Data Protection and Intellectual Property Rights
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the act of presenting someone else's work as your own called?

  • Copyright infringement
  • Theft
  • Fraud
  • Plagiarism (correct)

Using an image from the internet without the owner's permission is considered copyright infringement.

True (A)

What should you do to avoid plagiarism when using public domain content?

Cite the author or source.

Plagiarism can also occur when someone presents an __________ from an existing idea as a new idea.

<p>idea or product</p> Signup and view all the answers

Which of the following is NOT a way to violate intellectual property rights?

<p>Proper citation (D)</p> Signup and view all the answers

Just because a work is available on the internet, it is free to use without restrictions.

<p>False (B)</p> Signup and view all the answers

What can happen if someone commits plagiarism?

<p>It can be considered a serious ethical offense and sometimes fraud.</p> Signup and view all the answers

Match the following terms with their definitions:

<p>Plagiarism = Using someone else's work as your own Copyright infringement = Using copyrighted material without permission Citing = Giving credit to the original creator Public domain = Content that is free to use without restrictions</p> Signup and view all the answers

Which of the following is considered sensitive data?

<p>Health information (A)</p> Signup and view all the answers

Data protection laws provide guidelines on processing sensitive information.

<p>True (A)</p> Signup and view all the answers

What is one method to ensure the privacy of sensitive data?

<p>Encryption</p> Signup and view all the answers

An example of sensitive data includes __________ information.

<p>financial</p> Signup and view all the answers

What can cause substantial harm if compromised?

<p>Sensitive data (A)</p> Signup and view all the answers

Match the method of protecting sensitive data with its description:

<p>Encryption = Converts data into a coded format to prevent unauthorized access Authentication = Verifies the identity of a user accessing data Secure methods = Various techniques to safeguard data from breaches</p> Signup and view all the answers

Every country has the same data protection policies.

<p>False (B)</p> Signup and view all the answers

Why should sources be mentioned in projects or write-ups?

<p>To give credit and avoid plagiarism</p> Signup and view all the answers

What does trademark infringement involve?

<p>Unauthorized use of someone else's trademark (A)</p> Signup and view all the answers

What does FOSS stand for?

<p>Free Open Source Software (D)</p> Signup and view all the answers

Copyright allows for the unrestricted use of a work by others.

<p>False (B)</p> Signup and view all the answers

Name one example of a public license.

<p>GNU General Public License (GPL)</p> Signup and view all the answers

Software piracy is a legal act of using software without a license.

<p>False (B)</p> Signup and view all the answers

Name one popular FOSS tool mentioned.

<p>Libre Office</p> Signup and view all the answers

What is the recommended viewing distance from the computer screen?

<p>19-24 inches (A)</p> Signup and view all the answers

____ licenses provide rules for others to use existing copyrighted work.

<p>Public</p> Signup and view all the answers

It is safe to eat food while using a computer.

<p>False (B)</p> Signup and view all the answers

What is a key benefit of using open source licenses?

<p>They encourage collaboration and contributions. (D)</p> Signup and view all the answers

A __________ is a type of criminal activity carried out in a digital environment.

<p>cyber crime</p> Signup and view all the answers

The Creative Commons (CC) license is exclusive to software.

<p>False (B)</p> Signup and view all the answers

Match the following terms with their definitions:

<p>Software Piracy = Unauthorized use or distribution of software FOSS = Software that is free to use, modify, and distribute Cyber Crime = Criminal activities carried out in a digital environment Malware = Software designed to harm or exploit devices and networks</p> Signup and view all the answers

What should be the knee angle when sitting at a computer to ensure proper ergonomics?

<p>90 degrees</p> Signup and view all the answers

The seat height should be adjustable between _____ inches to accommodate different users.

<p>23-28</p> Signup and view all the answers

What can be a consequence of using pirated software?

<p>Negative impact on the software industry (B)</p> Signup and view all the answers

What may a trademark owner do if their registered trademark is infringed?

<p>Commence legal proceedings.</p> Signup and view all the answers

Cyber crimes can target individuals and organizations.

<p>True (A)</p> Signup and view all the answers

Match the following terms with their definitions:

<p>Copyright = Protection against unauthorized use of one's creative work Trademark = Protection of brand names and logos Public License = Allows others to use and modify copyrighted work Open Source = Software with source code that anyone can inspect or modify</p> Signup and view all the answers

Which of the following is a negative impact of improper posture while using devices?

<p>Fatigue and injuries (D)</p> Signup and view all the answers

Match the ergonomic adjustments with their purposes:

<p>Viewing Distance = To prevent eye strain Seat Height = To ensure feet are flat on the floor Knee Angle = To maintain circulation Wrist Position = To avoid strain on wrists</p> Signup and view all the answers

What is one potential intent behind cyber criminal activities?

<p>Financial loss</p> Signup and view all the answers

Ergonomics is focused on creating conditions that are uncomfortable for users.

<p>False (B)</p> Signup and view all the answers

What can cause issues to the computer device when eating or drinking near it?

<p>Liquid spills (C)</p> Signup and view all the answers

What is a common symptom complained about by users of digital devices?

<p>Eye strain</p> Signup and view all the answers

Maintaining the correct posture while sitting can enhance overall comfort during computer use.

<p>True (A)</p> Signup and view all the answers

What is the suggested seat back angle for optimal ergonomic posture?

<p>90 degrees</p> Signup and view all the answers

Regularly cleaning the computer screen helps to reduce __________.

<p>glare</p> Signup and view all the answers

Which of the following practices can help ensure good health while using devices?

<p>Using a liquid solution formulated for cleaning electronic screens (C)</p> Signup and view all the answers

Match the following practices to their benefits:

<p>Regular screen cleaning = Reduces glare Proper posture = Prevents fatigue and injuries Ventilation in the room = Improves air circulation Frequent breaks = Reduces eye strain</p> Signup and view all the answers

Spending too much time on the Internet can have a negative impact on our mental well-being.

<p>True (A)</p> Signup and view all the answers

What branch of science addresses the designing of safe workplaces for users?

<p>Ergonomics</p> Signup and view all the answers

Flashcards

Plagiarism

Presenting someone else's work or ideas as your own.

Plagiarism on Internet

Copying content online without referencing the original source.

Copyright Infringement

Using someone else's work without permission or paying for it.

Copyright

Legal right granted to the creator of original work.

Signup and view all the flashcards

Internet Content

Online materials like text, images, and videos.

Signup and view all the flashcards

Ethical Offense

Violation of moral principles in intellectual work.

Signup and view all the flashcards

Free for Use Content

Content permitted for use without infringement.

Signup and view all the flashcards

Public Use

Permission to use something freely and without rights issues.

Signup and view all the flashcards

Sensitive Data

Information that, if compromised, could cause harm, embarrassment, or unfairness to an individual.

Signup and view all the flashcards

Data Protection

Protecting the privacy of digitally stored data.

Signup and view all the flashcards

Data Privacy Policies

Legal guidelines for processing, storing, and transmitting sensitive information.

Signup and view all the flashcards

Intellectual Property Rights (IPR)

Rights that grant ownership over something created.

Signup and view all the flashcards

Strong Password

Complex passwords that are difficult to guess or crack.

Signup and view all the flashcards

Source Citation

Giving credit to where information comes from.

Signup and view all the flashcards

Encryption

A method of securing data by encoding it.

Signup and view all the flashcards

Authentication

Verifying the identity of a user.

Signup and view all the flashcards

Plagiarism

Using someone else's work or ideas without giving them credit.

Signup and view all the flashcards

Copyright Infringement

Using a copyrighted work without permission or licensing.

Signup and view all the flashcards

Trademark Infringement

Unauthorized use of another's trademark on goods or services.

Signup and view all the flashcards

Public Access Software Licenses

Allowing others to use, build upon, and modify copyrighted works.

Signup and view all the flashcards

Open Source Licenses

Licenses permitting the use and contribution to a project without individual permissions.

Signup and view all the flashcards

GNU General Public License (GPL)

A popular category of open-source software license.

Signup and view all the flashcards

Creative Commons (CC)

A type of license that allows free distribution of creative works like websites, music, films, and literature.

Signup and view all the flashcards

Copyright

Legal right granted to the creator of original works.

Signup and view all the flashcards

FOSS Software

Free and Open Source Software; software whose source code is freely available and can be used, modified, or distributed by anyone.

Signup and view all the flashcards

Software Piracy

Unauthorized use or distribution of software.

Signup and view all the flashcards

Derivative Works

Works created based upon one or more existing works (e.g., a book written based on a movie), but with original content/changes.

Signup and view all the flashcards

Copyright Infringement

Using someone else's copyrighted work without permission or paying for it, whether for sale, free distribution or personal use.

Signup and view all the flashcards

Cyber Crime

Criminal activities conducted in the digital environment.

Signup and view all the flashcards

Cyber Criminal

Someone who engages in cybercrime.

Signup and view all the flashcards

Malware

Software intended to damage or disable computers and computer systems.

Signup and view all the flashcards

Software License

Legal agreement that grants permission to use specific software under certain conditions.

Signup and view all the flashcards

Device Safety

Practices to maintain the good health of a computer system.

Signup and view all the flashcards

Ergonomics

Science of designing workplaces for comfort and safety.

Signup and view all the flashcards

Eye Strain

Symptom from prolonged screen use.

Signup and view all the flashcards

Improper Posture

Bad physical and mental position when using devices.

Signup and view all the flashcards

Digital Device Addiction

Excessive use of digital devices leading to negative impacts.

Signup and view all the flashcards

Health Impacts of Devices

Negative effects on body and mind from using devices excessively

Signup and view all the flashcards

Screen Cleaning Solution

Special liquid solution for cleaning electronic screens

Signup and view all the flashcards

Screen Glare

Bright light emitted from screens affecting eye sight

Signup and view all the flashcards

Viewing Distance

The recommended distance between your eyes and the computer screen (19"-24")

Signup and view all the flashcards

Food & Drink

Avoid eating or drinking near the computer keyboard.

Signup and view all the flashcards

Wrist Straight

Maintain a straight wrist position while typing.

Signup and view all the flashcards

Lumbar Support

Use lumbar support for proper lower back posture.

Signup and view all the flashcards

Seat Back Angle

Keep the seat back at a 90-degree angle.

Signup and view all the flashcards

Knee Angle

Maintain a 90-degree angle between your thighs and lower legs.

Signup and view all the flashcards

Adjustable Seat Height

Adjust your seat height so your feet are flat on the floor or a footrest.

Signup and view all the flashcards

Ergonomics

Designing and arranging workspaces to help people work safely and comfortably.

Signup and view all the flashcards

Study Notes

Data Protection

  • Data protection focuses on digital privacy
  • Sensitive data includes biometric, health, financial info, personal docs, images, audios, or videos
  • Data protection policies (laws) vary by country
  • These policies provide guidelines on processing, storing, and transmitting sensitive data
  • Aim is to protect sensitive data from modification or disclosure

Intellectual Property Rights (IPR)

  • IPR refers to ownership of ideas, inventions, literary works, artistic expressions, designs, names, and logos
  • Ownership lies with the creator/holder
  • IPR enables recognition and financial benefit
  • IPR is legally protected through copyrights, patents, and trademarks
  • Copyright grants legal rights to creators of original works (writing, photographs, audio recordings, videos, sculptures, architectural works, computer software, & other creative works)
  • Copyright prohibits copying, using, or selling others' work without permission or payment

(B) Patent

  • Patents are granted for inventions
  • Patents provide exclusive rights to the inventor to prevent others from using, selling, or distributing the invention
  • Grants control over use of invention, encourages sharing of knowledge or ideas for the public good
  • Protection lasts 20 years

(C) Trademark

  • Trademarks are visual symbols, words, or designs used to distinguish businesses or commercial enterprises from others
  • Protects brand identity and prevents confusion with similar marks

11.4.2 Violation of IPR

  • Violations of IPR can occur in various ways

(A) Plagiarism

  • Plagiarism occurs when someone presents another person's work or ideas as their own
  • Includes copying content from the internet without attribution
  • Copyright infringement happens when someone uses another person's work without permission or payment
  • Illegal use of copyrighted images from the internet, even with attribution, can be considered infringement if the copyright owner doesn't allow free use

(C) Trademark Infringement

  • Trademark infringement means unauthorized use of another person's registered trademark
  • Using similar or confusing logos, names or designs to a brand in an unauthorized manner

11.4.3 Public Access and Open Source Software

  • Copyright can sometimes restrict usage of copyrighted works by others
  • Licenses provide guidelines for use, allowing collaboration and innovation while preserving original author rights
  • Open source licenses allow others to modify or use existing works without explicit permission

11.5 Cyber Crimes

  • Cyber crimes involve criminal activities in a digital environment
  • The computer itself can be the target, or a tool for crime
  • Cyber crimes cover acts like hacking, phishing, spamming, denial-of-service attacks, and identity theft

11.5.1 Hacking

  • Hacking is unauthorized access to computer systems/networks.
  • Ethical hacking is used to test system vulnerabilities; unethical hacking focuses on illegal access and harm.

11.5.2 Phishing and Fraud Emails

  • Phishing involves creating fake websites/emails to deceive users to disclose personal info. Often targets bank accounts, or credit cards
  • Criminals use spoofed email addresses that seem legitimate to trick individuals into entering personal information.

11.5.3 Ransomware

  • Ransomware blocks access to computer data until a ransom is paid.

11.5.4 Combatting Cyber Crime

  • Measures to reduce cyber crime risk include regular backups, antivirus software, safe website practices, and strong passwords

11.6 Indian Information Technology Act (IT Act)

  • The Indian IT Act provides guidelines on data processing, storage and transmission
  • Establishes legal frameworks for cyber crimes & punishments to protect users' rights and information

11.7 Impact on Health

  • Excessive use of digital devices may negatively impact physical and mental health
  • Ergonomics principles can help avoid discomfort related to continued usage or improper postures

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Societal Impact PDF

Description

This quiz covers essential concepts related to data protection and intellectual property rights (IPR). It explores the significance of digital privacy, sensitive data, and the legal frameworks that protect creators' rights. Gain a deeper understanding of copyright laws and data protection policies that vary by country.

More Like This

Use Quizgecko on...
Browser
Browser