SlideShare a Scribd company logo
1 of 16
D a t a P r o t e c t i o n
F I N D I N G S
Arjun Mahes h
Topics
Data Protection 2
 Data Protection
 Intellectual
property Rights
 Violation of IPR
Introduction
Data Protection addresses the practices, safeguard and
blinding rules put in place to protect our personal
information and ensure that it remains safe while working
online.
Data Protection 3
Data Protection
 It secures Our sensitive data.
 Data that can cause substantial harm ,
inconvenience to individual , compromising data ,
these all are called sensitive data.
 It can include biometric information, financial
information or other personal documents etc.
Data Protection 4
We Must protect our data or it may lead To
Several Serious Issues :
 Physical data
Loss
 Attack By a
Virus , worm or
malicious code.
 Targeted by
hackers
 DDoS(
Distributed Denial
Of service )
 Loss Of Money
 Intellectual
property at risk
Data Protection 5
Data Protection 6
How to Protect Your Data
 Through Data Encryption.
 Not sharing private information such as password,
credit card credentials, etc.
 Not oversharing on social networking sites using public
domain.
 Adopting complete security mechanism for protection
against possible threats.
 Avoiding phishing emails.
 Being Careful about using Wi-Fi Connections.
Data Protection 7
Intellectual property Rights
o Intellectual property rights refers to creations of the intellect ; inventions,
literary and artistic works, symbols, names, Images and designs used in
commerce are part of it.
o Intellectual Property Rights are specific legal right that allow their owners to
completely benefit from the use of their creation for a certain period of time.
IPRs Are divided Into two branches
Industrial prope r ty Copyright
• It protects inventions ,trademark,,
Industrial designs , commercial
names , destinations and
geographic indications etc.
• It is divided into two sets.
• It protects literary, artistic works
such as books, poems, plays,
Films.
• It provides exclusive publication
rights to the distribution.
• There are such elements that have
right to copy can be reproduced
for works.
Data Protection 8
Industrial Property Divisions
Pate nt Trademark
• A patent is usually granted
for inventions, inventors need
to apply for patenting an
invention
• Patent gives the full control
to the patentee to decide
whether or how invention can
be used by others.
• A trade mark includes any
visual symbol, word, name,
design, slogan, label, etc..,
that distinguishes a band or
commercial enterprises from
other brands.
Data Protection 9
Violation Of IPR
• Intellectual property infringement is the violation of an
intellectual property right. For example, creating a
listing using a third party's image, trademark, logo,
design, etc., without the appropriate permission from
the intellectual property rights owner, can constitute
intellectual property infringement.
• It can happen in one following ways :
Data Protection 10
Plagiarism
• Plagiarism is copying someone else work. Its morally
wrong. It can be also called stealing.
• Copying other programmers program and calming it
as yours can be an act of Plagiarism.
Data Protection 11
Data Protection 12
Plagiarisms be classified as:-
 Accidental/unintentional
 Deliberate/intentional
 Intentional Plagiarism
How to avoid Plagiarism
• Use your own ways and ideas
• Always give the credit to the source you get information from.
• If, by any chance you need to use exact words , don’t forget to put them in
quotes and give credit using in text citations.
• As far as possible try to include the source in your wok citing page number.
• Cite name of website, authors, or URL of them if you have used it.
• Take information in the form of bulleted note rather than copying full content.
• Use online tools to check plagiarism.
Data Protection
13
Copyright Infringement
 Copyright infringement means using copyrighted
material without their Permission
• Downloading an image from the internet and using it in your project.
• Recording a film in movie theatre.
• Using copyrighted images un your website.
• Modifying a image and uploading in your company's website.
• Downloading music or film’s without paying for their us.
• Copying any literary Or artistic work without license or written agreement
Data Protection
14
Trademark Infringement
 Trademark infringement is defined as the
unauthorized use of trademark or service mark on or
in connections with good and or services in manner.
 Owners can take strict legal actions if they belive
there mark have been infriged
Data Protection 15
Thank you
Arjun Mahesh
Data Protection 16

More Related Content

Similar to Data Protection.pptx

Intellectual property protection
Intellectual property protectionIntellectual property protection
Intellectual property protectionMSIZI NDABA
 
Intellectual property basics presentation (practical law)
Intellectual property basics presentation (practical law)Intellectual property basics presentation (practical law)
Intellectual property basics presentation (practical law)jhreescnm
 
Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)ElaineLee
 
Societal impacts PART 1
Societal impacts PART 1Societal impacts PART 1
Societal impacts PART 1AVISHITYAGI
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rightsHimanshu Pathak
 
Intellectual property and existing businesses
Intellectual property and existing businessesIntellectual property and existing businesses
Intellectual property and existing businessesShravan Kalluri
 
IP Reference Guide
IP Reference GuideIP Reference Guide
IP Reference GuideKlemchuk LLP
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber CrimeNithin Raj
 
We-Thought-You-Wouldn't-Notice-Webinar
We-Thought-You-Wouldn't-Notice-WebinarWe-Thought-You-Wouldn't-Notice-Webinar
We-Thought-You-Wouldn't-Notice-WebinarNanette Newbry
 
Mora, Cindy P. (Intellectual Property Rights on the Development of Use of Dig...
Mora, Cindy P. (Intellectual Property Rights on the Development of Use of Dig...Mora, Cindy P. (Intellectual Property Rights on the Development of Use of Dig...
Mora, Cindy P. (Intellectual Property Rights on the Development of Use of Dig...moracindy870
 
Intellectual Property Strategy Maximising value fr.docx
Intellectual Property Strategy   Maximising value fr.docxIntellectual Property Strategy   Maximising value fr.docx
Intellectual Property Strategy Maximising value fr.docxvrickens
 
Protecting Your Brand: Trademarks, Copyrights and the Internet
Protecting Your Brand: Trademarks, Copyrights and the InternetProtecting Your Brand: Trademarks, Copyrights and the Internet
Protecting Your Brand: Trademarks, Copyrights and the InternetMyCorporation
 
Intellectual Property Rights and Plagiarism.pptx
Intellectual Property Rights and Plagiarism.pptxIntellectual Property Rights and Plagiarism.pptx
Intellectual Property Rights and Plagiarism.pptxShrutiMahanta1
 
A Strategic Approach to Identifying and Managing Valuable Intellectual Proper...
A Strategic Approach to Identifying and Managing Valuable Intellectual Proper...A Strategic Approach to Identifying and Managing Valuable Intellectual Proper...
A Strategic Approach to Identifying and Managing Valuable Intellectual Proper...Kelley Keller, Esq.
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual PropertyNazrul Islam
 
Intellectual Property for Startups
Intellectual Property for StartupsIntellectual Property for Startups
Intellectual Property for StartupsSenator Ihenyen
 
Guide to IPR Protection in China for the Creative Industry
Guide to IPR Protection in China for the Creative IndustryGuide to IPR Protection in China for the Creative Industry
Guide to IPR Protection in China for the Creative IndustryChina IPR SME Helpdesk
 

Similar to Data Protection.pptx (20)

Intellectual property protection
Intellectual property protectionIntellectual property protection
Intellectual property protection
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Intellectual property basics presentation (practical law)
Intellectual property basics presentation (practical law)Intellectual property basics presentation (practical law)
Intellectual property basics presentation (practical law)
 
Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)
 
Societal impacts PART 1
Societal impacts PART 1Societal impacts PART 1
Societal impacts PART 1
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
Intellectual property and existing businesses
Intellectual property and existing businessesIntellectual property and existing businesses
Intellectual property and existing businesses
 
IP Reference Guide
IP Reference GuideIP Reference Guide
IP Reference Guide
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
 
We-Thought-You-Wouldn't-Notice-Webinar
We-Thought-You-Wouldn't-Notice-WebinarWe-Thought-You-Wouldn't-Notice-Webinar
We-Thought-You-Wouldn't-Notice-Webinar
 
Mora, Cindy P. (Intellectual Property Rights on the Development of Use of Dig...
Mora, Cindy P. (Intellectual Property Rights on the Development of Use of Dig...Mora, Cindy P. (Intellectual Property Rights on the Development of Use of Dig...
Mora, Cindy P. (Intellectual Property Rights on the Development of Use of Dig...
 
Intellectual Property Rights.pptx
Intellectual Property Rights.pptxIntellectual Property Rights.pptx
Intellectual Property Rights.pptx
 
Intellectual Property Strategy Maximising value fr.docx
Intellectual Property Strategy   Maximising value fr.docxIntellectual Property Strategy   Maximising value fr.docx
Intellectual Property Strategy Maximising value fr.docx
 
Protecting Your Brand: Trademarks, Copyrights and the Internet
Protecting Your Brand: Trademarks, Copyrights and the InternetProtecting Your Brand: Trademarks, Copyrights and the Internet
Protecting Your Brand: Trademarks, Copyrights and the Internet
 
Intellectual Property Rights and Plagiarism.pptx
Intellectual Property Rights and Plagiarism.pptxIntellectual Property Rights and Plagiarism.pptx
Intellectual Property Rights and Plagiarism.pptx
 
A Strategic Approach to Identifying and Managing Valuable Intellectual Proper...
A Strategic Approach to Identifying and Managing Valuable Intellectual Proper...A Strategic Approach to Identifying and Managing Valuable Intellectual Proper...
A Strategic Approach to Identifying and Managing Valuable Intellectual Proper...
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Intellectual Property for Startups
Intellectual Property for StartupsIntellectual Property for Startups
Intellectual Property for Startups
 
Intellectual Property Rights
Intellectual Property Rights Intellectual Property Rights
Intellectual Property Rights
 
Guide to IPR Protection in China for the Creative Industry
Guide to IPR Protection in China for the Creative IndustryGuide to IPR Protection in China for the Creative Industry
Guide to IPR Protection in China for the Creative Industry
 

Recently uploaded

PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxMarlene Maheu
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaEADTU
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...Gary Wood
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptxVishal Singh
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxCeline George
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17Celine George
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismDabee Kamal
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................MirzaAbrarBaig5
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportDenish Jangid
 

Recently uploaded (20)

OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 

Data Protection.pptx

  • 1. D a t a P r o t e c t i o n F I N D I N G S Arjun Mahes h
  • 2. Topics Data Protection 2  Data Protection  Intellectual property Rights  Violation of IPR
  • 3. Introduction Data Protection addresses the practices, safeguard and blinding rules put in place to protect our personal information and ensure that it remains safe while working online. Data Protection 3
  • 4. Data Protection  It secures Our sensitive data.  Data that can cause substantial harm , inconvenience to individual , compromising data , these all are called sensitive data.  It can include biometric information, financial information or other personal documents etc. Data Protection 4
  • 5. We Must protect our data or it may lead To Several Serious Issues :  Physical data Loss  Attack By a Virus , worm or malicious code.  Targeted by hackers  DDoS( Distributed Denial Of service )  Loss Of Money  Intellectual property at risk Data Protection 5
  • 6. Data Protection 6 How to Protect Your Data  Through Data Encryption.  Not sharing private information such as password, credit card credentials, etc.  Not oversharing on social networking sites using public domain.  Adopting complete security mechanism for protection against possible threats.  Avoiding phishing emails.  Being Careful about using Wi-Fi Connections.
  • 7. Data Protection 7 Intellectual property Rights o Intellectual property rights refers to creations of the intellect ; inventions, literary and artistic works, symbols, names, Images and designs used in commerce are part of it. o Intellectual Property Rights are specific legal right that allow their owners to completely benefit from the use of their creation for a certain period of time.
  • 8. IPRs Are divided Into two branches Industrial prope r ty Copyright • It protects inventions ,trademark,, Industrial designs , commercial names , destinations and geographic indications etc. • It is divided into two sets. • It protects literary, artistic works such as books, poems, plays, Films. • It provides exclusive publication rights to the distribution. • There are such elements that have right to copy can be reproduced for works. Data Protection 8
  • 9. Industrial Property Divisions Pate nt Trademark • A patent is usually granted for inventions, inventors need to apply for patenting an invention • Patent gives the full control to the patentee to decide whether or how invention can be used by others. • A trade mark includes any visual symbol, word, name, design, slogan, label, etc.., that distinguishes a band or commercial enterprises from other brands. Data Protection 9
  • 10. Violation Of IPR • Intellectual property infringement is the violation of an intellectual property right. For example, creating a listing using a third party's image, trademark, logo, design, etc., without the appropriate permission from the intellectual property rights owner, can constitute intellectual property infringement. • It can happen in one following ways : Data Protection 10
  • 11. Plagiarism • Plagiarism is copying someone else work. Its morally wrong. It can be also called stealing. • Copying other programmers program and calming it as yours can be an act of Plagiarism. Data Protection 11
  • 12. Data Protection 12 Plagiarisms be classified as:-  Accidental/unintentional  Deliberate/intentional  Intentional Plagiarism
  • 13. How to avoid Plagiarism • Use your own ways and ideas • Always give the credit to the source you get information from. • If, by any chance you need to use exact words , don’t forget to put them in quotes and give credit using in text citations. • As far as possible try to include the source in your wok citing page number. • Cite name of website, authors, or URL of them if you have used it. • Take information in the form of bulleted note rather than copying full content. • Use online tools to check plagiarism. Data Protection 13
  • 14. Copyright Infringement  Copyright infringement means using copyrighted material without their Permission • Downloading an image from the internet and using it in your project. • Recording a film in movie theatre. • Using copyrighted images un your website. • Modifying a image and uploading in your company's website. • Downloading music or film’s without paying for their us. • Copying any literary Or artistic work without license or written agreement Data Protection 14
  • 15. Trademark Infringement  Trademark infringement is defined as the unauthorized use of trademark or service mark on or in connections with good and or services in manner.  Owners can take strict legal actions if they belive there mark have been infriged Data Protection 15