ethics test 2

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/125

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

126 Terms

1
New cards

Intellectual property

A categorical description of intangible assets owned and legally protected by a company/individual from outside use or implementation without consent.

2
New cards

Patent

Grant of property rights to the inventor. It gives the right to eliminate the usage, production, selling, and importing owner's invention.

3
New cards

Patent's safeguard

20 Years

4
New cards

Patent Registration

Available after the inventor reveals the invention fully and publicizes the technical information of the invention.

5
New cards

Patent Law

Grants protection for new inventions (products, processes, designs, etc.)

6
New cards

Trademark

Any word, phrase, symbol, design, or combination of these things that identifies your goods or services.

7
New cards

Trademark Registration

Trademark can be exclusively used by its owner or licensed to another party for use in return for payment. Provides legal certainty and reinforces the position of the right holder.

8
New cards

T/F- A lawncare company trademarks a logo it uses, this means that a company in a different business entirely cannot use a logo similar to the trademarked logo.

False

9
New cards

Trademarks that can be registered are...

almost endless. Incl. Drawings, Shape of goods, Sound, Colors, Words.

10
New cards

™ Symbol

Stands for trademark and indicates the unregistered trademark. Usually implies that they have applied for trademark registration.

11
New cards

T/F- ™ Symbol does not guarantee protection under Trademark law

TRUE

12
New cards

SM Symbol

Same as TM except used when in connection with a service such as banking or legal services.

13
New cards

R (®) Symbol

Trademark is registered.

14
New cards

T/F - R (®) Symbol can be used regardless if the trademark has actually been registered.

FALSE

15
New cards

Trademark Expiry

A trademark can last indefinitely but only if it is properly maintained. In order to keep your trademark alive, you need to continue using it in commerce and renew it every 10 years with the USPTO.

16
New cards

Trademark Renewal

The US Patent and Trademark Office (USPTO) administers federal trademark registrations.

17
New cards

Trade Secrets

IP rights on confidential information that may be sold or licensed. Defined as a piece of information that is kept confidential or reasonably which provides a business with an economic benefit over its competitors.

18
New cards

Types of Trade Secrets

  1. Financial Data

19
New cards
  1. Customer Lists

20
New cards
  1. Computer Source Code

21
New cards
  1. Supplier's Lists

22
New cards
  1. Pricing Information

23
New cards

Copyright (author's right)

A legal term used to describe the rights that creators have over their literary and artistic works.

24
New cards

Copyright does not extend to...

Ideas, Procedures, methods of operation & mathematical concepts.

25
New cards

Copyright protects

Literary works such as novels, poems, plays, reference works.

26
New cards

Computer Programs

27
New cards

Films, musical compositions, and choreography

28
New cards

Copyright Owner

Anyone can be a Copyright owner.

29
New cards

T/F- Works made by an employee belong to the employee.

False - They belong to the employer

30
New cards

Length of Copyright

Copyright protection varies from country to country, and can stand for 50 to 100 years after the individuals death.

31
New cards

Copyright: Original

Work must merely be independently created.

32
New cards

Copyright: Work of Authorship

Work must be a product of creative expression that falls under a category of copyrightable subject matter.

33
New cards

Copyright: Fixed

Meet the fixation requirement a work must be fixed in a tangible medium of expression. Protection attaches automatically to an eligible work the moment the work is fixed.

34
New cards

Rights Under Copyright

  1. Economic Rights: Allow the rights owner to derive financial reward from the use of their works by others.

35
New cards
  1. Moral Rights: Protect the non-economic interests of the author. Even if the creator sells copyright in the work to someone else he or she retains moral rights in the work. The work cannot be distorted, mutilated, or otherwise modified in a way that is prejudicial to the creator's reputation or honor.

36
New cards
  1. Moral rights are personal to the creator, and thus cannot be sold or given away.

37
New cards

Copyright Registration

Copyright exists automatically in an original work of authorship once its fixed.

38
New cards

Problems to Protect Copyrights

Digital technology and the internet make copyright infringement easier and cheaper.

39
New cards

Copyright Law of the U.S.

Grants monopoly protection for "original works of authorship".

40
New cards

Copyright Infringement

Using another person's original creative work, or a copyrighted work, without permission.

41
New cards

Fair Use

An affirmative defense that can be raised in response to claims by a copyright owner that a person is infringing a copyright.

42
New cards

4 Factors to consider in Order to Constitute Fair Use

  1. The purpose and character of the use, including whether such use is of a commercial nature or is for non-profit educational purposes

43
New cards
  1. The nature of the copyrighted work

44
New cards
  1. The amount and substantiality of the portion used in relation to the copyrighted work as a whole

45
New cards
  1. The effect of the use upon the potential market for or value of the copyrighted work.

46
New cards

Fair Use Exceptions

  1. Scholarly Works

47
New cards
  1. News Reporting

48
New cards
  1. Criticism

49
New cards
  1. Teaching

50
New cards

IP Rights

All rights associated with intangible assets owned by a person or company and protected against use without consent.

51
New cards

IP Theft

The act of robbing people or organizations of their ideas, inventions, creative products, and other types of IP.

52
New cards

3 Methods of IP Theft

  1. Hacking

53
New cards
  1. Privilege Abuse

54
New cards
  1. Human Errors

55
New cards

Protecting Intellectual Property

  1. Document Discoveries

56
New cards
  1. Use DRM systems

57
New cards
  1. Opt for strong nondisclosure agreements

58
New cards
  1. Create strong access credentials

59
New cards

Computer Crime A.K.A Cyber Crime

Crime involving computing against a digital target or a crime in which a computing system is used to commit criminal offenses

60
New cards

Hacking

Act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data.

61
New cards

T/F- Hacking is always malicious

F

62
New cards

Hacktivism

Hacking or Breaking into a computer system, for politically or socially motivated purposes.

63
New cards

Who do Hacktivists Target?

  1. Government Agencies

64
New cards
  1. Multinational Corporations

65
New cards
  1. Any entity perceived as "bad" or "wrong"

66
New cards

What Motivates Hacktivists?

  1. Revenge

67
New cards
  1. Political or Social incentives

68
New cards
  1. Ideology

69
New cards
  1. Protest

70
New cards
  1. Desire to embarrass certain organizations

71
New cards

White Hat Hackers

Ethical security hackers who identify and fix vulnerabilities

72
New cards

Black Hat Hackers

Cybercriminals that illegally crack systems with malicious intent.

73
New cards

Gray Hat Hackers

May not have malicious intent, but they don't have consent of those whose systems they hack into.

74
New cards

Zero-day Vulnerabilities

Software vulnerability discovered by attackers before the vendor has become aware of it.

75
New cards

Computer Fraud and Abuse Act (CFAA)

Inacted in 1986 CFAA prohibits intentionally accessing a computer without authorization or in excess of authorization.

76
New cards

Financial Identity Theft

When one person uses another's personal data for financial benefit.

77
New cards

Medical Identity Theft

When a criminal poses as another person to obtain health care services

78
New cards

Synthetic Identity Theft

When a criminal creates fake identities using real people's information.

79
New cards

Criminal Identity Theft

Occurs when someone cited or arrested for a crime presents themselves as another person, by using that person's name and identifying information.

80
New cards

Child Identity Theft

Revolves around creating fake IDs under children's names

81
New cards

Phishing

A method of cyberattack that attempts to trick victims into clicking on fraudulent links in emails.

82
New cards

Vishing

A combination of "voice" and "phishing" and is a scam where criminals call or leave a voicemail asking for personal information.

83
New cards

Smishing

An unwanted text message asking for personal information or urging you to click a suspicious link

84
New cards

Pharming

A specific type of cyber attack when a hacker mimics a real websites and redirects a user to the fake website.

85
New cards

DDoS Attack

Hacker sends a large amount of website traffic or pings to a network to try and slow/shut down the network.

86
New cards

Biometric Verification

You are the password

87
New cards

Physical Biometric

Include things like fingerprints, facial patterns, handprints, and eye patterns.

88
New cards

Behavioral Biometrics

Includes voice, how you walk, speak, and typing patterns

89
New cards

Privacy Rights

Personal possessions are generally considered private, including purses, briefcases, and employee storage lockers.

90
New cards

10 Employee Rights

  1. Privacy Rights

91
New cards
  1. Harassment-free Workplace

92
New cards
  1. Safe Workplace

93
New cards
  1. Whistleblowing

94
New cards
  1. Retaliation Protection

95
New cards

6.Reasonable Accommodations

96
New cards
  1. Fair Pay

97
New cards
  1. Overtime Wages

98
New cards
  1. Unpaid, Job-Protected Leave

99
New cards
  1. File a Complaint or Lawsuit

100
New cards

Harassment-free Workplace

Employers are not permitted to discriminate against any job applicant or employee due to his or her legally protected class in hiring