiarism:
1. Direct Plagiarism- word to word transcription of a section of someone elses work without attribution and
without quotation marks.
2. Self Plagiarism- occurs when a student submits his or her own previous work or mixes parts of previous work.
3. Mosaic Plagiarism- occurs when a student borrows phrases from a source without using quotation marks.
4. Accidental Plagiarism- occurs when a person neglects to cite their sources or misquotes their sources.
https://onlinenotepad.org/notepad 5/12
3/14/24, 4:46 PM Online Notepad
Software License
It is a document that provides legally binding guidelines for the use and distribution of software.
Software licenses typically provide end users with the right to one or more copies of the software without
violating copyrights.
Proprietary license
License where the copyright stays with the produces and the user is granted the right to use the software.
This distinguishes the GPL license from freeware software licenses likes Skype, Adobe acrobat reader that
allow copying for personal use but prohibit commercial distribution or proprietary license where copying is
prohibited by copyright law.
Creative Commons
Creative commons (CC) license is a public copyright license that enables free distribution of a copyrighted
work.
Used for all kinds of creative works like website, music, film, literature.
Non profit organisation.
Aims to build a publicly accessible Global platform where a range of Creative and academic works are shared
free.
Anyone across the globe can access them, share them and even use them for creating their own work out of it
without infringing the copyright or intellectual property rights of the owners
The creative commons organisation provides creative commons license free of charge.
Creative common license is a type of copyright license that enables the free distribution of anybody is
copyrighted work
Apache is the most popular web server software that enables a computer to host one or more websites.
It is open source and free to use hence enabling web hosting companies to offer web hosting solutions at
minimal costs.
Platforms supported by Apache: Linux, Windows and Macintosh operating systems.
Apache web server software is also known as Apache HTTP server.
https://onlinenotepad.org/notepad 6/12
3/14/24, 4:46 PM Online Notepad
Software Piracy-:
Software piracy is the unauthorised use for distribution of software.
Those who purchase a licence for a copy of the software do not have the rights to make additional copies
without the permission of the copyright owner.
It amounts to copyright in French mint regardless of whether it is done for sale for free distribution or for
copiers own use.
One should avoid software piracy.
Using pirated software not only degrades the performance of a computer system but also affect the software
industry which in turn affects the economy of the country
Keywords-:
Open Source:
The term open source refers to something people can modify and share because its design is publicly accessible.
OSS:
An OSS (open source software) refers to freedom to use, share and/or modify the source code and allow
copyrights to other users.
Shareware:
Shareware are copyrighted software that can be shared for a limited period for free on a trial basis with the
understanding that if the user decides to use it, he will pay for it.
Copyleft Licenses:
It allows modification and distribution of software with source code.
Proprietary software (sometimes referred to as closed source software):
is software that legally remains the property of the organisation, group, or individual who created it.
https://onlinenotepad.org/notepad 7/12
3/14/24, 4:46 PM Online Notepad
Cyber Crime-
Criminal activities or offences carried out in a digital environment can be considered as a cyber crime. In such
crimes, either the computer itself is the target or the computer is used as a tool to commit a crime.
Cyber crimes are carried out against either an individual or a group or an organisation or even against a
country, with the intent to directly or indirectly cause physical harm, financial loss or mental harassment.
A cyber criminal may spread viruses and other malwares in order to steal private and confidential data for
blackmailing and extortion.
A Computer virus is a type of malicious code that can copy itself and can have detrimental effect on the
computers, by destroying data or corrupting the system.
A malware is a software designed to specifically gain unauthorised access to computer systems.
1. Hacking
Hacking is the act of unauthorised access to a computer, computer network or any digital system.
Hackers usually have technical expertise of the hardware and software.
They look for bugs to exploit and break into the system.
A non-ethical hacker is the one who tries to gain unauthorised access to computers or networks in order to
steal sensitive data with the intent to damage or bring down systems.
They are called black hat hackers or crackers.
Their primary focus is on security cracking and data stealing.
They use their skills for illegal or malicious purposes.
Such hackers try to break through system securities for identity theft, monetary gain, to bring a competitor or
rival site down, to leak sensitive information etc.
There can be many ways in which the criminal takes advantage of an individual’s stolen identity.
Examples:
Financial identity theft: When the stolen identity is used for financial gain.
Criminal identity theft: Criminals use a victim’s stolen identity to avoid detection of their true identity.
Medical identity theft: Criminals can seek medical drugs or treatment using a stolen identity.
https://onlinenotepad.org/notepad 8/12
3/14/24, 4:46 PM Online Notepad
3. Ransomware
This is another kind of cyber crime where the attacker gains access to the computer and blocks the user from
accessing, usually by encrypting the data.
The attacker blackmails the victim to pay for getting access to the data or sometimes threaten to publish
personal and sensitive information or photographs unless a ransom is paid.
Ransomware can get downloaded when the user visit any malicious or unsecure websites or download
software from doubtful repositories.
Some ransomware are sent as an e-mail attachments in spam mails.
It can also reach our system when we click on a malicious advertisement on the Internet.
Cyber Bullying
Cyberbullying or bullying that takes place over digital devices like cell phones, computers and tablets.
Cyberbullying can occur through SMS, text and apps or online in social media, forums or gaming where people
can view, participate or share content.
Cyberbullying includes sending, posting or sharing negative, harmful, false or mean content about someone
else.
It can include sharing personal or private information about someone else causing embarrassment or
humiliation.
https://onlinenotepad.org/notepad 9/12
3/14/24, 4:46 PM Online Notepad
Cyber Law
These are the laws that apply to the Internet and Internet related technologies.
Cyber law is one of the newest areas of the legal system.
Cyber law provides legal protections to people using the Internet.
This includes both businesses and everyday citizens.
Cyber law has also been referred to as the “law of the Internet”.
https://onlinenotepad.org/notepad 10/12
3/14/24, 4:46 PM Online Notepad
E-Waste Management
E-waste is actually the old electronic goods that people simply give away to garbage trucks that are then
dumped into landfill or similar sites.
Electronics have a number of harmful elements(Lead,Beryllium,Cadmium,Plastic,Mercury) that react with air
and water to create problems of e-waste such as water, air and soil pollution as well as problems that affect
human beings in the form of diseases.
Thus, everything that falls into electronics category, that you intend to throw away, is e-waste (electronic
waste). This includes computers, laptops, tablets, smart-phones and so on.
Treating e-Waste-
The two methods of treatment of e-waste are Recycling and refurbishing.
https://onlinenotepad.org/notepad 11/12
3/14/24, 4:46 PM Online Notepad
Ergonomics is a branch of science are deals with designing or arranging work places including the furniture
equipments & systems so that it becomes safe and comfortable for the user. Ergonomics helps us in reducing
the strain on our bodies including the fatigue and injuries due to prolonged use.
https://onlinenotepad.org/notepad 12/12