Page 47 - iPro_trackGPT_V5_Class7
P. 47
Intellectual Property Rights
Intellectual Property Rights (IPR) refer to the legal protections granted to creators through
patents, copyrights, and trademarks. These rights give the originator exclusive control over the
use of their creations, including works like poetry, inventions, artwork, symbols, business names,
and images. This protection helps prevent unauthorized use and piracy of their work.
Measures to Protect Intellectual Property Rights
To safeguard your Intellectual Property Rights:
Keep your business ideas confidential and do not share them with others.
Maintain detailed records, including drawings, descriptions, and plans, to prove ownership of
your creations.
Register your business name and logo as trademarks as soon as you have them to secure
your rights.
Types of Intellectual Property Rights
There are three main types of Intellectual Property Rights:
Copyright: This grants someone the exclusive right to control how their literary, artistic, or
musical work is published and used. Copyright protection typically lasts for 70 years after the
creator's death, ensuring their work is safeguarded over time.
Patent: A patent provides an inventor with the exclusive right to make, use, and sell their
invention for a set period, usually 20 years. This ensures that the inventor can benefit from
their innovation without competition.
Trademark: A trademark is a legally recognised symbol or word that identifies and protects
a company's brand, logo, or product design. It lasts for 10 years and can be renewed to
maintain brand identity and protection.
Boost Bits
Trade secret is a secret device or technique used by a company in manufacturing its
products.
SAFETY MEASURES WHILE USING COMPUTER/INTERNET
We can take the following safety measures while using the Internet or computer:
Keep your antivirus software up to date.
Protect your passwords; use them cautiously online.
Ignore and delete suspicious emails or messages from strangers.
Never disclose personal information online.
Decline friend requests from unknown people.
Keep your privacy settings activated.
Only download files from trusted sources.
Think twice before posting on social media.
Use encryption to secure your data during file transfers.
Ethics and Safety Measures in Computing 45

