Legal, Ethical Nonsense Flashcards Preview

AH Computing > Legal, Ethical Nonsense > Flashcards

Flashcards in Legal, Ethical Nonsense Deck (70):
1

What do existing intellectual property rights stop people stealing/copying?

Names of products
Inventions
Design/Look of Products
Things that are written, made or produced

2

Give examples of intellectual property rights

Copyright
Patents
Design and trade marks

3

What are the only things that intellectual property rights apply to?

Something that is unique

4

What is covered under automatic UK protection?

Copyright
Design Right

5

What needs to be applied for?

Trademarks
Registered Designs
Patents

6

What is a patent?

A licence conferring a right/title for a set period

7

What does a registered design protect?

External appearance of a design

8

What is a trademarks?

Symbol, word, words legally registered for representation of a company

9

What criteria has to met for intellectual property rights to be conferred on a property?

- IF they have created the item and its meets the requirements for a patent/design
-IF they have purchased the property rights from the previous product owner
-IF they have a brand that can be trademarked

10

How long does it take for a trademark application?

4 months

11

What are examples of things that can be protected under a trademark?

Product names
Logos
Jingles

12

How long does it take to apply for a patent?

5 years

13

What is covered under a registered design?

Appearance of the product

14

What is covered under patents?

Inventions and Products

15

Give examples of intellectual property right infringements

- Selling a product similar to right holder
- Offers registered design commercially
- Uses a trademark similar to yours

16

What are the ways to resolve a copyright infringement?

Take legal action
Use mediation
Reach an agreement with infringing party

17

What is one way an agreement will be met with an infringing party?

IP licence agreement

18

What can data collected from things like social media be used to do?

Profile our behaviours
Suggest other products
Steal Identity

19

Give three data principles

1. Data must be processed fairly and accurately
2. Processed for lawful purposes
3. Adequate, relevant and not excessive
4. Accurate and up to date
5. Not kept for longer than necessary
6. Processed in accordance to individual rights
7. Kept Secure
8. Not transferred outside Europe Economic Area without adequate protection

20

What is an intelligent system?

A system with artificial intelligence

21

What are the benefits of intelligent systems?

Safer performance of difficult tasks
Faster responses in crisis situations
More efficent resource management

22

An increase in ______ and ______ makes it possible to process increasing amounts of data in a short time

Processor Power
Data Storage
Connectivity

23

What is an Intelligent Agent?

Autonomous Entity which observes through sensors and acts upon an environment using actuators

24

What do data centres require?

Specialized cooling systems, large amounts of energy

25

What are data centres?

Large groups of networked computer servers typically used for remote storage and processing

26

Give examples of European regulations which apply to computing products

RoHS, REACH and WEEE

27

What do European regulations ensure?

Hazardous materials included in devices are disposed of properly

28

A freelance graphic artist has been contracted by a company to create new characters for a game. Describe how the company would protect its interests when writing contract for this work

Company should ensure it owns any intellectual property rights in relation to the work contracted to this freelance artist

29

Explain how a company should use tracking information of it's customers/users to influence developments of products in the future

Cookies can be used to gather information about customer's profile/frequencies of visits to the site
Indicate what age groups are using the site, can then focus on target areas to attract that age group

30

Explain two ways analytics could be used to inform decisions about an online marketing campaign for a new range

Evaluating visitor stats from company's websites to help decide most effective product placement points
Social media analytics to assess success of previous competitions

31

Define Online Marketing

An umbrella term for the use of targeted and interactive marketing of products using digital technologies to generate sales

32

Users interacting with advertisements or signing-up for free trials of services or membership of web sites will provide marketers with what?

Contact information for direct marketing via e-mail/instant message or SMS

33

What is web profiling?

Use of persistent or permanent cookies to track a user's overall activity online

34

Who usually uses cookie profiling?

Marketers who buy advertising rights on thousands of websites in order to create a single "profile" of a user

35

What is the only way for marketers to target potential customers and obtain a possible product purchase from them?

Cookie Tracking

36

What are Analytics?

Tool used by web services companies, individuals and businesses to understand the behaviour of users.

37

Give example of information collected by analytics

Number of visits
Time spent on the website

38

What is Cyber Security?

Body of technologies, processes and practices designed to protect computers and data from attack or unauthorized access.

39

What are the three main areas in Cyber Risks?

Cyber Crime
Cyber War
Cyber Terror

40

What is the intent of cyber crime?

Intent on extracting money, data or causing disruption

41

Who carries out cyber crime?

Individuals working alone or in organised groups

42

Give examples of forms of cyber crime

Acquisition of credit/debit card data
Impairing operations of website

43

Define Cyber War

A nation state conducting sabotage and espionage against another nation in order to cause disruption or extract data

44

Who carries out cyber terror?

An organisation working independently of a nation state

45

Define Cyber Terror

An organisation working independently of a nation state conducting terrorist activities through the medium of cyberspace

46

Give examples of organisation that have to consider measures against cyber war/terror

Governments
Those within critical national infrastructure
High profile institutions

47

Define a Virus

A small piece of software program that can replicate itself and spread from one computer to another by attaching itself to another file and it gains access to steal information/files

48

What is the aim of a worm?

Seek to damage networks and deliver payloads with allow remote control of computer

49

Define Spyware

Installed by clicking links/downloading infected software. Takes control of your computer and collects information without your knowledge

50

What is the technique of a worm?

Self replicating
Do not need another file
Find vulnerabilities in system

51

What is the aim of trojan?

To create a backdoor on your computer by which information can be stolen

52

What is the technique used for a trojan?

A software program appears to perform one function but actually does not

53

Describe Pharming

An attack to redirect a website's traffic to a different, fake website, where the individuals' information is then compromised.

54

What is the method for phishing?

An attempt to acquire users' information by masquerading as a legitimate entity

55

What is a drive by attack?

Opportunistic attacks against specific weaknesses within a system

56

What is a MITM attack?

Middleman impersonates each endpoint and is thus able to manipulate both victims

57

What is social engineering?

Exploiting the weakness of the individual by making them click malicious links, or by physically gaining access to a computer through deception

58

Give examples of social engineering

Phishing and Pharming

59

Give examples of tools to prevent cybercrime

- Regularly update anti-virus software to prevent attacks
- Secure Passwords
- Biometrics for entry to devices
- Educating users to the dangers

60

What is the difference between Cyber Resilience and Cyber Security?

Cyber Resilience ensures that an organisation can continue to function effectively even if it has suffered from an attack
Cyber Security is trying to prevent the attacks

61

What is the 'RIGHT TO BE FORGOTTEN'

Ruling which forces Internet search providers to remove search results which point to articles/information which relate to personal data about an individual which should no longer appear

62

Define Social Media

Range of online communications tools focused on communities of users and their interactions

63

Give examples of legal issues with social media

- Libel
- Malicious Communication
- Breach of Copyright

64

What is Libel?

A published false statement that is damaging to a person's reputation

65

What is Cyberbullying?

Abuse of another person using threats, insults and hurtful remarks and messages over the internet.

66

What is the idea behind big data?

Many things we do in our lives leave a digital trace (or data), which we (and others) can use and analyse

67

What have advances in big data allowed us to do?

Decode Human DNA
Accurately predict human interactions

68

Define Big Data

Refers to our ability to collect and analyse the vast amounts of data we are now generating in the world

69

Give some examples of big data uses

- Supermarkets are combining their loyalty card data with social media information to detect and leverage changing buying patterns. For example, it is easy for retailers to predict that a woman is pregnant simply based on the changing buying patterns.
- Google's self-driving car is analysing a gigantic amount of data from sensor and cameras in real time to stay on the road safely

70

Describe Design Right

Automatically gain Design Right protection on the design of her program.
protects design for 10 years after it was first sold or 15 years after it was created - whichever is
earliest