Cyber Laws and Ipr
Cyber Laws and Ipr
Web Technology:
6. Internet Basics: The internet is a global network of interconnected computers, allowing users to access and share information worldwide. It relies on protocols like HTTP, HTTPS, and FTP
for communication.
7. Web Development: Involves creating websites and web applications using languages such as HTML, CSS, and JavaScript, along with frameworks and libraries like React, Angular, and
Vue.js. Backend development often involves languages like PHP, Python, Ruby, or Node.js.
8. Web Design: Focuses on the aesthetic and user experience aspects of websites, including layout, typography, color schemes, and interaction design. Tools like Adobe Photoshop, Sketch, and
Figma are commonly used for design.
9. Web Hosting: Refers to the service of storing and serving websites and web applications on servers connected to the internet. Hosting providers offer various options such as shared hosting,
VPS hosting, dedicated hosting, and cloud hosting.
10. E-commerce: The buying and selling of goods and services over the internet. E-commerce platforms like Shopify, WooCommerce, and Magento provide tools for setting up online stores,
processing payments, and managing inventory.
Unit 1 Page 1
Need for Cyber Law
27 March 2024 23:33
Cyber law, also known as Internet Law or Cyber Law, is the part of the overall legal system that is related to legal informat ics and supervises the digital circulation of information, e-commerce, software and
information security. It is associated with legal informatics and electronic elements, including information systems, compute rs, software, and hardware. It covers many areas, such as access to and usage of
the Internet, encompassing various subtopics as well as freedom of expression, and online privacy.
Cyber laws help to reduce or prevent people from cybercriminal activities on a large scale with the help of protecting inform ation access from unauthorized people, freedom
of speech related to the use of the Internet, privacy, communications, email, websites, intellectual property, hardware and software, such as data storage devices. As
Internet traffic is increasing rapidly day by day, that has led to a higher percentage of legal issues worldwide. Because cyb er laws are different according to the country and
jurisdiction, restitution ranges from fines to imprisonment, and enforcement is challenging.
Cyberlaw offers legal protections for people who are using the Internet as well as running an online business. It is most imp ortant for Internet users to know about the local
area and cyber law of their country by which they could know what activities are legal or not on the network. Also, they can prevent ourselves from unauthorized activities.
The Computer Fraud and Abuse Act was the first cyber law, called CFFA, that was enacted in 1986. This law was helpful in prev enting unauthorized access to computers.
And it also provided a description of the stages of punishment for breaking that law or performing any illegal activity.
Unit 1 Page 2
Cyber Jurisprudence at International and Indian Level
28 March 2024 09:19
Jurisprudence is the study that deals with the fundamental principles and various concepts of law. It guides a person to understand the deeper meaning of law. The word jurisprudence is
derived from the Latin term “Jurisprudentia” which means “knowledge of the law”. Basically ‘Jure’ means law and ‘prudentia’ means knowledge. Thus, the meaning of the entire word
signifies a practical knowledge of law and its various applications.
The aim of Jurisprudence is to help a layman understand the deeper meaning of the law. Jurisprudence is a crucial part of thelaw which is entirely based on theories and various
analyses. Jurisprudence focuses on the relationship of law with society, social science, and so on.
Jurisprudence means the study of law that takes place in a logical and philosophical manner. Jurisprudence analyses the nature of law, legal systems, legal rules, legal concepts, and legal
institutions and creates a way to understand the social, political as well and cultural arenas where law operates. It is a vast field that consists of a range of perspectives which includes
natural law, legal realism, critical legal studies, and so on. The study of jurisprudence helps scholars and practitioners to develop a deeper understanding of law and its importance in
shaping society.
HISTORY
Jurisprudence began in the Roman Times with the Romans scrutinizing the importance of the law and the nature of the law. Although it had a restrictive approach as the ideas of law and
ethics were blurred. After the fall of the Roman Empire, their set of ideas regarding jurisprudence vanished and the Christian State emerged. With the rise of Christian Rule, the concept of
secularism arose. Several hypotheses and concepts were proposed by renowned personalities.
Gradually, the possibility of positive law and positive methodologies took over whereby the limits of the law were divided. With the evolution of ideologies, several jurists presented their
own interpretations of jurisprudence.
Cyber jurisprudence, or cyber law, refers to the legal principles and regulations governing the internet, cyberspace, and digital technology. These laws are crucial in addressing various
issues such as cybercrime, data privacy, intellectual property rights, and online transactions. Both at the international and national levels, there are efforts to establish comprehensive legal
frameworks to regulate cyberspace effectively. Here's an overview of cyber jurisprudence at the international and Indian levels:
International Level:
1. United Nations (UN): The UN has been actively involved in addressing cybersecurity and cybercrime through various bodies such as the UN General As sembly
and the UN Office on Drugs and Crime (UNODC).The UN has adopted several resolutions and conventions, such as the Budapest Con vention on Cybercrime, to
facilitate international cooperation in combating cybercrime.
2. Council of Europe's Convention on Cybercrime (Budapest Convention): This is the first international treaty addressing cybercrime and electronic evidence. It
sets forth legal frameworks for the criminalization of offenses, procedural law, and international cooperation in investigati ng and prosecuting cybercrimes.
3. International Telecommunication Union (ITU): ITU works on establishing international standards and regulations for telecommunication and information
technology, including aspects of cybersecurity and internet governance.
4. Regional Initiatives: Various regional organizations have developed their own agreements and frameworks to address cyber threats and enhance cybers ecurity,
such as the European Union's General Data Protection Regulation (GDPR) and the ASEAN Cybersecurity Cooperation Strategy.
Indian Level:
1. Information Technology Act, 2000: The IT Act of 2000 is the primary legislation governing cyber activities in India. It addresses issues such as digital sign atures,
electronic governance, cybercrime, and data protection.
2. The Personal Data Protection Bill: This bill aims to regulate the processing of personal data of individuals by the government and private entities. It introduc es
provisions for the protection of personal data and penalties for non-compliance.
3. Cybercrime Investigation Cells: India has established specialized cybercrime investigation cells in various cities to investigate and prosecute cybercrimes
effectively.
4. Indian Cyber Law Cases: Over the years, several landmark judgments have shaped cyber jurisprudence in India, including cases related to data privacy,
intermediary liability, and online defamation.
5. International Cooperation: India actively participates in international forums and cooperates with other countries in combating cyber threats and enhanc ing
cybersecurity measures.
Unit 1 Page 3
Jurisdiction In cyber laws
28 March 2024 09:52
With the increase in the number of internet users and free browsing content from all over the world, it is easier for a person to get trapped in cybercrime by a person(hacker, internet stalker, cyber-terrorist,
scammer, and many others) in a different country. For instance, a person might commit online fraud by claiming to sell some item from a particular country to a person situated in a different country and
taking payment online but not sending the item specified. He indulged in this activity with other customers of different countries, and then a question of cyber jurisdiction arises as to where the complaint will
be filed.
Cyberlaw also governs cyberspace. “Cyberspace refers to the virtual computer world, and more specifically, an electronic medium that is used to facilitate online communication. Cyberspace typically
involves a large computer network made up of many worldwide computer sub-networks that employ the TCP/IP protocol to aid in communication and data exchange activities.”
The fact that the internet has no boundaries, no restraints, and cybercrime posing the same features results in conflicting laws. International law and municipal law have different approaches, and cyber law is
mainly tied between both, which results in no conclusion.
With the increase in the number of internet users and free browsing content from all over the world, it is easier for a person to get trapped in cybercrime by a person(hacker, internet stalker, cyber-terrorist,
scammer, and many others) in a different country. For instance, a person might commit online fraud by claiming to sell some item from a particular country to a person situated in a different country and
taking payment online but not sending the item specified. He indulged in this activity with other customers of different countries, and then a question of cyber jurisdiction arises as to where the complaint will
be filed.
Cyberlaw also governs cyberspace. “Cyberspace refers to the virtual computer world, and more specifically, an electronic medium that is used to facilitate online communication. Cyberspace typically
involves a large computer network made up of many worldwide computer sub-networks that employ the TCP/IP protocol to aid in communication and data exchange activities.”
The fact that the internet has no boundaries, no restraints, and cybercrime posing the same features results in conflicting laws. International law and municipal law have different approaches, and cyber law is
mainly tied between both, which results in no conclusion.
For example, if a user commits a robbery in country ‘A’ while sitting in country ‘B’ from the server of the country ‘C,’ then which country’s jurisdiction will apply needs to be answered. In this case, the
transaction might have been done virtually, yet the people are present physically in their respective countries governed by their laws and the court generally decides the cyber jurisdiction of the country where
the crime has been actually committed.
In cyberspace, there are generally three parties involved in a transaction: the user, the server host, and the person with whom the transaction is taking place, with the need to be put within one cyberspace
jurisdiction. All three parties in this illustration belong to three different countries, now the laws of ‘A,’ ‘B’ or ’C’ will be prevalent or not, or even municipal laws will be applicable or international laws the
issues of jurisdiction in cyberspace. The extent of a court’s competency to hear a cross-border matter and apply domestic state laws is another issue.
• Prescriptive Jurisdiction – This type of jurisdiction enables a country to impose laws, particularly for a person’s activity, status, circumstances, or choice. This jurisdiction is unlimited.
Hence, a country can enact any law, or legislation on any matter, even where the person’s nationality is different, or the act happened at a different place. However, International law prevents
any state from legislating any such law contrary to other countries interests.
• Jurisdiction to Adjudicate – Under this jurisdiction, the state has the power to decide the matter on a person concerned in civil or criminal cases despite the fact that the state was a party
or not; a mere relationship between both is sufficient. It is not necessary that a state having the prescribed jurisdiction must also have jurisdiction to adjudicate.
• Jurisdiction to Enforce – This jurisdiction depends on the existence of prescriptive jurisdiction; hence if prescriptive jurisdiction is absent, then it cannot be enforced to punish a person
violating its laws and regulations; however, this jurisdiction is not exercised in an absolute sense and a state cannot enforce its jurisdiction on a person or the crime situated or happened in a
different country.
Unit 1 Page 4
Unit 1 Page 5
The Test evolved of Jurisdictional Aspects in Cyber Law
28 March 2024 10:36
There are several tests that determine cyberspace jurisdiction in the cases of cybercrime.
Minimum Contacts Theory
This test is applicable where both or any of the parties are outside the territorial jurisdiction of the court. In the landmark judgment in Washington v International Shoe Company, this
theory was evolved by the US Supreme Court. “”
After this case, the court laid down three criteria-
• “The non-resident defendant must do some act or consummate some transaction with the forum or perform some act by which he purposefully avails himself of the privilege of
conducting activities in the forum, thereby invoking the benefits and protections.
• the claim must be one which arises out of or results from the defendant’s forum-related activities, and
• exercise of jurisdiction must be reasonable.”
However, Internet usage will increase every second on this earth, and therefore the laws should also be made progressive enough to combat cybercrime and issues relating to their jurisdiction.
International law should determine certain parameters in deciding the jurisdiction, and the cases in which jurisdiction cannot be decided should be tried in the international court of justice itself.
Unit 1 Page 6
Cyber Crimes & Legal Framework
04 April 2024 10:30
Cybercrimes can target individuals, institutions, and states, posing various threats to their security, integrity, and operations. Here's how cybercrimes manifest against each
of these entities:
Individuals:
1. Identity Theft: Cybercriminals steal personal information, such as Social Security numbers, credit card details, or login credentials, to impersonate individuals or
conduct fraudulent activities in their name.
2. Financial Fraud: Phishing scams, fake websites, or malware-infected links are used to deceive individuals into providing sensitive financial information, leading to
unauthorized transactions, credit card fraud, or online banking account breaches.
3. Online Harassment and Cyberbullying: Individuals may face harassment, stalking, or defamation through various online platforms, social media, or messaging
apps, causing emotional distress and reputational damage.
4. Privacy Violations: Unauthorized access to personal data, webcam hacking, or dissemination of private information online can infringe upon individuals' privacy
rights, leading to embarrassment, blackmail, or exploitation.
5. Romance Scams and Online Predation: Cybercriminals exploit trust and emotions in online relationships to manipulate individuals into providing money, sensitive
information, or engaging in risky behaviors.
Unit 2 Page 7
Hacking
04 April 2024 10:36
An effort to attack a computer system or a private network inside a computer is known as hacking. Simply, it is unauthorized access to or control of computer
network security systems with the intention of committing a crime. Hacking is the process of finding some security holes in a computer system or network in order to
gain access to personal or corporate information. One example of computer hacking is the use of a password cracking technique to gain access to a computer
system. The process of gaining illegal access to a computer system, or a group of computer systems, is known as hacking. This is accomplished by cracking the
passwords and codes that grant access to systems. Cracking is the term used to describe the process of obtaining a password or code. The hacker is the individual
who performs the hacking. Following are some of the things that can be hacked:
• Single systems
• Email account
• A group of systems
• LAN network
• A website
• Social media sites, etc.
Hackers
Computer hackers are unauthorized users who gain access to computers in order to steal, alter, or delete data, generally by installing malicious software without
your knowledge or agreement. They can get access to the information you don’t want them to have thanks to their cunning techniques and in-depth technological
knowledge. Any device is connected to the Internet is at risk from computer hackers and online predators. To distribute hazardous malware to your computer and
damage your network security, these online criminals generally use spam messages, phishing emails or instant messages, and websites.
Types of Hackers:
To elaborate on the aforementioned hacking aims, it is vital to understand the various sorts of hackers that exist in the cyber segment in order to distinguish
between their responsibilities and objectives. The types of hackers are:
1. Black Hat Hackers: These types of hackers, often known as crackers and always have a malicious motive and gain illegal access to computer networ ks and
websites. Their goal is to make money by stealing secret organizational data, stealing funds from online bank accounts, violating priva cy rights to benefit
criminal organizations, and so on. In today’s world, the majority of hackers fall into this category and conduct their busine ss in a murky manner. Black hat
hackers are nefarious individuals who aim to utilize their technical expertise to exploit and harm others. They usually have the expertise and training to get into
computer networks without the consent of the owners, attack security holes, and circumvent security procedures. With the male volent goal of gaining
unauthorized access to networks and systems, they attack to steal data, spread malware causing damage to systems.
2. White Hat Hackers/Ethical Hackers: White hat hackers (sometimes referred to as ethical hackers) are the polar opposites of black hat hackers. They employ
their technical expertise to defend the planet against malicious hackers. White hats are employed by businesses and governmen t agencies as data security
analysts, researchers, security specialists, etc. White hat hackers, with the permission of the system owner and with good mo tives, use the same hacking
tactics that the black hackers use. They can work as contractors, freelancers, or in-house for the companies. They assist their customers in resolving security
flaws before they are exploited by criminal hackers.
3. Gray Hat Hackers: They fall somewhere between the above-mentioned types of hackers, in that they gain illegal access to a system but do so without any
malicious intent. The goal is to expose the system’s weaknesses. Instead of exploiting vulnerabilities for unlawful gains, gr ey hat hackers may offer to repair
vulnerabilities they’ve identified through their own unauthorized actions. Example: They may, for example, infiltrate your we bsite, application without your
permission to seek vulnerabilities. They rarely, if ever, try to harm others. Grey hats do this to obtain notoriety and reput ation in the cyber security industry,
which helps them further their careers as security experts in the long run. This move, on the other hand, harms the reputatio n of the organizations whose
security flaws or exploits are made public.
4. Red Hat Hackers: Also known as eagle-eyed hackers. Red hat hackers want to stop threat actors from launching unethical assaults. The red hat hackers aim
the same as ethical hackers, but their methods differ, the red hat hackers may utilize illegal or extreme methods. Red hat ha ckers frequently use cyber-attacks
against threat actors’ systems.
5. Blue Hat Hackers: Safety experts that work outside of the organization are known as blue hat hackers. Before releasing new software, companies frequently
encourage them to test it and uncover security flaws. Companies occasionally hold meetings for blue hat hackers to help them uncover flaws in their critical
internet systems. Money and fame aren’t necessarily important to some hackers. They hack to exact personal vengeance on a per son, employer, organization,
or government for a genuine — or perceived — deception. To hurt their adversaries’ data, websites, or devices, blue hat hackers utilize malicious software and various
cyber threats on their rivals’ devices.
6. Green Hat Hackers: Green hat hackers aren’t familiar with safety measures or the internal dynamics of the internet, but they’re quick learners w ho are driven
(if not desperate) to advance in the hacking world. Although it is unlikely that they want to damage others, they may do so w hile “experimenting” with various
viruses and attack strategies. As a result, green hat hackers can be dangerous since they are frequently unaware of the impli cations of their activities – or, even
worse, how to correct them.
While your computer is linked to the Internet, spyware installed by a hacker silently communicates your personal and financial information without your awareness
or agreement. The hackers can:
• Steal usernames and passwords.
• Take out a cash advance
• Steal your money and use your name to obtain credit cards and bank accounts.
• Destroy Your credit.
• Exploit your Social Security number
• Make a new account requesting Additional credit cards or personal identification numbers (PINs)
• Misuse personal information and share it with third parties ( illegal purposes).
• Purchase something.
If your system is hacked by some hacker then you will see the following warning signs:
• Your computer system or mobile phone or tablet start acting strangely like the password does not work, the setting of your de vice is changes, the camera and
microphone of your system is activating, etc.
• The antivirus software of your system is deactivated without your information. It is the main element to protect your system if it is off without you knowledge
then it is big sign that your system is under attack.
• Generally hackers redirect your browser or your internet traffic to some malicious website. Then it is the sign that your sys tem is under attack.
• If someone stealing money from your account without your permission.
• When some hacker gain the access of your account then the first step he/she do is to change that password of your account. So when the password doesn’t
work then this means that someone change your account password.
• Seeing some suspicious ads or popup frequently on your system is also the part of hacking.
Unit 2 Page 8
Hacking is a chronic problem that jeopardizes a nation’s and its residents’ security. Individually, it can result in incalculable economic losses, even wiping out a
person’s financial savings. At the organizational level, it has resulted in data theft, resulting in significant financial losses and long-term consequences. To stop this
terrible threat, protections must be put in place at the correct moment and at all levels. So to protect ourselves from hackers always remember the following points:
• Always keep your system updated because hackers always look for holes in security to attack. So, updating the operating syste m and software will prevent the
user from getting hacked.
• Always set unique and strong passwords for different accounts never use the same passwords for the same accounts because it i s easy to hack.
• While using websites always look for HTTPS encryption. It ensure that the connection is secure.
• Use Virtual Private Networks (VPNs) as a type of point-to-point communication that allows business networks to connect to offsite and remote sites. VPN
services, such as Express VPN, encrypt the sending and receiving IP addresses, preventing unauthorized access.
• Only download software from reputable sources. Before downloading free software or file-sharing applications, give them a thorough examination.
• Make use of a two-way firewall.
• Stay away from dubious websites.
• Increase the security settings of your browser.
• Always install antivirus software
Unit 2 Page 9
Digital Forgery
04 April 2024 12:27
Digital forgery refers to the act of manipulating or altering digital content, such as images, videos, or documents, with the intention to deceive or mislead viewers. It involves using
digital tools and techniques to create fraudulent or deceptive representations that appear authentic and genuine. This can include modifying the content itself, adding or removing
elements, or even fabricating entirely new compositions.
Digital forgery has become increasingly prevalent with the advancements in technology and software capabilities. It can be used for various malicious purposes, such as spreading fake
news, creating false evidence, or conducting online scams. Detecting digital forgery has become a significant challenge as the sophistication of forgery techniques continues to evolve.
Advanced image and video analysis methods, along with artificial intelligence and machine learning, are being employed to develop robust detection algorithms to safeguard the
integrity of digital content.
Forgery is defined as the production of a document that is known to be fake but appears to be genuine. It is usually seen in documents such as cheques, passports, visas, certificates,
other identification documents etc and people are easily hoodwinked, especially when the forgery is done digitally. It is impossible to tell the difference between genuine and falsified
documents unless you’ve been trained to do so. Forgeries are dangerous because they are frequently difficult to spot as fakes. As a result of digital forgeries, the victims of these
activities may suffer financial loss as well as a loss of reputation. The number of crimes pertaining to forgery is increasing day by day.It is not very hard for forgers to falsify documents
and signatures especially if it is a digital one but it can be extremely difficult for a layman to figure out the minute indications and details in a document that distinguish a fake one from
an original. Digital forgery is at an all-time high in today’s contemporary world and as a matter of fact, the majority of people do not realise when their documents are forged.
The topic of digital forgeries study is still in its early stages. Many practical and specialized strategies and solutions have also been presented. The originality and validity of financial,
legal, and medical documents and data, as well as other high-value assets, is crucial and imperative. In many circumstances, figuring out the originality and validity of a picture or data
is a difficult and painstaking task. Identifying and distinguishing data and images captured by devices from computer-generated data and images is a multifarious topic that has
captivated scholars all over the globe.
The technology of digital resource repositories is moving at a much faster rate due to social networking sites, making it very difficult to find the original source of the forgeries. As a
result, tracing the history of digital fakes becomes a major challenge. In the network context, certain efforts are being made to determine the lineage of data, but to our knowledge, no
one has attempted to locate the lineage of digital resources. The pursuit of answers leads to the resolution of today’s most concerning issues particularly the genuineness of intellectual
property.
Solutions
There are several approaches and tools available today for detecting forgeries. Apart from standard procedures like ocular analysis of a picture and parameter adjustment (such as
brightness, contrast, and so on), the forensic experts employ the following:
There are several approaches like file structure analysis, metadata analysis, and others that are more commonly utilised for detecting picture or video creation processes, but not for
forgery detection.
Even without detecting methods for a picture or video creation, the number of methods applied is rather extensive. The problem is that different techniques of image encoding and the
variety of alterations that may be applied to digital pictures change the features of the image that are available for forensic inspection in different ways. For example, the ELA approach
can only be used with JPEG images; looking for cloned sections won’t help you identify a single insertion or hand retouch; shadows analysis won’t help you with photos taken in
overcast weather; and so on.
The provisions of the IPC in respect to forgery were updated by Section 91 of the Information Technology (IT) Act (read with the Second Schedule) to embrace electronic records as
well. The Indian Penal Code has been amended to include Section 29A, which defines electronic records. The terms “electronic record” and “electronic record” will have the same
meaning as in Section 2(1)(t)2 of the IT Act.
Section 464 of the IPC was amended by Section 91 of the IT Act to include a false electronic record. Under Section 464, a person is said to make a false electronic record:
1. Who makes or transmits any electronic record or part of an electronic record dishonestly or fraudulently, or affixes any digital signature on any electronic record, or makes any
mark denoting the authenticity of a digital signature, with the intent of making it appear that such electronic record or part of an electronic record or digital signature was made,
executed, transmitted, or affixed by or by the authority of a person by whom or whose affixed
2. Who, without lawful authority, dishonestly or fraudulently alters an electronic record in any material part thereof after it has been made, executed, or affixed with a digital
signature by himself or by any other person, whether such person is alive or dead at the time of such alteration, by cancellation or otherwise.
3. Who deceptively or fraudulently causes any person to sign, execute, or alter an electronic record, or to affix his digital signature to any electronic record, knowing that such person
cannot, or that he does not know the contents of the electronic record or the nature of the alteration, due to insanity or intoxication.
Explanation 3 to Section 464 has also been added, which states that the term “affixing digital signature” has the same meaning as it does in Section 2(1)(d)3 of the IT Act for the
purposes of this Section.
Section 463 of the IPC, after amendment, defines forgery, in relation to electronic records, as the making of any false electronic record or part thereof with intent to cause damage or
injury to the public or to any person, or to support any claim or title, or to cause any person to part with property, or to enter into any express or implied contract, or with intent to
commit fraud or that fraud may be committed.
Section 466 (forgery of record of Court or of Public register, etc.), Section 468 (forgery for purpose of cheating), Section 469 (forger for purpose of harming reputation), Section 470
(forged document or electronic record), Section 471 (using as genuine a forged document), Section 474 (having possession of the document described in Section 466 or 467, knowing it
to be forged and intending to use it as genuine) and Section 476 (counterfeiting device or mark used for authenticating documents other than those described in Section 467, or
possessing counterfeit marked material) have also been suitably amended to include electronic records.
It should be noted, however, that Section 467, which deals with forgery of valuable securities, wills, and other documents, has not been amended because Section 1(4) prohibits the IT
Act from being applied to certain documents such as a will, trust, power of attorney, contract for sale or conveyance of immovable property, and so on. As a result of the modifications
Unit 2 Page 10
Act from being applied to certain documents such as a will, trust, power of attorney, contract for sale or conveyance of immovable property, and so on. As a result of the modifications
in the IT Act, digital forgery and offences linked to it are now covered under the IPC.
Unit 2 Page 11
Cyber Stalking/Harassment
08 April 2024 11:02
Cyberstalking refers to the use of the internet and other technologies to harass or stalk another person online, and is potentially a crime in the United States. This online
harassment, which is an extension of cyberbullying and in-person stalking, can take the form of e-mails, text messages, social media posts, and more and is often methodical,
deliberate, and persistent.
Most of the time, the interactions do not end even if the recipient expresses their displeasure or asks the person to stop. The content directed at the target is often inappropriate
and sometimes even disturbing, which can leave the person feeling fearful, distressed, anxious, and worried.
While some of the online harassment that people in the survey experienced was just nuisance behaviours, nearly 1 in 5 Americans said they had experienced severe forms of online harassment. These actions
included physical threats, sexual harassment, and stalking
Signs of Cyberstalking
Some signs that you are experiencing cyberstalking include someone sending you too many messages, a person sending you inappropriate messages, liking all of your old posts
on social media, manipulating you into interacting with them online, or trolling you. Online impersonality, GPS tracking, threatening messages, catfishing, and doxing are also
behaviour associated with cyberstalking.
Examples of Cyberstalking
When it comes to cyberstalking, those who engage in this behaviour use a variety of tactics and techniques to harass, humiliate, intimidate, and control their targets. In fact, many
of those who engage in cyberstalking are technologically savvy as well as creative and come up with a multitude of ways to torment and harass their targets.
So what is considered cyberstalking? Here are some examples of things people who cyberstalk might do:
• Post rude, offensive, or suggestive comments online
• Follow the target online by joining the same groups and forums
• Send threatening, controlling, or lewd messages or emails to the target
• Use technology to threaten or blackmail the target
• Tag the target in posts excessively, even if they have nothing to do with them
• Comment on or like everything the target posts online
• Create fake accounts to follow the target on social media
• Message the target repeatedly
• Hack into or hijack the target's online accounts
• Attempt to extort sex or explicit photos
• Send unwanted gifts or items to the target
• Release confidential information online
• Post or distribute real or fake photos of the target
• Bombard the target with sexually explicit photos of themselves
• Create fake posts designed to shame the victim
• Track the target's online movements by installing tracking devices
• Hack into the target's camera on their laptop or smartphone as a way to secretly record them
• Continue the harassing behaviour even after being asked to stop
Consequences of Cyberstalking
Just like stalking, cyberstalking has the potential to cause a wide range of physical and emotional consequences for those who are targeted. For instance, it's not uncommon for
those who are being harassed online to experience anger, fear, and confusion. They also might have trouble sleeping and even complain of stomach trouble.
There are even reports that targets of cyberstalking may experience post traumatic stress disorder and suicidal ideation. If you are experiencing cyberstalking, it's important that you reach out for help. You
can contact the National Centre for Victims of Crime at 1-855-4-VICTIM (1-855-484-2846). And, if you or a loved one are in immediate danger be sure to call 911 right way.
Unit 2 Page 12
Ethics and Etiquettes of Cyber World
08 April 2024 11:52
Cyberethics is a branch of computer technology behavior that defines the best practices that must be adopted by a user when he uses the computer
system. In simple terms, cyberethics refers to the basic ethics and etiquette that must be followed while using a computer system. Ethics, in general,
refers to propagating good behavior, similarly by cyber ethics we refer to propagating good behavior online that is not harsh or rude. Cyberethics
governs rules that individuals must be polite and responsible when they use the internet. Cyberethics aim to protect the moral, financial, social behavior
of individuals. Cyberethics engages the users to use the internet safely and use technology responsibly and sensibly. Cyberethics empathizes the
behavior that must be adopted while using cyber technology.
Some of the breaches of cyberethics are listed below:
• Cyber Bullying: Cyberbullying is a form of bullying carried out via internet technology such as social media where individuals are mocked on their
physical appearance, lifestyle, preferences, etc. The teenage generation or say youngsters are the major victims of this form of cyber ethic breach.
Cyberbullying affects the emotional ethics of individuals and can cause mental disturbance to individuals.
• Hacking: Stealing a user’s personal or organizational information without authorized permission is not considered a good practice. It is one of the
riskiest cyber breaches to data leak. Data leak includes passing of sensitive information such as passwords, bank details of the user to a third-party
user who is not authorized to access the information.
• Copywriting: Claiming of another individual as one’s own is another type of cyber ethic breach that must be eradicated. Never engage in copywriting
another person’s content or document and claim as it is your own. It leads to a serious problem called plagiarism, which is a punishable offense and
considered a legal crime. It is always advisable to follow general cyberethics, while using the internet or say any kind of technology. A proper code of
conduct must be followed while using cyber technology. Cyberethics if not used wisely can lead to serious situations. Social and legal laws are defined
to use cyber technology wisely. In extreme cases, legal action can be taken if there is a violation of cyber ethics.
1. Privacy:
• The content that is available on the internet should not hurt any moral, emotional, or personal ethics of individuals.
• Users should have the right to protect any information which they don’t want to share openly.
• Private information like user’s contact details, address, security-related information like bank details, credit card/debit card details, are all included in
basic cyber ethics of user privacy and must not be breached in any case.
• Any breach of privacy is theft/fraud of user identity and user personal information, which is punishable as per the rules of law.
2. IPR:
• IPR stands for Intellectual Property Rights.
• IPR defines that the owners have the complete right to the content that is posted on the internet.
• The entire content is solely a belonging of the originator and no individual is allowed to claim that content published by the original creator as its own.
• Unauthorized distribution of someone else’s work should never be adopted as it’s ethically incorrect to not give creation and monetary benefits to the
creator of the work.
3. Security:
• Security on the internet is the most basic ethical right that every user must be accessible.
• Users of the internet should feel safe while they surf the net.
• Security, in general means only authorized users to have access to the content on the computer.
• And confidential information is safe, without any risk of loss of information/content.
4. Accuracy:
• The content available on the internet is accessed by billions of users.
• If there is no reliability of the information that is posted online, then it would mislead the masses.
• Cyberethics assert the importance of posting content on the internet that is correct in all aspects.
• Users trust the content of the internet and rely heavily on the internet for facts, therefore it is highly needed that the asked information is correct and
reliable.
Best policies that individuals must adopt while using the internet or any kind of technology should include the following:
• Being Polite and not using harsh words.
• Avoid clicking on unknown links.
• Wisely opening Emails from known senders only.
• Not mocking anyone on Social Media.
• Not copying any individual’s work and claiming it as their own. Always cite that you have used someone else’s work.
• Be careful and research before installing any free software.
• Never intrude on another person’s privacy.
• Don’t contribute to any malpractice that can lead to the leak of data of an individual or organization.
• Never engage in Cyberbullying.
• Never compromise with the safety of your system. Always install an anti-virus on your system.
Unit 2 Page 13
advantage of this and end up making unnecessary comments or noise during an online class. One of the top rules of cyber etiquette or netiquette is to respect everyone
equally and be polite with everyone while following all the guidelines. Remember that your teachers are also adjusting to the pandemic world and adapting to using online
technologies which they might not be as familiar with as the young generation. So, you should always be polite and respectful towards not only your teachers but also your
peers while attending online classes.
Speak Clearly
During an online class, you should try to be brief and to the point in your communication. Taking an unnecessary amount of time to reach a point may result in the loss of
meaning in that point as well as loss of interest. So, make sure that you try to express yourself as clearly as possible by using minimum words.
Unit 2 Page 14
Cyber Pornography
08 April 2024 12:05
Cyber pornography is in simple words defined as the act of using cyberspace to create, display, distribute, import, or publish pornography or obscene materials. With the advent of cyberspace,
traditional pornographic content has now been largely replaced by online/digital pornographic content.
Cyber pornography is banned in many countries and legalized in some. In India, under the Information Technology Act, 2000, this is a grey area of the law, where it is not prohibited but not legalized
either.
There is no settled definition of pornography or obscenity. What is considered simply sexually explicit but not obscene in USA may well be considered obscene in India. There have been many
attempts to limit the availability of pornographic content on the Internet by governments and law enforcement bodies all around the world but with little effect. Pornography on the Internet is
available in different formats. These range from pictures and short animated movies, to sound files and stories. The Internet also makes it possible to discuss sex, see live sex acts, and arrange sexual
activities from computer screens. Although the Indian Constitution guarantees the fundamental right of freedom of speech and expression, it has been held that a law against obscenity is
constitutional. The Supreme Court has defined obscene as “offensive to modesty or decency; lewd, filthy, repulsive.
Under Section 67 of the Information Technology Act, 2000 makes the following acts punishable with imprisonment up to 3 years and fine up to 5 lakhs:
1. Publication- which would include uploading on a website, what's app group or any other digital portal where third parties can have access to such content.
2. Transmission- this includes sending obscene photos or images to any person via email, messaging, what's app or any other form of digital media.
3. Causing to be published or transmitted- this is a very wide terminology which would end up making the intermediary portal liable, using which the offender has published or transmitted such
obscene content. The Intermediary Guidelines under the Information Technology Act put an onus on the Intermediary/Service Provider to exercise due diligence to ensure their portal is not
being misused.
Section 67A of the Information Technology Act makes publication, transmission and causing to be transmitted and published in electronic form any material containing sexually explicit act or
conduct , punishable with imprisonment up to 5 years and fine up to 10 lakhs.
Unit 2 Page 15
Identity Theft & Fraud
08 April 2024 12:24
Unit 2 Page 16
Services Available to Help
There are several identity theft protection services that help people avoid or mitigate the effects of identity theft. Typically, such services help:
• Safeguard personal information
• Monitor public and private records, such as credit reports, and send alerts to clients about suspicious transactions and status changes
• Resolve problems associated with identity theft
In addition, some government agencies and nonprofit organizations provide similar assistance, typically through websites that offer information and
tools to help people avoid, remedy, and report incidents of identity theft.4
Many of the best credit monitoring services also provide identity protection tools and services.4
6. Contact your bank(s) and credit card companies and request that they close your current credit and debit cards and issue you new ones.
7. Change all of your login and password information.
8. From there, continue monitoring your credit reports to ensure that your personal and financial information remains secure and unavailable to
thieves.
Unit 2 Page 17
Cyber Terrorism
08 April 2024 12:35
What is cyberterrorism?
Cyberterrorism is usually defined as any premeditated, politically motivated attack against information systems, programs, and data that threatens violence or results in violence. It might include
any cyberattack that intimidates or generates fear in the target population of a country, state, or city, usually by damaging or disrupting critical infrastructure that's vital to social, economic,
political, and business operations.
Cyberterrorist acts are carried out using computer servers, other devices and networks visible on the public internet. Secure d government networks and other restricted networks are often targets
of such acts. Other targets include the banking industry, military installations, power plants, air traffic control centers, and water systems.
The U.S. Federal Bureau of Investigation (FBI) defines cyberterrorism as any "premeditated, politically motivated attack agai nst information, computer systems, computer programs and data,
which results in violence against noncombatant targets by subnational groups or clandestine agents." Per the FBI, a cyberterr orist attack is a type of cybercrime explicitly designed to cause
physical harm.
Other organizations and experts include less harmful attacks as acts of cyberterrorism, especially when those are intended to be disruptive or to further the attackers' political agenda. The North
Atlantic Treaty Organization (NATO), defines cyberterrorism as a cyberattack that uses or exploits computer or communication networks to cause "sufficient destruction or disruption to generate
fear or to intimidate a society into an ideological goal."
Unit 2 Page 18
Cyber Defamation
08 April 2024 13:56
Introduction
The growth and development of technology have brought a drastic change in the world. The Internet has made many things far easier for all of us through various social networking sites.
Whether it is communication or access to information, these things have become a piece of cake for all of us. But these facilities may sometimes lead to misuse also. As users can publish and
disseminate information through these social networking sites, Defamation has become a subject of concern. With the rise of so-called trends of sharing or posting information or pictures on
certain social networking sites and commenting on them have increased the risk of ‘Cyber Defamation’.
The term ‘Cyber Defamation’ basically means publishing of false statement about an individual in cyberspace that can injure or demean the reputation of that individual. In India, defamation
can be contemplated as both civil and criminal offence, and thus legal remedies are provided to the victims by the Indian judiciary system.
Cyber Defamation
The widely used social media brought a revolution not only in the Indian sphere but also all across the world. The remarkable growth of the Internet has provided people with a platform to
express their opinions, thoughts, and feelings through various forms of publications. Nonetheless, the ease of accessibility and publication in this online world has created several risks as these
digital platforms are prone to be exploited by unscrupulous Internet users in the name of freedom of speech and expression. Thus this has led to numerous cases of “Cyber Defamation”.
Cyber defamation is a new concept but the traditional definition of defamation is injury caused to the reputation of a person in the eyes of a third person, and this injury can be done by verbal
or written communication or through signs and visible representations. The statement must refer to the plaintiff, and the intention must be to lower the reputation of the person against whom
the statement has been made. On the other hand, Cyber defamation involves defaming a person through a new and far more effective method such as the use of modern Electronic devices. It
refers to the publishing of defamatory material against any person in cyberspace or with the help of computers or the Internet. If a person publishes any kind of defamatory statement against
any other person on a website or sends E-mails containing defamatory material to that person to whom the statement has been made would tantamount to Cyber defamation.
Defamation can be understood as the wrongful and intentional publication of something either in the written or oral form about a person to harm his reputation in the society. For a statement to
be considered as defamatory, the following essential elements must be fulfilled.
• There must be the publication of the defamatory statement, which means coming to the knowledge of a third party.
• The statement must refer only to the plaintiff
• The statement must be defamatory in nature.
Types of Defamation
Defamation can be bifurcated into two categories that are –
In India, a person can be made liable for defamation both under civil and criminal law.
Section 500 of IPC provides for punishment wherein “any person held liable under section 499 will be punishable with imprisonment of two years or fine or both.”
Section 469 deals with forgery. If anyone creates a false document or fake account by which it harms the reputation of a person. The punishment of this offence can extend up to 3 years and
fine.
Section 503 of IPC deals with the offence of criminal intimidation by use of electronic means to damage one’s reputation in society.
If a person has been defamed in cyberspace, he can make a complaint to the cyber crime investigation cell. It is a unit of the Crime Investigation Department.
Unit 2 Page 19
Right to Privacy and Data Protection on Internet
08 April 2024 13:57
The right to privacy and data protection on the internet are crucial aspects of modern digital society. With the proliferation of online activities and the vast amounts of personal data being
generated and shared, protecting individuals' privacy rights and ensuring the security of their data have become pressing concerns. Here's an overview of these concepts:
1. **Right to Privacy**: The right to privacy is a fundamental human right recognized by various international conventions and legal frameworks. It encompasses an individual's right
to control their personal information, including its collection, use, and disclosure. This right applies to both offline and online environments, including interactions on the internet.
2. **Data Protection**: Data protection refers to the measures taken to safeguard individuals' personal data against unauthorized access, use, or disclosure. It involves implementing
security protocols, encryption techniques, and privacy-enhancing technologies to ensure that data is handled responsibly and securely.
3. **Regulatory Frameworks**: Many countries have established laws and regulations specifically addressing data protection and privacy rights on the internet. For example:
- In the European Union, the General Data Protection Regulation (GDPR) sets comprehensive guidelines for the processing of personal data and grants individuals significant control
over their data.
- In the United States, various laws such as the California Consumer Privacy Act (CCPA) and sector-specific regulations like the Health Insurance Portability and Accountability Act
(HIPAA) govern data protection and privacy rights.
- Other countries have their own regulations, such as the Personal Information Protection and Electronic Documents Act (PIPEDA) in Canada and the Personal Data Protection Act
(PDPA) in Singapore.
4. **Privacy Policies and Consent**: Websites and online services are often required to have privacy policies detailing how they collect, use, and share users' personal data. Users are
typically required to provide informed consent for the processing of their data, and they should have the option to opt out or revoke consent at any time.
5. **Data Breach Notifications**: Many jurisdictions mandate that organizations notify individuals in the event of a data breach that compromises their personal information. Prompt
notification allows affected individuals to take necessary precautions, such as changing passwords or monitoring their financial accounts for suspicious activity.
6. **International Data Transfers**: With the global nature of the internet, the transfer of personal data across borders has become common. However, such transfers are subject to
regulations to ensure that adequate protections are in place, especially when transferring data to countries with differing data protection standards.
7. **Emerging Technologies**: The advent of emerging technologies like artificial intelligence (AI), big data analytics, and the Internet of Things (IoT) pose new challenges to privacy
and data protection. It's essential for regulations and safeguards to evolve alongside technological advancements to address these challenges effectively.
Overall, safeguarding the right to privacy and ensuring robust data protection mechanisms are essential for fostering trust and maintaining the integrity of the internet as a platform for
communication, commerce, and innovation.
Unit 2 Page 20
Concept of privacy
08 April 2024 13:57
The concept of privacy is multifaceted and can vary depending on cultural, societal, and individual perspectives. Generally, privacy refers to the ability of individuals to control their personal
information, interactions, and activities, and to maintain boundaries around their personal space and autonomy. Here are some key aspects of the concept of privacy:
1. **Informational Privacy**: This aspect relates to individuals' control over the collection, use, and dissemination of their personal data. It encompasses concerns about surveillance, data
mining, and the unauthorized sharing of personal information.
2. **Physical Privacy**: Physical privacy concerns the ability of individuals to control access to their bodies, personal space, and belongings. It includes aspects such as solitude,
confidentiality in personal communications, and freedom from intrusion.
3. **Psychological Privacy**: Psychological privacy pertains to individuals' rights to control their thoughts, emotions, and mental processes without undue interference or surveillance. It
involves freedom from psychological manipulation, coercion, or undue influence.
4. **Social Privacy**: Social privacy involves individuals' ability to control the disclosure of information about their social interactions, relationships, and activities. It encompasses
boundaries around social interactions and the right to manage one's public persona.
5. **Decisional Privacy**: Decisional privacy relates to individuals' autonomy and freedom to make choices without external coercion or undue influence. It involves the right to make
decisions about one's personal life, beliefs, values, and relationships without interference.
6. **Spatial Privacy**: Spatial privacy refers to individuals' control over their physical environments and the ability to maintain boundaries around spaces such as homes, workplaces, and
public areas. It involves freedom from surveillance, monitoring, or intrusion into physical spaces.
7. **Cultural and Contextual Privacy**: The concept of privacy can vary significantly across cultures and contexts. What is considered private or sensitive in one culture may not be the
same in another. Additionally, privacy expectations may vary depending on the social context, such as within families, communities, or public settings.
8. **Digital Privacy**: With the proliferation of digital technologies and online communication platforms, digital privacy has become increasingly important. It encompasses concerns about
the collection, use, and security of personal data in digital environments, as well as issues related to online tracking, surveillance, and digital identity management.
Overall, privacy is a fundamental human right essential for individual autonomy, dignity, and freedom. It serves as a protective barrier against intrusion, surveillance, and unwarranted
interference, enabling individuals to maintain control over their personal lives, identities, and relationships. However, achieving a balance between privacy rights and other societal interests,
such as security and public safety, remains a complex and ongoing challenge.
Unit 2 Page 21
Threat to privacy on internet
08 April 2024 13:57
Privacy on the internet faces numerous threats due to the nature of digital communication and the vast amounts of personal data exchanged online. Some of the key threats to privacy on the
internet include:
1. **Data Collection and Profiling**: Many websites, social media platforms, and online services collect extensive data about users' browsing habits, preferences, and behaviors. This data
is often used to create detailed user profiles for targeted advertising, personalization, and other purposes without users' explicit consent.
2. **Third-Party Tracking**: Third-party trackers, such as cookies, beacons, and tracking pixels, are embedded on websites to monitor users' online activities across different sites. This
tracking can result in the aggregation of sensitive personal information and the creation of comprehensive user profiles without users' knowledge or consent.
3. **Data Breaches**: Data breaches occur when hackers or malicious actors gain unauthorized access to databases containing users' personal information. These breaches can lead to the
exposure of sensitive data, such as names, addresses, passwords, and financial information, putting users at risk of identity theft, fraud, and other forms of cybercrime.
4. **Surveillance and Government Monitoring**: Governments, intelligence agencies, and law enforcement entities conduct online surveillance and monitoring activities to gather
intelligence, prevent criminal activity, and enforce laws. Mass surveillance programs, such as those revealed by Edward Snowden, raise concerns about privacy violations, civil liberties, and
the erosion of individual rights.
5. **Malware and Spyware**: Malicious software, such as viruses, worms, Trojans, and spyware, can compromise users' privacy by infecting their devices and stealing sensitive
information, monitoring their activities, or remotely controlling their systems. Malware attacks often exploit vulnerabilities in software or rely on social engineering tactics to deceive users
into downloading malicious programs.
6. **Phishing and Social Engineering**: Phishing attacks involve the use of deceptive emails, messages, or websites to trick users into divulging personal information, such as login
credentials, financial details, or account numbers. Social engineering tactics exploit human psychology and trust to manipulate users into revealing sensitive information or performing
actions that compromise their privacy and security.
7. **Inadequate Privacy Policies and Practices**: Many websites and online services have opaque or misleading privacy policies that fail to adequately inform users about how their data
is collected, used, and shared. Additionally, some organizations engage in unethical or irresponsible data practices, such as selling user data to third parties or failing to secure sensitive
information properly.
8. **Emerging Technologies and Privacy Risks**: Emerging technologies, such as artificial intelligence, biometrics, Internet of Things (IoT) devices, and wearable technology, introduce
new privacy risks and challenges. These technologies often involve the collection and processing of vast amounts of personal data, raising concerns about surveillance, data security, and
algorithmic discrimination.
Addressing these threats to privacy on the internet requires a multi-faceted approach involving technological solutions, regulatory frameworks, user education, and advocacy for privacy
rights. Efforts to enhance data protection, promote transparency and accountability, and empower individuals to exercise greater control over their personal information are essential for
safeguarding privacy in the digital age.
Unit 2 Page 22
Self-regulation approach to privacy
08 April 2024 13:58
The self-regulation approach to privacy involves industry-driven initiatives and voluntary measures undertaken by businesses, organizations, and online platforms to address privacy concerns
and protect users' personal information. Instead of relying solely on government regulations, self-regulation encourages companies to develop and adhere to privacy policies, standards, and
best practices that promote transparency, accountability, and user trust. Here are some key elements of the self-regulation approach to privacy:
1. **Privacy Policies and Practices**: Companies develop and publicly disclose privacy policies outlining how they collect, use, share, and protect users' personal information. These
policies should be written in clear, accessible language and provide detailed information about data handling practices, including data retention periods, security measures, and user rights.
2. **Data Minimization and Purpose Limitation**: Companies practice data minimization by collecting only the personal information necessary for legitimate business purposes and
limiting its use to those purposes specified in their privacy policies. They also adhere to purpose limitation principles, ensuring that personal data is not used for secondary purposes without
users' consent.
3. **User Consent and Control**: Companies obtain users' informed consent before collecting, processing, or sharing their personal information. They provide users with meaningful
choices and controls over their data, such as opt-in/opt-out mechanisms, privacy settings, and preferences management tools.
4. **Data Security and Integrity**: Companies implement robust security measures to protect users' personal information from unauthorized access, disclosure, alteration, or destruction.
This includes encryption, access controls, authentication mechanisms, regular security audits, and incident response procedures to address data breaches promptly.
5. **Transparency and Accountability**: Companies are transparent about their data practices and accountable for complying with their privacy policies and legal obligations. They
provide users with access to their own data, facilitate data portability, and respond to user inquiries, complaints, and requests for information or data deletion.
6. **Education and Awareness**: Companies educate users about privacy risks, best practices, and tools for protecting their personal information online. They provide clear and
understandable privacy notices, FAQs, and educational resources to help users make informed decisions about their privacy.
7. **Industry Standards and Certification Programs**: Companies adhere to industry standards, guidelines, and certification programs developed by industry associations, trade groups,
or independent organizations to demonstrate their commitment to privacy protection. These standards may cover specific sectors or domains, such as healthcare, finance, or online
advertising.
8. **Collaboration and Self-Regulatory Bodies**: Companies collaborate with other stakeholders, including industry peers, consumer advocacy groups, academics, and regulators, to
address privacy challenges collectively. They participate in self-regulatory bodies, forums, or working groups dedicated to privacy issues to share knowledge, exchange best practices, and
develop voluntary standards or codes of conduct.
While the self-regulation approach to privacy can complement government regulations and promote innovation, it also has limitations. Critics argue that self-regulatory measures may lack
enforcement mechanisms, result in inconsistent practices across industries, and prioritize business interests over user rights. Therefore, effective self-regulation requires ongoing monitoring,
evaluation, and oversight to ensure compliance and accountability, as well as periodic reassessment to adapt to evolving privacy risks and challenges.
Unit 2 Page 23
Introduction and the need for intellectual property right (IPR)
08 April 2024 14:00
Intellectual Property Rights (IPR) refer to legal rights that protect creations of the mind, such as inventions, literary and artistic works, designs, symbols, names, and images used in commerce.
These rights provide creators and innovators with exclusive rights to their creations, allowing them to benefit from their work and investment by preventing others from using, selling, or copying
their intellectual property without permission.
Intellectual Property Rights (IPR) encompass a set of legal rights granted to individuals or entities to protect their creations of the intellect. These creations can range from inventions and literary or
artistic works to symbols, designs, and even trade secrets. The primary objective of IPR is to provide creators and innovators with exclusive rights over their intellectual creations, enabling them to
benefit financially from their endeavours while also encouraging further innovation and creativity.
The concept of IPR recognizes that intangible assets, such as ideas, designs, and innovations, hold significant value in today's knowledge-based economy. Therefore, safeguarding these assets is
essential for fostering economic growth, incentivizing innovation, and promoting cultural and artistic development.
IPR typically include several forms of protection, each tailored to specific types of intellectual property:
1. Patents: Patents protect inventions, granting inventors exclusive rights to their creations for a specified period. This exclusivity enables inventors to commercialize their inventions without fear of
unauthorized use by others.
2. Copyrights: Copyrights safeguard original literary, artistic, musical, and dramatic works, giving creators the exclusive right to reproduce, distribute, perform, or display their works. Copyright
protection encourages the production of diverse cultural and creative content.
3. Trademarks: Trademarks protect symbols, names, and logos used to identify and distinguish goods and services in the marketplace. Trademark owners can prevent others from using similar marks
that could confuse consumers.
4. Trade Secrets: Trade secrets safeguard confidential information, such as formulas, processes, or techniques, that provide a competitive advantage to businesses. Unlike patents, trade secrets do
not require public disclosure and offer perpetual protection as long as the information remains confidential.
5. Design Rights: Design rights protect the visual appearance or aesthetic aspects of products, preventing unauthorized copying or imitation of unique designs.
Effective IPR frameworks balance the interests of creators, innovators, consumers, and society as a whole. They provide incentives for innovation, promote economic growth, preserve cultural
heritage, and ensure fair competition in the marketplace. By recognizing and protecting intellectual property, societies can foster a conducive environment for creativity, entrepreneurship, and
progress.
The need for Intellectual Property Rights arises from several factors:
6. Incentivizing Innovation: By granting creators and innovators exclusive rights to their inventions and creations, IPR encourages investment in research, development, and creativity. The promise of
protection fosters innovation by ensuring that innovators can profit from their ideas.
7. Protection of Investments: Developing intellectual property often requires significant investments of time, resources, and effort. IPR safeguards these investments by offering legal mechanisms to
prevent unauthorized use or exploitation of intellectual property by others.
8. Promotion of Economic Growth: Intellectual property-intensive industries contribute significantly to economic growth and job creation. Strong IPR frameworks attract investment, foster
competition, and stimulate technological advancement, thereby driving economic development.
9. Cultural and Artistic Preservation: Intellectual Property Rights protect cultural heritage and artistic expressions by providing creators with the means to control and benefit from their works. This
encourages the continued production of cultural and artistic content, preserving diverse cultural traditions and promoting creativity.
10. Consumer Protection: IPR ensures that consumers receive genuine, high-quality products and services by preventing counterfeit goods and piracy. By upholding the integrity of brands and
products, IPR safeguards consumer rights and promotes trust in the marketplace.
Overall, Intellectual Property Rights play a crucial role in fostering innovation, protecting investments, promoting economic growth, preserving cultural heritage, and ensuring consumer welfare.
Effective IPR frameworks balance the interests of creators, innovators, consumers, and society as a whole, facilitating the development and dissemination of valuable intellectual assets.
Unit 3 Page 24
IPR in India – Genesis and Development IPR in abroad
08 April 2024 14:01
The genesis and development of Intellectual Property Rights (IPR) in India, followed by a brief overview of IPR abroad.
The modern framework of Intellectual Property Rights in India traces its roots back to the colonial era, primarily influencedby British law. The first significant legislation pertaining to intellectual
property in India was the Indian Patents and Designs Act of 1911, which introduced a rudimentary system for patent protection. However, this law was criticized for its limited scope and colonial
biases, as it favored the interests of British inventors over those of Indian innovators.
After gaining independence in 1947, India embarked on a journey to develop its own intellectual property regime that aligned more closely with its national interests and socio-economic
priorities. Over the decades, India enacted several landmark legislations to strengthen its IPR framework:
1.The Trade Marks Act (1958): This legislation provided for the registration and protection of trademarks in India, ensuring the exclusive rights of trademark owners to use their marks in trade.
2. The Copyright Act (1957): Enacted to protect literary, artistic, musical, and other creative works, the Copyright Act introduced comprehensive provisions for copyright protection and
enforcement.
3. The Designs Act (2000): This law governs the registration and protection of industrial designs in India, aiming to promoteinnovation and creativity in design-related industries.
4. The Patents Act (1970): One of the most significant milestones in India's intellectual property journey, the Patents Act of 1970 introduced a system of process patents, limiting patentability to
inventions related to processes rather than products. This legislation was driven by the government's commitment to promotingindigenous innovation and ensuring access to essential medicines
and technologies.
5. The Geographical Indications of Goods (Registration and Protection) Act (1999): This legislation provides for the registration and protection of geographical indications (GIs) in India,
safeguarding the reputation and quality of products associated with specific geographical locations.
India's approach to intellectual property has been characterized by a delicate balance between promoting innovation and safeguarding public interests, such as access to affordable healthcare,
cultural heritage, and traditional knowledge. The country has also been actively engaged in international discussions and agreements on intellectual property, seeking to ensure that global IPR
regimes accommodate the needs and priorities of developing nations like India.
IPR Abroad:
In foreign jurisdictions, Intellectual Property Rights are governed by a variety of laws and regulations tailored to each country's legal and economic landscape. However, there are several
commonalities across international IPR frameworks:
1. TRIPS Agreement: The Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS), administered by the World Trade Organization (WTO), sets minimum standards for
intellectual property protection and enforcement among its member countries.
2. European Union (EU) Legislation: EU member states adhere to a harmonized system of intellectual property laws and regulations, including directives and regulations governing patents,
trademarks, copyrights, and other forms of intellectual property.
3. United States: The U.S. has a robust system of intellectual property protection, with comprehensive laws covering patents,trademarks, copyrights, and trade secrets. The U.S. Patent and
Trademark Office (USPTO) and the U.S. Copyright Office oversee the registration and enforcement of intellectual property rights in the country.
4. International Treaties and Conventions: Various international treaties and conventions, such as the Paris Convention for the Protection of Industrial Property and the Berne Convention for the
Protection of Literary and Artistic Works, provide mechanisms for the mutual recognition and enforcement of intellectual property rights across borders.
In summary, Intellectual Property Rights play a crucial role in both India and abroad, serving as a catalyst for innovation, economic growth, and cultural development. While each jurisdiction has
its own unique legal framework and approach to intellectual property, international cooperation and collaboration are essential for addressing global challenges and ensuring equitable access to
the benefits of innovation and creativity.
Unit 3 Page 25
Data Protection
08 April 2024 14:02
Data protection refers to the practice of safeguarding sensitive information from unauthorized access, use, disclosure, alteration, or destruction. In today's digital age, where vast amounts of personal
and sensitive data are generated, collected, and stored, ensuring the privacy and security of this data is paramount.
Data protection encompasses various principles, practices, and regulations aimed at mitigating risks associated with the processing and handling of data. Key aspects of data protection include:
1. Data Privacy: Data privacy involves controlling access to personal information and ensuring that individuals have the right to determine how their data is collected, used, and shared. Privacy laws
and regulations dictate the conditions under which personal data can be processed and establish individuals' rights regarding their data.
2. Data Security: Data security involves implementing measures to protect data from unauthorized access, misuse, or breaches. This includes encryption, access controls, firewalls, secure
authentication methods, and regular security audits to identify and address vulnerabilities.
3. Data Minimization: Data minimization involves collecting and retaining only the data that is necessary for a specific purpose. Minimizing data reduces the risk of unauthorized access or misuse and
enhances individuals' privacy by limiting the exposure of their personal information.
4. Consent Management: Obtaining informed consent from individuals before collecting, processing, or sharing their personal data is a fundamental principle of data protection. Consent should be
freely given, specific, informed, and unambiguous, and individuals should have the right to withdraw consent at any time.
5. Data Retention and Deletion: Establishing clear policies and procedures for data retention and deletion ensures that data is not retained longer than necessary for its intended purpose. Deleting
outdated or unnecessary data reduces the risk of unauthorized access or misuse and enhances compliance with data protection regulations.
6. Data Transfer and Cross-Border Data Flows: Transferring personal data across borders raises privacy and security concerns due to differing data protection laws and standards in different
jurisdictions. Adequate safeguards, such as data transfer agreements, standard contractual clauses, or binding corporate rules, may be required to ensure the lawful transfer of data internationally.
7. Regulatory Compliance: Compliance with data protection laws and regulations, such as the General Data Protection Regulation (GDPR) in the European Union, the California Consumer Privacy Act
(CCPA) in the United States, or the Personal Data Protection Bill in India, is essential for organizations to avoid legal penalties and reputational damage.
Overall, data protection is essential for maintaining individuals' privacy, fostering trust in the digital economy, and mitigating the risks associated with the processing and handling of sensitive
information. Organizations must implement robust data protection measures and adhere to applicable laws and regulations to safeguard data privacy and security effectively.
Unit 3 Page 26
Open Source Software
08 April 2024 14:11
Open Source Software (OSS) refers to software whose source code is freely available to the public, allowing users to study, m odify, and distribute the software as per the terms of its respective license.
Unlike proprietary software, which is typically developed and distributed under restrictive licenses that limit users' rights , open source software fosters collaboration, transparency, and community-
driven development.
1. Source Code Availability: Open source software provides access to its source code, enabling users to inspect, modify, and enhance the software according to their needs. This transparency fosters trust
and collaboration within the developer community.
2. Free Redistribution: Open source licenses typically allow users to redistribute the software freely, either in its origina l form or with modifications. This enables widespread adoption and distribution of
open source projects without the need for restrictive licensing fees.
3. Derived Works: Users are allowed to create and distribute derivative works based on open source software, provided that th ey adhere to the terms of the original license. This encourages innovation
and the development of new software solutions built upon existing open source projects.
4. Community Collaboration: Open source projects often thrive on community collaboration, with developers from around the wor ld contributing code, bug fixes, documentation, and other resources to
improve the software. Collaboration platforms such as GitHub facilitate this process by providing tools for version control, issue tracking, and code review.
5. Licensing: Open source software is typically distributed under licenses approved by the Open Source Initiative (OSI), such as the GNU General Public License (GPL), Apache License, MIT License, and
BSD License. These licenses specify the terms and conditions under which the software can be used, modified, and distributed, ensuring that the freedoms of users and developers are protected.
6. Transparency and Security: The availability of source code in open source software allows for greater transparency and scr utiny, which can help identify and address security vulnerabilities more
effectively. Many eyes on the code mean that issues can be discovered and fixed quickly by the community.
Open source software is widely used across various domains, including operating systems (e.g., Linux), web servers (e.g., Apa che HTTP Server), programming languages (e.g., Python, JavaScript),
databases (e.g., MySQL, PostgreSQL), and development frameworks (e.g., TensorFlow, React).
Overall, open source software plays a vital role in driving innovation, collaboration, and democratization of technology by p roviding free and accessible tools for developers, businesses, and individuals
worldwide.
Unit 3 Page 27
Macro-economic impact of the patent system
08 April 2024 14:12
The patent system in cyber law, particularly concerning inventions related to technology and software, can have significant macro-economic impacts. Here's how:
1. Incentivizing Innovation: The patent system incentivizes innovation by granting inventors exclusive rights to their inventions for a limited period. In the realm of cyber law, patents encourage the
development of new technologies, software, and digital solutions by providing inventors with legal protection and potential financial rewards for their innovations. This incentivization leads to the
creation of new products, services, and processes that drive economic growth and competitiveness in the digital economy.
2. Fostering R&D Investment: Companies often invest substantial resources in research and development (R&D) to create innovative technologies and software solutions. The prospect of securing
patents for these inventions encourages R&D investment by providing companies with a means to protect their intellectual property and recoup their investment through exclusive rights and
potential licensing revenues. This investment in R&D not only drives technological advancement but also stimulates economic activity and job creation.
3. Promoting Technology Transfer and Licensing: The patent system facilitates technology transfer and licensing arrangements, allowing inventors and companies to monetize their intellectual
property by granting others the right to use, manufacture, or sell their patented inventions. In the context of cyber law, technology transfer and licensing agreements enable the dissemination of
innovative technologies and software solutions, fostering collaboration, knowledge sharing, and industry growth. This promotes the efficient utilization of intellectual property assets and accelerates
the pace of innovation across sectors.
4. Encouraging Competition and Market Dynamics: While patents grant inventors exclusive rights to their inventions, they also encourage competition and market dynamics by fostering innovation
and diversity in the marketplace. Patent holders must compete with other innovators and companies, driving continuous improvement, differentiation, and the introduction of new products and
services. This competition benefits consumers by offering a wider range of choices, driving down prices, and improving product quality and features.
5. Balancing Innovation and Access: While patents provide inventors with exclusive rights to their inventions, they also strike a balance between innovation and access to technology by promoting
disclosure and knowledge sharing. Patent applicants must disclose their inventions in detail, enabling others to build upon existing knowledge and further advance technology. Additionally, patent
laws may include provisions for compulsory licensing or patent pools to ensure that essential technologies are accessible for public benefit, particularly in sectors such as healthcare and
telecommunications.
Overall, the patent system in cyber law plays a crucial role in driving innovation, investment, competition, and technology transfer in the digital economy. By providing inventors with incentives to
create and protect their inventions, patents contribute to economic growth, technological advancement, and societal progress. However, it's essential to strike a balance between incentivizing
innovation and promoting access to essential technologies to ensure that the benefits of the patent system are realized by society as a whole.
Unit 3 Page 28
Patent and kind of inventions protected by a patent
08 April 2024 14:14
Patents protect various types of inventions and innovations across a wide range of fields, including technology, science, engineering, medicine, and design. The primary requirement for an invention to be
eligible for patent protection is that it must be novel, non-obvious, and useful. Here are some common types of inventions that can be protected by a patent:
1. Utility Patents: Utility patents are the most common type of patent and cover new and useful processes, machines, articles of manufacture, or compositions of matter. Examples of inventions
protected by utility patents include:
- Manufacturing processes
- Mechanical devices
- Chemical compositions
- Software algorithms
- Biotechnological innovations
2. Design Patents: Design patents protect the ornamental design or appearance of a functional item. Unlike utility patents, which focus on the functionality or utility of an invention, design patents focus
on the aesthetic aspects. Examples of inventions protected by design patents include:
- Product designs (e.g., smartphones, furniture)
- Graphic icons and user interfaces
- Packaging designs
- Textile patterns
3. Plant Patents: Plant patents protect new varieties of asexually reproduced plants, such as through grafting or cuttings. To be eligible for a plant patent, the new variety must be distinct, uniform, and
stable. Examples of inventions protected by plant patents include:
- New varieties of fruit trees
- Ornamental plants and flowers
- Hybrid plant varieties developed through selective breeding
4. Software Patents: In some jurisdictions, including the United States, software inventions may be eligible for patent protection if they meet the criteria of novelty, non-obviousness, and utility. Software
patents typically cover novel algorithms, methods, or processes implemented through computer code. Examples of software inventions protected by patents include:
- Data compression algorithms
- Encryption methods
- Search engine algorithms
- User interface innovations
5. Biotechnological Patents: Biotechnological inventions encompass a wide range of innovations in fields such as genetics, molecular biology, and pharmaceuticals. Biotechnological patents may cover:
- Genetically engineered organisms
- Therapeutic antibodies and proteins
- Diagnostic methods and tools
- Gene editing technologies like CRISPR
It's important to note that patentability requirements and standards may vary between jurisdictions, and not all inventions are eligible for patent protection. Additionally, inventions must be disclosed in
sufficient detail to enable others skilled in the field to replicate or implement them based on the patent specification.
Unit 3 Page 29
Patent document How to protect your inventions?,
08 April 2024 14:15
A patent document is a legal document issued by a government authority, such as a patent office, granting exclusive rights to an inventor or assignee for a specified invention. It contains detailed information
about the patented invention, including its description, claims, drawings, and any other relevant information. Patent documen ts serve several purposes:
1. Legal Protection: A patent document provides legal protection for an invention, granting the patent holder exclusive rights to make, use, sell, or import the patented invention for a limited period, typically 20
years from the filing date of the patent application.
2. Public Disclosure: Patent documents serve as a public disclosure of the patented invention, providing detailed information about its features, f unctionality, and implementation. This promotes transparency,
encourages innovation, and facilitates knowledge sharing within the scientific and technological community.
3. Enforcement: Patent documents can be used to enforce the patent holder's rights against unauthorized use, manufacture, or sale of the pate nted invention by third parties. Patent holders can initiate legal
proceedings, such as infringement lawsuits, to protect their intellectual property rights and seek remedies for infringement.
4. Licensing and Commercialization: Patent documents enable patent holders to license their inventions to others for commercialization, research, or development purposes. Licensing agreements allow third
parties to use the patented invention in exchange for royalties or other financial compensation, facilitating the transfer of technology and promoting innovation.
5. Prior Art: Patent documents also serve as prior art for subsequent patent applications, providing a basis for evaluating the novelty and non-obviousness of new inventions. Patent examiners and researchers
use patent documents to assess the state of the art in a particular field and determine whether an invention meets the criter ia for patentability.
Title: The title of the invention, which succinctly describes the nature of the patented invention.
Abstract: A brief summary of the invention, highlighting its key features and advantages.
Description: A detailed description of the invention, including its technical aspects, functionality, and implementation. The description should enable a person skilled in the relevant field to understand and
replicate the invention.
Claims: The claims define the scope of the patent protection, specifying the particular features or elements of the invention that ar e protected. Patent claims are drafted in legal language and must be clear,
concise, and supported by the description.
Drawings: Diagrams, illustrations, or drawings that accompany the description to provide visual representations of the invention and ai d in understanding its structure and operation.
Overall, patent documents play a crucial role in protecting and promoting innovation by providing legal protection, facilitat ing knowledge dissemination, and enabling commercialization of patented inventions.
Protecting your inventions through a patent involves several steps and considerations. Here's a general overview of the proce ss:
2. Evaluate Patentability:
- Assess whether your invention meets the criteria for patentability, including novelty, non -obviousness, and utility.
- Consider consulting with a patent attorney or agent to evaluate the patentability of your invention and determine the best st rategy for protection.
Throughout the patenting process, it's essential to work closely with a qualified patent attorney or agent who can provide ex pert guidance and assistance in navigating the complexities of patent law and
maximizing the protection of your inventions.
Unit 3 Page 30
Granting of patent, Rights of a patent
08 April 2024 14:15
The granting of a patent by a government authority confers certain exclusive rights to the patent holder for a specified invention. These rights are typically outlined in the patent law of the relevant jurisdiction and
are subject to certain conditions and limitations. Here are the primary rights associated with a granted patent:
1. Exclusive Right to Use: The patent holder has the exclusive right to use the patented invention for the duration of the patent term, typically 20 years from the filing date of the patent application. This right allows
the patent holder to exploit the invention commercially, either by manufacturing, selling, importing, or using the patented product or process.
2. Exclusive Right to Exclude Others: The patent holder has the exclusive right to exclude others from making, using, selling, offering for sale, or importing the patented invention without permission. This right
enables the patent holder to prevent competitors and third parties from exploiting the patented invention without authorization, thereby protecting the commercial value of the invention.
3. Right to License: The patent holder has the right to license the patented invention to others for commercialization, research, or development purposes. Licensing agreements allow third parties to use the
patented invention in exchange for royalties or other financial compensation, enabling the patent holder to generate revenue from the invention without directly engaging in commercial activities.
4. Right to Enforce: The patent holder has the right to enforce their patent rights against unauthorized use, manufacture, or sale of the patented invention by third parties. The patent holder can initiate legal
proceedings, such as infringement lawsuits, to protect their intellectual property rights and seek remedies for infringement, including injunctions, damages, and attorney fees.
5. Right to Assign or Transfer: The patent holder has the right to assign or transfer their patent rights to another party, either partially or entirely. Patent assignments involve transferring ownership of the patent to a
new owner, while patent licenses involve granting permission to use the patented invention without transferring ownership. Assignments and licenses are typically documented through written agreements and may
involve the payment of consideration or royalties.
It's important to note that while patents grant exclusive rights to the patent holder, these rights are subject to certain limitations and exceptions, including:
Non-Infringing Uses: Patents do not grant the patent holder the right to prevent others from using the patented invention for non-infringing purposes, such as research, education, or private use.
Exhaustion Doctrine: Once a patented product is lawfully sold or distributed by the patent holder, the patent rights are said to be "exhausted," and the purchaser can use or resell the product without further
restrictions from the patent holder.
Compulsory Licensing: In certain circumstances, governments may grant compulsory licenses to third parties to use a patented invention without the consent of the patent holder, typically for reasons of public
interest, national security, or antitrust concerns.
Overall, the rights associated with a granted patent provide the patent holder with exclusive control over the commercial exploitation of the patented invention, enabling them to derive economic benefits from their
innovation and incentivizing further research, development, and investment in new technologies.
Unit 3 Page 31
What is copyright?
08 April 2024 14:15
Copyright
What Is Copyright?
Copyright is the legal right given to an intellectual property owner. As the term suggests, it is the right to copy. Thus, copyright meaning is that when a person creates a product, they own the right to it.
So, only that individual can have the exclusive right to reproduce that work or anyone they give authorization to. Copyright law grants the original creators of the product an exclusive right to use it
further or duplicate the product for a specific time. At this point, the item that has been copyrighted develops into the public domain.
Copyright Definition
A legal right granted to an intellectual property owner is copyright. It helps protect the creator of the original material so that no one can duplicate or use it without authorization. If an original work
needs protection through copyright laws, it must be in a tangible form. For instance, the Indian Copyright Act protects the creator's work by law until 60 years after their death.
For instance, art, novels, computer software, films, website content, poetry, musical lyrics, and more are all unique creations. So, Copyright meaning, acts as a protection to legally safeguard that
original creation. The copyright law states that a work is original if the author made it by thinking independently and not copying it from somewhere. If you have that copyright to your product, no one
can use or replicate your work.
The original owner can voluntarily register that copyright to get the upper hand. Although, not every work is eligible to be copyrighted. For instance, you cannot protect an idea or theory with copyright.
Similarly, logos, names of brands, slogans, etc., are not up for protection by the law of copyright.
As per the copyright definition, the work must be in a tangible form so it can be copyrighted. You will have to write down the speech, idea, discovery, etc., in a physical form to make it eligible for
protection by copyright.
1. Exclusive Rights: Copyright grants creators a bundle of exclusive rights to their works, including the rights to reproduce, distribute, perform, display, and create derivative works based on the original
work. These rights enable creators to control how their works are used and to benefit financially from their creations.
2. Automatic Protection: In most countries, copyright protection is automatic upon the creation of an original work in a tangible form of expression. There is no requirement to register the work or affix
a copyright notice, although registration may provide certain legal benefits and remedies in case of infringement.
3. Duration of Protection: Copyright protection typically lasts for a specific period, which varies depending on the jurisdiction and type of work. In many countries, copyright protection lasts for the life
of the author plus a certain number of years after their death (e.g., 70 years in many jurisdictions). After the copyright term expires, the work enters the public domain and can be freely used by anyone.
4. Fair Use or Fair Dealing: Copyright laws often include provisions for "fair use" (in the United States) or "fair dealing" (in other jurisdictions), which allow limited use of copyrighted works without
permission from the copyright owner for purposes such as criticism, commentary, news reporting, teaching, scholarship, or research. Fair use/fair dealing is determined on a case-by-case basis and
considers factors such as the purpose and character of the use, the nature of the copyrighted work, the amount and substantiality of the portion used, and the effect on the potential market for the
original work.
5. Moral Rights: In addition to economic rights, copyright laws in some jurisdictions also recognize "moral rights" that protect the integrityand attribution of the author's work. Moral rights typically
include the right of attribution (to be identified as the author of the work) and the right of integrity (to prevent distortion, mutilation, or modification of the work that would harm the author's
reputation).
Copyright plays a crucial role in protecting the rights of creators, encouraging creativity and innovation, and fostering thedissemination of knowledge and culture. It provides an incentive for creators to
produce new works by ensuring that they can benefit from their efforts and investments in the creation of original content.
Unit 4 Page 32
Latest editions of Designs
08 April 2024 14:16
As of my last update in January 2022, the latest editions of designs are not usually referred to by a specific version number like software or books. Instead, updates to design standards, guidelines, or
methodologies may occur periodically, but they are often referred to by the year of publication or revision. For example:
1. ISO Standards: The International Organization for Standardization (ISO) periodically updates its standards related to design practices and methodologies. The latest editions or revisions of ISO
standards related to design may include ISO 13407: Human-centered design processes for interactive systems and ISO 9241: Ergonomics of human-system interaction.
2. Design Guidelines: Various organizations and industries publish design guidelines and best practices to inform designers and practitioners about current trends, methodologies, and principles in
design. These guidelines may be updated periodically to reflect changes in technology, user preferences, or industry standards.
3. Software Design Tools: Design software tools and applications, such as Adobe Creative Suite, Sketch, Figma, and InVision, often release updates and new versions with enhanced features,
improvements, and bug fixes. Designers may refer to the latest versions of these tools to stay up-to-date with the latest design capabilities.
4. Design Publications: Design-related publications, journals, and magazines may release new editions or issues periodically, featuring articles, case studies, and insights on design trends, innovations,
and practices. Examples include "Design Issues," "Communication Arts," "Eye Magazine," and "Design Observer."
To find the latest editions or updates in the field of design, it's recommended to consult relevant sources such as professional organizations, academic journals, industry publications, and official
standards bodies. Additionally, staying connected with the design community through conferences, workshops, and online forums can provide insights into the latest developments and trends in design
practice and theory.
Unit 4 Page 33
what is covered by copyright?
08 April 2024 14:16
Copyright covers a wide range of creative works and expressions, including but not limited to:
1. Literary Works: This category includes novels, short stories, poems, essays, articles, blogs, and other written content.
2. Artistic Works: Artistic works encompass visual creations such as paintings, drawings, sculptures, photographs, illustrations, graphic design s, and digital art.
3. Musical Works: Musical works include compositions, songs, melodies, lyrics, and musical arrangements.
4. Dramatic Works: Dramatic works cover plays, scripts, screenplays, choreography, and other theatrical or performance -based works.
5. Architectural Works: Architectural works refer to designs, plans, blueprints, and drawings of buildings and structures.
6. Audiovisual Works: This category includes films, videos, television shows, documentaries, animations, and multimedia presentations.
7. Computer Programs: Copyright also protects computer programs, software code, applications, and databases, including both source code and object code.
8. Sound Recordings: Sound recordings encompass recorded performances, music albums, podcasts, audiobooks, and other audio content.
9. Broadcasts: Copyright covers broadcasts of radio and television programs, as well as live streaming and webcasts.
10. Compilation Works: Compilation works involve the selection, arrangement, and organization of pre-existing materials, such as anthologies, collections, databases, directories, and
encyclopaedias.
It's important to note that copyright protects the expression of ideas, not the ideas themselves. This means that while the s pecific form or expression of a creative work is protected by copyright,
the underlying ideas, facts, concepts, or methods are not. Additionally, copyright protection arises automatically upon the c reation of an original work in a tangible form of expression, and
registration or formalities are not required to secure copyright protection (although registration may provide certain legal benefits and remedies).
Unit 4 Page 34
How long does copyright last?
08 April 2024 14:16
The duration of copyright protection varies depending on several factors, including the type of work, the jurisdiction, and w hen the work was created or published. In general, copyright protection lasts for a specific
period of time, after which the work enters the public domain and can be freely used by anyone. Here are some general guideli nes for the duration of copyright:
It's important to consult the copyright laws and regulations of the relevant jurisdiction to determine the specific duration of copyright protection for a particular work. Additionally, the duration of copyright may be
affected by factors such as international agreements and treaties, changes in copyright law, and individual circumstances rel ated to the creation and publication of the work.
Unit 4 Page 35
Why protect copyright?
08 April 2024 14:16
Copyright protection serves several important purposes, which ultimately contribute to fostering creativity, innovation, and cultural development. Here are some key reasons why copyright is protected:
1. Incentivizing Creativity: Copyright protection provides creators with the exclusive rights to their works, enabling them to control how their creations are used and to benefit financially from their efforts. By
providing creators with economic incentives and rewards for their creative endeavors, copyright encourages the production of new and original works across various fields, including literature, music, art, film,
software, and other creative industries.
2. Promoting Innovation and Progress: Copyright protection fosters innovation and progress by incentivizing the creation and dissemination of new ideas, expressions, and cultural works. By granting creators
exclusive rights to their works for a limited period, copyright encourages investment in creative endeavors, research, development, and experimentation, leading to the production of new and diverse cultural
works that enrich society and contribute to human knowledge and understanding.
3. Supporting Economic Growth and Job Creation: Copyright protection contributes to economic growth and job creation by stimulating the growth of creative industries, supporting cultural production and
distribution, and generating revenue streams for creators, publishers, distributors, and other stakeholders in the creative ecosystem. Creative industries, including publishing, music, film, television, software,
and design, play a significant role in driving economic activity, employment, and innovation in many countries around the world.
4. Preserving Cultural Heritage and Diversity: Copyright protection helps preserve and promote cultural heritage, traditions, and diversity by safeguarding the rights of creators and communities to control and
protect their cultural expressions, folklore, and traditional knowledge. Copyright enables creators to share, transmit, and preserve cultural works, stories, languages, and customs for future generations,
contributing to cultural identity, cohesion, and inclusivity.
5. Encouraging Access to Knowledge and Education: While copyright grants creators exclusive rights to their works, it also includes provisions for exceptions and limitations that balance the interests of
creators with the public interest in access to knowledge, education, and information. Copyright exceptions, such as fair use/fair dealing, educational use, library and archive exceptions, and public domain
access, facilitate the use of copyrighted works for purposes such as research, teaching, criticism, commentary, and transformative use, promoting access to knowledge and cultural enrichment.
Overall, copyright protection plays a crucial role in fostering creativity, innovation, cultural development, and economic prosperity by incentivizing the production and dissemination of creative works and
ensuring a balance between the rights of creators and the public interest in access to culture and knowledge.
Unit 4 Page 36
What are related rights?
08 April 2024 14:16
In the context of Intellectual Property Rights (IPR), related rights refer to legal protections granted to individuals and en tities that are closely associated with the creation, production, or dissemination of
creative works, performances, and recordings. Related rights are distinct from copyright but share similarities in terms of t heir objectives and legal protections. The main categories of related rights in IPR
include:
1. Performers' Rights: Performers' rights protect the interests of individuals who perform artistic, musical, dramatic, or other creative works in f ront of an audience or in a recorded format. Performers' rights
typically include rights such as the right to control the use of their performances, the right to receive equitable remunerat ion for their performances, and the right to prevent unauthorized recordings,
broadcasts, or distributions of their performances.
2. Producers' Rights: Producers' rights protect the interests of individuals or entities that invest resources in the production, recording, or dis tribution of creative works, such as sound recordings, films, or
broadcasts. Producers' rights typically include rights such as the right to control the reproduction, distribution, and publi c performance of their productions, the right to receive royalties or licensing fees for the
use of their productions, and the right to prevent unauthorized copying, distribution, or broadcasting of their productions.
3. Broadcasting Rights: Broadcasting rights protect the interests of broadcasters that transmit radio, television, or internet broadcasts of creative works, including music, news, sports, and entertainment
programming. Broadcasting rights typically include rights such as the right to control the transmission, retransmission, or r ebroadcasting of their broadcasts, the right to receive licensing fees or royalties for the
use of their broadcasts, and the right to prevent unauthorized recording, distribution, or rebroadcasting of their broadcasts .
4. Moral Rights of Performers and Producers: Similar to the moral rights of authors in copyright law, performers and producers may have moral rights that protect the inte grity and attribution of their
performances or productions. Moral rights may include rights such as the right to be identified as the performer or producer of a work, the right to prevent distortion, mutilation, or modification of a work that
would harm the performer's or producer's reputation, and the right to prevent unauthorized association of a work with a produ ct, service, or cause.
Related rights play a crucial role in supporting the creative industries, promoting the interests of performers, producers, b roadcasters, and other stakeholders, and ensuring a fair and equitable distribution of
revenues and benefits within the creative ecosystem. Like copyright, related rights are governed by national laws, internatio nal treaties, and collective management organizations that administer and enforce
related rights on behalf of rights holders.
Unit 4 Page 37
Distinction between related rights and copyright?
08 April 2024 14:16
Unit 4 Page 38
What is a trademark?
08 April 2024 14:17
A trademark is a distinctive sign, symbol, logo, word, phrase, design, or combination thereof that is used by individuals, bu sinesses, organizations, or other entities to identify and distinguish
their goods or services from those of others in the marketplace. Trademarks serve as a form of intellectual property protecti on for brands and help consumers recognize and associate products
or services with a particular source or origin.
A trademark can be any word, phrase, symbol, design, or a combination of these things that identifies your goods or services. It’s how cu stomers recognize you in the marketplace and
distinguish you from your competitors.
The word “trademark” can refer to both trademarks and service marks. A trademark is used for goods, while a service mark is used for services.
A trademark:
• Identifies the source of your goods or services.
• Provides legal protection for your brand.
• Helps you guard against counterfeiting and fraud.
A common misconception is that having a trademark means you legally own a particular word or phrase and can prevent others fr om using it. However, you don’t have rights to the word or
phrase in general, only to how that word or phrase is used with your specific goods or services.
For example, let's say you use a logo as a trademark for your small woodworking business to identify and distinguish your goo ds or services from others in the woodworking field. This doesn't
mean you can stop others from using a similar logo for non-woodworking related goods or services.
Another common misconception is believing that choosing a trademark that merely describes your goods or services is effective . Creative and unique trademarks are more effective and easier
to protect. Read more about strong trademarks.
1. Identification and Distinction: Trademarks are used to identify and distinguish the goods or services of one party from those of others in the marketplace. T hey help consumers recognize and
associate specific brands with certain qualities, characteristics, or attributes.
2. Source of Origin: Trademarks serve as indicators of the source or origin of goods or services, signalling to consumers the manufacturer, produc er, distributor, or provider associated with a
particular product or service.
3. Protection of Brand Identity: Trademarks help protect the reputation, goodwill, and brand identity of businesses and organizations by preventing unauthoriz ed use or infringement of their
distinctive marks by competitors or third parties.
4. Exclusive Rights: Trademark owners have the exclusive right to use their marks in connection with the goods or services for which the marks are registered. They can prevent others from
using identical or similar marks that are likely to cause confusion, deception, or dilution of their brand.
5. Registration and Enforcement: While trademark rights can arise through use in commerce, registration with the relevant trademark office provides additional legal protections and benefits,
including the presumption of ownership, nationwide or international protection, and the ability to enforce rights against inf ringers through legal proceedings.
6. Renewal and Maintenance: Trademark registrations typically require periodic renewal and maintenance to remain in force. Trademark owners must actively use their marks in commerce
and comply with renewal and maintenance requirements to preserve their rights and prevent the loss of trademark protection.
Examples of trademarks include company names, product names, logos, slogans, jingles, packaging designs, and other distinctiv e marks used to identify and distinguish goods or services in the
marketplace. Well-known trademarks such as Coca-Cola, Nike, Apple, and McDonald's are widely recognized and associated with specific brands, products, or services around the world.
Unit 4 Page 39
Rights of trademark?
08 April 2024 14:17
The rights associated with a trademark are the exclusive rights granted to the owner of the trademark to use the mark in connection with specific goods or services and to prevent others from using
similar marks in a way that could cause confusion, deception, or dilution of the brand. These rights typically include:
1. Exclusive Use: The trademark owner has the exclusive right to use the trademark in connection with the goods or services for which it is registered. This exclusive right allows the owner to distinguish
their products or services from those of others and to build brand recognition and loyalty among consumers.
2. Preventing Infringement: The trademark owner has the right to prevent others from using identical or confusingly similar trademarks in connection with similar or related goods or services. This
includes preventing competitors from using marks that are likely to cause confusion among consumers about the source or origin of the goods or services.
3. Enforcement: The trademark owner has the right to enforce their trademark rights against unauthorized use or infringement by third parties. This may involve taking legal action, such as filing a
trademark infringement lawsuit, seeking injunctive relief, or pursuing other remedies to stop the unauthorized use of the trademark and to obtain damages or other relief for the infringement.
4. Licensing: The trademark owner has the right to license or authorize others to use the trademark under specific terms and conditions. Trademark licensing agreements allow third parties, such as
distributors, franchisees, or manufacturers, to use the trademark in connection with authorized products or services, typically in exchange for royalties or licensing fees.
5. Assignment: The trademark owner has the right to assign or transfer their trademark rights to another party, either partially or entirely. Trademark assignments involve transferring ownership of the
trademark to a new owner, who assumes all rights and responsibilities associated with the mark.
6. Renewal and Maintenance: The trademark owner has the responsibility to maintain and renew their trademark registration to keep it in force. This typically involves filing periodic renewal
applications and complying with maintenance requirements, such as demonstrating continued use of the mark in commerce.
7. Protection from Dilution: In some jurisdictions, trademark owners may have the right to prevent dilution of their trademarks, which occurs when the distinctiveness or uniqueness of the mark is
weakened by unauthorized use or association with unrelated goods or services.
Overall, the rights associated with a trademark provide the owner with valuable legal protections and the ability to protect and enforce their brand identity, reputation, and goodwill in the marketplace.
Unit 4 Page 40
What kind of signs can be used as trademarks?, types of trademark,
function does a trademark perform, How is a trademark protected?,
How is a trademark registered?
08 April 2024 14:17
- Words: Any word, combination of words, or phrase that uniquely identifies a product or service can be used as a trademark. Examples include brand names like "Nike," "Apple," and "Coca-Cola."
- Logos: Designs, symbols, graphics, or emblems that serve as visual representations of a brand can be used as trademarks. Examples include the Nike "swoosh," the Apple logo, and the McDonald's golden
arches.
- Letters or numerals: Individual letters or numerals, as well as combinations thereof, can function as trademarks. For example, "IBM" and "3M" are registered trademarks.
- Slogans: Catchphrases, slogans, or taglines that are associated with a particular brand or product can be used as trademarks. Examples include "Just Do It" (Nike) and "I'm Lovin' It" (McDonald's).
- Shapes: Distinctive shapes or configurations of products or packaging can function as trademarks. Examples include the Coca-Cola bottle shape and the Toblerone chocolate bar triangular shape.
- Sounds: Unique sounds or jingles associated with a brand or product can be registered as trademarks. Examples include the NBC chimes and the Intel jingle.
2. Types of trademarks:
Trademarks can be classified into various types based on their distinctiveness and the level of protection they receive. The main types of trademarks include:
- Arbitrary or fanciful marks: These are inherently distinctive marks that bear no logical connection to the goods or services they represent. Examples include "Apple" for computers and "Exxon" for fuel.
- Suggestive marks: These marks indirectly suggest a characteristic or quality of the goods or services they represent, requiring some imagination or thought to understand their association. Examples include
"Netflix" for streaming services and "Microsoft" for software products.
- Descriptive marks: These marks directly describe a characteristic or quality of the goods or services they represent, making them less inherently distinctive and requiring acquired distinctiveness through
use. Examples include "Vision Center" for eyewear stores and "All-Bran" for cereal products.
- Generic marks: These marks consist of common terms or names that refer to the general category of goods or services they represent and cannot be registered as trademarks. Examples include
"Computer" for computers and "Beer" for beer products.
3. Function of a trademark:
Trademarks serve several important functions in the marketplace, including:
- Common law rights: Trademark rights arise automatically through use in commerce, providing some level of protection against unauthorized use or infringement by others.
- Statutory registration: Trademark owners can register their trademarks with the relevant government authority, such as the United States Patent and Trademark Office (USPTO) in the United States or the
European Union Intellectual Property Office (EUIPO) in the European Union, to obtain enhanced legal protections and benefits.
- Enforcement: Trademark owners can enforce their rights against unauthorized use or infringement by third parties through legal proceedings, such as trademark infringement lawsuits, cease-and-desist
letters, and administrative actions before trademark offices.
- Licensing and policing: Trademark owners can license or authorize others to use their trademarks under specific terms and conditions, as well as monitor the marketplace for potential infringements and
take proactive measures to protect their trademarks.
- Conducting a trademark search: Before applying for registration, it's advisable to conduct a comprehensive search to ensure that the proposed trademark is available for use and registration and does not
conflict with existing trademarks.
- Filing a trademark application: The trademark owner submits an application for registration to the relevant trademark office,providing information about the trademark, the goods or services it will be
used with, and the basis for the application.
- Examination: The trademark office examines the application to ensure that it meets the requirements for registration, including distinctiveness, eligibility, and compliance with formalities.
- Publication: If the application meets the requirements, the trademark may be published for opposition, allowing third parties to challenge the registration within a specified period.
- Registration: If no oppositions are filed or if they are resolved in favor of the applicant, the trademark is registered, and the owner receives a certificate of registration, granting exclusive rights to use the
trademark in connection with the specified goods or services.
These steps may vary depending on the jurisdiction and the specific requirements of the trademark office responsible for registration. It's advisable to consult with a trademark attorney or agent to navigate
the registration process and ensure the best possible outcome for your trademark application.
Unit 4 Page 41