Page 62 - KEC Khaitan C6 Flipbook
P. 62

SOFTWARE PIRACY
                  Software piracy is the unauthorised copying or stealing of software, movies, music and making

                  these copies available on the Internet. Every software has a license. When we buy a software, we
                  become an authorised user of that software.
                  But, if we make copies of the software and give it to others to use, then it is against the law. There
                  are different types of software piracy including borrowing and installing a copy of the software

                  from someone, installing and selling unauthorised copies of the software, duplicating and selling
                  copyrighted programs and downloading illegal software from the Internet.
                  Following are some tips to avoid software piracy:

                      Do not download any software without license.

                      Register yourself on the company’s official website before using the software.


                  INTELLECTUAL PROPERTY RIGHTS
                  The property that arises from human intelligence is called intellectual property. It includes  creations
                  of the mind like books, paintings, music compositions, movies, video games, software, etc.

                  Intellectual Property Rights are the exclusive rights given by the government to the owners of
                  intellectual creations. We can protect our creations by creating copyrights on them.


                  DIGITAL FOOTPRINTS

                  Digital footprints or digital shadow are the traceable activities that we leave behind after surfing
                  the Internet. All the activities performed by us on the Internet are recorded, including:

                      All social media activities on Facebook, Twitter,
                     Instagram, blogs, etc.
                      Uploaded photos and videos

                      Browsing history
                      E-subscription

                      Personal information
                      Played online games

                  Digital footprints are permanent and can be used by law enforcement agencies to find out the
                  details about the offenders.



                            COMMON CYBER SECURITY MEASURES


                  Cyber security comprises technologies, processes and practices designed to protect systems,
                  devices,  programs and data  from cyber-attack or unauthorised  access.  It is also known as
                  information technology security.






                   60   Premium Edition-VI
   57   58   59   60   61   62   63   64   65   66   67