ethics test 2

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Intellectual property

1 / 125

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

126 Terms

1

Intellectual property

A categorical description of intangible assets owned and legally protected by a company/individual from outside use or implementation without consent.

New cards
2

Patent

Grant of property rights to the inventor. It gives the right to eliminate the usage, production, selling, and importing owner's invention.

New cards
3

Patent's safeguard

20 Years

New cards
4

Patent Registration

Available after the inventor reveals the invention fully and publicizes the technical information of the invention.

New cards
5

Patent Law

Grants protection for new inventions (products, processes, designs, etc.)

New cards
6

Trademark

Any word, phrase, symbol, design, or combination of these things that identifies your goods or services.

New cards
7

Trademark Registration

Trademark can be exclusively used by its owner or licensed to another party for use in return for payment. Provides legal certainty and reinforces the position of the right holder.

New cards
8

T/F- A lawncare company trademarks a logo it uses, this means that a company in a different business entirely cannot use a logo similar to the trademarked logo.

False

New cards
9

Trademarks that can be registered are...

almost endless. Incl. Drawings, Shape of goods, Sound, Colors, Words.

New cards
10

™ Symbol

Stands for trademark and indicates the unregistered trademark. Usually implies that they have applied for trademark registration.

New cards
11

T/F- ™ Symbol does not guarantee protection under Trademark law

TRUE

New cards
12

SM Symbol

Same as TM except used when in connection with a service such as banking or legal services.

New cards
13

R (®) Symbol

Trademark is registered.

New cards
14

T/F - R (®) Symbol can be used regardless if the trademark has actually been registered.

FALSE

New cards
15

Trademark Expiry

A trademark can last indefinitely but only if it is properly maintained. In order to keep your trademark alive, you need to continue using it in commerce and renew it every 10 years with the USPTO.

New cards
16

Trademark Renewal

The US Patent and Trademark Office (USPTO) administers federal trademark registrations.

New cards
17

Trade Secrets

IP rights on confidential information that may be sold or licensed. Defined as a piece of information that is kept confidential or reasonably which provides a business with an economic benefit over its competitors.

New cards
18

Types of Trade Secrets

  1. Financial Data

New cards
19
  1. Customer Lists

New cards
20
  1. Computer Source Code

New cards
21
  1. Supplier's Lists

New cards
22
  1. Pricing Information

New cards
23

Copyright (author's right)

A legal term used to describe the rights that creators have over their literary and artistic works.

New cards
24

Copyright does not extend to...

Ideas, Procedures, methods of operation & mathematical concepts.

New cards
25

Copyright protects

Literary works such as novels, poems, plays, reference works.

New cards
26

Computer Programs

New cards
27

Films, musical compositions, and choreography

New cards
28

Copyright Owner

Anyone can be a Copyright owner.

New cards
29

T/F- Works made by an employee belong to the employee.

False - They belong to the employer

New cards
30

Length of Copyright

Copyright protection varies from country to country, and can stand for 50 to 100 years after the individuals death.

New cards
31

Copyright: Original

Work must merely be independently created.

New cards
32

Copyright: Work of Authorship

Work must be a product of creative expression that falls under a category of copyrightable subject matter.

New cards
33

Copyright: Fixed

Meet the fixation requirement a work must be fixed in a tangible medium of expression. Protection attaches automatically to an eligible work the moment the work is fixed.

New cards
34

Rights Under Copyright

  1. Economic Rights: Allow the rights owner to derive financial reward from the use of their works by others.

New cards
35
  1. Moral Rights: Protect the non-economic interests of the author. Even if the creator sells copyright in the work to someone else he or she retains moral rights in the work. The work cannot be distorted, mutilated, or otherwise modified in a way that is prejudicial to the creator's reputation or honor.

New cards
36
  1. Moral rights are personal to the creator, and thus cannot be sold or given away.

New cards
37

Copyright Registration

Copyright exists automatically in an original work of authorship once its fixed.

New cards
38

Problems to Protect Copyrights

Digital technology and the internet make copyright infringement easier and cheaper.

New cards
39

Copyright Law of the U.S.

Grants monopoly protection for "original works of authorship".

New cards
40

Copyright Infringement

Using another person's original creative work, or a copyrighted work, without permission.

New cards
41

Fair Use

An affirmative defense that can be raised in response to claims by a copyright owner that a person is infringing a copyright.

New cards
42

4 Factors to consider in Order to Constitute Fair Use

  1. The purpose and character of the use, including whether such use is of a commercial nature or is for non-profit educational purposes

New cards
43
  1. The nature of the copyrighted work

New cards
44
  1. The amount and substantiality of the portion used in relation to the copyrighted work as a whole

New cards
45
  1. The effect of the use upon the potential market for or value of the copyrighted work.

New cards
46

Fair Use Exceptions

  1. Scholarly Works

New cards
47
  1. News Reporting

New cards
48
  1. Criticism

New cards
49
  1. Teaching

New cards
50

IP Rights

All rights associated with intangible assets owned by a person or company and protected against use without consent.

New cards
51

IP Theft

The act of robbing people or organizations of their ideas, inventions, creative products, and other types of IP.

New cards
52

3 Methods of IP Theft

  1. Hacking

New cards
53
  1. Privilege Abuse

New cards
54
  1. Human Errors

New cards
55

Protecting Intellectual Property

  1. Document Discoveries

New cards
56
  1. Use DRM systems

New cards
57
  1. Opt for strong nondisclosure agreements

New cards
58
  1. Create strong access credentials

New cards
59

Computer Crime A.K.A Cyber Crime

Crime involving computing against a digital target or a crime in which a computing system is used to commit criminal offenses

New cards
60

Hacking

Act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data.

New cards
61

T/F- Hacking is always malicious

F

New cards
62

Hacktivism

Hacking or Breaking into a computer system, for politically or socially motivated purposes.

New cards
63

Who do Hacktivists Target?

  1. Government Agencies

New cards
64
  1. Multinational Corporations

New cards
65
  1. Any entity perceived as "bad" or "wrong"

New cards
66

What Motivates Hacktivists?

  1. Revenge

New cards
67
  1. Political or Social incentives

New cards
68
  1. Ideology

New cards
69
  1. Protest

New cards
70
  1. Desire to embarrass certain organizations

New cards
71

White Hat Hackers

Ethical security hackers who identify and fix vulnerabilities

New cards
72

Black Hat Hackers

Cybercriminals that illegally crack systems with malicious intent.

New cards
73

Gray Hat Hackers

May not have malicious intent, but they don't have consent of those whose systems they hack into.

New cards
74

Zero-day Vulnerabilities

Software vulnerability discovered by attackers before the vendor has become aware of it.

New cards
75

Computer Fraud and Abuse Act (CFAA)

Inacted in 1986 CFAA prohibits intentionally accessing a computer without authorization or in excess of authorization.

New cards
76

Financial Identity Theft

When one person uses another's personal data for financial benefit.

New cards
77

Medical Identity Theft

When a criminal poses as another person to obtain health care services

New cards
78

Synthetic Identity Theft

When a criminal creates fake identities using real people's information.

New cards
79

Criminal Identity Theft

Occurs when someone cited or arrested for a crime presents themselves as another person, by using that person's name and identifying information.

New cards
80

Child Identity Theft

Revolves around creating fake IDs under children's names

New cards
81

Phishing

A method of cyberattack that attempts to trick victims into clicking on fraudulent links in emails.

New cards
82

Vishing

A combination of "voice" and "phishing" and is a scam where criminals call or leave a voicemail asking for personal information.

New cards
83

Smishing

An unwanted text message asking for personal information or urging you to click a suspicious link

New cards
84

Pharming

A specific type of cyber attack when a hacker mimics a real websites and redirects a user to the fake website.

New cards
85

DDoS Attack

Hacker sends a large amount of website traffic or pings to a network to try and slow/shut down the network.

New cards
86

Biometric Verification

You are the password

New cards
87

Physical Biometric

Include things like fingerprints, facial patterns, handprints, and eye patterns.

New cards
88

Behavioral Biometrics

Includes voice, how you walk, speak, and typing patterns

New cards
89

Privacy Rights

Personal possessions are generally considered private, including purses, briefcases, and employee storage lockers.

New cards
90

10 Employee Rights

  1. Privacy Rights

New cards
91
  1. Harassment-free Workplace

New cards
92
  1. Safe Workplace

New cards
93
  1. Whistleblowing

New cards
94
  1. Retaliation Protection

New cards
95

6.Reasonable Accommodations

New cards
96
  1. Fair Pay

New cards
97
  1. Overtime Wages

New cards
98
  1. Unpaid, Job-Protected Leave

New cards
99
  1. File a Complaint or Lawsuit

New cards
100

Harassment-free Workplace

Employers are not permitted to discriminate against any job applicant or employee due to his or her legally protected class in hiring

New cards

Explore top notes

note Note
studied byStudied by 12 people
... ago
5.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(1)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 2 people
... ago
5.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(1)
note Note
studied byStudied by 38 people
... ago
5.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 15 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (48)
studied byStudied by 15 people
... ago
5.0(1)
flashcards Flashcard (129)
studied byStudied by 39 people
... ago
5.0(1)
flashcards Flashcard (85)
studied byStudied by 24 people
... ago
5.0(1)
flashcards Flashcard (46)
studied byStudied by 32 people
... ago
5.0(1)
flashcards Flashcard (71)
studied byStudied by 169 people
... ago
4.0(1)
flashcards Flashcard (35)
studied byStudied by 2321 people
... ago
4.9(45)
flashcards Flashcard (20)
studied byStudied by 163 people
... ago
5.0(1)
flashcards Flashcard (50)
studied byStudied by 1 person
... ago
5.0(1)
robot