SlideShare a Scribd company logo
Intellectual Property Rights 
Intellectual property (IP) rights are legally recognized 
exclusive rights to creations of the mind. Under 
intellectual property laws, owners are granted certain 
exclusive rights to a variety of intangible assets, such as 
musical, literary, and artistic works; discoveries and 
inventions; and words, phrases, symbols, and designs. 
Common types of intellectual property rights include 
copyright, trademarks, patents, industrial design rights, 
trade dress, and in some jurisdictions trade secrets.
•A patent is a set of exclusive rights granted to an inventor 
or assignee for a limited period of time in exchange for 
detailed public disclosure of an invention. 
•Patents are a form of intellectual property. 
•The procedure for granting patents, requirements placed on 
the patentee, and the extent of the exclusive rights vary 
widely between countries according to national laws and 
international agreements. 
•The exclusive right granted to a patentee in most countries 
is the right to prevent others from commercially making, 
using, selling, importing, or distributing a patented invention 
without permission
•Copyright is a legal right that grants the creator of an 
original work exclusive rights to its use and distribution, 
usually for a limited time, with the intention of enabling 
the creator (e.g. the photographer of a photograph or the 
author of a book) to receive compensation for their 
intellectual effort. 
•Copyright is a form of intellectual property applicable to 
any expressible form of an idea or information. It is often 
shared, then percentage holders are commonly called 
rightsholders.
•A trademark, is a recognizable sign, design or expression which identifies 
products or services of a particular source from those of othersThe trademark 
owner can be an individual, business organization, or any legal entity. A 
trademark may be located on a package, a label, a voucher or on the product 
itself. For the sake of corporate identity trademarks are also being displayed on 
company buildings 
•Trademarks are used to claim exclusive properties of products or services. 
•The usage of trademarks by its owner can cause legal issues if this usage 
makes them guilty of false advertising or if the trademark is offensive 
•The unauthorized usage of trademarks by producing and trading 
counterfeit consumer goods is known as brand piracy. 
•The owner of a trademark may pursue legal action against trademark 
infringement.
Cyber Laws 
Computer crime, or Cybercrime, refers to any crime that involves a computer and a 
network. The computer may have been used in the commission of a crime, or it may be 
the target. 
Netcrime is criminal exploitation of the Internet. 
Cybercrimes are defined as: "Offences that are committed against individuals or 
groups of individuals with a criminal motive to intentionally harm the reputation of the 
victim or cause physical or mental harm to the victim directly or indirectly, using 
modern telecommunication networks such as Internet (Chat rooms, emails, notice 
boards and groups) and mobile phones (SMS/MMS) 
Issues surrounding these types of crimes have become high-profile, particularly those 
surrounding cracking, copyright infringement, child pornography, and child grooming. 
There are also problems of privacy when confidential information is lost or intercepted, 
lawfully or otherwise.
Section Offence Punishment 
65 
Tampering with computer source documents - Intentional 
concealment, destruction or alteration of source code 
when the computer source code is required to be kept or 
maintained by law for the time being in force 
Imprisonment up to three years, 
or/and with fine up to 2 lakh rupees 
66 Hacking 
Imprisonment up to three years, 
or/and with fine up to 5 lakh rupees 
66-A 
Sending offensive message through electronic means - 
Sending any information through an electronic message 
that is grossly offensive or has menacing character and 
might cause insult, injury, criminal intimidation, enmity, 
hatred, or ill will, etc. or sending such mail intended to 
deceive or to mislead the addressee or recipient about the 
origin of such messages 
Imprisonment up to three years, 
and with fine. 
Offences(IT Act 2000)
Network Security Measures 
Network security consists of the provisions and policies adopted by a 
network administrator to prevent and monitor unauthorized access, misuse, 
modification, or denial of a computer network and network-accessible 
resources. 
Network security involves the authorization of access to data in a network, 
which is controlled by the network administrator. 
Users choose or are assigned an ID and password or other authenticating 
information that allows them access to information and programs within 
their authority
Network security starts with authenticating, commonly with a username 
and a password. 
Once authenticated, a firewall enforces access policies such as what 
services are allowed to be accessed by the network users. Though effective 
to prevent unauthorized access, this component may fail to check 
potentially harmful content such as computer worms or Trojans being 
transmitted over the network. Anti-virus software help detect and inhibit 
the action of such malware. 
Communication between two hosts using a network may be encrypted to 
maintain privacy. 
A home or small office may only require basic security while large 
businesses may require high-maintenance and advanced software and 
hardware to prevent malicious attacks from hacking..
Static vs Dynamic Web pages 
Classical hypertext navigation, with HTML alone, provides "static" content, meaning that 
the user requests a web page and simply views the page and the information on that 
page. 
However, a web page can also provide a "live", "dynamic", or "interactive" user 
experience. Content (text, images, form fields, etc.) on a web page can change, in 
response to different contexts or conditions. 
There are two ways to create this kind of effect: 
Using client-side scripting to change interface behaviors within a specific web page, in 
response to mouse or keyboard actions or at specified timing events. In this case the 
dynamic behavior occurs within the presentation. 
Using server-side scripting to change the supplied page to the browser. Server responses 
may be determined by such conditions as data in a posted HTML form, parameters in the 
URL, the type of browser being used, the passage of time, or a database or server state. 
Client-side scripting languages like JavaScript or ActionScript, used for Dynamic HTML 
(DHTML) and Flash technologies respectively, are frequently used to orchestrate media 
types (sound, animations, changing text, etc.) of the presentation. 
Web pages that use to the second method are often created with the help of server-side 
languages such as PHP, Perl, ASP, ASP.NET, JSP, ColdFusion and other languages.
Wireless Technologies 
Wi-Fi, is a local area wireless technology that allows an electronic 
device to exchange data or connect to the internet using radio 
waves. "Wi-Fi" is used in general English as a synonym for "WLAN". 
Many devices can use Wi-Fi, e.g., personal computers, video-game 
consoles, smartphones, digital cameras, tablet computers and digital 
audio players. 
These can connect to a network resource such as the Internet via a 
wireless network access point. Such an access point (or hotspot) has 
a range of about 20 meters (66 feet) indoors and a greater range 
outdoors. Hotspot coverage can comprise an area as small as a 
single room with walls that block radio waves, or as large as many 
square kilometres achieved by using multiple overlapping access 
points
WiMAX (Worldwide Interoperability for Microwave Access) is 
a wireless communications standard designed to provide 30 to 
40 megabit-per-second data rates, with the 2011 update 
providing up to 1 Gbit/s for fixed stations. WiMAX is described 
as "a standards-based technology enabling the delivery of last 
mile wireless broadband access as an alternative to cable and 
DSL". It is similar to Wi-Fi, but it can enable usage at much 
greater distances.
Wireless local loop (WLL), is a term for the use of a wireless 
communications link as the connection for delivering plain old 
telephone service (POTS) or Internet access (marketed under 
the term "broadband") to telecommunications customers. 
Various types of WLL systems and technologies exist. 
Other terms for this type of access include Broadband Wireless 
Access (BWA), Radio In The Loop (RITL), Fixed-Radio Access 
(FRA), Fixed Wireless Access (FWA) and Metro Wireless (MW).

More Related Content

What's hot

Regulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International LawRegulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International Law
Jon Garon
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
atuljaybhaye
 
Digital Rights Management
Digital Rights Management Digital Rights Management
Digital Rights Management
Muruli N. Tarikere
 
Digital rights management (drm) and you
Digital rights management (drm) and youDigital rights management (drm) and you
Digital rights management (drm) and you
SaneMaly
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
Adv Prashant Mali
 
Networking technology
Networking technologyNetworking technology
Networking technology
SmritiGurung4
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
Excel Asama
 
Internet2007
Internet2007Internet2007
Internet2007
marianavigato0
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
Vikas Saw
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?blogzilla
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4University of Delhi
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
Himanshu Pathak
 
DigitalCitizenshipPresentation
DigitalCitizenshipPresentationDigitalCitizenshipPresentation
DigitalCitizenshipPresentation
ICCNS
 
Intellectual property rights (IPR) and digital
Intellectual property rights (IPR) and digitalIntellectual property rights (IPR) and digital
Intellectual property rights (IPR) and digital
Dheeraj Negi
 
Internetnuovo1
Internetnuovo1Internetnuovo1
Internetnuovo1
maristella1956
 
Computer & services
Computer & services Computer & services
Computer & services
Prateek Rohatgi
 

What's hot (19)

Regulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International LawRegulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International Law
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Digital Rights Management
Digital Rights Management Digital Rights Management
Digital Rights Management
 
Digital rights management (drm) and you
Digital rights management (drm) and youDigital rights management (drm) and you
Digital rights management (drm) and you
 
DRM Powerpoint
DRM PowerpointDRM Powerpoint
DRM Powerpoint
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Networking technology
Networking technologyNetworking technology
Networking technology
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Internet2007
Internet2007Internet2007
Internet2007
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 
DigitalCitizenshipPresentation
DigitalCitizenshipPresentationDigitalCitizenshipPresentation
DigitalCitizenshipPresentation
 
Intellectual property rights (IPR) and digital
Intellectual property rights (IPR) and digitalIntellectual property rights (IPR) and digital
Intellectual property rights (IPR) and digital
 
Internetnuovo1
Internetnuovo1Internetnuovo1
Internetnuovo1
 
Computer & services
Computer & services Computer & services
Computer & services
 

Viewers also liked

Offences and prosecutions
Offences and prosecutionsOffences and prosecutions
Offences and prosecutionsMohammad Ghori
 
Penalties and prosecutions under income-tax: current developments - VKS
Penalties and prosecutions under income-tax: current developments - VKSPenalties and prosecutions under income-tax: current developments - VKS
Penalties and prosecutions under income-tax: current developments - VKS
D Murali ☆
 
Penalties and prosecutions
Penalties and prosecutionsPenalties and prosecutions
Penalties and prosecutionspunitky
 
Offences and penalties
Offences and penaltiesOffences and penalties
Offences and penaltiesstudent
 
Basics of income tax assessments and appeals
Basics of income tax assessments and appealsBasics of income tax assessments and appeals
Basics of income tax assessments and appeals
Ameet Patel
 

Viewers also liked (6)

Offences and prosecutions
Offences and prosecutionsOffences and prosecutions
Offences and prosecutions
 
Penalty & prosecution
Penalty & prosecutionPenalty & prosecution
Penalty & prosecution
 
Penalties and prosecutions under income-tax: current developments - VKS
Penalties and prosecutions under income-tax: current developments - VKSPenalties and prosecutions under income-tax: current developments - VKS
Penalties and prosecutions under income-tax: current developments - VKS
 
Penalties and prosecutions
Penalties and prosecutionsPenalties and prosecutions
Penalties and prosecutions
 
Offences and penalties
Offences and penaltiesOffences and penalties
Offences and penalties
 
Basics of income tax assessments and appeals
Basics of income tax assessments and appealsBasics of income tax assessments and appeals
Basics of income tax assessments and appeals
 

Similar to Ipr

legal aspects in e marketing
legal aspects in e marketinglegal aspects in e marketing
legal aspects in e marketing
SHIVANI SINGH
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
FarhanMalik93
 
Unit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internetUnit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internet
gabriela-technoteacher
 
Common services of Internet .docx
Common services of Internet        .docxCommon services of Internet        .docx
Common services of Internet .docx
Kamran Abdullah
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the LawDavid Phillips
 
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Tim Hsieh
 
Information-Control.pptx
Information-Control.pptxInformation-Control.pptx
Information-Control.pptx
JeydeeeYhudieee
 
E-Commerce: Challenges and Issues
E-Commerce: Challenges and IssuesE-Commerce: Challenges and Issues
E-Commerce: Challenges and Issues
Dr. Prashant Vats
 
Information System for Manager solution.pdf
Information System for Manager solution.pdfInformation System for Manager solution.pdf
Information System for Manager solution.pdf
DiamondPlastics
 
Components of the Internet and the World Wide Web
Components of the Internet and the World Wide WebComponents of the Internet and the World Wide Web
Components of the Internet and the World Wide Web
AlvinLaguidao
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey96
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
O Leary2010 Comp Ppt Ch02 Rev
O Leary2010 Comp Ppt Ch02 RevO Leary2010 Comp Ppt Ch02 Rev
O Leary2010 Comp Ppt Ch02 Revguest5ebaae9
 
INTERNET.pptx
INTERNET.pptxINTERNET.pptx
INTERNET.pptx
ABHILASHAPANCHAL2
 
Chapter1-HTML.docx
Chapter1-HTML.docxChapter1-HTML.docx
Chapter1-HTML.docx
JanessaCruz
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
n|u - The Open Security Community
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptx
jameshagwen
 

Similar to Ipr (20)

legal aspects in e marketing
legal aspects in e marketinglegal aspects in e marketing
legal aspects in e marketing
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
 
Unit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internetUnit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internet
 
Common services of Internet .docx
Common services of Internet        .docxCommon services of Internet        .docx
Common services of Internet .docx
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the Law
 
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Information-Control.pptx
Information-Control.pptxInformation-Control.pptx
Information-Control.pptx
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
E-Commerce: Challenges and Issues
E-Commerce: Challenges and IssuesE-Commerce: Challenges and Issues
E-Commerce: Challenges and Issues
 
Information System for Manager solution.pdf
Information System for Manager solution.pdfInformation System for Manager solution.pdf
Information System for Manager solution.pdf
 
Components of the Internet and the World Wide Web
Components of the Internet and the World Wide WebComponents of the Internet and the World Wide Web
Components of the Internet and the World Wide Web
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
O Leary2010 Comp Ppt Ch02 Rev
O Leary2010 Comp Ppt Ch02 RevO Leary2010 Comp Ppt Ch02 Rev
O Leary2010 Comp Ppt Ch02 Rev
 
INTERNET.pptx
INTERNET.pptxINTERNET.pptx
INTERNET.pptx
 
Internet
InternetInternet
Internet
 
Chapter1-HTML.docx
Chapter1-HTML.docxChapter1-HTML.docx
Chapter1-HTML.docx
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptx
 

Recently uploaded

Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

Ipr

  • 1. Intellectual Property Rights Intellectual property (IP) rights are legally recognized exclusive rights to creations of the mind. Under intellectual property laws, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property rights include copyright, trademarks, patents, industrial design rights, trade dress, and in some jurisdictions trade secrets.
  • 2. •A patent is a set of exclusive rights granted to an inventor or assignee for a limited period of time in exchange for detailed public disclosure of an invention. •Patents are a form of intellectual property. •The procedure for granting patents, requirements placed on the patentee, and the extent of the exclusive rights vary widely between countries according to national laws and international agreements. •The exclusive right granted to a patentee in most countries is the right to prevent others from commercially making, using, selling, importing, or distributing a patented invention without permission
  • 3. •Copyright is a legal right that grants the creator of an original work exclusive rights to its use and distribution, usually for a limited time, with the intention of enabling the creator (e.g. the photographer of a photograph or the author of a book) to receive compensation for their intellectual effort. •Copyright is a form of intellectual property applicable to any expressible form of an idea or information. It is often shared, then percentage holders are commonly called rightsholders.
  • 4. •A trademark, is a recognizable sign, design or expression which identifies products or services of a particular source from those of othersThe trademark owner can be an individual, business organization, or any legal entity. A trademark may be located on a package, a label, a voucher or on the product itself. For the sake of corporate identity trademarks are also being displayed on company buildings •Trademarks are used to claim exclusive properties of products or services. •The usage of trademarks by its owner can cause legal issues if this usage makes them guilty of false advertising or if the trademark is offensive •The unauthorized usage of trademarks by producing and trading counterfeit consumer goods is known as brand piracy. •The owner of a trademark may pursue legal action against trademark infringement.
  • 5. Cyber Laws Computer crime, or Cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime is criminal exploitation of the Internet. Cybercrimes are defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS) Issues surrounding these types of crimes have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
  • 6. Section Offence Punishment 65 Tampering with computer source documents - Intentional concealment, destruction or alteration of source code when the computer source code is required to be kept or maintained by law for the time being in force Imprisonment up to three years, or/and with fine up to 2 lakh rupees 66 Hacking Imprisonment up to three years, or/and with fine up to 5 lakh rupees 66-A Sending offensive message through electronic means - Sending any information through an electronic message that is grossly offensive or has menacing character and might cause insult, injury, criminal intimidation, enmity, hatred, or ill will, etc. or sending such mail intended to deceive or to mislead the addressee or recipient about the origin of such messages Imprisonment up to three years, and with fine. Offences(IT Act 2000)
  • 7. Network Security Measures Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority
  • 8. Network security starts with authenticating, commonly with a username and a password. Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software help detect and inhibit the action of such malware. Communication between two hosts using a network may be encrypted to maintain privacy. A home or small office may only require basic security while large businesses may require high-maintenance and advanced software and hardware to prevent malicious attacks from hacking..
  • 9. Static vs Dynamic Web pages Classical hypertext navigation, with HTML alone, provides "static" content, meaning that the user requests a web page and simply views the page and the information on that page. However, a web page can also provide a "live", "dynamic", or "interactive" user experience. Content (text, images, form fields, etc.) on a web page can change, in response to different contexts or conditions. There are two ways to create this kind of effect: Using client-side scripting to change interface behaviors within a specific web page, in response to mouse or keyboard actions or at specified timing events. In this case the dynamic behavior occurs within the presentation. Using server-side scripting to change the supplied page to the browser. Server responses may be determined by such conditions as data in a posted HTML form, parameters in the URL, the type of browser being used, the passage of time, or a database or server state. Client-side scripting languages like JavaScript or ActionScript, used for Dynamic HTML (DHTML) and Flash technologies respectively, are frequently used to orchestrate media types (sound, animations, changing text, etc.) of the presentation. Web pages that use to the second method are often created with the help of server-side languages such as PHP, Perl, ASP, ASP.NET, JSP, ColdFusion and other languages.
  • 10. Wireless Technologies Wi-Fi, is a local area wireless technology that allows an electronic device to exchange data or connect to the internet using radio waves. "Wi-Fi" is used in general English as a synonym for "WLAN". Many devices can use Wi-Fi, e.g., personal computers, video-game consoles, smartphones, digital cameras, tablet computers and digital audio players. These can connect to a network resource such as the Internet via a wireless network access point. Such an access point (or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors. Hotspot coverage can comprise an area as small as a single room with walls that block radio waves, or as large as many square kilometres achieved by using multiple overlapping access points
  • 11. WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide 30 to 40 megabit-per-second data rates, with the 2011 update providing up to 1 Gbit/s for fixed stations. WiMAX is described as "a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL". It is similar to Wi-Fi, but it can enable usage at much greater distances.
  • 12. Wireless local loop (WLL), is a term for the use of a wireless communications link as the connection for delivering plain old telephone service (POTS) or Internet access (marketed under the term "broadband") to telecommunications customers. Various types of WLL systems and technologies exist. Other terms for this type of access include Broadband Wireless Access (BWA), Radio In The Loop (RITL), Fixed-Radio Access (FRA), Fixed Wireless Access (FWA) and Metro Wireless (MW).