MGT602 Final Term Handout-30-57
MGT602 Final Term Handout-30-57
Introduction:
Intellectual property rights are often the most valuable assets owned, used and developed by a
software house.
Confidential information
Patents
trade marks
Designs
They protect information stored by electronic means and all of the paperwork which
accompanies a program, such as the user manual, plus any multimedia packages and most items
on the Web.
Great care should be taken to protect, exploit and enforce intellectual property
The name under which a product is sold may be registered as a trade mark
the know-how which goes into the development of the product may be protected as
confidential information
Unauthorized use of intellectual property can be stopped by injunction and damages may be
sought for infringement of these rights
General Agreement on Tariffs and Trade (GATT) concerned the protection of intellectual
property rights in the face of widespread piracy of software products
Confidential Information:
Any category of information, from personal confidences, to trade secrets and sensitive
government information, any or all of which a computer scientist might handle in the course of
his or her work, or all or any of which a firm may want to protect against unauthorized use or
disclosure by others
Three conditions must be satisfied before an action for breach of confidence can succeed:
the information must have been disclosed in circumstances which give rise to an
obligation of confidence
Patents:
A government authority conferring a right or title for a set period, especially the sole right to
exclude others from making, using, or selling an invention
A patent gives to an inventor a monopoly in an invention. This means that the inventor is given
the exclusive right to use or exploit the invention for a defined period
The monopoly granted by patent law is so strong, that the owner of a patent may even exclude
independent inventors from the market
The better the patent and the more commercially desirable the breakthrough, the more likely it
is to be challenged. For example, if competitors can produce a similar product or process, which
is not covered by the patent, they will be free to market it and to erode the commercial
advantage of the patentee. If they can prove that the subject matter of the patent has been
used or disclosed before, they can invalidate the patent
Patent Act merely sets out a number of criteria which must be satisfied before an invention can
be patented
the subject matter of the invention does not fall within an excluded class
It is possible to patent something which is more than just a program—something which can be
called, for simplicity, a “program plus”
Copyright:
The exclusive legal right, given to an originator or an assignee to print, publish, perform
material, and to authorize others to do the same
Copyright protects more items generated by businesses or by individuals than any other aspect
of intellectual property law
What we will probably see over the next few years are stronger
laws, more rights for copyright owners, widespread licensing schemes and greater use of
technical anti-piracy or copy-monitoring devices and electronic rights management systems
Some acts are permitted under the 1988 Act, even though they would otherwise amount to
breach of copyright.
Fair dealing
Error correction
Databases
A copyright owner has all the usual civil remedies of search, injunction, damages and an action
for an account of profits made in breach of copyright
If it is shown that at the time of the infringement of copyright the defendant did not know and
had no reason to believe that
copyright subsisted in the work, then the plaintiff is not entitled to damages against the
defendant
A copyright owner is also given an important power to enter premises without using force in
order to seize infringing copies, or articles specifically designed or adapted for making copies
Plagiarism:
The practice of taking someone else's work or ideas and passing them off as one's own.
changing words but copying the sentence structure of a source without giving credit
for a computer program changing variable names only, or not changing the structure or
flow of a program
(END)
Week: 8 Computer Contracts
Introduction:
An agreement between two or more parties for the doing or not doing of something specified
If the contracts are too harsh or unfair causing any issue between parties to be unresolved, it is
the responsibility of contract laws to contemplate according to the rules
There are almost never disputes over contracts which run perfectly. Example marriage.
In order to avoid disputes and future difficulties it is better to draft a document which sets out:
Methods of payments
Contract should be clear, concise and consistent. There should be no ambiguity and the parties
to the agreement should be left in no doubt as to their rights and duties. Ambiguity and doubts
can lead to performance which is viewed as unsatisfactory. This can lead to disagreement and
the expenditure of time, effort and therefore money, in resolving the matter.
Software suppliers try to use what are known as standard form contracts, which are used or
intended to be used many times over.
It states that it is an agreement between the parties whose names and registered addresses are
given.
Other parts:
Annexes must include any document stated like SRS. This is to avoid, for example, the situation
in which statements made by an over-enthusiastic salesman while trying to win the business are
claimed by the client to constitute part of the contract
What is to be produced?
What is to be delivered?
Ownership of rights
Payment terms
Penalty clauses
Progress meetings
Project Managers
Acceptance procedure
There are four types of contractual arrangement which are widely used in connection with the
provision of software services:
fixed price
contract hire
consultancy
Contract Hire:
The supplier agrees to provide the services of one or more staff to work for the client
Supplier’s responsibility is limited to provide suitable competent people and replacing them if
they become unavailable or said unsuitable by the client
Payment is on the basis of a fixed rate for each man day worked
Issues such as delay payments, acceptance tests and many others simply do not arise
The supplier agrees to undertake the development of the software in much the same way as in a
fixed price contract but payment is made on the basis of the costs incurred, with labor charged
in the same way as for contract hire
The supplier is not committed to completing the work for a fixed price, although a maximum
payment may be fixed beyond which the project may be reviewed
Consultancy contracts:
Consultants are typically used to assess some aspect of an organization and to make proposals
for improvements.
(END)
CS625 Professional Practices
(VURANK)
We will explore areas of legal liability and mechanisms for regulating potentially hazardous
activities as well as the factors which should be taken into account for safety related
applications
Regulatory Issues:
Standards:
Use of appropriate standards is both a familiar and traditional technique for regulating
hazardous activities and attempting to ensure the safety of a product
Regulation by law:
The law may exert a regulatory effect either directly or by requiring compliance with other
forms of regulation such as standards and licensing because of fears of litigation if safety
standards are breached
Legal Liability:
Introduction
System designers and software engineers may have legal responsibilities under statutes such as
the Health and Safety
Regardless of any contractual limitations of liability, if a product or any of its component parts
are defective its manufacturer may be liable for damage under the Consumer Protection Act
(CPA) or the common law of negligence
Negligence
The manufacturer or system designer has failed to take due care in the construction or design of
the system, and this lack of care has resulted in failure leading to the injury
There is an understood assumption that all those engaged in the design and development of
safety system software are competent to perform the necessary tasks
Factors such as training and relevant experience are also considered important traits for a
competent software engineer
Hazard analysis
Design
Documentation
(END OF WEEK 9)
(WEEK # 10)
Introduction:
The media and popular computing press abound with tales of multi-million pound computer frauds and
of the dangers to commercial companies, governmental data banks, financial institutions and national
security from the activities of computer hackers
Modern business process is done through utilizing computer software and hardware, i.e. some
form of computer system is used in it.
There has been a sharp rise in the number of crimes involving computing; and the Internet has
undoubtedly created new security risks
Categories of misuse:
Under the study of the English criminal law, the Law Commission highlighted a number of categories of
misuse of computers
Computer fraud
Computer hacking
Eavesdropping on a computer
The Law Commission defined computer fraud as conduct which involves the manipulation of a
computer or internet, by whatever method, in order dishonestly to obtain money, property, or
some other advantage of value, or to cause loss
Input frauds
E.g. intentionally entering false data or amending data into the computer
Output frauds
Program frauds
The second form of misuse identified by the Law Commission was unauthorized obtaining of
information from a computer. It is sub-divided as:
Computer hacking:
Accessing a computer without the authorization of the owner. In this case the person accesses
the computer secretly for stealing information, data or manipulation of data for diverse
purposes
Eavesdropping
Using computer’s authorized information for personal benefits. In this case, the person misusing
the computer is usually employee or authorized user of the company
Regulation and control of personal information: data protection, defamation and related issues:
Introduction:
We can not deny the dramatic impact which increasing computerization has had on the storage,
processing, retention and release of information and data.
The value to businesses is also enhanced by the fact that how easily and safely data can be
transferred around the globe
Data protection refers to how your personal information is used by the organization or being an
organization, how you would make sure to protect data of your customers, employees etc
Privacy refers to the privilege provided to an individual by law or by the organizational policy
where the individual can keep the information secret to or from a specific group
The original challenge of data protection law was to provide a suitable mechanism for dealing
with the perceived threat to individual privacy of large centralized data banks
The development of global information networks has changed and intensified the character of
the privacy protection problem
The question which is inevitably being asked is whether the original formulation of data
protection law is capable of controlling the amorphous decentralized activities which occur
through the medium of the Internet and World Wide Web
Factors affecting the regulation of data processing:
There is by no means a straightforward answer to this question, complicated as the issues are by
rapidly advancing technology, the global nature of the activities to be regulated and the variety
of possible regulatory approaches to be found in the various legal traditions within the world
Formidable problems of policy and implementation are presented by the attempt to regulate
systems and practices that are technologically advanced, widely professional issues in software
engineering dispersed, rapidly changing and employed by powerful economic and government
interests
It is an observed fact that, at the level of international agreements and national legislation, the
requirements imposed by this particular type of technology have resulted in a convergence of
the rules made to ensure good data management
An example in this respect is the emergence of data protection principles or fair use guidelines
which have created a harmonizing effect on national legislation on data protection
Even without the cover of anonymity, the various methods available for the dissemination of
information on computer networks provide fertile ground for the propagation of information
about others
What redress is available for those who feel that untrue and unwarranted statements have been
circulated about them
Publication of such material might attract an action for defamation. Such actions are not
uncommon against newspapers and other sections of the media
Although there may be some differences of degree and substance, most jurisdictions provide
some form of remedy for injury to a person’s integrity or reputation
Introduction to hacking:
The process of attempting to gain or successfully gaining, unauthorized access to computer resources is
called hacking.
OR
The process of modifying the features of a system, in order to accomplish a goal outside of the creator's
original purpose.
Who is hacker?
Types of hacking:
Website Hacking
Net Hacking
Password Hacking
Software Hacking
Ethical Hacking
Email Hacking
Computer Hacking
Website Hacking:
Hacking a website means taking control from the website owner to a person who hacks the
website.
Net Hacking:
Port (It is logical port on your computer which hacker can use to enter in the system)
Password Hacking:
Password Hacking or Password cracking is the process of recovering secret passwords from data
that has been stored in or transmitted by a computer system.
Brute force (Hackers try out all the combination of all keyboard letters)
Software Hacking:
In that hackers changes the look & execution way of that software. For example change the
demo version into the full version of that software.
Ethical Hacking:
The process in which a person hacks to find weakness in a system and then usually patches
them.
Can be used to recover lost information where the computer password has been lost.
Computer Hacking:
Computer Hacking is when files on computer are viewed, created, edited or deleted without
authorization.
Tools of Hacking:
Scanners
Telnet
FTP
FTP is one type of protocol but some time it is used as hacking tool, port 21 for the ftp.
For connecting ftp we need some ftp s/w known as ftp client. For connecting ftp server
you have to hammer that server.
Computer Security Ethics:
Being ethical is not necessarily following one’s feelings; “feelings frequently deviate from what is
ethical“.
Ethics is not confined to religion nor is the same as religion. Also being ethical is not solely
following the law
Example: “If a person conceives of engineering activity as only making money, then one's
definition of practical ethics, one's actions and values will, be guided by this basic philosophical
position. “
Ethical Hackers:
Performs most of the same activities but with owner’s permission such as penetration tests.
Penetration test means Legal attempt to break into a company’s network to find its weakest link
Tester only reports findings
Penetration-Testing Methodologies:
Tester is told everything about the network topology and technology and is
authorized to interview IT personnel as well. Makes the job easier for him
Company staff does not know about the test. Tester is not given detail about
the network so the burden is on the tester to find out the details. The test
determines if the security personnel are able to detect an attack.
This mode of test is combination of both white and black box models. The
company provides the tester with partial information about the network.
Hackers Code of Conduct:
Protect Privacy
Exceed Limitations
Leave No Traces
Share!
Self Defense
Introduction:
Confidentiality
Integrity
Availability
Information Security Organizational Structure:
Information Classification:
Information Classification
Government classifications
Criteria
Risk Management:
Introduction
Risk identification
Risk assessment
A systematic process of evaluating the potential risks that may be involved in a projected activity or
undertaking
Assets
Threats
Vulnerabilities
Weakness
Controls
Safeguard
Risk Assessment:
Uncertainty
Risk Determination
For each threat and its associated vulnerabilities that have residual risk, create a
preliminary list of control ideas. Three general categories of controls exist:
Policies
Programs
Technical controls
Examples:
Introduction
Def:
Web 2.0
Example
http://eliasbizannes.com/blog/2009/01/phishing-for-fraud-on-facebook/
Also the British MI6 chief that was exposed by his wife’s Facebook pictures:
http://www.dailymail.co.uk/news/article-1197562/MI6-chief-blows-cover-wifes-
Facebook-account-reveals-family-holidays-showbiz-friends-links-David-
Irving.html
How to Protect Your Self:
Do not post address, ssn, phone number, financial info, your schedule, full birth date
Be careful not to display information used to answer security questions (e.g., favorite pet,
mother’s maiden name)
Google yourself
Don’t use the same password for a social networking site and for your email
Remember - social networking sites are a public resource – like a billboard in cyberspace
Lock down your profile information to people you accepts as a friend. That way no one can read
your personal information unless they are an approved friend
Be skeptical
Introduction
Moral Issues
Ethical Issues
Introduction:
Def: The Use of internet by individuals and organizations has raised a number of issues that need to be
considered.
Setting up websites containing incorrect information. People may rely on and use this
information thinking it is correct
Using e-mail to give bad news when explaining face to face would have been better
Moral Issues:
Plagiarism
Sending spam. People waste time deleting spam if the spam filter allows it through
Privacy issues
Gambling addiction
Obsity
Widens the gaps between the haves and have nots (e.g. between rich and poor countries and
individuals)
Organizations moving call centers abroad. The same service can be provided cheaply using the
internet and internet phone links
Growth of e-commerce may mean shops have to close, leaving some city centers looking
desolate Social Issues Many countries in the world that are not democratic; they do not allow
the free passage of info to or from other countries. They control on what their people can and
cannot view.
Don’t use the same password for a social networking site and for your email
The internet has both positive and negative effects on the users. Effects on communities
Advantages:
- Blogs & chats for communities to discuss local issues - Housebound members of the
community are less isolated as people contact them to check everything is ok
- Employment opportunities
Local citizens advice websites can be set up to deal with the problems they have There are laws
covering the production and distribution of this material BUT, the material is perfectly legal in
other countries, so we can't really stop it.
There is a special software that's able to filter out this material but we're not completely that
sure.
It doesn't have to be illicit content to be offensive; an image of a pack of hounds attacking a fox
maybe offensive to animal lovers but not for the hunt
Disadvantages:
- Lack of social interaction - social networking, computer games etc.
- Local shops shutting - more orders for goods are placed using the internet so local shops close
FIN