0% found this document useful (0 votes)
25 views

Cyber Laws and Ipr

notes for cyber laws

Uploaded by

Milan Deep
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Cyber Laws and Ipr

notes for cyber laws

Uploaded by

Milan Deep
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

Introduction

27 March 2024 23:28

Overview of Computer and Web Technology


Computer and web technology are intertwined fields that play crucial roles in modern society, facilitating communication, information exchange, entertainment, business operations, and much
more. Here's an overview of each:
Computer Technology:
1. Hardware: Refers to the physical components of a computer system, such as the central processing unit (CPU), memory (RAM), storage devices (hard drives, SSDs), input/output devices
(keyboard, mouse, monitor), and networking equipment (routers, switches).
2. Software: Encompasses the programs and instructions that tell the hardware what to do. This includes operating systems (Windows, macOS, Linux), application software (Microsoft Office,
Adobe Creative Suite), and system software (device drivers, utilities).
3. Networking: Involves connecting computers and other devices to share resources and communicate with each other. This includes local area networks (LANs), wide area networks (WANs),
the internet, and protocols like TCP/IP.
4. Security: Focuses on protecting computer systems, networks, and data from unauthorized access, theft, and damage. This includes measures such as firewalls, encryption, antivirus software,
and user authentication.
5. Emerging Technologies: Constantly evolving fields such as artificial intelligence (AI), machine learning, quantum computing, and Internet of Things (IoT) are pushing the boundaries of what
computers can do and how they interact with the world.

Web Technology:
6. Internet Basics: The internet is a global network of interconnected computers, allowing users to access and share information worldwide. It relies on protocols like HTTP, HTTPS, and FTP
for communication.
7. Web Development: Involves creating websites and web applications using languages such as HTML, CSS, and JavaScript, along with frameworks and libraries like React, Angular, and
Vue.js. Backend development often involves languages like PHP, Python, Ruby, or Node.js.
8. Web Design: Focuses on the aesthetic and user experience aspects of websites, including layout, typography, color schemes, and interaction design. Tools like Adobe Photoshop, Sketch, and
Figma are commonly used for design.
9. Web Hosting: Refers to the service of storing and serving websites and web applications on servers connected to the internet. Hosting providers offer various options such as shared hosting,
VPS hosting, dedicated hosting, and cloud hosting.
10. E-commerce: The buying and selling of goods and services over the internet. E-commerce platforms like Shopify, WooCommerce, and Magento provide tools for setting up online stores,
processing payments, and managing inventory.

Interplay between Computer and Web Technology:


11. Web Applications: Many modern applications, such as social media platforms, email clients, and productivity tools, are web-based, leveraging both computer and web technologies.
12. Cloud Computing: Cloud services rely heavily on both computer and web technologies, providing scalable and on-demand access to computing resources over the internet.
13. Mobile Computing: Mobile devices like smartphones and tablets often integrate computer and web technologies, accessing web content through browsers and running apps that utilize both.
14. Data Management: Both fields are essential for managing and analysing large volumes of data, whether stored locally on computers or accessed and processed over the web.

Unit 1 Page 1
Need for Cyber Law
27 March 2024 23:33

Cyber law, also known as Internet Law or Cyber Law, is the part of the overall legal system that is related to legal informat ics and supervises the digital circulation of information, e-commerce, software and
information security. It is associated with legal informatics and electronic elements, including information systems, compute rs, software, and hardware. It covers many areas, such as access to and usage of
the Internet, encompassing various subtopics as well as freedom of expression, and online privacy.
Cyber laws help to reduce or prevent people from cybercriminal activities on a large scale with the help of protecting inform ation access from unauthorized people, freedom
of speech related to the use of the Internet, privacy, communications, email, websites, intellectual property, hardware and software, such as data storage devices. As
Internet traffic is increasing rapidly day by day, that has led to a higher percentage of legal issues worldwide. Because cyb er laws are different according to the country and
jurisdiction, restitution ranges from fines to imprisonment, and enforcement is challenging.
Cyberlaw offers legal protections for people who are using the Internet as well as running an online business. It is most imp ortant for Internet users to know about the local
area and cyber law of their country by which they could know what activities are legal or not on the network. Also, they can prevent ourselves from unauthorized activities.
The Computer Fraud and Abuse Act was the first cyber law, called CFFA, that was enacted in 1986. This law was helpful in prev enting unauthorized access to computers.
And it also provided a description of the stages of punishment for breaking that law or performing any illegal activity.

Why are cyber laws needed?


There are many security issues with using the Internet and also available different malicious people who try to unauthorized access your computer system to perform potential fraud. Therefore, similarly,
any law, cyber law is created to protect online organizations and people on the network from unauthorized access and maliciou s people. If someone does any illegal activity or breaks the cyber rule, it
offers people or organizations to have that persons sentenced to punishment or take action against them.
If anyone breaks a cyber law, the action would be taken against that person on the basis of the type of cyberlaw he broke, wh ere he lives, and where he broke the law. There are many situations like if you
break the law on a website, your account will be banned or suspended and blocked your IP (Internet Protocol) address. Furthermore, if any person performs a very serious illegal activity, such as causing
another person or company distress, hacking, attacking another person or website, advance action can be taken against that pe rson.

Importance of Cyber Law


Cyber laws are formed to punish people who perform any illegal activities online. They are important to punish related to the se types of issues such as online harassment,
attacking another website or individual, data theft, disrupting the online workflow of any enterprise and other illegal activ ities.
If anyone breaks a cyber law, the action would be taken against that person on the basis of the type of cyberlaw he broke, wh ere he lives, and where he broke the law. It is
most important to punish the criminals or to bring them to behind bars, as most of the cybercrimes cross the limit of crime t hat cannot be considered as a common crime.
These crimes may be very harmful for losing the reliability and confidentiality of personal information or a nation. Therefor e, these issues must be handled according to the
laws.
• When users apply transactions on the Internet, cyber law covers every transaction and protect them.
• It touches every reaction and action in cyberspace.
• It captures all activities on the Internet.

Areas involving in Cyber Laws


These laws deal with multiple activities and areas that occur online and serve several purposes. Some laws are formed to desc ribe the policies for using the Internet and the computer in an organization,
and some are formed to offer people security from unauthorized users and malicious activities. There are various broad catego ries that come under cyber laws; some are as follows:
Fraud
Copyrighting Issues
Scam/ Treachery
Online Harassment and Stalking
Data Protection
Contracts and Employment Law
Trade Secrets

Unit 1 Page 2
Cyber Jurisprudence at International and Indian Level
28 March 2024 09:19

Jurisprudence is the study that deals with the fundamental principles and various concepts of law. It guides a person to understand the deeper meaning of law. The word jurisprudence is
derived from the Latin term “Jurisprudentia” which means “knowledge of the law”. Basically ‘Jure’ means law and ‘prudentia’ means knowledge. Thus, the meaning of the entire word
signifies a practical knowledge of law and its various applications.

The aim of Jurisprudence is to help a layman understand the deeper meaning of the law. Jurisprudence is a crucial part of thelaw which is entirely based on theories and various
analyses. Jurisprudence focuses on the relationship of law with society, social science, and so on.

Jurisprudence means the study of law that takes place in a logical and philosophical manner. Jurisprudence analyses the nature of law, legal systems, legal rules, legal concepts, and legal
institutions and creates a way to understand the social, political as well and cultural arenas where law operates. It is a vast field that consists of a range of perspectives which includes
natural law, legal realism, critical legal studies, and so on. The study of jurisprudence helps scholars and practitioners to develop a deeper understanding of law and its importance in
shaping society.

HISTORY

Jurisprudence began in the Roman Times with the Romans scrutinizing the importance of the law and the nature of the law. Although it had a restrictive approach as the ideas of law and
ethics were blurred. After the fall of the Roman Empire, their set of ideas regarding jurisprudence vanished and the Christian State emerged. With the rise of Christian Rule, the concept of
secularism arose. Several hypotheses and concepts were proposed by renowned personalities.

Gradually, the possibility of positive law and positive methodologies took over whereby the limits of the law were divided. With the evolution of ideologies, several jurists presented their
own interpretations of jurisprudence.

Cyber jurisprudence, or cyber law, refers to the legal principles and regulations governing the internet, cyberspace, and digital technology. These laws are crucial in addressing various
issues such as cybercrime, data privacy, intellectual property rights, and online transactions. Both at the international and national levels, there are efforts to establish comprehensive legal
frameworks to regulate cyberspace effectively. Here's an overview of cyber jurisprudence at the international and Indian levels:

International Level:
1. United Nations (UN): The UN has been actively involved in addressing cybersecurity and cybercrime through various bodies such as the UN General As sembly
and the UN Office on Drugs and Crime (UNODC).The UN has adopted several resolutions and conventions, such as the Budapest Con vention on Cybercrime, to
facilitate international cooperation in combating cybercrime.
2. Council of Europe's Convention on Cybercrime (Budapest Convention): This is the first international treaty addressing cybercrime and electronic evidence. It
sets forth legal frameworks for the criminalization of offenses, procedural law, and international cooperation in investigati ng and prosecuting cybercrimes.
3. International Telecommunication Union (ITU): ITU works on establishing international standards and regulations for telecommunication and information
technology, including aspects of cybersecurity and internet governance.
4. Regional Initiatives: Various regional organizations have developed their own agreements and frameworks to address cyber threats and enhance cybers ecurity,
such as the European Union's General Data Protection Regulation (GDPR) and the ASEAN Cybersecurity Cooperation Strategy.

Indian Level:
1. Information Technology Act, 2000: The IT Act of 2000 is the primary legislation governing cyber activities in India. It addresses issues such as digital sign atures,
electronic governance, cybercrime, and data protection.
2. The Personal Data Protection Bill: This bill aims to regulate the processing of personal data of individuals by the government and private entities. It introduc es
provisions for the protection of personal data and penalties for non-compliance.
3. Cybercrime Investigation Cells: India has established specialized cybercrime investigation cells in various cities to investigate and prosecute cybercrimes
effectively.
4. Indian Cyber Law Cases: Over the years, several landmark judgments have shaped cyber jurisprudence in India, including cases related to data privacy,
intermediary liability, and online defamation.
5. International Cooperation: India actively participates in international forums and cooperates with other countries in combating cyber threats and enhanc ing
cybersecurity measures.

Unit 1 Page 3
Jurisdiction In cyber laws
28 March 2024 09:52

What is Cyber Jurisdiction? What is the concept of jurisdiction in cyber law?


The ambit of Cyber law is so vast that cyber jurisdiction in a case involving various countries is very difficult to ascertain. A website, app, product, or content in one country may be legal but illegal in
another, the parties may be residents or non-residents, which makes this concept all the more complex. Cyber law’s jurisdiction depends on the kind of cybercrime and the location from which it has been
done.
At the end of the 20th century and the beginning of the 21st century, the use of computers and mobile phones saw a significant rise. Later, with its increasing utility, the rise of the internet began in the 1990s.
In the last 15-16 years, the role of social media, online payments, education, gaming, communication, movies, and search engines have eventually become an essential part of everybody’s day-to-day life, and
so did the misuse of it have increased. The real reason behind this is the lack of stringent laws, awareness, lacunas in the safety and privacy of a user and etc.
Criminal activity on the web (internet) is termed cybercrime. Cybercrime is prevented and protected by Cyber laws. The non-presence of physical boundaries on the internet and the non-effective security of
the data of the user is one of the main reasons for cybercrime.

With the increase in the number of internet users and free browsing content from all over the world, it is easier for a person to get trapped in cybercrime by a person(hacker, internet stalker, cyber-terrorist,
scammer, and many others) in a different country. For instance, a person might commit online fraud by claiming to sell some item from a particular country to a person situated in a different country and
taking payment online but not sending the item specified. He indulged in this activity with other customers of different countries, and then a question of cyber jurisdiction arises as to where the complaint will
be filed.
Cyberlaw also governs cyberspace. “Cyberspace refers to the virtual computer world, and more specifically, an electronic medium that is used to facilitate online communication. Cyberspace typically
involves a large computer network made up of many worldwide computer sub-networks that employ the TCP/IP protocol to aid in communication and data exchange activities.”

The fact that the internet has no boundaries, no restraints, and cybercrime posing the same features results in conflicting laws. International law and municipal law have different approaches, and cyber law is
mainly tied between both, which results in no conclusion.
With the increase in the number of internet users and free browsing content from all over the world, it is easier for a person to get trapped in cybercrime by a person(hacker, internet stalker, cyber-terrorist,
scammer, and many others) in a different country. For instance, a person might commit online fraud by claiming to sell some item from a particular country to a person situated in a different country and
taking payment online but not sending the item specified. He indulged in this activity with other customers of different countries, and then a question of cyber jurisdiction arises as to where the complaint will
be filed.

Cyberlaw also governs cyberspace. “Cyberspace refers to the virtual computer world, and more specifically, an electronic medium that is used to facilitate online communication. Cyberspace typically
involves a large computer network made up of many worldwide computer sub-networks that employ the TCP/IP protocol to aid in communication and data exchange activities.”

The fact that the internet has no boundaries, no restraints, and cybercrime posing the same features results in conflicting laws. International law and municipal law have different approaches, and cyber law is
mainly tied between both, which results in no conclusion.

Issues of the jurisdiction in cyberspace


Jurisdiction gives power to the appropriate court to hear a case and declare a judgment. In cybercrime instances, the victim and the accused are generally from different countries, and hence deciding which
cyber jurisdiction will prevail is conflicting. The internet as stated earlier has no boundaries; thus, no specific jurisdiction in cyberspace can be titled over its use. A user is free to access whatever he wishes
to and from wherever he wishes to. Till the time a user’s online activity is legal and not violative of any law, till then there is no issue. However, when such actions become illegal and criminal, jurisdiction
has a crucial role to play.

For example, if a user commits a robbery in country ‘A’ while sitting in country ‘B’ from the server of the country ‘C,’ then which country’s jurisdiction will apply needs to be answered. In this case, the
transaction might have been done virtually, yet the people are present physically in their respective countries governed by their laws and the court generally decides the cyber jurisdiction of the country where
the crime has been actually committed.

In cyberspace, there are generally three parties involved in a transaction: the user, the server host, and the person with whom the transaction is taking place, with the need to be put within one cyberspace
jurisdiction. All three parties in this illustration belong to three different countries, now the laws of ‘A,’ ‘B’ or ’C’ will be prevalent or not, or even municipal laws will be applicable or international laws the
issues of jurisdiction in cyberspace. The extent of a court’s competency to hear a cross-border matter and apply domestic state laws is another issue.

Types of Cyberspace jurisdiction


There are three types of cyber jurisdiction recognized in international law, namely-
• Personal Jurisdiction – It is a type of jurisdiction where the court can pass judgments on particular parties and persons. In the case of Pennoyer v. Neff, The Supreme Court of the US observed that the Due
process enshrined in the constitution of the US constrains the personal jurisdiction upon its implication on the non-resident, hence there is no direct jurisdiction on the non-residents. However, this restraint
was curbed by the minimum contact theory which allowed the jurisdiction over the non-residents as well.
• Subject-matter jurisdiction – It is a type of jurisdiction where the court can hear and decide specific cases that include a particular subject matter. If the specific subject matter is of one court but the
plaintiff had sued in any other court then the plea will be rejected and the plaintiff will have to file the case in the court which is related to that matter. For instance, a complaint regarding a consumer good
should be filed in the district consumer forum rather than district court as district consumer forums specifically look at consumer-related cases. In the same manner, all environmental-related cases are tried in
NGT rather than a district court.
• Pecuniary Jurisdiction – This type of jurisdiction mainly deals with monetary matters. The value of the suit should not exceed the pecuniary jurisdiction. There are various limits set for a court that can try a
case of a certain value beyond which it is tried in different courts. For example, the district consumer forum looks at the matter not exceeding 20 lakh rupees, the State consumer dispute redressal commission
has pecuniary jurisdiction of more than 20 lakh rupees but not exceeding 1 crore, the National consumer dispute redressal commission has pecuniary jurisdiction involving cases of more than 1 crore rupees
in India. It is dependent upon the claim made in proceedings and is structured in hierarchical order.

Prerequisites of Jurisdiction in Cyberspace


There are three prerequisites of valid jurisdictions that are needed to be followed. A person is compelled to follow the rules and regulations of the state. The state has the power
to punish a person violating such laws.

• Prescriptive Jurisdiction – This type of jurisdiction enables a country to impose laws, particularly for a person’s activity, status, circumstances, or choice. This jurisdiction is unlimited.
Hence, a country can enact any law, or legislation on any matter, even where the person’s nationality is different, or the act happened at a different place. However, International law prevents
any state from legislating any such law contrary to other countries interests.
• Jurisdiction to Adjudicate – Under this jurisdiction, the state has the power to decide the matter on a person concerned in civil or criminal cases despite the fact that the state was a party
or not; a mere relationship between both is sufficient. It is not necessary that a state having the prescribed jurisdiction must also have jurisdiction to adjudicate.
• Jurisdiction to Enforce – This jurisdiction depends on the existence of prescriptive jurisdiction; hence if prescriptive jurisdiction is absent, then it cannot be enforced to punish a person
violating its laws and regulations; however, this jurisdiction is not exercised in an absolute sense and a state cannot enforce its jurisdiction on a person or the crime situated or happened in a
different country.

Unit 1 Page 4
Unit 1 Page 5
The Test evolved of Jurisdictional Aspects in Cyber Law
28 March 2024 10:36

There are several tests that determine cyberspace jurisdiction in the cases of cybercrime.
Minimum Contacts Theory
This test is applicable where both or any of the parties are outside the territorial jurisdiction of the court. In the landmark judgment in Washington v International Shoe Company, this
theory was evolved by the US Supreme Court. “”
After this case, the court laid down three criteria-
• “The non-resident defendant must do some act or consummate some transaction with the forum or perform some act by which he purposefully avails himself of the privilege of
conducting activities in the forum, thereby invoking the benefits and protections.
• the claim must be one which arises out of or results from the defendant’s forum-related activities, and
• exercise of jurisdiction must be reasonable.”

Sliding Scale Theory


Sliding Scale theory is also known as Zippo Test. It is the most accepted test in deciding personal jurisdiction in cyberspace cases. On the basis of the interactivity of the websites, the
jurisdiction is decided. The more the number of interactivities, the more the courts have personal jurisdiction over it in the forum state.
For a passive website, the courts have almost no jurisdiction, while in the middle spectrum site, the court may or may not have jurisdiction; however, in the case of a highly interactive
site, the court has cyberspace jurisdiction.
In the landmark case of Zippo Manufacturer v Zippo.Com, the plaintiff Zippo Manufacturer of lighters in Pennsylvania sued the defendant Zippo.com for an infringing trademark.
The defendant had a lot of interactivity; hence the personal jurisdiction will be applicable to the defendant.

Effects Test and International Targeting


Few conditions are required to be satisfied for the Effect test, mainly the action taken expressly against the forum state with the knowledge and intention that it will injure the state. If
the court thinks fit that the defendant’s action caused injuries to the forum state, then personal cyberspace jurisdiction is asserted in cyberspace cases where no contact is present.
In the landmark case of Calder v Jones[11], The Supreme Court of the US observed that the court in the state can exercise personal jurisdiction over non-residents. In this case, the
editor and writer of a national magazine published a defamatory article on the residents. The facts of the case are that the plaintiff Shirley Jones sued the distributor, the writer, and its
editor Calder of a national magazine, defaming her as an alcoholic. Jones was a resident of California while the article was written and edited in Florida. Jones sued the defendants in
the court of California because the magazine had a vast circulation in the state. The court held that the court of California has personal jurisdiction over the defendants.
In Panavision International v Toeppen, Toeppen, the defendant indulged in cybercrime by using the plaintiff’s trademark commercially and selling it back to him for a hefty amount.
The California court held that by applying the effects test, the court had personal jurisdiction over the non-resident defendant.

Jurisdiction under Information Technology Act, 2000


“Information Technology Act, 2000 in section 1(2) states that the Act extends to the whole of India and applies also to any offence or contravention thereunder committed outside
India by any person.”
Further, “Section 75 states that subject to the provision of sub-section (2), the provision of this act shall also apply to any offence or contravention committed outside India by any person
irrespective of his nationality. For the purpose of subsection (1), this act shall apply to an offence or contravention committed outside India by any person if the act or conduct constitutes an
offence or contravention that involves a computer, computer system, or computer network located in India.”
Despite having laid down various tests to figure out cyberspace jurisdiction, it is still debatable in the courts of law to ascertain the jurisdiction in cybercrime cases involving more than one
country. The criteria to determine the jurisdiction are different in different countries. Hence, a test of jurisdiction might qualify in one country but not qualify in another, so where the disputed
parties are of different states, it is very difficult to acclaim the jurisdiction of one nation over the other. In such a situation more than one test should be incorporated in deciding the jurisdiction.
In India, Information Technology Act, 2000 does govern cyberspace yet there is no provision relating to the territorial jurisdiction and hence it is the current requirement from the legislators to
incorporate provisions relating to extra-territorial jurisdiction in the Act.

However, Internet usage will increase every second on this earth, and therefore the laws should also be made progressive enough to combat cybercrime and issues relating to their jurisdiction.
International law should determine certain parameters in deciding the jurisdiction, and the cases in which jurisdiction cannot be decided should be tried in the international court of justice itself.

Unit 1 Page 6
Cyber Crimes & Legal Framework
04 April 2024 10:30

Cybercrimes can target individuals, institutions, and states, posing various threats to their security, integrity, and operations. Here's how cybercrimes manifest against each
of these entities:
Individuals:
1. Identity Theft: Cybercriminals steal personal information, such as Social Security numbers, credit card details, or login credentials, to impersonate individuals or
conduct fraudulent activities in their name.
2. Financial Fraud: Phishing scams, fake websites, or malware-infected links are used to deceive individuals into providing sensitive financial information, leading to
unauthorized transactions, credit card fraud, or online banking account breaches.
3. Online Harassment and Cyberbullying: Individuals may face harassment, stalking, or defamation through various online platforms, social media, or messaging
apps, causing emotional distress and reputational damage.
4. Privacy Violations: Unauthorized access to personal data, webcam hacking, or dissemination of private information online can infringe upon individuals' privacy
rights, leading to embarrassment, blackmail, or exploitation.
5. Romance Scams and Online Predation: Cybercriminals exploit trust and emotions in online relationships to manipulate individuals into providing money, sensitive
information, or engaging in risky behaviors.

Institutions (Businesses, Organizations, etc.):


1. Data Breaches: Cyberattacks, such as hacking or malware infections, target institutional networks or databases to steal sensitive information, including customer
data, intellectual property, or financial records.
2. Ransomware Attacks: Malicious software encrypts institutional data, rendering it inaccessible until a ransom is paid, disrupting operations, causing financial losses,
and damaging reputation.
3. Business Email Compromise (BEC): Cybercriminals compromise business email accounts to impersonate executives, manipulate employees, or initiate fraudulent
transactions, leading to financial losses or sensitive data exposure.
4. Intellectual Property Theft: Corporate espionage, insider threats, or hacking activities target trade secrets, patents, or proprietary information, undermining
innovation, competitiveness, and business viability.
5. Supply Chain Attacks: Cybercriminals exploit vulnerabilities in interconnected supply chains to infiltrate and compromise multiple institutions, infecting software,
hardware, or critical infrastructure components.

States (Government Agencies, Critical Infrastructure, etc.):


1. Cyber Espionage: State-sponsored actors or cybercriminal groups conduct espionage activities to steal classified information, political intelligence, or military secrets,
undermining national security and diplomatic relations.
2. Cyber Terrorism: Malicious cyber activities, such as distributed denial-of-service (DDoS) attacks or malware deployment, target critical infrastructure, disrupting
essential services, causing economic damage, or inciting fear among the populace.
3. Cyber Warfare: State-sponsored cyber operations involve offensive tactics, including sabotage, data manipulation, or infrastructure disruption, aimed at disrupting
adversaries' military capabilities, political stability, or economic interests.
4. Cyber Attacks on Elections: Manipulation of electoral processes, voter databases, or dissemination of fake news and propaganda through social media platforms
can undermine democratic institutions, erode public trust, and destabilize governance.
5. Critical Infrastructure Attacks: Cyberattacks targeting critical infrastructure, such as power grids, transportation systems, or healthcare facilities, pose significant
risks to public safety, economic stability, and national defense capabilities.

Unit 2 Page 7
Hacking
04 April 2024 10:36

An effort to attack a computer system or a private network inside a computer is known as hacking. Simply, it is unauthorized access to or control of computer
network security systems with the intention of committing a crime. Hacking is the process of finding some security holes in a computer system or network in order to
gain access to personal or corporate information. One example of computer hacking is the use of a password cracking technique to gain access to a computer
system. The process of gaining illegal access to a computer system, or a group of computer systems, is known as hacking. This is accomplished by cracking the
passwords and codes that grant access to systems. Cracking is the term used to describe the process of obtaining a password or code. The hacker is the individual
who performs the hacking. Following are some of the things that can be hacked:
• Single systems
• Email account
• A group of systems
• LAN network
• A website
• Social media sites, etc.

Hackers

Computer hackers are unauthorized users who gain access to computers in order to steal, alter, or delete data, generally by installing malicious software without
your knowledge or agreement. They can get access to the information you don’t want them to have thanks to their cunning techniques and in-depth technological
knowledge. Any device is connected to the Internet is at risk from computer hackers and online predators. To distribute hazardous malware to your computer and
damage your network security, these online criminals generally use spam messages, phishing emails or instant messages, and websites.
Types of Hackers:
To elaborate on the aforementioned hacking aims, it is vital to understand the various sorts of hackers that exist in the cyber segment in order to distinguish
between their responsibilities and objectives. The types of hackers are:

1. Black Hat Hackers: These types of hackers, often known as crackers and always have a malicious motive and gain illegal access to computer networ ks and
websites. Their goal is to make money by stealing secret organizational data, stealing funds from online bank accounts, violating priva cy rights to benefit
criminal organizations, and so on. In today’s world, the majority of hackers fall into this category and conduct their busine ss in a murky manner. Black hat
hackers are nefarious individuals who aim to utilize their technical expertise to exploit and harm others. They usually have the expertise and training to get into
computer networks without the consent of the owners, attack security holes, and circumvent security procedures. With the male volent goal of gaining
unauthorized access to networks and systems, they attack to steal data, spread malware causing damage to systems.
2. White Hat Hackers/Ethical Hackers: White hat hackers (sometimes referred to as ethical hackers) are the polar opposites of black hat hackers. They employ
their technical expertise to defend the planet against malicious hackers. White hats are employed by businesses and governmen t agencies as data security
analysts, researchers, security specialists, etc. White hat hackers, with the permission of the system owner and with good mo tives, use the same hacking
tactics that the black hackers use. They can work as contractors, freelancers, or in-house for the companies. They assist their customers in resolving security
flaws before they are exploited by criminal hackers.
3. Gray Hat Hackers: They fall somewhere between the above-mentioned types of hackers, in that they gain illegal access to a system but do so without any
malicious intent. The goal is to expose the system’s weaknesses. Instead of exploiting vulnerabilities for unlawful gains, gr ey hat hackers may offer to repair
vulnerabilities they’ve identified through their own unauthorized actions. Example: They may, for example, infiltrate your we bsite, application without your
permission to seek vulnerabilities. They rarely, if ever, try to harm others. Grey hats do this to obtain notoriety and reput ation in the cyber security industry,
which helps them further their careers as security experts in the long run. This move, on the other hand, harms the reputatio n of the organizations whose
security flaws or exploits are made public.
4. Red Hat Hackers: Also known as eagle-eyed hackers. Red hat hackers want to stop threat actors from launching unethical assaults. The red hat hackers aim
the same as ethical hackers, but their methods differ, the red hat hackers may utilize illegal or extreme methods. Red hat ha ckers frequently use cyber-attacks
against threat actors’ systems.
5. Blue Hat Hackers: Safety experts that work outside of the organization are known as blue hat hackers. Before releasing new software, companies frequently
encourage them to test it and uncover security flaws. Companies occasionally hold meetings for blue hat hackers to help them uncover flaws in their critical
internet systems. Money and fame aren’t necessarily important to some hackers. They hack to exact personal vengeance on a per son, employer, organization,
or government for a genuine — or perceived — deception. To hurt their adversaries’ data, websites, or devices, blue hat hackers utilize malicious software and various
cyber threats on their rivals’ devices.
6. Green Hat Hackers: Green hat hackers aren’t familiar with safety measures or the internal dynamics of the internet, but they’re quick learners w ho are driven
(if not desperate) to advance in the hacking world. Although it is unlikely that they want to damage others, they may do so w hile “experimenting” with various
viruses and attack strategies. As a result, green hat hackers can be dangerous since they are frequently unaware of the impli cations of their activities – or, even
worse, how to correct them.

What can Hackers do?

While your computer is linked to the Internet, spyware installed by a hacker silently communicates your personal and financial information without your awareness
or agreement. The hackers can:
• Steal usernames and passwords.
• Take out a cash advance
• Steal your money and use your name to obtain credit cards and bank accounts.
• Destroy Your credit.
• Exploit your Social Security number
• Make a new account requesting Additional credit cards or personal identification numbers (PINs)
• Misuse personal information and share it with third parties ( illegal purposes).
• Purchase something.

How to identify that your system is hacked?

If your system is hacked by some hacker then you will see the following warning signs:
• Your computer system or mobile phone or tablet start acting strangely like the password does not work, the setting of your de vice is changes, the camera and
microphone of your system is activating, etc.
• The antivirus software of your system is deactivated without your information. It is the main element to protect your system if it is off without you knowledge
then it is big sign that your system is under attack.
• Generally hackers redirect your browser or your internet traffic to some malicious website. Then it is the sign that your sys tem is under attack.
• If someone stealing money from your account without your permission.
• When some hacker gain the access of your account then the first step he/she do is to change that password of your account. So when the password doesn’t
work then this means that someone change your account password.
• Seeing some suspicious ads or popup frequently on your system is also the part of hacking.

How to Safeguard us from the Hackers?

Unit 2 Page 8
Hacking is a chronic problem that jeopardizes a nation’s and its residents’ security. Individually, it can result in incalculable economic losses, even wiping out a
person’s financial savings. At the organizational level, it has resulted in data theft, resulting in significant financial losses and long-term consequences. To stop this
terrible threat, protections must be put in place at the correct moment and at all levels. So to protect ourselves from hackers always remember the following points:
• Always keep your system updated because hackers always look for holes in security to attack. So, updating the operating syste m and software will prevent the
user from getting hacked.
• Always set unique and strong passwords for different accounts never use the same passwords for the same accounts because it i s easy to hack.
• While using websites always look for HTTPS encryption. It ensure that the connection is secure.
• Use Virtual Private Networks (VPNs) as a type of point-to-point communication that allows business networks to connect to offsite and remote sites. VPN
services, such as Express VPN, encrypt the sending and receiving IP addresses, preventing unauthorized access.
• Only download software from reputable sources. Before downloading free software or file-sharing applications, give them a thorough examination.
• Make use of a two-way firewall.
• Stay away from dubious websites.
• Increase the security settings of your browser.
• Always install antivirus software

Unit 2 Page 9
Digital Forgery
04 April 2024 12:27

Digital forgery refers to the act of manipulating or altering digital content, such as images, videos, or documents, with the intention to deceive or mislead viewers. It involves using
digital tools and techniques to create fraudulent or deceptive representations that appear authentic and genuine. This can include modifying the content itself, adding or removing
elements, or even fabricating entirely new compositions.
Digital forgery has become increasingly prevalent with the advancements in technology and software capabilities. It can be used for various malicious purposes, such as spreading fake
news, creating false evidence, or conducting online scams. Detecting digital forgery has become a significant challenge as the sophistication of forgery techniques continues to evolve.
Advanced image and video analysis methods, along with artificial intelligence and machine learning, are being employed to develop robust detection algorithms to safeguard the
integrity of digital content.
Forgery is defined as the production of a document that is known to be fake but appears to be genuine. It is usually seen in documents such as cheques, passports, visas, certificates,
other identification documents etc and people are easily hoodwinked, especially when the forgery is done digitally. It is impossible to tell the difference between genuine and falsified
documents unless you’ve been trained to do so. Forgeries are dangerous because they are frequently difficult to spot as fakes. As a result of digital forgeries, the victims of these
activities may suffer financial loss as well as a loss of reputation. The number of crimes pertaining to forgery is increasing day by day.It is not very hard for forgers to falsify documents
and signatures especially if it is a digital one but it can be extremely difficult for a layman to figure out the minute indications and details in a document that distinguish a fake one from
an original. Digital forgery is at an all-time high in today’s contemporary world and as a matter of fact, the majority of people do not realise when their documents are forged.

Problems of digital forgery

The topic of digital forgeries study is still in its early stages. Many practical and specialized strategies and solutions have also been presented. The originality and validity of financial,
legal, and medical documents and data, as well as other high-value assets, is crucial and imperative. In many circumstances, figuring out the originality and validity of a picture or data
is a difficult and painstaking task. Identifying and distinguishing data and images captured by devices from computer-generated data and images is a multifarious topic that has
captivated scholars all over the globe.

The technology of digital resource repositories is moving at a much faster rate due to social networking sites, making it very difficult to find the original source of the forgeries. As a
result, tracing the history of digital fakes becomes a major challenge. In the network context, certain efforts are being made to determine the lineage of data, but to our knowledge, no
one has attempted to locate the lineage of digital resources. The pursuit of answers leads to the resolution of today’s most concerning issues particularly the genuineness of intellectual
property.

Solutions

There are several approaches and tools available today for detecting forgeries. Apart from standard procedures like ocular analysis of a picture and parameter adjustment (such as
brightness, contrast, and so on), the forensic experts employ the following:

1. reflections and shadows,


2. lighting,
3. analysis of thumbnails,
4. error level analysis (ELA),
5. examination of brightness gradients,
6. principal component analysis (PCA),
7. clone detection,
8. stamp investigation of chromatic aberrations,
9. noise analysis.

There are several approaches like file structure analysis, metadata analysis, and others that are more commonly utilised for detecting picture or video creation processes, but not for
forgery detection.

Even without detecting methods for a picture or video creation, the number of methods applied is rather extensive. The problem is that different techniques of image encoding and the
variety of alterations that may be applied to digital pictures change the features of the image that are available for forensic inspection in different ways. For example, the ELA approach
can only be used with JPEG images; looking for cloned sections won’t help you identify a single insertion or hand retouch; shadows analysis won’t help you with photos taken in
overcast weather; and so on.

Forgery under Indian Law

The provisions of the IPC in respect to forgery were updated by Section 91 of the Information Technology (IT) Act (read with the Second Schedule) to embrace electronic records as
well. The Indian Penal Code has been amended to include Section 29A, which defines electronic records. The terms “electronic record” and “electronic record” will have the same
meaning as in Section 2(1)(t)2 of the IT Act.

Section 464 of the IPC was amended by Section 91 of the IT Act to include a false electronic record. Under Section 464, a person is said to make a false electronic record:

1. Who makes or transmits any electronic record or part of an electronic record dishonestly or fraudulently, or affixes any digital signature on any electronic record, or makes any
mark denoting the authenticity of a digital signature, with the intent of making it appear that such electronic record or part of an electronic record or digital signature was made,
executed, transmitted, or affixed by or by the authority of a person by whom or whose affixed
2. Who, without lawful authority, dishonestly or fraudulently alters an electronic record in any material part thereof after it has been made, executed, or affixed with a digital
signature by himself or by any other person, whether such person is alive or dead at the time of such alteration, by cancellation or otherwise.
3. Who deceptively or fraudulently causes any person to sign, execute, or alter an electronic record, or to affix his digital signature to any electronic record, knowing that such person
cannot, or that he does not know the contents of the electronic record or the nature of the alteration, due to insanity or intoxication.
Explanation 3 to Section 464 has also been added, which states that the term “affixing digital signature” has the same meaning as it does in Section 2(1)(d)3 of the IT Act for the
purposes of this Section.

Section 463 of the IPC, after amendment, defines forgery, in relation to electronic records, as the making of any false electronic record or part thereof with intent to cause damage or
injury to the public or to any person, or to support any claim or title, or to cause any person to part with property, or to enter into any express or implied contract, or with intent to
commit fraud or that fraud may be committed.

Section 466 (forgery of record of Court or of Public register, etc.), Section 468 (forgery for purpose of cheating), Section 469 (forger for purpose of harming reputation), Section 470
(forged document or electronic record), Section 471 (using as genuine a forged document), Section 474 (having possession of the document described in Section 466 or 467, knowing it
to be forged and intending to use it as genuine) and Section 476 (counterfeiting device or mark used for authenticating documents other than those described in Section 467, or
possessing counterfeit marked material) have also been suitably amended to include electronic records.

It should be noted, however, that Section 467, which deals with forgery of valuable securities, wills, and other documents, has not been amended because Section 1(4) prohibits the IT
Act from being applied to certain documents such as a will, trust, power of attorney, contract for sale or conveyance of immovable property, and so on. As a result of the modifications

Unit 2 Page 10
Act from being applied to certain documents such as a will, trust, power of attorney, contract for sale or conveyance of immovable property, and so on. As a result of the modifications
in the IT Act, digital forgery and offences linked to it are now covered under the IPC.

Unit 2 Page 11
Cyber Stalking/Harassment
08 April 2024 11:02

Cyberstalking refers to the use of the internet and other technologies to harass or stalk another person online, and is potentially a crime in the United States. This online
harassment, which is an extension of cyberbullying and in-person stalking, can take the form of e-mails, text messages, social media posts, and more and is often methodical,
deliberate, and persistent.
Most of the time, the interactions do not end even if the recipient expresses their displeasure or asks the person to stop. The content directed at the target is often inappropriate
and sometimes even disturbing, which can leave the person feeling fearful, distressed, anxious, and worried.
While some of the online harassment that people in the survey experienced was just nuisance behaviours, nearly 1 in 5 Americans said they had experienced severe forms of online harassment. These actions
included physical threats, sexual harassment, and stalking

Signs of Cyberstalking
Some signs that you are experiencing cyberstalking include someone sending you too many messages, a person sending you inappropriate messages, liking all of your old posts
on social media, manipulating you into interacting with them online, or trolling you. Online impersonality, GPS tracking, threatening messages, catfishing, and doxing are also
behaviour associated with cyberstalking.

Examples of Cyberstalking
When it comes to cyberstalking, those who engage in this behaviour use a variety of tactics and techniques to harass, humiliate, intimidate, and control their targets. In fact, many
of those who engage in cyberstalking are technologically savvy as well as creative and come up with a multitude of ways to torment and harass their targets.
So what is considered cyberstalking? Here are some examples of things people who cyberstalk might do:
• Post rude, offensive, or suggestive comments online
• Follow the target online by joining the same groups and forums
• Send threatening, controlling, or lewd messages or emails to the target
• Use technology to threaten or blackmail the target
• Tag the target in posts excessively, even if they have nothing to do with them
• Comment on or like everything the target posts online
• Create fake accounts to follow the target on social media
• Message the target repeatedly
• Hack into or hijack the target's online accounts
• Attempt to extort sex or explicit photos
• Send unwanted gifts or items to the target
• Release confidential information online
• Post or distribute real or fake photos of the target
• Bombard the target with sexually explicit photos of themselves
• Create fake posts designed to shame the victim
• Track the target's online movements by installing tracking devices
• Hack into the target's camera on their laptop or smartphone as a way to secretly record them
• Continue the harassing behaviour even after being asked to stop

Consequences of Cyberstalking
Just like stalking, cyberstalking has the potential to cause a wide range of physical and emotional consequences for those who are targeted. For instance, it's not uncommon for
those who are being harassed online to experience anger, fear, and confusion. They also might have trouble sleeping and even complain of stomach trouble.
There are even reports that targets of cyberstalking may experience post traumatic stress disorder and suicidal ideation. If you are experiencing cyberstalking, it's important that you reach out for help. You
can contact the National Centre for Victims of Crime at 1-855-4-VICTIM (1-855-484-2846). And, if you or a loved one are in immediate danger be sure to call 911 right way.

How to Prevent Cyberstalking


When it comes to preventing cyberstalking, it's important that you take the necessary precautions to protect yourself online. Although it's not possible to completely prevent
cyberstalking from occurring, there are steps you can take to increase your security and reduce the likelihood of it happening.
Make Security a Priority
The first step in preventing cyberstalking is to ensure that your devices and your online accounts are as secure as possible. Here are some steps you should consider taking.
• Create strong passwords. Make sure you have strong passwords for all your online accounts as well as strong passwords for your devices. Then, set a reminder on your
phone to regularly change your passwords. Choose passwords that would be difficult to guess but are easy for you to remember.
• Be sure to log out every time. It may seem like a pain, but make sure you log out of email, social media accounts, and other online accounts after using them. This way, if
someone were able to get into your device they would not have easy access to your accounts.
• Keep track of your devices. Don't leave your phone sitting on your desk at work or walk away from an open laptop. It only takes a minute or two for someone to install a
tracking device or hack your device. So, make sure you keep these things in your possession or that you secure them in some way.
• Use caution on public Wi-Fi. Recognize the fact that if you use public Wi-Fi at hotels or at the local coffee shop, you are putting yourself at risk for hacking. Try to refrain
from using public Wi-Fi or invest in VPN.
• Practice online safety habits. In other words, make it a priority to only accept friend requests from people you know and keep your posts private. You also should consider
having one email address that is specifically for your online activity. Use this email when you do your online shopping or join loyalty programs.

Unit 2 Page 12
Ethics and Etiquettes of Cyber World
08 April 2024 11:52

Cyberethics is a branch of computer technology behavior that defines the best practices that must be adopted by a user when he uses the computer
system. In simple terms, cyberethics refers to the basic ethics and etiquette that must be followed while using a computer system. Ethics, in general,
refers to propagating good behavior, similarly by cyber ethics we refer to propagating good behavior online that is not harsh or rude. Cyberethics
governs rules that individuals must be polite and responsible when they use the internet. Cyberethics aim to protect the moral, financial, social behavior
of individuals. Cyberethics engages the users to use the internet safely and use technology responsibly and sensibly. Cyberethics empathizes the
behavior that must be adopted while using cyber technology.
Some of the breaches of cyberethics are listed below:
• Cyber Bullying: Cyberbullying is a form of bullying carried out via internet technology such as social media where individuals are mocked on their
physical appearance, lifestyle, preferences, etc. The teenage generation or say youngsters are the major victims of this form of cyber ethic breach.
Cyberbullying affects the emotional ethics of individuals and can cause mental disturbance to individuals.
• Hacking: Stealing a user’s personal or organizational information without authorized permission is not considered a good practice. It is one of the
riskiest cyber breaches to data leak. Data leak includes passing of sensitive information such as passwords, bank details of the user to a third-party
user who is not authorized to access the information.
• Copywriting: Claiming of another individual as one’s own is another type of cyber ethic breach that must be eradicated. Never engage in copywriting
another person’s content or document and claim as it is your own. It leads to a serious problem called plagiarism, which is a punishable offense and
considered a legal crime. It is always advisable to follow general cyberethics, while using the internet or say any kind of technology. A proper code of
conduct must be followed while using cyber technology. Cyberethics if not used wisely can lead to serious situations. Social and legal laws are defined
to use cyber technology wisely. In extreme cases, legal action can be taken if there is a violation of cyber ethics.

Cyber Ethics focuses on the following:

1. Privacy:
• The content that is available on the internet should not hurt any moral, emotional, or personal ethics of individuals.
• Users should have the right to protect any information which they don’t want to share openly.
• Private information like user’s contact details, address, security-related information like bank details, credit card/debit card details, are all included in
basic cyber ethics of user privacy and must not be breached in any case.
• Any breach of privacy is theft/fraud of user identity and user personal information, which is punishable as per the rules of law.

2. IPR:
• IPR stands for Intellectual Property Rights.
• IPR defines that the owners have the complete right to the content that is posted on the internet.
• The entire content is solely a belonging of the originator and no individual is allowed to claim that content published by the original creator as its own.
• Unauthorized distribution of someone else’s work should never be adopted as it’s ethically incorrect to not give creation and monetary benefits to the
creator of the work.

3. Security:
• Security on the internet is the most basic ethical right that every user must be accessible.
• Users of the internet should feel safe while they surf the net.
• Security, in general means only authorized users to have access to the content on the computer.
• And confidential information is safe, without any risk of loss of information/content.

4. Accuracy:
• The content available on the internet is accessed by billions of users.
• If there is no reliability of the information that is posted online, then it would mislead the masses.
• Cyberethics assert the importance of posting content on the internet that is correct in all aspects.
• Users trust the content of the internet and rely heavily on the internet for facts, therefore it is highly needed that the asked information is correct and
reliable.

Best policies that individuals must adopt while using the internet or any kind of technology should include the following:
• Being Polite and not using harsh words.
• Avoid clicking on unknown links.
• Wisely opening Emails from known senders only.
• Not mocking anyone on Social Media.
• Not copying any individual’s work and claiming it as their own. Always cite that you have used someone else’s work.
• Be careful and research before installing any free software.
• Never intrude on another person’s privacy.
• Don’t contribute to any malpractice that can lead to the leak of data of an individual or organization.
• Never engage in Cyberbullying.
• Never compromise with the safety of your system. Always install an anti-virus on your system.

Etiquettes of Cyber World


Cyber Etiquette is a set of acceptable rules and norms that must be followed with the use of technology. These rules are there to ensure individual and community safety,
security and positive communication across the internet. Cyber etiquette is extremely important in this era of connectedness and increased virtual interaction. As the world
is fast- adapting to online practices for learning, working and entertainment, there is a growing need to ensure respect, security, social sensitivity and appropriate
communication in this sphere. Here are some benefits of cyber etiquettes-
• Protection from Cyberbullying
• Ensures Ethical Communication
• Teaches Email Etiquette and safe-conduct across social media platforms like Facebook, Twitter and Instagram
• Maintenance and protection of company/school’s data and confidentiality
• Ensures Cyber safety for individuals, communities and organisations

11 Rules of Online Etiquette for Students


Be Polite with Your Teachers
While taking online classes, you should be as polite to your teachers as you are to them in person. Since online classes let you hide your video, many students to take
advantage of this and end up making unnecessary comments or noise during an online class. One of the top rules of cyber etiquette or netiquette is to respect everyone

Unit 2 Page 13
advantage of this and end up making unnecessary comments or noise during an online class. One of the top rules of cyber etiquette or netiquette is to respect everyone
equally and be polite with everyone while following all the guidelines. Remember that your teachers are also adjusting to the pandemic world and adapting to using online
technologies which they might not be as familiar with as the young generation. So, you should always be polite and respectful towards not only your teachers but also your
peers while attending online classes.

Respect Everyone’s Privacy


This is one of the basic rules of Cyber Etiquette that applies in every situation whether you are taking an online class, meeting or even scrolling on a social media site.
Remember that anything on the internet stays forever and you should not enter anyone else’s personal space just like you would not want anyone to breach your privacy.
While taking your college classes online, don’t breach anyone’s locations, passwords, private conversations on class chat. While chatting and small talks are often ignored
in a four-walled classroom, an online class might be hard to handle for a teacher if students are taking their private conversations on the chats or making any such
comments. So, you need to keep in mind how to treat everyone with respect and everyone’s privacy.

Submit Assignments on Time


Assignment submission is a big problem in online classes. Just because there is no teacher to scold you personally, doesn’t mean you aren’t accountable for your work.
Thus, you must also follow this cyber etiquette for online classes by sticking to the specific guidelines for submitting online assignments. Submitting files in the wrong
format of way past the due date means the student isn’t paying attention. Properly submitting all your assignments on time is not only your moral duty but also the
responsibility you have as a student.
Don’t Yell
Everyone in your class is equally as important as you are to the class. The key to effective communication is listening before speaking. You should try your best to
maintain the decorum of your class. Chatting online with friends is different from chatting with your professors and you should be careful of the tone you speak to them
with. Follow this cyber etiquette in any academic or professional setting especially in online courses, classes or meetings. Speaking unnecessarily and writing in all caps is
usually interpreted as rude and so you should take care of that and work towards having healthy communication.

Speak Clearly
During an online class, you should try to be brief and to the point in your communication. Taking an unnecessary amount of time to reach a point may result in the loss of
meaning in that point as well as loss of interest. So, make sure that you try to express yourself as clearly as possible by using minimum words.

Work on Your Spoken and Written Proficiency


Digital communication has certain rules that one must keep in mind at all times. You should properly use grammar and punctuation at all times so as to convey your
message clearly. This cyber etiquette is not just for students but also for working professionals as we often overlook our own flaws in spoken and written communication.
Speak clearly when taking an online class or meeting and write a clear, concise and professional message while communicating to your professor or manager online and
avoid using any slangs or abbreviations in your email.

Control Your Sarcasm


Conveying a sarcastic message online can be a bit difficult and is often misunderstood. While you may be a humorous person in real life but when communicating digitally,
a light-hearted joke can take a serious turn and might be perceived as rude. Your online classroom is filled with people from diverse cultures, so you don’t know what might
hurt someone. Thus, follow this professional cyber etiquette of keeping your jokes and sarcasm at a minimum.

Address Your Teachers with Their Respective Titles


Many students tend to get informal in online classes and forget the decorum of the classroom. It is one of the most basic cyber etiquettes that one should follow regardless
of anything. So, always maintain that formal relationship between you and your professors.

Be Accurate when Sharing Information


We are living in a hi-tech age brimming with information without any valid sources. So, before you share anything in your class group, check its accuracy and only send
factual relevant information that might be of some use to others.

Read Before Responding


Just like you should speak clearly so that others get your point, you should also do the same while reading. A lot of people have a tendency to respond to a message
without even reading and understanding it completely. Your lack of understanding might lead to a heated argument online and following this simply cyber etiquette can
help you avoid the same.

Unit 2 Page 14
Cyber Pornography
08 April 2024 12:05

Cyber pornography is in simple words defined as the act of using cyberspace to create, display, distribute, import, or publish pornography or obscene materials. With the advent of cyberspace,
traditional pornographic content has now been largely replaced by online/digital pornographic content.

Cyber pornography is banned in many countries and legalized in some. In India, under the Information Technology Act, 2000, this is a grey area of the law, where it is not prohibited but not legalized
either.

There is no settled definition of pornography or obscenity. What is considered simply sexually explicit but not obscene in USA may well be considered obscene in India. There have been many
attempts to limit the availability of pornographic content on the Internet by governments and law enforcement bodies all around the world but with little effect. Pornography on the Internet is
available in different formats. These range from pictures and short animated movies, to sound files and stories. The Internet also makes it possible to discuss sex, see live sex acts, and arrange sexual
activities from computer screens. Although the Indian Constitution guarantees the fundamental right of freedom of speech and expression, it has been held that a law against obscenity is
constitutional. The Supreme Court has defined obscene as “offensive to modesty or decency; lewd, filthy, repulsive.

Under Section 67 of the Information Technology Act, 2000 makes the following acts punishable with imprisonment up to 3 years and fine up to 5 lakhs:

1. Publication- which would include uploading on a website, what's app group or any other digital portal where third parties can have access to such content.
2. Transmission- this includes sending obscene photos or images to any person via email, messaging, what's app or any other form of digital media.
3. Causing to be published or transmitted- this is a very wide terminology which would end up making the intermediary portal liable, using which the offender has published or transmitted such
obscene content. The Intermediary Guidelines under the Information Technology Act put an onus on the Intermediary/Service Provider to exercise due diligence to ensure their portal is not
being misused.
Section 67A of the Information Technology Act makes publication, transmission and causing to be transmitted and published in electronic form any material containing sexually explicit act or
conduct , punishable with imprisonment up to 5 years and fine up to 10 lakhs.

Unit 2 Page 15
Identity Theft & Fraud
08 April 2024 12:24

What Is Identity Theft?


Identity theft is the crime of using the personal or financial information of another person to commit fraud, such as making unauthorized transactions
or purchases.
Identity theft is committed in many different ways and its victims are typically left with damage to their credit, finances, and reputation.
Understanding Identity Theft
Identity theft occurs when someone steals your personal information—such as your Social Security number, bank account number, and credit card
information.
How Thieves Get Your Data
Thieves can attempt to obtain your personal information in various ways. For instance, some sift through trash bins looking for bank account and
credit card statements.
Identity thieves increasingly use computer technology to obtain other people's personal information for identity fraud.
To find such information, they may search the hard drives of stolen or discarded computers; hack into computers or computer networks of
organizations and corporations; access computer-based public records; use information-gathering malware to infect computers; browse social
networking sites; or use deceptive emails or text messages.
Once identity thieves have the information they are looking for, they can ruin a person's credit rating and the standing of other personal information.

Types of Identity Theft


There are several types of identity theft, including:

Financial Identity Theft


Financial identity theft occurs when someone uses another person's identity or information to obtain credit, goods, services, or benefits. This is the
most common form of identity theft.

Social Security Identity Theft


If identity thieves obtain your Social Security number, they can use it to apply for credit cards and loans and then not pay outstanding balances.
Fraudsters can also use your number to receive medical, disability, and other benefits.

Medical Identity Theft


In medical identity theft, someone poses as another person to obtain free medical care.

Synthetic Identity Theft


Synthetic identity theft is a type of fraud in which a criminal combines real (usually stolen) and fake information to create a new identity. This new
identity is used to open fraudulent accounts and make fraudulent purchases. Synthetic identity theft allows the criminal to steal money from credit
card companies and lenders who extend them credit based on the fake identity.

Child Identity Theft


Child identity theft involves using a child's identity for various forms of personal gain. This is common, as children typically do not have the capability
to take steps to create obstacles for the perpetrator.
The fraudster may use the child's name and Social Security number to obtain a residence, find employment, obtain loans, or avoid arrest on
outstanding warrants. Often, the victim is a family member, the child of a friend, or someone else close to the perpetrator. Some people even steal
the personal information of deceased loved ones.

Tax Identity Theft


Tax identity theft occurs when someone uses your personal information, including your Social Security number, to file a bogus state or federal tax
return in your name and collect a refund.

Criminal Identity Theft


In criminal identity theft, a criminal poses as another person during an arrest to try to avoid a summons, prevent the discovery of a warrant issued in
their real name, or avoid an arrest or conviction record.

Examples of Identity Theft


It can be difficult to know if you've been a victim of identity theft, especially if you don't check your financial statements regularly. Some clear
indicators of identity theft include:
• Bills for items that you didn't buy that you discover on your credit card statement, online account, or via invoices by email or U.S. mail
• Calls from debt collectors regarding accounts that you didn't open
• Loan applications that are denied even though you believe your credit is in good standing
• Bounced checks
• A warrant for your arrest
• Unfounded medical bills and explanations of benefits (EOBs) from an insurance company
• Utilities being shut off
• The inability to sign into accounts
• Inexplicable hard inquiries into your credit report
• New credit cards in your name that you didn't apply for

Potential Victims of Identity Theft


Anyone can be a victim of identity theft. However, children and aging adults are particularly vulnerable. They may not unders tand specific situations
or paperwork, such as bills. In addition, their care and finances often are handled by others who normally may not inform them of details or regularly
check their accounts.
Children who are victims of identity theft may not become aware of it until they are adults. Adults who need medical care often have to provide a lot of
personal information repeatedly to hospitals, clinics, caregiving agencies, and doctor's officers. As a result, this information can be sought and
obtained nefariously from a variety of locations.

Identity Theft Protection


Many types of identity theft can be prevented or limited. One way to protect yourself is to continually check the accuracy of personal documents and
promptly deal with any discrepancies.
Services Available to Help

Unit 2 Page 16
Services Available to Help
There are several identity theft protection services that help people avoid or mitigate the effects of identity theft. Typically, such services help:
• Safeguard personal information
• Monitor public and private records, such as credit reports, and send alerts to clients about suspicious transactions and status changes
• Resolve problems associated with identity theft
In addition, some government agencies and nonprofit organizations provide similar assistance, typically through websites that offer information and
tools to help people avoid, remedy, and report incidents of identity theft.4
Many of the best credit monitoring services also provide identity protection tools and services.4

Recovering From Identity Theft


Managing identity theft can be a long, painstaking process. After you have filed, and retained a copy of, your report with the FTC, there are other
steps that you need to take:
1. Start by placing fraud alerts on all of your credit reports. Fraud alerts are an added layer of protection in that lenders mu st confirm your identity
before opening an account, usually via phone.
2. Freeze your credit reports. Freezing your reports prevents access to any credit information. Your credit report is removed fr om circulation so that
a lender will not have access to it. If access is denied, no account in your name can be opened.
3. Contact all of the companies involved in the identity theft. Demonstrate to them that you are a victim of such theft, that you did not open any
accounts, and that no purchases of goods or services are legitimate.
4. If necessary, file complaints with companies, dispute questionable charges, and share any other reports you have filed, such as police reports or
reports with the FTC. The Fair Credit Billing Act and the Electronic Funds Transfer Act works in your favor.
5. Contact all credit reporting agencies to dispute any incorrect charges and information on your credit reports.

6. Contact your bank(s) and credit card companies and request that they close your current credit and debit cards and issue you new ones.
7. Change all of your login and password information.
8. From there, continue monitoring your credit reports to ensure that your personal and financial information remains secure and unavailable to
thieves.

What Do You Do If Someone Has Stolen Your Identity?


The first step to take is to report the theft to the Federal Trade Commission (FTC) at IdentityTheft.gov. You can also call them at 1-877-438-4338.
Then, you can freeze your credit reports, file a police report, and change your login and password information for all sensitive accounts. It would also
be wise to close your current credit and debit cards and receive new ones. Check your credit reports for false accounts and dispute any with the
credit agencies.

What Are the First Signs of Identity Theft?


Some early signs of identity theft are unfamiliar charges on your credit card or debit card statements, new cards that you did not apply for, incorrect
items on your credit report, medical bills for doctor's visits that you did not have, and collection notices for purchases that you did not make.

What Are Three Types of Identity Theft?


Three common types of identity theft are medical identity theft, financial identity theft, and child identity theft.

The Bottom Line


Identity theft is a traumatic and difficult experience and can severely damage your creditworthiness. It can leave you with bills that you did not incur
and cannot pay.
It's important to monitor your bank and credit card statements regularly. Review your credit report periodically for any signs of fraud.
If you suspect that you are a victim of fraud, there are ways to dispute the charges, fix the theft, and stop your private information from being made
available to thieves. In addition, the government provides various resources to help you repair your credit standing.

Unit 2 Page 17
Cyber Terrorism
08 April 2024 12:35

What is cyberterrorism?
Cyberterrorism is usually defined as any premeditated, politically motivated attack against information systems, programs, and data that threatens violence or results in violence. It might include
any cyberattack that intimidates or generates fear in the target population of a country, state, or city, usually by damaging or disrupting critical infrastructure that's vital to social, economic,
political, and business operations.
Cyberterrorist acts are carried out using computer servers, other devices and networks visible on the public internet. Secure d government networks and other restricted networks are often targets
of such acts. Other targets include the banking industry, military installations, power plants, air traffic control centers, and water systems.
The U.S. Federal Bureau of Investigation (FBI) defines cyberterrorism as any "premeditated, politically motivated attack agai nst information, computer systems, computer programs and data,
which results in violence against noncombatant targets by subnational groups or clandestine agents." Per the FBI, a cyberterr orist attack is a type of cybercrime explicitly designed to cause
physical harm.

Other organizations and experts include less harmful attacks as acts of cyberterrorism, especially when those are intended to be disruptive or to further the attackers' political agenda. The North
Atlantic Treaty Organization (NATO), defines cyberterrorism as a cyberattack that uses or exploits computer or communication networks to cause "sufficient destruction or disruption to generate
fear or to intimidate a society into an ideological goal."

Methods used for cyberterrorism


The intention of cyberterrorist groups is to cause mass chaos, disrupt critical infrastructure, support political activism or hacktivism, or inflict physical damage and even loss of life.
Cyberterrorism actors use various methods to achieve these aims, including:
• Advanced persistent threat (APT) attacks, which use sophisticated, concentrated penetration methods to gain network access. Once inside the network, the att ackers stay undetected for a time,
intending to steal data. Organizations with high-value information, such as those in the defense, manufacturing, healthcare, and financial industries are typical targets for APT attacks.
• Computer viruses, worms and malware target IT control systems. They are used to attack utilities, transportation systems, power grids, critical infrastructure, g overnment departments, and military
systems
• Denial of service (DoS) attacks attempt to prevent legitimate users from accessing targeted computer systems, devices, or websites. These attackers often go after critical infrastructure and
governments.
• Hacking seeks to gain unauthorized access to steal critical data, often from institutions, governments and businesses.
• Ransomware, a type of malware, is aimed at holding data or information systems hostage (usually via encryption) until the victim pays t he ransom. Some ransomware attacks also exfiltrate data.
• Phishing attacks attempt to collect information through a target's email, using that information to access systems or steal the victim 's identity.
What are examples of cyberterrorism?
Examples of cyberterrorism include:
• Disruption of major websites. The intent is to stop traffic to websites that serve many users and whose disruption might create widespread public inconveni ence.
• Unauthorized access. Attackers often aim to gain access to certain systems or to modify communications that control military systems or other crit ical technology.
• Disruption of critical infrastructure systems. Threat actors try to disable or disrupt cities, cause a public health crisis, endanger public safety or cause massive panic and fatalities, for example,
by targeting a water treatment plant, causing a regional power outage, or disrupting an oil or gas pipeline.
• Cyberespionage. Rogue governments or nation-states carry out or sponsor cyberespionage attacks to spy on rival nations and gather sensitive, secret, or confidential intelligence, such as troop
locations or military strategies.
Strategies to defend against cyberterrorism
In the past, cyberterrorism mostly targeted government entities. But now, businesses and other organizations are becoming tar gets as well, so they must implement extensive cybersecurity
measures and vigilance to counter cyberterrorism. For one, they must ensure that all internet of things devices are secured and inaccessible via public networks. To protect against ransomware and
similar types of attacks, they must back up systems regularly and implement continuous monitoring techniques. They must also use firewalls, antivirus software, and antimalware to protect their
systems from these attack vectors. Companies must also implement controls and IT security policies to protect business data. This includes limiting access to sensitive data and enforcing strict
password and authentication procedures, like two-factor authentication or multifactor authentication.

International efforts to combat cybercrime and cyberterrorism


The National Cyber Security Alliance is a public-private partnership to promote cybersecurity awareness and create a more secure and interconnected world. It is contributing to the global fight
against cybercrime and cyberterrorism. Similarly, the U.S. Department of Homeland Security (DHS) coordinates with other publi c sector agencies and private sector partners. It shares information
on potential terrorist activity and how to protect national security, as well as counterterrorism measures that the U.S. -- and all countries -- can implement to combat the (growing) problem of
cyberterrorism.
The Council of Europe's Convention on Cybercrime (also known as the Budapest Convention on Cybercrime) is the world's first -ever international treaty that seeks to address cybercrime and
cyberwarfare by getting countries to cooperate with each other, share information, and harmonize their national laws. As of 2024, 69 countries have ratified the Convention. Another 22 have been
invited to accede.
The United Nations has also proposed a major cybercrime treaty that is likely to address multiple topics, including internati onal cooperation, access to digital evidence by law enforcement
authorities, and procedural safeguards. Its text and all associated negotiations are expected to be finalized in 2024.

Unit 2 Page 18
Cyber Defamation
08 April 2024 13:56

Introduction
The growth and development of technology have brought a drastic change in the world. The Internet has made many things far easier for all of us through various social networking sites.
Whether it is communication or access to information, these things have become a piece of cake for all of us. But these facilities may sometimes lead to misuse also. As users can publish and
disseminate information through these social networking sites, Defamation has become a subject of concern. With the rise of so-called trends of sharing or posting information or pictures on
certain social networking sites and commenting on them have increased the risk of ‘Cyber Defamation’.

The term ‘Cyber Defamation’ basically means publishing of false statement about an individual in cyberspace that can injure or demean the reputation of that individual. In India, defamation
can be contemplated as both civil and criminal offence, and thus legal remedies are provided to the victims by the Indian judiciary system.

Cyber Defamation
The widely used social media brought a revolution not only in the Indian sphere but also all across the world. The remarkable growth of the Internet has provided people with a platform to
express their opinions, thoughts, and feelings through various forms of publications. Nonetheless, the ease of accessibility and publication in this online world has created several risks as these
digital platforms are prone to be exploited by unscrupulous Internet users in the name of freedom of speech and expression. Thus this has led to numerous cases of “Cyber Defamation”.

Cyber defamation is a new concept but the traditional definition of defamation is injury caused to the reputation of a person in the eyes of a third person, and this injury can be done by verbal
or written communication or through signs and visible representations. The statement must refer to the plaintiff, and the intention must be to lower the reputation of the person against whom
the statement has been made. On the other hand, Cyber defamation involves defaming a person through a new and far more effective method such as the use of modern Electronic devices. It
refers to the publishing of defamatory material against any person in cyberspace or with the help of computers or the Internet. If a person publishes any kind of defamatory statement against
any other person on a website or sends E-mails containing defamatory material to that person to whom the statement has been made would tantamount to Cyber defamation.

What do we understand by the term “Defamation”?

Defamation can be understood as the wrongful and intentional publication of something either in the written or oral form about a person to harm his reputation in the society. For a statement to
be considered as defamatory, the following essential elements must be fulfilled.

• There must be the publication of the defamatory statement, which means coming to the knowledge of a third party.
• The statement must refer only to the plaintiff
• The statement must be defamatory in nature.

Types of Defamation
Defamation can be bifurcated into two categories that are –

• Libel – A statement that is defamatory and is published in a written form.


• Slander – A defamatory statement spoken that means a verbal form of defamation.
Thus, the fundamental distinction between both the types is the medium in which they are expressed that is, one is expressed in a written form while the other in oral form.

Liability in Cyber Defamation

In India, a person can be made liable for defamation both under civil and criminal law.

1. Indian Penal Code


Section 499 of Indian Penal Code says that “Whoever by words either spoken or intended to be read or by signs and visual representations makes or publishes any imputation concerning any
person intending to harm or knowing or having reason to believe that such imputation will harm the reputation of such person is said, except in the cases hereinafter excepted to defame that
person.”

Section 500 of IPC provides for punishment wherein “any person held liable under section 499 will be punishable with imprisonment of two years or fine or both.”

Section 469 deals with forgery. If anyone creates a false document or fake account by which it harms the reputation of a person. The punishment of this offence can extend up to 3 years and
fine.

Section 503 of IPC deals with the offence of criminal intimidation by use of electronic means to damage one’s reputation in society.

1. Information Technology Act, 2000


Section 66A, Information Technology Act,2000 – This law has been struck down by Supreme Court in the year 2015. The section defined punishment for sending ‘offensive’ messages through
a computer, mobile or tablet. Since the government did not clarify the word ‘offensive’. The government started using it as a tool to repress freedom of speech. In 2015, the whole section was
quashed by the Supreme Court.

If a person has been defamed in cyberspace, he can make a complaint to the cyber crime investigation cell. It is a unit of the Crime Investigation Department.

Unit 2 Page 19
Right to Privacy and Data Protection on Internet
08 April 2024 13:57

The right to privacy and data protection on the internet are crucial aspects of modern digital society. With the proliferation of online activities and the vast amounts of personal data being
generated and shared, protecting individuals' privacy rights and ensuring the security of their data have become pressing concerns. Here's an overview of these concepts:

1. **Right to Privacy**: The right to privacy is a fundamental human right recognized by various international conventions and legal frameworks. It encompasses an individual's right
to control their personal information, including its collection, use, and disclosure. This right applies to both offline and online environments, including interactions on the internet.

2. **Data Protection**: Data protection refers to the measures taken to safeguard individuals' personal data against unauthorized access, use, or disclosure. It involves implementing
security protocols, encryption techniques, and privacy-enhancing technologies to ensure that data is handled responsibly and securely.

3. **Regulatory Frameworks**: Many countries have established laws and regulations specifically addressing data protection and privacy rights on the internet. For example:
- In the European Union, the General Data Protection Regulation (GDPR) sets comprehensive guidelines for the processing of personal data and grants individuals significant control
over their data.
- In the United States, various laws such as the California Consumer Privacy Act (CCPA) and sector-specific regulations like the Health Insurance Portability and Accountability Act
(HIPAA) govern data protection and privacy rights.
- Other countries have their own regulations, such as the Personal Information Protection and Electronic Documents Act (PIPEDA) in Canada and the Personal Data Protection Act
(PDPA) in Singapore.

4. **Privacy Policies and Consent**: Websites and online services are often required to have privacy policies detailing how they collect, use, and share users' personal data. Users are
typically required to provide informed consent for the processing of their data, and they should have the option to opt out or revoke consent at any time.

5. **Data Breach Notifications**: Many jurisdictions mandate that organizations notify individuals in the event of a data breach that compromises their personal information. Prompt
notification allows affected individuals to take necessary precautions, such as changing passwords or monitoring their financial accounts for suspicious activity.

6. **International Data Transfers**: With the global nature of the internet, the transfer of personal data across borders has become common. However, such transfers are subject to
regulations to ensure that adequate protections are in place, especially when transferring data to countries with differing data protection standards.

7. **Emerging Technologies**: The advent of emerging technologies like artificial intelligence (AI), big data analytics, and the Internet of Things (IoT) pose new challenges to privacy
and data protection. It's essential for regulations and safeguards to evolve alongside technological advancements to address these challenges effectively.

Overall, safeguarding the right to privacy and ensuring robust data protection mechanisms are essential for fostering trust and maintaining the integrity of the internet as a platform for
communication, commerce, and innovation.

Unit 2 Page 20
Concept of privacy
08 April 2024 13:57

The concept of privacy is multifaceted and can vary depending on cultural, societal, and individual perspectives. Generally, privacy refers to the ability of individuals to control their personal
information, interactions, and activities, and to maintain boundaries around their personal space and autonomy. Here are some key aspects of the concept of privacy:

1. **Informational Privacy**: This aspect relates to individuals' control over the collection, use, and dissemination of their personal data. It encompasses concerns about surveillance, data
mining, and the unauthorized sharing of personal information.

2. **Physical Privacy**: Physical privacy concerns the ability of individuals to control access to their bodies, personal space, and belongings. It includes aspects such as solitude,
confidentiality in personal communications, and freedom from intrusion.

3. **Psychological Privacy**: Psychological privacy pertains to individuals' rights to control their thoughts, emotions, and mental processes without undue interference or surveillance. It
involves freedom from psychological manipulation, coercion, or undue influence.

4. **Social Privacy**: Social privacy involves individuals' ability to control the disclosure of information about their social interactions, relationships, and activities. It encompasses
boundaries around social interactions and the right to manage one's public persona.

5. **Decisional Privacy**: Decisional privacy relates to individuals' autonomy and freedom to make choices without external coercion or undue influence. It involves the right to make
decisions about one's personal life, beliefs, values, and relationships without interference.

6. **Spatial Privacy**: Spatial privacy refers to individuals' control over their physical environments and the ability to maintain boundaries around spaces such as homes, workplaces, and
public areas. It involves freedom from surveillance, monitoring, or intrusion into physical spaces.

7. **Cultural and Contextual Privacy**: The concept of privacy can vary significantly across cultures and contexts. What is considered private or sensitive in one culture may not be the
same in another. Additionally, privacy expectations may vary depending on the social context, such as within families, communities, or public settings.

8. **Digital Privacy**: With the proliferation of digital technologies and online communication platforms, digital privacy has become increasingly important. It encompasses concerns about
the collection, use, and security of personal data in digital environments, as well as issues related to online tracking, surveillance, and digital identity management.

Overall, privacy is a fundamental human right essential for individual autonomy, dignity, and freedom. It serves as a protective barrier against intrusion, surveillance, and unwarranted
interference, enabling individuals to maintain control over their personal lives, identities, and relationships. However, achieving a balance between privacy rights and other societal interests,
such as security and public safety, remains a complex and ongoing challenge.

Unit 2 Page 21
Threat to privacy on internet
08 April 2024 13:57

Privacy on the internet faces numerous threats due to the nature of digital communication and the vast amounts of personal data exchanged online. Some of the key threats to privacy on the
internet include:

1. **Data Collection and Profiling**: Many websites, social media platforms, and online services collect extensive data about users' browsing habits, preferences, and behaviors. This data
is often used to create detailed user profiles for targeted advertising, personalization, and other purposes without users' explicit consent.

2. **Third-Party Tracking**: Third-party trackers, such as cookies, beacons, and tracking pixels, are embedded on websites to monitor users' online activities across different sites. This
tracking can result in the aggregation of sensitive personal information and the creation of comprehensive user profiles without users' knowledge or consent.

3. **Data Breaches**: Data breaches occur when hackers or malicious actors gain unauthorized access to databases containing users' personal information. These breaches can lead to the
exposure of sensitive data, such as names, addresses, passwords, and financial information, putting users at risk of identity theft, fraud, and other forms of cybercrime.

4. **Surveillance and Government Monitoring**: Governments, intelligence agencies, and law enforcement entities conduct online surveillance and monitoring activities to gather
intelligence, prevent criminal activity, and enforce laws. Mass surveillance programs, such as those revealed by Edward Snowden, raise concerns about privacy violations, civil liberties, and
the erosion of individual rights.

5. **Malware and Spyware**: Malicious software, such as viruses, worms, Trojans, and spyware, can compromise users' privacy by infecting their devices and stealing sensitive
information, monitoring their activities, or remotely controlling their systems. Malware attacks often exploit vulnerabilities in software or rely on social engineering tactics to deceive users
into downloading malicious programs.

6. **Phishing and Social Engineering**: Phishing attacks involve the use of deceptive emails, messages, or websites to trick users into divulging personal information, such as login
credentials, financial details, or account numbers. Social engineering tactics exploit human psychology and trust to manipulate users into revealing sensitive information or performing
actions that compromise their privacy and security.

7. **Inadequate Privacy Policies and Practices**: Many websites and online services have opaque or misleading privacy policies that fail to adequately inform users about how their data
is collected, used, and shared. Additionally, some organizations engage in unethical or irresponsible data practices, such as selling user data to third parties or failing to secure sensitive
information properly.

8. **Emerging Technologies and Privacy Risks**: Emerging technologies, such as artificial intelligence, biometrics, Internet of Things (IoT) devices, and wearable technology, introduce
new privacy risks and challenges. These technologies often involve the collection and processing of vast amounts of personal data, raising concerns about surveillance, data security, and
algorithmic discrimination.

Addressing these threats to privacy on the internet requires a multi-faceted approach involving technological solutions, regulatory frameworks, user education, and advocacy for privacy
rights. Efforts to enhance data protection, promote transparency and accountability, and empower individuals to exercise greater control over their personal information are essential for
safeguarding privacy in the digital age.

Unit 2 Page 22
Self-regulation approach to privacy
08 April 2024 13:58

The self-regulation approach to privacy involves industry-driven initiatives and voluntary measures undertaken by businesses, organizations, and online platforms to address privacy concerns
and protect users' personal information. Instead of relying solely on government regulations, self-regulation encourages companies to develop and adhere to privacy policies, standards, and
best practices that promote transparency, accountability, and user trust. Here are some key elements of the self-regulation approach to privacy:

1. **Privacy Policies and Practices**: Companies develop and publicly disclose privacy policies outlining how they collect, use, share, and protect users' personal information. These
policies should be written in clear, accessible language and provide detailed information about data handling practices, including data retention periods, security measures, and user rights.

2. **Data Minimization and Purpose Limitation**: Companies practice data minimization by collecting only the personal information necessary for legitimate business purposes and
limiting its use to those purposes specified in their privacy policies. They also adhere to purpose limitation principles, ensuring that personal data is not used for secondary purposes without
users' consent.

3. **User Consent and Control**: Companies obtain users' informed consent before collecting, processing, or sharing their personal information. They provide users with meaningful
choices and controls over their data, such as opt-in/opt-out mechanisms, privacy settings, and preferences management tools.

4. **Data Security and Integrity**: Companies implement robust security measures to protect users' personal information from unauthorized access, disclosure, alteration, or destruction.
This includes encryption, access controls, authentication mechanisms, regular security audits, and incident response procedures to address data breaches promptly.

5. **Transparency and Accountability**: Companies are transparent about their data practices and accountable for complying with their privacy policies and legal obligations. They
provide users with access to their own data, facilitate data portability, and respond to user inquiries, complaints, and requests for information or data deletion.

6. **Education and Awareness**: Companies educate users about privacy risks, best practices, and tools for protecting their personal information online. They provide clear and
understandable privacy notices, FAQs, and educational resources to help users make informed decisions about their privacy.

7. **Industry Standards and Certification Programs**: Companies adhere to industry standards, guidelines, and certification programs developed by industry associations, trade groups,
or independent organizations to demonstrate their commitment to privacy protection. These standards may cover specific sectors or domains, such as healthcare, finance, or online
advertising.

8. **Collaboration and Self-Regulatory Bodies**: Companies collaborate with other stakeholders, including industry peers, consumer advocacy groups, academics, and regulators, to
address privacy challenges collectively. They participate in self-regulatory bodies, forums, or working groups dedicated to privacy issues to share knowledge, exchange best practices, and
develop voluntary standards or codes of conduct.

While the self-regulation approach to privacy can complement government regulations and promote innovation, it also has limitations. Critics argue that self-regulatory measures may lack
enforcement mechanisms, result in inconsistent practices across industries, and prioritize business interests over user rights. Therefore, effective self-regulation requires ongoing monitoring,
evaluation, and oversight to ensure compliance and accountability, as well as periodic reassessment to adapt to evolving privacy risks and challenges.

Unit 2 Page 23
Introduction and the need for intellectual property right (IPR)
08 April 2024 14:00

Intellectual Property Rights (IPR) refer to legal rights that protect creations of the mind, such as inventions, literary and artistic works, designs, symbols, names, and images used in commerce.
These rights provide creators and innovators with exclusive rights to their creations, allowing them to benefit from their work and investment by preventing others from using, selling, or copying
their intellectual property without permission.
Intellectual Property Rights (IPR) encompass a set of legal rights granted to individuals or entities to protect their creations of the intellect. These creations can range from inventions and literary or
artistic works to symbols, designs, and even trade secrets. The primary objective of IPR is to provide creators and innovators with exclusive rights over their intellectual creations, enabling them to
benefit financially from their endeavours while also encouraging further innovation and creativity.
The concept of IPR recognizes that intangible assets, such as ideas, designs, and innovations, hold significant value in today's knowledge-based economy. Therefore, safeguarding these assets is
essential for fostering economic growth, incentivizing innovation, and promoting cultural and artistic development.
IPR typically include several forms of protection, each tailored to specific types of intellectual property:
1. Patents: Patents protect inventions, granting inventors exclusive rights to their creations for a specified period. This exclusivity enables inventors to commercialize their inventions without fear of
unauthorized use by others.
2. Copyrights: Copyrights safeguard original literary, artistic, musical, and dramatic works, giving creators the exclusive right to reproduce, distribute, perform, or display their works. Copyright
protection encourages the production of diverse cultural and creative content.
3. Trademarks: Trademarks protect symbols, names, and logos used to identify and distinguish goods and services in the marketplace. Trademark owners can prevent others from using similar marks
that could confuse consumers.
4. Trade Secrets: Trade secrets safeguard confidential information, such as formulas, processes, or techniques, that provide a competitive advantage to businesses. Unlike patents, trade secrets do
not require public disclosure and offer perpetual protection as long as the information remains confidential.
5. Design Rights: Design rights protect the visual appearance or aesthetic aspects of products, preventing unauthorized copying or imitation of unique designs.
Effective IPR frameworks balance the interests of creators, innovators, consumers, and society as a whole. They provide incentives for innovation, promote economic growth, preserve cultural
heritage, and ensure fair competition in the marketplace. By recognizing and protecting intellectual property, societies can foster a conducive environment for creativity, entrepreneurship, and
progress.

The need for Intellectual Property Rights arises from several factors:
6. Incentivizing Innovation: By granting creators and innovators exclusive rights to their inventions and creations, IPR encourages investment in research, development, and creativity. The promise of
protection fosters innovation by ensuring that innovators can profit from their ideas.
7. Protection of Investments: Developing intellectual property often requires significant investments of time, resources, and effort. IPR safeguards these investments by offering legal mechanisms to
prevent unauthorized use or exploitation of intellectual property by others.
8. Promotion of Economic Growth: Intellectual property-intensive industries contribute significantly to economic growth and job creation. Strong IPR frameworks attract investment, foster
competition, and stimulate technological advancement, thereby driving economic development.
9. Cultural and Artistic Preservation: Intellectual Property Rights protect cultural heritage and artistic expressions by providing creators with the means to control and benefit from their works. This
encourages the continued production of cultural and artistic content, preserving diverse cultural traditions and promoting creativity.
10. Consumer Protection: IPR ensures that consumers receive genuine, high-quality products and services by preventing counterfeit goods and piracy. By upholding the integrity of brands and
products, IPR safeguards consumer rights and promotes trust in the marketplace.
Overall, Intellectual Property Rights play a crucial role in fostering innovation, protecting investments, promoting economic growth, preserving cultural heritage, and ensuring consumer welfare.
Effective IPR frameworks balance the interests of creators, innovators, consumers, and society as a whole, facilitating the development and dissemination of valuable intellectual assets.

Unit 3 Page 24
IPR in India – Genesis and Development IPR in abroad
08 April 2024 14:01

The genesis and development of Intellectual Property Rights (IPR) in India, followed by a brief overview of IPR abroad.

IPR in India: Genesis and Development

The modern framework of Intellectual Property Rights in India traces its roots back to the colonial era, primarily influencedby British law. The first significant legislation pertaining to intellectual
property in India was the Indian Patents and Designs Act of 1911, which introduced a rudimentary system for patent protection. However, this law was criticized for its limited scope and colonial
biases, as it favored the interests of British inventors over those of Indian innovators.

After gaining independence in 1947, India embarked on a journey to develop its own intellectual property regime that aligned more closely with its national interests and socio-economic
priorities. Over the decades, India enacted several landmark legislations to strengthen its IPR framework:

1.The Trade Marks Act (1958): This legislation provided for the registration and protection of trademarks in India, ensuring the exclusive rights of trademark owners to use their marks in trade.

2. The Copyright Act (1957): Enacted to protect literary, artistic, musical, and other creative works, the Copyright Act introduced comprehensive provisions for copyright protection and
enforcement.

3. The Designs Act (2000): This law governs the registration and protection of industrial designs in India, aiming to promoteinnovation and creativity in design-related industries.

4. The Patents Act (1970): One of the most significant milestones in India's intellectual property journey, the Patents Act of 1970 introduced a system of process patents, limiting patentability to
inventions related to processes rather than products. This legislation was driven by the government's commitment to promotingindigenous innovation and ensuring access to essential medicines
and technologies.

5. The Geographical Indications of Goods (Registration and Protection) Act (1999): This legislation provides for the registration and protection of geographical indications (GIs) in India,
safeguarding the reputation and quality of products associated with specific geographical locations.

India's approach to intellectual property has been characterized by a delicate balance between promoting innovation and safeguarding public interests, such as access to affordable healthcare,
cultural heritage, and traditional knowledge. The country has also been actively engaged in international discussions and agreements on intellectual property, seeking to ensure that global IPR
regimes accommodate the needs and priorities of developing nations like India.

IPR Abroad:

In foreign jurisdictions, Intellectual Property Rights are governed by a variety of laws and regulations tailored to each country's legal and economic landscape. However, there are several
commonalities across international IPR frameworks:

1. TRIPS Agreement: The Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS), administered by the World Trade Organization (WTO), sets minimum standards for
intellectual property protection and enforcement among its member countries.

2. European Union (EU) Legislation: EU member states adhere to a harmonized system of intellectual property laws and regulations, including directives and regulations governing patents,
trademarks, copyrights, and other forms of intellectual property.

3. United States: The U.S. has a robust system of intellectual property protection, with comprehensive laws covering patents,trademarks, copyrights, and trade secrets. The U.S. Patent and
Trademark Office (USPTO) and the U.S. Copyright Office oversee the registration and enforcement of intellectual property rights in the country.

4. International Treaties and Conventions: Various international treaties and conventions, such as the Paris Convention for the Protection of Industrial Property and the Berne Convention for the
Protection of Literary and Artistic Works, provide mechanisms for the mutual recognition and enforcement of intellectual property rights across borders.

In summary, Intellectual Property Rights play a crucial role in both India and abroad, serving as a catalyst for innovation, economic growth, and cultural development. While each jurisdiction has
its own unique legal framework and approach to intellectual property, international cooperation and collaboration are essential for addressing global challenges and ensuring equitable access to
the benefits of innovation and creativity.

Unit 3 Page 25
Data Protection
08 April 2024 14:02

Data protection refers to the practice of safeguarding sensitive information from unauthorized access, use, disclosure, alteration, or destruction. In today's digital age, where vast amounts of personal
and sensitive data are generated, collected, and stored, ensuring the privacy and security of this data is paramount.

Data protection encompasses various principles, practices, and regulations aimed at mitigating risks associated with the processing and handling of data. Key aspects of data protection include:

1. Data Privacy: Data privacy involves controlling access to personal information and ensuring that individuals have the right to determine how their data is collected, used, and shared. Privacy laws
and regulations dictate the conditions under which personal data can be processed and establish individuals' rights regarding their data.

2. Data Security: Data security involves implementing measures to protect data from unauthorized access, misuse, or breaches. This includes encryption, access controls, firewalls, secure
authentication methods, and regular security audits to identify and address vulnerabilities.

3. Data Minimization: Data minimization involves collecting and retaining only the data that is necessary for a specific purpose. Minimizing data reduces the risk of unauthorized access or misuse and
enhances individuals' privacy by limiting the exposure of their personal information.

4. Consent Management: Obtaining informed consent from individuals before collecting, processing, or sharing their personal data is a fundamental principle of data protection. Consent should be
freely given, specific, informed, and unambiguous, and individuals should have the right to withdraw consent at any time.

5. Data Retention and Deletion: Establishing clear policies and procedures for data retention and deletion ensures that data is not retained longer than necessary for its intended purpose. Deleting
outdated or unnecessary data reduces the risk of unauthorized access or misuse and enhances compliance with data protection regulations.

6. Data Transfer and Cross-Border Data Flows: Transferring personal data across borders raises privacy and security concerns due to differing data protection laws and standards in different
jurisdictions. Adequate safeguards, such as data transfer agreements, standard contractual clauses, or binding corporate rules, may be required to ensure the lawful transfer of data internationally.

7. Regulatory Compliance: Compliance with data protection laws and regulations, such as the General Data Protection Regulation (GDPR) in the European Union, the California Consumer Privacy Act
(CCPA) in the United States, or the Personal Data Protection Bill in India, is essential for organizations to avoid legal penalties and reputational damage.

Overall, data protection is essential for maintaining individuals' privacy, fostering trust in the digital economy, and mitigating the risks associated with the processing and handling of sensitive
information. Organizations must implement robust data protection measures and adhere to applicable laws and regulations to safeguard data privacy and security effectively.

Unit 3 Page 26
Open Source Software
08 April 2024 14:11

Open Source Software (OSS) refers to software whose source code is freely available to the public, allowing users to study, m odify, and distribute the software as per the terms of its respective license.
Unlike proprietary software, which is typically developed and distributed under restrictive licenses that limit users' rights , open source software fosters collaboration, transparency, and community-
driven development.

Key characteristics of open source software include:

1. Source Code Availability: Open source software provides access to its source code, enabling users to inspect, modify, and enhance the software according to their needs. This transparency fosters trust
and collaboration within the developer community.

2. Free Redistribution: Open source licenses typically allow users to redistribute the software freely, either in its origina l form or with modifications. This enables widespread adoption and distribution of
open source projects without the need for restrictive licensing fees.

3. Derived Works: Users are allowed to create and distribute derivative works based on open source software, provided that th ey adhere to the terms of the original license. This encourages innovation
and the development of new software solutions built upon existing open source projects.

4. Community Collaboration: Open source projects often thrive on community collaboration, with developers from around the wor ld contributing code, bug fixes, documentation, and other resources to
improve the software. Collaboration platforms such as GitHub facilitate this process by providing tools for version control, issue tracking, and code review.

5. Licensing: Open source software is typically distributed under licenses approved by the Open Source Initiative (OSI), such as the GNU General Public License (GPL), Apache License, MIT License, and
BSD License. These licenses specify the terms and conditions under which the software can be used, modified, and distributed, ensuring that the freedoms of users and developers are protected.

6. Transparency and Security: The availability of source code in open source software allows for greater transparency and scr utiny, which can help identify and address security vulnerabilities more
effectively. Many eyes on the code mean that issues can be discovered and fixed quickly by the community.

Open source software is widely used across various domains, including operating systems (e.g., Linux), web servers (e.g., Apa che HTTP Server), programming languages (e.g., Python, JavaScript),
databases (e.g., MySQL, PostgreSQL), and development frameworks (e.g., TensorFlow, React).

Overall, open source software plays a vital role in driving innovation, collaboration, and democratization of technology by p roviding free and accessible tools for developers, businesses, and individuals
worldwide.

Unit 3 Page 27
Macro-economic impact of the patent system
08 April 2024 14:12

The patent system in cyber law, particularly concerning inventions related to technology and software, can have significant macro-economic impacts. Here's how:

1. Incentivizing Innovation: The patent system incentivizes innovation by granting inventors exclusive rights to their inventions for a limited period. In the realm of cyber law, patents encourage the
development of new technologies, software, and digital solutions by providing inventors with legal protection and potential financial rewards for their innovations. This incentivization leads to the
creation of new products, services, and processes that drive economic growth and competitiveness in the digital economy.

2. Fostering R&D Investment: Companies often invest substantial resources in research and development (R&D) to create innovative technologies and software solutions. The prospect of securing
patents for these inventions encourages R&D investment by providing companies with a means to protect their intellectual property and recoup their investment through exclusive rights and
potential licensing revenues. This investment in R&D not only drives technological advancement but also stimulates economic activity and job creation.

3. Promoting Technology Transfer and Licensing: The patent system facilitates technology transfer and licensing arrangements, allowing inventors and companies to monetize their intellectual
property by granting others the right to use, manufacture, or sell their patented inventions. In the context of cyber law, technology transfer and licensing agreements enable the dissemination of
innovative technologies and software solutions, fostering collaboration, knowledge sharing, and industry growth. This promotes the efficient utilization of intellectual property assets and accelerates
the pace of innovation across sectors.

4. Encouraging Competition and Market Dynamics: While patents grant inventors exclusive rights to their inventions, they also encourage competition and market dynamics by fostering innovation
and diversity in the marketplace. Patent holders must compete with other innovators and companies, driving continuous improvement, differentiation, and the introduction of new products and
services. This competition benefits consumers by offering a wider range of choices, driving down prices, and improving product quality and features.

5. Balancing Innovation and Access: While patents provide inventors with exclusive rights to their inventions, they also strike a balance between innovation and access to technology by promoting
disclosure and knowledge sharing. Patent applicants must disclose their inventions in detail, enabling others to build upon existing knowledge and further advance technology. Additionally, patent
laws may include provisions for compulsory licensing or patent pools to ensure that essential technologies are accessible for public benefit, particularly in sectors such as healthcare and
telecommunications.

Overall, the patent system in cyber law plays a crucial role in driving innovation, investment, competition, and technology transfer in the digital economy. By providing inventors with incentives to
create and protect their inventions, patents contribute to economic growth, technological advancement, and societal progress. However, it's essential to strike a balance between incentivizing
innovation and promoting access to essential technologies to ensure that the benefits of the patent system are realized by society as a whole.

Unit 3 Page 28
Patent and kind of inventions protected by a patent
08 April 2024 14:14

Patents protect various types of inventions and innovations across a wide range of fields, including technology, science, engineering, medicine, and design. The primary requirement for an invention to be
eligible for patent protection is that it must be novel, non-obvious, and useful. Here are some common types of inventions that can be protected by a patent:

1. Utility Patents: Utility patents are the most common type of patent and cover new and useful processes, machines, articles of manufacture, or compositions of matter. Examples of inventions
protected by utility patents include:
- Manufacturing processes
- Mechanical devices
- Chemical compositions
- Software algorithms
- Biotechnological innovations

2. Design Patents: Design patents protect the ornamental design or appearance of a functional item. Unlike utility patents, which focus on the functionality or utility of an invention, design patents focus
on the aesthetic aspects. Examples of inventions protected by design patents include:
- Product designs (e.g., smartphones, furniture)
- Graphic icons and user interfaces
- Packaging designs
- Textile patterns

3. Plant Patents: Plant patents protect new varieties of asexually reproduced plants, such as through grafting or cuttings. To be eligible for a plant patent, the new variety must be distinct, uniform, and
stable. Examples of inventions protected by plant patents include:
- New varieties of fruit trees
- Ornamental plants and flowers
- Hybrid plant varieties developed through selective breeding

4. Software Patents: In some jurisdictions, including the United States, software inventions may be eligible for patent protection if they meet the criteria of novelty, non-obviousness, and utility. Software
patents typically cover novel algorithms, methods, or processes implemented through computer code. Examples of software inventions protected by patents include:
- Data compression algorithms
- Encryption methods
- Search engine algorithms
- User interface innovations

5. Biotechnological Patents: Biotechnological inventions encompass a wide range of innovations in fields such as genetics, molecular biology, and pharmaceuticals. Biotechnological patents may cover:
- Genetically engineered organisms
- Therapeutic antibodies and proteins
- Diagnostic methods and tools
- Gene editing technologies like CRISPR

It's important to note that patentability requirements and standards may vary between jurisdictions, and not all inventions are eligible for patent protection. Additionally, inventions must be disclosed in
sufficient detail to enable others skilled in the field to replicate or implement them based on the patent specification.

Unit 3 Page 29
Patent document How to protect your inventions?,
08 April 2024 14:15

A patent document is a legal document issued by a government authority, such as a patent office, granting exclusive rights to an inventor or assignee for a specified invention. It contains detailed information
about the patented invention, including its description, claims, drawings, and any other relevant information. Patent documen ts serve several purposes:

1. Legal Protection: A patent document provides legal protection for an invention, granting the patent holder exclusive rights to make, use, sell, or import the patented invention for a limited period, typically 20
years from the filing date of the patent application.

2. Public Disclosure: Patent documents serve as a public disclosure of the patented invention, providing detailed information about its features, f unctionality, and implementation. This promotes transparency,
encourages innovation, and facilitates knowledge sharing within the scientific and technological community.

3. Enforcement: Patent documents can be used to enforce the patent holder's rights against unauthorized use, manufacture, or sale of the pate nted invention by third parties. Patent holders can initiate legal
proceedings, such as infringement lawsuits, to protect their intellectual property rights and seek remedies for infringement.

4. Licensing and Commercialization: Patent documents enable patent holders to license their inventions to others for commercialization, research, or development purposes. Licensing agreements allow third
parties to use the patented invention in exchange for royalties or other financial compensation, facilitating the transfer of technology and promoting innovation.

5. Prior Art: Patent documents also serve as prior art for subsequent patent applications, providing a basis for evaluating the novelty and non-obviousness of new inventions. Patent examiners and researchers
use patent documents to assess the state of the art in a particular field and determine whether an invention meets the criter ia for patentability.

The contents of a patent document typically include:

Title: The title of the invention, which succinctly describes the nature of the patented invention.
Abstract: A brief summary of the invention, highlighting its key features and advantages.
Description: A detailed description of the invention, including its technical aspects, functionality, and implementation. The description should enable a person skilled in the relevant field to understand and
replicate the invention.
Claims: The claims define the scope of the patent protection, specifying the particular features or elements of the invention that ar e protected. Patent claims are drafted in legal language and must be clear,
concise, and supported by the description.
Drawings: Diagrams, illustrations, or drawings that accompany the description to provide visual representations of the invention and ai d in understanding its structure and operation.

Overall, patent documents play a crucial role in protecting and promoting innovation by providing legal protection, facilitat ing knowledge dissemination, and enabling commercialization of patented inventions.

Protecting your inventions through a patent involves several steps and considerations. Here's a general overview of the proce ss:

1. Conduct a Patent Search:


- Before proceeding with a patent application, it's crucial to conduct a thorough search to determine if your invention is nove l and not already patented or publicly disclosed.
- Search databases, patent repositories, and relevant literature to identify similar inventions or prior art that may affect th e patentability of your invention.

2. Evaluate Patentability:
- Assess whether your invention meets the criteria for patentability, including novelty, non -obviousness, and utility.
- Consider consulting with a patent attorney or agent to evaluate the patentability of your invention and determine the best st rategy for protection.

3. Document Your Invention:


- Keep detailed records of your invention, including sketches, diagrams, laboratory notes, prototypes, and test results.
- Document the development process, key features, and innovative aspects of your invention to support your patent application.

4. File a Patent Application:


- Prepare and file a patent application with the relevant patent office. The application should include a detailed description of the invention, along with any drawings, claims, and supporting documents.
- Choose the appropriate type of patent application based on your invention (e.g., utility patent, design patent) and the juris diction in which you seek protection.

5. Prosecute Your Patent Application:


- Work with a patent attorney or agent to navigate the patent examination process and respond to any office actions or objectio ns raised by the patent examiner.
- Amend the patent application as necessary to address any concerns raised by the examiner and enhance the chances of patent is suance.

6. Obtain Patent Grant:


- If the patent office determines that your invention meets the patentability requirements, your patent application will be gra nted, and you will receive a patent certificate.
- The patent grant provides you with exclusive rights to your invention for a specified period, typically 20 years from the fil ing date of the application, during which you can prevent others from making, using,
selling, or importing your invention without your permission.

7. Maintain and Enforce Your Patent:


- Pay maintenance fees and comply with any other requirements to keep your patent in force throughout its term.
- Monitor the marketplace for potential infringement of your patent rights and take appropriate legal action to enforce your ri ghts against unauthorized use or infringement.

8. Consider International Protection:


- If you plan to market your invention globally, consider filing for patent protection in multiple countries or regions to safe guard your intellectual property rights internationally.
- Explore options such as the Patent Cooperation Treaty (PCT) or regional patent systems to streamline the international patent filing process.

Throughout the patenting process, it's essential to work closely with a qualified patent attorney or agent who can provide ex pert guidance and assistance in navigating the complexities of patent law and
maximizing the protection of your inventions.

Unit 3 Page 30
Granting of patent, Rights of a patent
08 April 2024 14:15

The granting of a patent by a government authority confers certain exclusive rights to the patent holder for a specified invention. These rights are typically outlined in the patent law of the relevant jurisdiction and
are subject to certain conditions and limitations. Here are the primary rights associated with a granted patent:

1. Exclusive Right to Use: The patent holder has the exclusive right to use the patented invention for the duration of the patent term, typically 20 years from the filing date of the patent application. This right allows
the patent holder to exploit the invention commercially, either by manufacturing, selling, importing, or using the patented product or process.

2. Exclusive Right to Exclude Others: The patent holder has the exclusive right to exclude others from making, using, selling, offering for sale, or importing the patented invention without permission. This right
enables the patent holder to prevent competitors and third parties from exploiting the patented invention without authorization, thereby protecting the commercial value of the invention.

3. Right to License: The patent holder has the right to license the patented invention to others for commercialization, research, or development purposes. Licensing agreements allow third parties to use the
patented invention in exchange for royalties or other financial compensation, enabling the patent holder to generate revenue from the invention without directly engaging in commercial activities.

4. Right to Enforce: The patent holder has the right to enforce their patent rights against unauthorized use, manufacture, or sale of the patented invention by third parties. The patent holder can initiate legal
proceedings, such as infringement lawsuits, to protect their intellectual property rights and seek remedies for infringement, including injunctions, damages, and attorney fees.

5. Right to Assign or Transfer: The patent holder has the right to assign or transfer their patent rights to another party, either partially or entirely. Patent assignments involve transferring ownership of the patent to a
new owner, while patent licenses involve granting permission to use the patented invention without transferring ownership. Assignments and licenses are typically documented through written agreements and may
involve the payment of consideration or royalties.

It's important to note that while patents grant exclusive rights to the patent holder, these rights are subject to certain limitations and exceptions, including:

Non-Infringing Uses: Patents do not grant the patent holder the right to prevent others from using the patented invention for non-infringing purposes, such as research, education, or private use.
Exhaustion Doctrine: Once a patented product is lawfully sold or distributed by the patent holder, the patent rights are said to be "exhausted," and the purchaser can use or resell the product without further
restrictions from the patent holder.
Compulsory Licensing: In certain circumstances, governments may grant compulsory licenses to third parties to use a patented invention without the consent of the patent holder, typically for reasons of public
interest, national security, or antitrust concerns.

Overall, the rights associated with a granted patent provide the patent holder with exclusive control over the commercial exploitation of the patented invention, enabling them to derive economic benefits from their
innovation and incentivizing further research, development, and investment in new technologies.

Unit 3 Page 31
What is copyright?
08 April 2024 14:15

Copyright
What Is Copyright?
Copyright is the legal right given to an intellectual property owner. As the term suggests, it is the right to copy. Thus, copyright meaning is that when a person creates a product, they own the right to it.
So, only that individual can have the exclusive right to reproduce that work or anyone they give authorization to. Copyright law grants the original creators of the product an exclusive right to use it
further or duplicate the product for a specific time. At this point, the item that has been copyrighted develops into the public domain.

Copyright Definition
A legal right granted to an intellectual property owner is copyright. It helps protect the creator of the original material so that no one can duplicate or use it without authorization. If an original work
needs protection through copyright laws, it must be in a tangible form. For instance, the Indian Copyright Act protects the creator's work by law until 60 years after their death.

How Copyrighting Works


After learning what is copyright, it is essential to understand how it works. When you create an original product and put in a significant amount of mental activity to develop it, it gets labelled as
intellectual property. This property needs protection from people who may duplicate it without authorization.

For instance, art, novels, computer software, films, website content, poetry, musical lyrics, and more are all unique creations. So, Copyright meaning, acts as a protection to legally safeguard that
original creation. The copyright law states that a work is original if the author made it by thinking independently and not copying it from somewhere. If you have that copyright to your product, no one
can use or replicate your work.

The original owner can voluntarily register that copyright to get the upper hand. Although, not every work is eligible to be copyrighted. For instance, you cannot protect an idea or theory with copyright.
Similarly, logos, names of brands, slogans, etc., are not up for protection by the law of copyright.

As per the copyright definition, the work must be in a tangible form so it can be copyrighted. You will have to write down the speech, idea, discovery, etc., in a physical form to make it eligible for
protection by copyright.

Difference between Copyright, Trademarks and Patents


Copyright meaning tells us that it is not all-encompassing, but trademark and patent laws can enforce additional sanctions. We often use the terms copyright, trademark andpatent interchangeably,
but in reality, they provide your intellectual property with different types of protection.
Trademark laws protect material that one uses to differentiate a person's or corporation's work from another entity. For instance, logos, brand names, slogans, etc. All this is not covered by copyright
law.
On the other hand, patents are for inventions for a limited time. For instance, machines, chemical positions, industrial processes, etc., can be patented materials.
What is copyright meaning? Give an example?
Copyright meaning tells us that one can get an exclusive right to make a copy or copies of their original work and sell them in the market. For instance, a copyright example protects against selling
Michael Jackson's music as your own.
What makes a work copyrighted?
The work must be creative and in tangible form.
Why is copyright so important?
It is essential because it protects the value of the creator's work by giving the original owner the ability to protect it from being used without a license or any credit.

Key aspects of copyright include:

1. Exclusive Rights: Copyright grants creators a bundle of exclusive rights to their works, including the rights to reproduce, distribute, perform, display, and create derivative works based on the original
work. These rights enable creators to control how their works are used and to benefit financially from their creations.

2. Automatic Protection: In most countries, copyright protection is automatic upon the creation of an original work in a tangible form of expression. There is no requirement to register the work or affix
a copyright notice, although registration may provide certain legal benefits and remedies in case of infringement.

3. Duration of Protection: Copyright protection typically lasts for a specific period, which varies depending on the jurisdiction and type of work. In many countries, copyright protection lasts for the life
of the author plus a certain number of years after their death (e.g., 70 years in many jurisdictions). After the copyright term expires, the work enters the public domain and can be freely used by anyone.

4. Fair Use or Fair Dealing: Copyright laws often include provisions for "fair use" (in the United States) or "fair dealing" (in other jurisdictions), which allow limited use of copyrighted works without
permission from the copyright owner for purposes such as criticism, commentary, news reporting, teaching, scholarship, or research. Fair use/fair dealing is determined on a case-by-case basis and
considers factors such as the purpose and character of the use, the nature of the copyrighted work, the amount and substantiality of the portion used, and the effect on the potential market for the
original work.

5. Moral Rights: In addition to economic rights, copyright laws in some jurisdictions also recognize "moral rights" that protect the integrityand attribution of the author's work. Moral rights typically
include the right of attribution (to be identified as the author of the work) and the right of integrity (to prevent distortion, mutilation, or modification of the work that would harm the author's
reputation).

Copyright plays a crucial role in protecting the rights of creators, encouraging creativity and innovation, and fostering thedissemination of knowledge and culture. It provides an incentive for creators to
produce new works by ensuring that they can benefit from their efforts and investments in the creation of original content.

Unit 4 Page 32
Latest editions of Designs
08 April 2024 14:16

As of my last update in January 2022, the latest editions of designs are not usually referred to by a specific version number like software or books. Instead, updates to design standards, guidelines, or
methodologies may occur periodically, but they are often referred to by the year of publication or revision. For example:

1. ISO Standards: The International Organization for Standardization (ISO) periodically updates its standards related to design practices and methodologies. The latest editions or revisions of ISO
standards related to design may include ISO 13407: Human-centered design processes for interactive systems and ISO 9241: Ergonomics of human-system interaction.

2. Design Guidelines: Various organizations and industries publish design guidelines and best practices to inform designers and practitioners about current trends, methodologies, and principles in
design. These guidelines may be updated periodically to reflect changes in technology, user preferences, or industry standards.

3. Software Design Tools: Design software tools and applications, such as Adobe Creative Suite, Sketch, Figma, and InVision, often release updates and new versions with enhanced features,
improvements, and bug fixes. Designers may refer to the latest versions of these tools to stay up-to-date with the latest design capabilities.

4. Design Publications: Design-related publications, journals, and magazines may release new editions or issues periodically, featuring articles, case studies, and insights on design trends, innovations,
and practices. Examples include "Design Issues," "Communication Arts," "Eye Magazine," and "Design Observer."

To find the latest editions or updates in the field of design, it's recommended to consult relevant sources such as professional organizations, academic journals, industry publications, and official
standards bodies. Additionally, staying connected with the design community through conferences, workshops, and online forums can provide insights into the latest developments and trends in design
practice and theory.

Unit 4 Page 33
what is covered by copyright?
08 April 2024 14:16

Copyright covers a wide range of creative works and expressions, including but not limited to:

1. Literary Works: This category includes novels, short stories, poems, essays, articles, blogs, and other written content.

2. Artistic Works: Artistic works encompass visual creations such as paintings, drawings, sculptures, photographs, illustrations, graphic design s, and digital art.

3. Musical Works: Musical works include compositions, songs, melodies, lyrics, and musical arrangements.

4. Dramatic Works: Dramatic works cover plays, scripts, screenplays, choreography, and other theatrical or performance -based works.

5. Architectural Works: Architectural works refer to designs, plans, blueprints, and drawings of buildings and structures.

6. Audiovisual Works: This category includes films, videos, television shows, documentaries, animations, and multimedia presentations.

7. Computer Programs: Copyright also protects computer programs, software code, applications, and databases, including both source code and object code.

8. Sound Recordings: Sound recordings encompass recorded performances, music albums, podcasts, audiobooks, and other audio content.

9. Broadcasts: Copyright covers broadcasts of radio and television programs, as well as live streaming and webcasts.

10. Compilation Works: Compilation works involve the selection, arrangement, and organization of pre-existing materials, such as anthologies, collections, databases, directories, and
encyclopaedias.

It's important to note that copyright protects the expression of ideas, not the ideas themselves. This means that while the s pecific form or expression of a creative work is protected by copyright,
the underlying ideas, facts, concepts, or methods are not. Additionally, copyright protection arises automatically upon the c reation of an original work in a tangible form of expression, and
registration or formalities are not required to secure copyright protection (although registration may provide certain legal benefits and remedies).

Unit 4 Page 34
How long does copyright last?
08 April 2024 14:16

The duration of copyright protection varies depending on several factors, including the type of work, the jurisdiction, and w hen the work was created or published. In general, copyright protection lasts for a specific
period of time, after which the work enters the public domain and can be freely used by anyone. Here are some general guideli nes for the duration of copyright:

1. Individual Authors and Creators:


- In many countries, copyright protection for works created by individual authors, such as literary, artistic, musical, and oth er creative works, typically lasts for the life of the author plus a certain number of years
after their death. This period is often referred to as the "author's life plus" term.
- The duration of copyright may vary between jurisdictions, but it is commonly set at 50 years, 70 years, or more after the aut hor's death.

2. Anonymous and Pseudonymous Works:


- For works published anonymously or under a pseudonym, copyright protection may last for a specific period from the date of pu blication or creation, depending on the jurisdiction.
- Once the term of protection expires, the work may enter the public domain unless the identity of the author becomes known dur ing the copyright term.

3. Corporate and Anonymous Works:


- For works created by corporations, governments, or other legal entities, as well as works published anonymously or without an identified author, copyright protection may last for a specific period from the date
of publication or creation, depending on the jurisdiction.
- The duration of copyright for corporate and anonymous works may be shorter than the term for individual authors' works.

4. Works Created or Published Before Certain Dates:


- The duration of copyright for works created or published before specific dates may be subject to different rules and transiti onal provisions.
- In some jurisdictions, works that were already in the public domain as of a certain date may remain in the public domain, whi le works that were still under copyright protection may be subject to extended terms.

It's important to consult the copyright laws and regulations of the relevant jurisdiction to determine the specific duration of copyright protection for a particular work. Additionally, the duration of copyright may be
affected by factors such as international agreements and treaties, changes in copyright law, and individual circumstances rel ated to the creation and publication of the work.

Unit 4 Page 35
Why protect copyright?
08 April 2024 14:16

Copyright protection serves several important purposes, which ultimately contribute to fostering creativity, innovation, and cultural development. Here are some key reasons why copyright is protected:

1. Incentivizing Creativity: Copyright protection provides creators with the exclusive rights to their works, enabling them to control how their creations are used and to benefit financially from their efforts. By
providing creators with economic incentives and rewards for their creative endeavors, copyright encourages the production of new and original works across various fields, including literature, music, art, film,
software, and other creative industries.

2. Promoting Innovation and Progress: Copyright protection fosters innovation and progress by incentivizing the creation and dissemination of new ideas, expressions, and cultural works. By granting creators
exclusive rights to their works for a limited period, copyright encourages investment in creative endeavors, research, development, and experimentation, leading to the production of new and diverse cultural
works that enrich society and contribute to human knowledge and understanding.

3. Supporting Economic Growth and Job Creation: Copyright protection contributes to economic growth and job creation by stimulating the growth of creative industries, supporting cultural production and
distribution, and generating revenue streams for creators, publishers, distributors, and other stakeholders in the creative ecosystem. Creative industries, including publishing, music, film, television, software,
and design, play a significant role in driving economic activity, employment, and innovation in many countries around the world.

4. Preserving Cultural Heritage and Diversity: Copyright protection helps preserve and promote cultural heritage, traditions, and diversity by safeguarding the rights of creators and communities to control and
protect their cultural expressions, folklore, and traditional knowledge. Copyright enables creators to share, transmit, and preserve cultural works, stories, languages, and customs for future generations,
contributing to cultural identity, cohesion, and inclusivity.

5. Encouraging Access to Knowledge and Education: While copyright grants creators exclusive rights to their works, it also includes provisions for exceptions and limitations that balance the interests of
creators with the public interest in access to knowledge, education, and information. Copyright exceptions, such as fair use/fair dealing, educational use, library and archive exceptions, and public domain
access, facilitate the use of copyrighted works for purposes such as research, teaching, criticism, commentary, and transformative use, promoting access to knowledge and cultural enrichment.

Overall, copyright protection plays a crucial role in fostering creativity, innovation, cultural development, and economic prosperity by incentivizing the production and dissemination of creative works and
ensuring a balance between the rights of creators and the public interest in access to culture and knowledge.

Unit 4 Page 36
What are related rights?
08 April 2024 14:16

In the context of Intellectual Property Rights (IPR), related rights refer to legal protections granted to individuals and en tities that are closely associated with the creation, production, or dissemination of
creative works, performances, and recordings. Related rights are distinct from copyright but share similarities in terms of t heir objectives and legal protections. The main categories of related rights in IPR
include:

1. Performers' Rights: Performers' rights protect the interests of individuals who perform artistic, musical, dramatic, or other creative works in f ront of an audience or in a recorded format. Performers' rights
typically include rights such as the right to control the use of their performances, the right to receive equitable remunerat ion for their performances, and the right to prevent unauthorized recordings,
broadcasts, or distributions of their performances.

2. Producers' Rights: Producers' rights protect the interests of individuals or entities that invest resources in the production, recording, or dis tribution of creative works, such as sound recordings, films, or
broadcasts. Producers' rights typically include rights such as the right to control the reproduction, distribution, and publi c performance of their productions, the right to receive royalties or licensing fees for the
use of their productions, and the right to prevent unauthorized copying, distribution, or broadcasting of their productions.

3. Broadcasting Rights: Broadcasting rights protect the interests of broadcasters that transmit radio, television, or internet broadcasts of creative works, including music, news, sports, and entertainment
programming. Broadcasting rights typically include rights such as the right to control the transmission, retransmission, or r ebroadcasting of their broadcasts, the right to receive licensing fees or royalties for the
use of their broadcasts, and the right to prevent unauthorized recording, distribution, or rebroadcasting of their broadcasts .

4. Moral Rights of Performers and Producers: Similar to the moral rights of authors in copyright law, performers and producers may have moral rights that protect the inte grity and attribution of their
performances or productions. Moral rights may include rights such as the right to be identified as the performer or producer of a work, the right to prevent distortion, mutilation, or modification of a work that
would harm the performer's or producer's reputation, and the right to prevent unauthorized association of a work with a produ ct, service, or cause.

Related rights play a crucial role in supporting the creative industries, promoting the interests of performers, producers, b roadcasters, and other stakeholders, and ensuring a fair and equitable distribution of
revenues and benefits within the creative ecosystem. Like copyright, related rights are governed by national laws, internatio nal treaties, and collective management organizations that administer and enforce
related rights on behalf of rights holders.

Unit 4 Page 37
Distinction between related rights and copyright?
08 April 2024 14:16

Aspect Related Rights Copyright


Protection Protects performers, producers, broadcasters, and other stakeholders involved in the Protects the
Scope production and dissemination of creative works, performances, and recordings. creators/authors of original
literary, artistic, musical,
and other creative works.
Type of Covers performances, productions, broadcasts, and recordings of creative works, Covers original literary
Works including music, films, radio/TV programs, and live performances. works, artistic works,
musical compositions, and
other creative expressions.
Rights Performers' rights, producers' rights, broadcasting rights, and moral rights. Exclusive rights such as
Granted reproduction, distribution,
public performance,
adaptation, and moral
rights.
Beneficiari Performers, producers, broadcasters, and related stakeholders in the creative industry. Authors, creators, and
es copyright holders of
original works.
Duration Typically granted for specific periods depending on the jurisdiction and type of right. Generally lasts for the life
of the author plus a certain
number of years after their
death.
Purpose Protects the interests of individuals or entities involved in the creation, production, and Encourages and rewards
and distribution of creative content. creativity by granting
Function exclusive rights to authors
and creators of original
works.
Examples Performers' rights protect live performers, such as musicians and actors, and their Copyright protects authors
performances. Producers' rights protect individuals or companies that invest in the of novels, poems, songs,
production of sound recordings, films, or broadcasts. Broadcasting rights protect paintings, sculptures, films,
broadcasters that transmit radio, television, or internet broadcasts of creative works. and other original works.
Moral rights protect the integrity and attribution of performers' and producers' works.
This table provides a concise comparison between related rights and copyright, highlighting their respective
scopes, beneficiaries, durations, purposes, and examples.

Unit 4 Page 38
What is a trademark?
08 April 2024 14:17

A trademark is a distinctive sign, symbol, logo, word, phrase, design, or combination thereof that is used by individuals, bu sinesses, organizations, or other entities to identify and distinguish
their goods or services from those of others in the marketplace. Trademarks serve as a form of intellectual property protecti on for brands and help consumers recognize and associate products
or services with a particular source or origin.
A trademark can be any word, phrase, symbol, design, or a combination of these things that identifies your goods or services. It’s how cu stomers recognize you in the marketplace and
distinguish you from your competitors.
The word “trademark” can refer to both trademarks and service marks. A trademark is used for goods, while a service mark is used for services.
A trademark:
• Identifies the source of your goods or services.
• Provides legal protection for your brand.
• Helps you guard against counterfeiting and fraud.
A common misconception is that having a trademark means you legally own a particular word or phrase and can prevent others fr om using it. However, you don’t have rights to the word or
phrase in general, only to how that word or phrase is used with your specific goods or services.
For example, let's say you use a logo as a trademark for your small woodworking business to identify and distinguish your goo ds or services from others in the woodworking field. This doesn't
mean you can stop others from using a similar logo for non-woodworking related goods or services.
Another common misconception is believing that choosing a trademark that merely describes your goods or services is effective . Creative and unique trademarks are more effective and easier
to protect. Read more about strong trademarks.

Owning a trademark vs. having a registered trademark


You become a trademark owner as soon as you start using your trademark with your goods or services. You establish rights in your trademark by using it, bu t those rights are limited, and they
only apply to the geographic area in which you’re providing your goods or services. If you want stronger, nationwide rights, you’ll need to apply to register your trademark with us.
You’re not required to register your trademark. However, a registered trademark provides broader rights and protections than an unregistered one.
For example, you use a logo as a trademark for the handmade jewelry you sell at a local farmer’s market. As your business gro ws and you expand online, you might want more protection for
your trademark and decide to apply for federal registration. Registering your trademark with us means that you create nationwide rights in your trademark.

Using the trademark symbols TM, SM, and ®


Every time you use your trademark, you can use a symbol with it. The symbol lets consumers and competitors know you’re claiming the trademark as yours. You can use “TM” for goods or
“SM” for services even if you haven’t filed an application to register your trademark.
Once you register your trademark with us, use an ® with the trademark. You may use the registration symbol anywhere around th e trademark, although most trademark owners use the symbol
in a superscript or subscript manner to the right of the trademark. You may only use the registration symbol with the tradema rk for the goods or services listed in the federal trademark
registration.

Key aspects of trademarks include:

1. Identification and Distinction: Trademarks are used to identify and distinguish the goods or services of one party from those of others in the marketplace. T hey help consumers recognize and
associate specific brands with certain qualities, characteristics, or attributes.

2. Source of Origin: Trademarks serve as indicators of the source or origin of goods or services, signalling to consumers the manufacturer, produc er, distributor, or provider associated with a
particular product or service.

3. Protection of Brand Identity: Trademarks help protect the reputation, goodwill, and brand identity of businesses and organizations by preventing unauthoriz ed use or infringement of their
distinctive marks by competitors or third parties.

4. Exclusive Rights: Trademark owners have the exclusive right to use their marks in connection with the goods or services for which the marks are registered. They can prevent others from
using identical or similar marks that are likely to cause confusion, deception, or dilution of their brand.

5. Registration and Enforcement: While trademark rights can arise through use in commerce, registration with the relevant trademark office provides additional legal protections and benefits,
including the presumption of ownership, nationwide or international protection, and the ability to enforce rights against inf ringers through legal proceedings.

6. Renewal and Maintenance: Trademark registrations typically require periodic renewal and maintenance to remain in force. Trademark owners must actively use their marks in commerce
and comply with renewal and maintenance requirements to preserve their rights and prevent the loss of trademark protection.

Examples of trademarks include company names, product names, logos, slogans, jingles, packaging designs, and other distinctiv e marks used to identify and distinguish goods or services in the
marketplace. Well-known trademarks such as Coca-Cola, Nike, Apple, and McDonald's are widely recognized and associated with specific brands, products, or services around the world.

Unit 4 Page 39
Rights of trademark?
08 April 2024 14:17

The rights associated with a trademark are the exclusive rights granted to the owner of the trademark to use the mark in connection with specific goods or services and to prevent others from using
similar marks in a way that could cause confusion, deception, or dilution of the brand. These rights typically include:

1. Exclusive Use: The trademark owner has the exclusive right to use the trademark in connection with the goods or services for which it is registered. This exclusive right allows the owner to distinguish
their products or services from those of others and to build brand recognition and loyalty among consumers.

2. Preventing Infringement: The trademark owner has the right to prevent others from using identical or confusingly similar trademarks in connection with similar or related goods or services. This
includes preventing competitors from using marks that are likely to cause confusion among consumers about the source or origin of the goods or services.

3. Enforcement: The trademark owner has the right to enforce their trademark rights against unauthorized use or infringement by third parties. This may involve taking legal action, such as filing a
trademark infringement lawsuit, seeking injunctive relief, or pursuing other remedies to stop the unauthorized use of the trademark and to obtain damages or other relief for the infringement.

4. Licensing: The trademark owner has the right to license or authorize others to use the trademark under specific terms and conditions. Trademark licensing agreements allow third parties, such as
distributors, franchisees, or manufacturers, to use the trademark in connection with authorized products or services, typically in exchange for royalties or licensing fees.

5. Assignment: The trademark owner has the right to assign or transfer their trademark rights to another party, either partially or entirely. Trademark assignments involve transferring ownership of the
trademark to a new owner, who assumes all rights and responsibilities associated with the mark.

6. Renewal and Maintenance: The trademark owner has the responsibility to maintain and renew their trademark registration to keep it in force. This typically involves filing periodic renewal
applications and complying with maintenance requirements, such as demonstrating continued use of the mark in commerce.

7. Protection from Dilution: In some jurisdictions, trademark owners may have the right to prevent dilution of their trademarks, which occurs when the distinctiveness or uniqueness of the mark is
weakened by unauthorized use or association with unrelated goods or services.

Overall, the rights associated with a trademark provide the owner with valuable legal protections and the ability to protect and enforce their brand identity, reputation, and goodwill in the marketplace.

Unit 4 Page 40
What kind of signs can be used as trademarks?, types of trademark,
function does a trademark perform, How is a trademark protected?,
How is a trademark registered?
08 April 2024 14:17

1. What kind of signs can be used as trademarks?


Trademarks can take various forms, including:

- Words: Any word, combination of words, or phrase that uniquely identifies a product or service can be used as a trademark. Examples include brand names like "Nike," "Apple," and "Coca-Cola."
- Logos: Designs, symbols, graphics, or emblems that serve as visual representations of a brand can be used as trademarks. Examples include the Nike "swoosh," the Apple logo, and the McDonald's golden
arches.
- Letters or numerals: Individual letters or numerals, as well as combinations thereof, can function as trademarks. For example, "IBM" and "3M" are registered trademarks.
- Slogans: Catchphrases, slogans, or taglines that are associated with a particular brand or product can be used as trademarks. Examples include "Just Do It" (Nike) and "I'm Lovin' It" (McDonald's).
- Shapes: Distinctive shapes or configurations of products or packaging can function as trademarks. Examples include the Coca-Cola bottle shape and the Toblerone chocolate bar triangular shape.
- Sounds: Unique sounds or jingles associated with a brand or product can be registered as trademarks. Examples include the NBC chimes and the Intel jingle.

2. Types of trademarks:
Trademarks can be classified into various types based on their distinctiveness and the level of protection they receive. The main types of trademarks include:

- Arbitrary or fanciful marks: These are inherently distinctive marks that bear no logical connection to the goods or services they represent. Examples include "Apple" for computers and "Exxon" for fuel.
- Suggestive marks: These marks indirectly suggest a characteristic or quality of the goods or services they represent, requiring some imagination or thought to understand their association. Examples include
"Netflix" for streaming services and "Microsoft" for software products.
- Descriptive marks: These marks directly describe a characteristic or quality of the goods or services they represent, making them less inherently distinctive and requiring acquired distinctiveness through
use. Examples include "Vision Center" for eyewear stores and "All-Bran" for cereal products.
- Generic marks: These marks consist of common terms or names that refer to the general category of goods or services they represent and cannot be registered as trademarks. Examples include
"Computer" for computers and "Beer" for beer products.

3. Function of a trademark:
Trademarks serve several important functions in the marketplace, including:

- Identifying the source or origin of goods or services


- Distinguishing a company's products or services from those of competitors
- Building brand recognition and reputation among consumers
- Assuring consumers of consistent quality and reliability
- Serving as a valuable asset for businesses and contributing to brand equity and goodwill

4. How is a trademark protected?


Trademarks are protected through various legal mechanisms, including:

- Common law rights: Trademark rights arise automatically through use in commerce, providing some level of protection against unauthorized use or infringement by others.
- Statutory registration: Trademark owners can register their trademarks with the relevant government authority, such as the United States Patent and Trademark Office (USPTO) in the United States or the
European Union Intellectual Property Office (EUIPO) in the European Union, to obtain enhanced legal protections and benefits.
- Enforcement: Trademark owners can enforce their rights against unauthorized use or infringement by third parties through legal proceedings, such as trademark infringement lawsuits, cease-and-desist
letters, and administrative actions before trademark offices.
- Licensing and policing: Trademark owners can license or authorize others to use their trademarks under specific terms and conditions, as well as monitor the marketplace for potential infringements and
take proactive measures to protect their trademarks.

5. How is a trademark registered?


The process of registering a trademark typically involves the following steps:

- Conducting a trademark search: Before applying for registration, it's advisable to conduct a comprehensive search to ensure that the proposed trademark is available for use and registration and does not
conflict with existing trademarks.
- Filing a trademark application: The trademark owner submits an application for registration to the relevant trademark office,providing information about the trademark, the goods or services it will be
used with, and the basis for the application.
- Examination: The trademark office examines the application to ensure that it meets the requirements for registration, including distinctiveness, eligibility, and compliance with formalities.
- Publication: If the application meets the requirements, the trademark may be published for opposition, allowing third parties to challenge the registration within a specified period.
- Registration: If no oppositions are filed or if they are resolved in favor of the applicant, the trademark is registered, and the owner receives a certificate of registration, granting exclusive rights to use the
trademark in connection with the specified goods or services.

These steps may vary depending on the jurisdiction and the specific requirements of the trademark office responsible for registration. It's advisable to consult with a trademark attorney or agent to navigate
the registration process and ensure the best possible outcome for your trademark application.

Unit 4 Page 41

You might also like