0% found this document useful (0 votes)
32 views26 pages

Cyber Crime PDF

The document outlines various aspects of cybercrime, including types of cybercrimes, definitions of phishing and vishing, and the concept of salami attacks. It also provides guidance on Wi-Fi security settings, filing cyber complaints, and security measures for social media and mobile wallets. Additionally, it discusses tools for cybersecurity, steps for antivirus installation, and the patent registration process in India.

Uploaded by

devanvr82
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views26 pages

Cyber Crime PDF

The document outlines various aspects of cybercrime, including types of cybercrimes, definitions of phishing and vishing, and the concept of salami attacks. It also provides guidance on Wi-Fi security settings, filing cyber complaints, and security measures for social media and mobile wallets. Additionally, it discusses tools for cybersecurity, steps for antivirus installation, and the patent registration process in India.

Uploaded by

devanvr82
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

1. Write the different types of Cyber crimes.

Ans: Most cybercrime falls under two main categories:


• Criminal activity that targets computers.
• Criminal activity that uses computers.
Cybercrime that targets computers often involves malware (Viruses, Trojans, Worms, Ransomware,
Spyware) like viruses.

2. Define Phishing and Vishing.


Ans: Phishing is a form of social engineering and scam where attackers deceive people into revealing
sensitive information or installing malware such as ransomware.
Vishing is the practice of tricking people into sharing sensitive information through telephone calls
3. What is salami attack?
Ans: A salami attack is a method of cybercrime that attackers or a hacker typically used to commit
financial crimes.
4. Write the Wi-Fi Security settings in the computer. Ans Connect to your Wi-Fi network.
• Click on the Wi-Fi icon in the system tray.
• Click on Properties of your network adapter.
• Scroll down to Properties and look for Security Type. It will show you the protocol and the
encryption type.

5. Define Hackers.
Ans A hacker is a person skilled in information technology who achieves goals by non-standard
means.

6. What is copyright and patent?


Ans Copyright and patent are two different methods of protecting and obtaining legal rights to an
invention or an original work. Copyright protects original works such as novels, plays, music, art, and
film. Patents provide a person the right to prevent others from creating, using, or selling an
invention.

7. Write the steps of filing an offline/online cyber complaint

Ans: To report a cybercrime in India online, you can submit a complaint through the National Crime
Reporting Portal of India, accessible at National Cyber Security Report Portal
STEP 1: Go to https://cyber crime.gov.in/Accept.aspx
STEP 2: Click on 'Report other cyber crimes' on the menu.
STEP 3: Click on 'File a Complaint'.
STEP 4: Read the conditions and accept them.
STEP 5: Register your mobile number and fill in your name and State.
STEP 6: Fill in the relevant details about the offence.

Offline Cyber Complaint:


Checklist for reporting cybercrime at cybercrime police station

● Document the incident: Write down a detailed description of the cybercrime incident including the date,
time and location. Gather any evidence you have such as screenshots, emails, chat logs or any other relevant
files. ●Contact Information: Prepare your contact information including your full name, address, phone
number and email address.
●Relevant Personal Information: Provide any relevant Personal Information about yourself, such as your
occupation or association with the affected organization ( if applicable)
● Description of the cybercrime: Clearly describe the nature of the Cybercrime, such as hacking, online
fraud, identity theft, harassment or any other offense. Include specific details about the incident such as
unauthorized access, compromised accounts or stolen data.
● Impact assessment: Assess the impact of the cybercrime on you or your organization including financial
loss, reputational damage or any other consequences.
●Previous actions taken: Note any actions you have taken prior to reporting the cybercrime, such as
contacting your internet service provider, blocking the attacker or preserving evidence.
● Relevant details about the offender: If you have any information about the offender, provide details such
as username, email addresses, IP addresses or any other identifying information.
●Witnesses or suspected third parties: If there were any witnesses to the cybercrime or you suspect the
involvement of third parties, provide their contact information or any other relevant details.
● Secure your systems: Take steps to secure your systems and prevent further damage. This may involve
changing passwords, updating security software or seeking professional assistance.
● Reporting Channels: Research the cybercrime police station or law enforcement agency responsible for
handling cybercrime cases in your area. Determine the appropriate reporting channel such as online form or
inperson visit.
● Compile the checklist: Organize the above information into a checklist or document to ensure you have
everything ready when reporting the cybercrime.

8. Write the checklist for security settings on popular social media’s.


Ans Keep your personal data safe while using social media
• Manage Privacy Settings
These settings allow you to make sure you are only sharing with friends and family. These setting can
change with updates so you should check them regularly.

• Don’t Enable Auto Login


If someone gets access to your phone or computer make sure they can’t automatically access your
social sites. Make sure your computer’s browser “remember” your login and password isn’t set.

• Use Two-factor authentication 2FA


‘double checking’ you really are who you say you are by texting your phone a code that you need to
enter before you can log in.
• Setup Security Answers
You can set up security questions on your accounts use questions that are hard to find out about you.

• Use a VPN
Virtual Private Network is an encryption tool. If you want to keep your conversations, messages, and
calls secure this is the best solution.

• Keep Antivirus Updated


Never go on the internet without installing anti-malware and antivirus software to secure your online
activity and important data.

• Change Passwords Frequently


Always use a combination of letters, numbers, and symbols to make it harder to break.
Good, secure passwords shouldn’t be easy to remember.
Never use the same password for multiple websites because they will all become compromised.

• Selective Accepting Friends


Are they really who they say they are? Do you really know that their profile is real and not fake? The
safest option is to only accept “friend” requests from people you know in the real world.

• Turn Off GPS


Turn off your GPS to keep your exact location private. If you plan to share images online turn off the
GPS function to protect your safety.

• Internet is Permanent
Always consider that anything you post stays there forever. Even if you delete your account, someone
may already print/copy your content.

• Personal Information
Careful who you reveal personal information. Always be suspicious of anyone who asks for your
personal information over any social media platform.

• Beware Clicking on Links


Even if sent from your friends think twice. Hackers love social platforms because you are more likely
to click on something from your friends.

• Block Fake Accounts


Sadly social media is full of fake profiles. These can be used for a number of reasons from hacking or
monitoring your activities.

• Suspicious Login Attempts


Social media platforms email you if they feel a login is suspicious. Maybe because it comes from a
different IP address, a different browser or your account is sending spamming posts.
Keep checking your emails regularly. If you get a suspicious login attempt to your account, change
your password as soon as possible.

• Keep Browser Updated


Make sure you have the latest version of your browser that is not vulnerable to attacks and hackers.
Don’t save passwords in your browser because if your system gets compromised your passwords can
be easily read.

• Auto Share Options


There are options to automatically share posts from one platform to another.

• Close Old Accounts


Old social media accounts you haven’t used in years can risk your personal data security. Delete
account and remove as much personal information as possible.

• App Authorisation
Every time you log in to another site using the option of using a social media login you are granting
authorisation to your account.

They tell you what data this app will have access to before you agree but if you stop using that site
remember to revoke authorisation.

• Password Manager
Your passwords are valuable, so treat them that way.

There are a number of password manager software available that help you store and organize
passwords. This enables you to log in with just one main password that then allows you to access all
your accounts.

9. Explain how security settings can be applied on Mobile wallets and UPI’s.
Ans Mobile wallets and UPIs are popular modes of digital payments that offer convenience and speed.
However, they also require users to be vigilant about the security of their transactions and personal
information.
Here are some ways to apply security settings on mobile wallets and UPIs:

Set a strong UPI PIN: Your UPI PIN is the primary authentication for UPI transactions. Choose a unique and
complex PIN that is not easily guessable. Never share your UPI PIN with anyone, even if they claim to be
from your bank or UPI provider. Change your UPI PIN regularly to ensure maximum security.
Download official UPI apps: Always download the official UPI app from a trusted source such as the Google
Play Store or Apple App Store. Avoid downloading UPI apps from WhatsApp and SMS, as they could
potentially have harmful software or put your device at risk. Keep your UPI app updated to benefit from the
latest security patches and enhancements.
Verify transaction details: Before authorizing any UPI transaction, carefully review the transaction details
displayed on the app or payment interface. Ensure that the payment amount, receiver details, and purpose
of the transaction are accurate. Be cautious of unexpected or suspicious requests for payments and cross-
check any unfamiliar transaction details with the intended recipient before proceeding.
Be wary of phishing attempts: Phishing attacks are common in the digital realm, and UPI is not exempt from
such threats. Be cautious of emails, text messages, or calls claiming to be from your bank or UPI provider,
asking for sensitive information or UPI PINs. Legitimate institutions will never ask for such details through
unsecured channels. Avoid clicking on suspicious links or providing personal information to unknown
sources. When in doubt, contact your bank or UPI provider directly to verify the authenticity of the
communication.
Use secure networks: When conducting UPI transactions, ensure that you are connected to a secure and
trusted network. Public Wi-Fi networks, especially those without password protection, can be vulnerable to
data breaches and interception. Avoid making UPI transactions on public networks or shared devices, as
they may compromise the security of your personal and financial information. Instead, use a secure and
passwordprotected network or consider using a virtual private network (VPN) for an added layer of security.
Regularly monitor account activity: Keep track of your UPI transactions and account balance by checking
your statements and notifications regularly. Report any unauthorized or suspicious transactions to your
bank or UPI provider immediately. You can also set transaction limits and alerts to control your spending
and prevent fraud.
Install security software: Protect your device from malware and viruses by installing a reliable security
software. Scan your device regularly and remove any unwanted or suspicious apps. Enable automatic device
updates to ensure that you have the latest security patches installed.
Keep your device secure: Ensure the security of your device by implementing basic security measures. Set a
strong device password or use biometric authentication features if available. Enable remote wipe or lock
features in case your device is lost or stolen. Do not store your UPI PIN or other sensitive information on
your device or cloud storage.

By following these security settings, you can use mobile wallets and UPIs safely and securely
10. Write the different tools for cyber security.

Ans: The different tools available for cyber security are

1. Password Managers: The need to keep private digital information protected


is highlighted by the prevalence of growing cyber attacks. Password managers are being
used to keep track of and generate secure passwords. The user has to only remember
one password, that of the password manager.
Password managers like Lastpass,Dashlane, Sticky Password and KeepassX can be used. 2.
Virtual Private Network (VPN): A VPN connection establishes a secure connection between
you and the internet. Via the VPN, all your data traffic is routed through an encrypted virtual
tunnel. This disguises your IP address when you use the internet, making its location invisible
to everyone. You can still access all online services using the VPN. VPNs offer the best
protection available when it comes to your online security. Therefore, you should leave your
VPN on at all times to protect from data leaks and cyberattacks.
3. Blockchain Technology: Blockchain technology, a decentralized distributed ledger of
transactions, offers the next level of cyber security.

11. Write the steps for installation and configuration of Anti-virus in computers
Ans: There are different ways to install and configure antivirus software on your computer, depending on the
type of antivirus program you choose and the operating system you use. Here are some general steps that
can help you with this process:
• First, make sure your computer is updated with the latest security patches and updates from your
operating system. This will help prevent any compatibility issues or conflicts with the antivirus
software.
You can check for updates manually or enable automatic updates in your system settings.
• Second, research your antivirus options and select the one that suits your needs and preferences.
You can use online reviews, ratings, and comparisons to help you decide. Some popular antivirus
programs for Windows include Bitdefender, Webroot, McAfee, and Malwarebytes. For Mac, you can
choose from apps like Norton, Intego, Kaspersky, and Sophos.
• Third, download the antivirus software from a trusted source or insert the installation disk into your
computer. If you download the software, make sure it is from the official website of the antivirus
provider or a reputable download site. Avoid clicking on any suspicious links or pop-ups that claim to
offer antivirus software, as they may be malware in disguise.
• Fourth, run the installer file and follow the instructions on the screen. You may need to grant
permission for the software to make changes to your computer or disable your existing antivirus
program temporarily. You may also need to choose the type of installation (such as full, custom, or
express) and the features you want to enable (such as real-time protection, firewall, or browser
extensions).
• Fifth, after the installation is complete, restart your computer and open the antivirus program. You
may need to activate your license or create an account to use the software. You should also update
the antivirus program with the latest virus definitions and scan your computer for any threats. You
can adjust the settings of the antivirus program according to your preferences, such as the frequency
of scans, the level of protection, and the actions to take when a threat is detected.
• These are the basic steps for installing and configuring antivirus software on your computer.

12. Write a short note on patent registration.

Ans: Patent Registration process can be completed in multiple stages, beginning from Patent Search to the
issuance of Patent Registration Certificate. These stages involve legal intricacies which can be better handled
by an experienced IPR Professional. So, we strongly recommend approaching a Patent Service Provider like
Setindiabiz, or an experienced legal practitioner for patent filing in India.

Here is a detailed explanation of the Patent Registration process in India:

Step 1: Patent Search

Patent Search is the first step of Patent Filing procedure in India and is conducted worldwide to determine
the novelty of an invention. Generally, it is considered safe to do patent searches before patent application
filing. If an invention is found in prior arts or closely resembling prior arts, then the novelty of that invention
can be challenged by the Indian Patent Office and the application can be objected to. Therefore, it is
important to perform prior patent searches to assess the chances of your patent getting approved by the
Patent Office.
Step 2: Drafting Patent Specification

After conducting thorough searches worldwide, the specification of the invention is written in a techno-legal
language with or without the inventor’s claims. Without claims is the provisional specification and with
claims is the complete specification. The specification outlines the field of invention, detailed description of
the invention with working examples, and the best method to use the invention so that when it comes to
the knowledge of a person skilled in the art, it can be easily used. Legal protection to the patent is granted
when the specification is drafted with the inventor’s claim and is complete.

Step 3: Patent Application Filing

After drafting the Patent Specification, you can begin the procedure for Filing Patent Application in India. As
we discussed earlier, patent applications can be provisional or complete, based on the specifications drafted.
The drafted provisional or complete specification is filed in Form-2 while Patent Application form is filed in
Form 1 as prescribed by the Indian Patent Act. If a provisional patent specification is filed, then within 12
months of its filing, a complete specification has to be filed with the inventor’s claims. There are 6 different
types of Patent Application forms which can be filed on the basis of their purpose. These are:

• Ordinary patent application: Used to file a patent application directly in India, seeking protection
only within the Indian territory.
• PCT National phase patent application: Used to enter the national phase of PCT or Patent
Cooperation Treaty in India, after which the applicant will be allowed to seek patent protection in
multiple countries.
• PCT International patent application: Used to file a single patent application for patent registration in
multiple countries which are members of the PCT, providing a centralized process for seeking patent
protection internationally.
• Convention patent application: Used to claim priority based on an earlier application filed in a
convention country, allowing applicants to secure the priority date for their invention.
• Divisional patent application: Used to divide an existing patent application into multiple separate
applications, typically when the existing application contains multiple inventions.
• Patent of addition application: Used to file an application for an improvement or modification of an
already existing invention for which a patent has already been granted.

Step 4: Patent Publication for Public Opposition

Once the patent application process is complete, then after the expiry of 18 months from the date of patent
filing or date of priority whichever is earlier, the patent is published in an official journal and is open for
public viewing and inspection. This provides an opportunity to the general public to raise an objection to the
patent on valid grounds.

Step 5: Requesting Patent Examination

The patent application is examined only when a request for examination has been filed. The request for
examination has to be filed within 48 months of the patent filing date or date of the priority. The patent
examiner examines a patent application and issues an examination report. The examination report contains
a series of objections raised by an examiner. The response to an examination report has to be filed within 12
months of the issuance of the examination report. If needed, the examiner can call the applicant or his
agent for a show cause hearing to resolve the objections. That’s why this phase is also called patent
prosecution.

Step 6: Grant of a Patent

After all objections to the examination report have been replied to and the examiner is satisfied with the
reply of the applicant, the application is put in order for grant of Patent Registration. This marks the end of
the procedure for registration of Patent. On the other hand, if the examiner is not satisfied with the reply
and arguments of the applicant, then he/she can reject the patent application. In this case, the applicant will
again have to repeat the entire patent procedure in India again to get patent protection.

Part - C

III – Answer any 4 questions. Each question carries 8 marks. 4 x 8 = 32


13. Write the steps for identifying phishing emails.
The steps taken to identify phishing emails are:

Step 1: Is the email legitimate?


When trying to identify a phishing email, first, take stock.
Before beginning to dissect the email, ask yourself whether or not it was expected.
Phishing emails are typically unsolicited and it’s that that makes them conspicuous. An unsolicited email is
the first clue an email might be phishing.

Step 2: Does the email ask you to break company policy?


A professional penetration tester revealed how she manipulated an employee to gain physical access to
confidential information. First, she garnered sympathy from her victim, then solicited site access without
identity verification.
An email chain that somehow leads you towards sidestepping company policies is a red flag. If at any point
you’re considering skirting company policies as the result of an email message, it’s highly likely you’re under
attack.

Step 3: Does the email attempt to evoke emotion?


As we’ve discussed elsewhere, even rudimentary phishing emails are calculated affairs.
Phishing emails seek to tug at heartstrings in an effort to influence behaviors. Evidence of emotional
manipulation is therefore something to look out for.
Is the email designed to make you panic, perhaps by claiming criminals are attempting to access your online
bank account?
Does the email make you feel guilty? Or sympathetic towards someone in need? Does the email pique your
curiosity with the promise of photos or confidential information?
If an email heightens your emotions, take a moment to pause. There’s a chance the email’s pretext is
fictional and the email is merely a phishing attack.
Step 4: Does the email include attachments or links?
Phishing emails typically seek to either steal your personal information (identity theft), install malware or
persuade you to do something you otherwise wouldn’t do.
While the latter doesn’t necessarily rely on you clicking malicious links or opening malicious attachments,
criminals usually rely on sending a suspicious link and/or attachment to steal your information, login
credentials or install malware.
The presence of links and attachments can help to identify a phishing email – especially if the email or a
follow up phone call is unexpected and emotionally manipulative (see above).
Step 5: Check the sender details
Checking the sender details isn’t foolproof. An email account can be hacked and sender details can be
spoofed. But, for the most part, it’s possible to identify phishing emails as fraudulent by scrutinizing the
senders’ details, especially the email header.
Emails that claim to be from companies such as Apple might be sent from domains such as appple.com. Or,
they could be from apple.supportstaff.com. Both should raise alarm bells.

What to do if a suspicious email turns out to be a phishing attack


Phishing attacks are on the rise. From time to time, it’s likely that phishing emails are going to land in your
inbox.

14. Write a short note on important sections in IT Act.


Ans: Information Technology Act 2000 (IT Act 2000) is the main law connected with cyber security in
India.
Indian Penal Code, 1860 is also used to book criminals connected with cybercrimes
The Information Technology Act 2000, also known as the IT Act 2000, is an Indian
legislation that was enacted to provide legal recognition and regulation for electronic
transactions and digital information.
The Information Technology Act, 2000 is the most important law in India dealing with cybercrime
and e-commerce. It is based on the United Nations Model Law on Electronic Commerce 1996. It has
13 chapters and 94 sections, and two schedules. Some of the important sections of the IT Act are: -
Section 43: This section deals with unauthorized access and data theft from a computer system or
network. It imposes a penalty to be paid to the owner as compensation for damages.
- Section 66: This section focuses on cyber crimes like hacking and identity theft. It prescribes
imprisonment up to three years or fine up to five lakh rupees or both.
- Section 69: This section grants the government the authority to intercept and monitor
information for national security or public order.
- Section 72: This section penalizes the breach of confidentiality and privacy of any information
obtained under the IT Act. It prescribes imprisonment up to two years or fine up to one lakh rupees
or both.
- Section 79: This section provides immunity to intermediaries (such as internet service providers,
web hosts, etc.) from liability for any third party information, data, or communication link made
available or hosted by them, subject to certain conditions.
- Section 85: This section makes the company and its directors or officers liable for any offence
committed by the company under the IT Act, unless they prove that the offence was committed
without their knowledge or consent.
- Section 87: This section empowers the Central Government to make rules for carrying out the
provisions of the IT Act.
- Section 88: This section empowers the State Government to make rules for prescribing the
manner in which the electronic records and digital signatures shall be preserved by the authorities
under the IT Act.

15. Discuss the various data protection laws in India.


Ans: Data protection laws in India are currently undergoing a major transformation. As of now, there is no
separate legislation that specifically governs data protection or privacy in India. The main laws that deal
with data protection are the Information Technology Act, 2000 (IT Act) and the Information Technology
(Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (SPDI
Rules). However, these laws are not comprehensive and have several limitations and challenges.

In 2017, the Supreme Court of India recognized privacy as a fundamental right and highlighted the need to
protect personal data online³. In response, the government proposed the Personal Data Protection (PDP) Bill
in 2019, which aimed to establish a robust framework for data protection in India. The PDP Bill covered
various aspects such as data consent, data fiduciaries, data principals, data protection authority, data
localization, crossborder data transfers, and individual rights. However, the PDP Bill was referred to a Joint
Parliamentary Committee (JPC) for further review and deliberation.

Some of the key features of the DPDP Bill are:

- It covers both personal and non-personal data, and defines different categories of data such
as sensitive personal data, critical personal data, anonymized data, and metadata.
- It introduces the concept of data trusts, which are entities that can collect, store, process, and
share data for specific purposes, such as health, education, agriculture, etc.
- It provides for the establishment of a Data Protection Board of India, which will be the apex
regulatory body for data protection in India. The Board will have the power to issue
guidelines, standards, codes of practice, and enforce the provisions of the DPDP Bill.
- It grants various rights to data principals, such as the right to access, correction, erasure,
portability, and objection. It also introduces the right to be forgotten, which allows data
principals to request the removal of their personal data from online platforms under certain
conditions.
- It imposes various obligations on data fiduciaries, such as obtaining consent, providing notice,
ensuring data quality, implementing security safeguards, conducting data protection impact
assessments, and appointing data protection officers.
- It mandates data localization for critical personal data, which means such data can only be
processed and stored within India. It also imposes restrictions and conditions on cross-border
data transfers for other types of data.
- It prescribes penalties and remedies for violations of the DPDP Bill, which can range from
warnings and admonitions to fines and imprisonment.

The DPDP Bill is expected to bring a paradigm shift in the data protection landscape in India, and align it with
the global standards and best practices. However, the DPDP Bill is still subject to parliamentary approval and
public consultation, and may undergo further changes before it becomes a law. Therefore, data protection
laws in India are still evolving and uncertain, and may pose various challenges and opportunities for data
users and providers in the near future.

16. Explain how security features can be implemented in net banking.

Security measures in Digital Banking

The security features available to customers include the following:


• Login details: The very first level of security is the login credentials you need to provide. While setting up a
password, you are prompted to choose an alphanumerical string that includes special characters, and it also
suggests an optimum password length.
• Encrypted data: The data is encrypted in such a way that none other than you and your bank can understand
and read it while it is transferred across the internet. The cipher strength is so complicated that a hacker
cannot crack the code easily.
• Serious account management: Banks ensure additional checks in case you wish to add a new beneficiary or
payee, or change your password or addresses. Hence a hacker will not be able to log in to your account and
transfer money or get a new Debit Card made.
• Logout: You can log in to your bank from only one device at a time. When you log out the window or app, it
is closed instantly. The browser’s or app’s back button won’t work. And every time you want to return to
your Digital Banking page, you will have to log in again.
• Two-factor authorization: 2FA helps identify genuine account holders. It needs your password or PIN and a
card reader or mobile phone that generates a single-use pass code. Apart from the above, banks also use
the following:
• Intrusion detection system and firewalls to protect servers and information systems.
17. What are the three password policy settings that can be done in a Computer?

There are different types of password policy settings that can be done in a computer, depending on the
operating system and the domain. Some common password policy settings are:

Password length: This setting determines the minimum number of characters required for a password. A
longer password is usually more secure than a shorter one.
Password complexity: This setting determines whether a password must contain a combination of different
types of characters, such as uppercase and lowercase letters, numbers, and symbols. A complex password is
usually harder to guess or crack than a simple one.
Password expiration: This setting determines how often a user must change their password. A frequent
password change can reduce the risk of a password being compromised, but it can also increase the user’s
frustration and the likelihood of forgetting the password.

These are some examples of password policy settings, but there may be others depending on the specific
system and environment.
18. What is Gi? Explain the different indicators of GI and its significance
Geographical Indications (GIs) are special labels indicating a product’s origin, protecting unique items linked
to specific places. GIs ensure authenticity, preventing imitation. They’re like identity tags, preserving the
distinctiveness of local products and supporting regional economies.
Geographical Indications: Laws & Treaties
Geographical Indications (GIs) are special labels on products that link them to a specific geographic origin.
These labels help protect the product’s unique qualities, traditional methods, and reputation associated
with that location. Various laws and treaties govern GIs globally, ensuring fair competition and safeguarding
regional identities.
WTO
The WTO is like a referee for global trade. It helps countries make fair trade rules and solve trade problems.
Members talk, negotiate, and agree on trade rules. The WTO makes sure countries follow these rules. It’s
like a big meeting place where countries discuss and sort out trade issues peacefully.
Trade Related Aspects of Intellectual Property Rights (TRIPS) Agreement
The Trade-Related Aspects of Intellectual Property Rights (TRIPS) Agreement is an international treaty that
sets global standards for intellectual property protection. It’s part of the World Trade Organization (WTO)
and aims to ensure fair and uniform rules for patents, copyrights, trademarks, and trade secrets among
member countries. TRIPS promotes innovation by granting creators exclusive rights over their inventions
and creations. While it encourages a balance between protecting intellectual property and facilitating access
to knowledge, critics argue that it may sometimes hinder access to essential medicines and technology,
especially in developing nations. TRIPS plays a crucial role in shaping global trade and innovation policies.
Geographical Indications (GIs) of Law passed in India
These laws collectively safeguard the unique identity and quality of products originating from specific
geographical locations in India, promoting local heritage and preventing unauthorized use of such
indications. The Geographical Indications of Goods (Registration and Protection) Act, 1999: Establishes a
framework for the registration and protection of geographical indications in India.
The Geographical Indications of Goods (Registration and Protection) Rules, 2002: Provides detailed
guidelines and procedures for the registration and protection of geographical indications.
Amendment to the Geographical Indications of Goods (Registration and Protection) Act, 2008:
Introduces changes to enhance the effectiveness of the legislation. Geographical Indication (GIs)
Registered Products in India
India boasts several Geographical Indication (GI) registered products, denoting their unique origin and
quality. Basmati Rice
Darjeeling Tea
Alphonso Mangoes
Banarasi Silk
Kanchipuram Silk Sarees
Nagpur Orange

Geographical Indications (GIs) that Origin from Different States


Darjeeling Tea – West Bengal: Famous tea with a unique taste grown in the Darjeeling region.
Basmati Rice – Punjab, Haryana, Himachal Pradesh, Uttarakhand, Delhi, Western Uttar Pradesh, and Jammu
& Kashmir: Fragrant rice variety.
Kanchipuram Silk Saree – Tamil Nadu: Traditional silk saree known for its rich texture and vibrant colors.
Alphonso Mango – Maharashtra, Gujarat, Karnataka, and Andhra Pradesh: Renowned for its sweetness and
flavor.
Nagpur Orange – Maharashtra: Unique orange variety grown in the Nagpur region.
Pochampally Ikat – Telangana: Handwoven fabric with distinctive patterns.
Mysore Silk – Karnataka: Silk renowned for its quality, often used in sarees.
Agra Petha – Uttar Pradesh: Sweet candy made from ash gourd, famous in Agra.
Channapatna Toys – Karnataka: Handcrafted wooden toys from the Channapatna region.
Jaipur Blue Pottery – Rajasthan: Traditional pottery with blue glaze, often used for decorative items.
Geographical Indications of States in India
Geographical Indications (GIs) in India highlight unique products linked to specific regions, ensuring their
authenticity. Various states boast diverse GIs, reflecting their cultural and agricultural richness. Examples
include:
Karnataka: Mysore Silk
Tamil Nadu: Kancheepuram Silk
Andhra Pradesh: Kondapalli Toys
Maharashtra: Kolhapuri Chappal
Rajasthan: Kota Doria
Gujarat: Jamnagar Bandhani
Kerala: Alleppey Coir
West Bengal: Darjeeling Tea
Uttar Pradesh: Banaras Brocade
Odisha: Rasgulla
IIn conclusion, Geographical Indications (GIs) are labels used on products to show they come from a specific
geographic region, possessing qualities, reputation, or characteristics associated with that place. These tags
cover a variety of products, such as handicrafts, food, wine, and more,Indicators.

wine,

1. Define Cyber crime and Cyber criminal.


Ans: Cybercrime refers to criminal activities that either target or utilize computers, computer
networks, or networked devices. These illicit actions are carried out by cybercriminals or hackers
with various motivations.
Cybercriminals are individuals or teams of people who use technology to commit malicious activities
on digital systems or networks with the intention of stealing sensitive company information or
personal data, and generating profit.
2. What are the categories of Cyber crimes.
Ans: Most cybercrime falls under two main categories:
• Criminal activity that targets computers.
• Criminal activity that uses computers.
Cybercrime that targets computers often involves malware (Viruses, Trojans, Worms, Ransomware,
Spyware) like viruses.
3. What is data theft?
Ans: Data theft is the act of stealing information stored on corporate databases, devices, and servers.
This form of corporate theft is a significant risk for businesses of all sizes and can originate both
inside and outside an organization.
4. Write the three security settings in the computer. Ans: The three security settings in the computer
are
1. Antivirus and Antispyware Programs
2. Firewalls for Internet connection
3. Encryption Programs.
These help to ensure that unauthorized access is prevented.
5. What are the different checklists for secure net banking.
Ans: To ensure that the netbanking is done safely and securely we need to take care of the below
practices.
- Ensure 2 factor authentication account is used while logging in.
- Password created should be strong containing lowercase, uppercase, numbers and special
characters.
- Passwords should be changed once in a while.
- Secure your machine and keep it updated using firewall.- Ensure to logout when done.
6. Define IPR and GI.
Ans: Intellectual property (IP) is a category of property that includes intangible creations of
the human intellect. There are many types of intellectual property, and some countries recognize
more than others. The best-known types are patents, copyrights, trademarks, and trade secrets.
Geographical Indications (GIs) are special labels indicating a product’s origin, protecting
unique items linked to specific places. GIs ensure authenticity, preventing imitation. They’re like
identity tags, preserving the distinctiveness of local products and supporting regional economies.

7. What are the characteristics of Cybercrime activities?


Ans: Cybercrime is a criminal act that utilizes electronic devices and internet connections to carry
out malicious actions that can cross the borders of a country within a very short time. In today’s
technological development, the definition of cybercrime has evolved. Cybercrime is defined as a type
of
crime related to the unlimited use of information technology, with a strong emphasis on technology
engineering that relies on high levels of security and credibility of information delivered and
accessed by internet users.

Characteristics of Cybercrime
In general, cybercrime is a type of crime that uses computer technology based on the internet. This
crime has unique characteristics, including:

1. Global Nature and Often Crosses National Borders


Cybercrime is often committed transnational, making it difficult to detect and determine the
applicable legal jurisdiction. This complicates law enforcement efforts.

2. Not Causing Easily Visible Chaos


Cybercrime often does not result in easily visible physical damage. Nevertheless, its impact can be far
more damaging than conventional crime, especially in terms of financial losses and information
theft.

3. Universal Perpetrators of Cybercrime


There are no age or geographical restrictions to becoming a cybercriminal. Even children and
teenagers can be involved in these crimes.
4. Use of Technology Incomprehensible to Non-Experts
Cybercrime often leverages technology that is not easily understood by individuals who are not
proficient in the cyber world. This makes law enforcement and network protection tasks increasingly
complicated.

5. Material and Non-Material Loss Impacts


Cybercrime can lead to financial losses, such as theft of money and non-material losses, such as the
loss of confidential information, privacy, and the dignity of individuals or companies.

8. Write the steps of filing an offline/online cyber complaint.

Ans: To report a cybercrime in India online, you can submit a complaint through the National Crime
Reporting Portal of India, accessible at National Cyber Security Report Portal

STEP 1: Go to https://cyber crime.gov.in/Accept.aspx


STEP 2: Click on 'Report other cyber crimes' on the menu.
STEP 3: Click on 'File a Complaint'.
STEP 4: Read the conditions and accept them.
STEP 5: Register your mobile number and fill in your name and State.
STEP 6: Fill in the relevant details about the offence.

Offline Cyber Complaint:

Checklist for reporting cybercrime at cybercrime police station

● Document the incident: Write down a detailed description of the cybercrime incident including the date,
time and location. Gather any evidence you have such as screenshots, emails, chat logs or any other relevant
files. ●Contact Information: Prepare your contact information including your full name, address, phone
number and email address.
●Relevant Personal Information: Provide any relevant Personal Information about yourself, such as your
occupation or association with the affected organization ( if applicable)
● Description of the cybercrime: Clearly describe the nature of the Cybercrime, such as hacking, online
fraud, identity theft, harassment or any other offense. Include specific details about the incident such as
unauthorized access, compromised accounts or stolen data.
● Impact assessment: Assess the impact of the cybercrime on you or your organization including financial
loss, reputational damage or any other consequences.
●Previous actions taken: Note any actions you have taken prior to reporting the cybercrime, such as
contacting your internet service provider, blocking the attacker or preserving evidence.
● Relevant details about the offender: If you have any information about the offender, provide details such
as username, email addresses, IP addresses or any other identifying information.
●Witnesses or suspected third parties: If there were any witnesses to the cybercrime or you suspect the
involvement of third parties, provide their contact information or any other relevant details.
● Secure your systems: Take steps to secure your systems and prevent further damage. This may involve
changing passwords, updating security software or seeking professional assistance.
● Reporting Channels: Research the cybercrime police station or law enforcement agency responsible for
handling cybercrime cases in your area. Determine the appropriate reporting channel such as online form or
inperson visit.
● Compile the checklist: Organize the above information into a checklist or document to ensure you have
everything ready when reporting the cybercrime.

Explain the important sections of IT Act.


Ans: Information Technology Act 2000 (IT Act 2000) is the main law connected with cyber
security in India.
Indian Penal Code, 1860 is also used to book criminals connected with cybercrimes
The Information Technology Act 2000, also known as the IT Act 2000, is an Indian
legislation that was enacted to provide legal recognition and regulation for
electronic transactions and digital information.
The Information Technology Act, 2000 is the most important law in India dealing with cybercrime
and e-commerce. It is based on the United Nations Model Law on Electronic Commerce 1996. It has
13 chapters and 94 sections, and two schedules. Some of the important sections of the IT Act are: -
Section 43: This section deals with unauthorized access and data theft from a computer system or
network. It imposes a penalty to be paid to the owner as compensation for damages.
- Section 66: This section focuses on cyber crimes like hacking and identity theft. It prescribes
imprisonment up to three years or fine up to five lakh rupees or both.
- Section 69: This section grants the government the authority to intercept and monitor
information for national security or public order.
- Section 72: This section penalizes the breach of confidentiality and privacy of any information
obtained under the IT Act. It prescribes imprisonment up to two years or fine up to one lakh rupees
or both.
- Section 79: This section provides immunity to intermediaries (such as internet service providers,
web hosts, etc.) from liability for any third party information, data, or communication link made
available or hosted by them, subject to certain conditions.
- Section 85: This section makes the company and its directors or officers liable for any offence
committed by the company under the IT Act, unless they prove that the offence was committed
without their knowledge or consent.
- Section 87: This section empowers the Central Government to make rules for carrying out the
provisions of the IT Act.
- Section 88: This section empowers the State Government to make rules for prescribing the
manner in which the electronic records and digital signatures shall be preserved by the authorities
under the IT Act.

10. Write a note on phishing.

Ans: Phishing attacks are extremely common and involve sending mass amounts of fraudulent
emails to unsuspecting users, disguised as coming from a reliable source. The fraudulent emails
often have the appearance of being legit, but link the recipient to a malicious file or script
designed to grant attackers access to your device to control it or gather recon, install malicious
scripts/files, or to extract data such as user information, financial info, and more.
Phishing attacks can also take place via social networks and other online communities, via direct
messages from other users with a hidden intent. Phishers often leverage social engineering and
other public information sources to collect info about your work, interests, and activities—giving
attackers an edge in convincing you they’re not who they say.
There are several different types of phishing attacks, including:
• Spear Phishing—targeted attacks directed at specific companies and/or individuals.
• Whaling—attacks targeting senior executives and stakeholders within an organization.•
Pharming—leverages DNS cache poisoning to capture user credentials through a fake login
landing page.
Phishing attacks can also take place via phone call (voice phishing) and via text message (SMS
phishing).

11. Explain the process of Wi-Fi security management in Computer and Mobile.

Ans: Wi-Fi security management is the process of protecting devices and networks connected in a wireless
environment from unauthorized access, eavesdropping, data theft, and other threats. Wi-Fi security
management involves the following steps:

- Authentication: This is the process of verifying the identity of the devices and users who want to access the
Wi-Fi network. Authentication can be done using methods such as Wired Equivalent Privacy (WEP),
Extensible Authentication Protocol (EAP), or two-factor authentication (2FA)¹².
- Encryption: This is the process of transforming the data that is transmitted over the Wi-Fi network into a
secret code that can only be deciphered by authorized recipients. Encryption can be done using standards
such as Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), or Wi-Fi Protected Access 3
(WPA3)¹³. - Integrity: This is the process of ensuring that the data that is transmitted over the Wi-Fi
network is not altered, corrupted, or tampered with by malicious actors. Integrity can be done using
techniques such as checksums, digital signatures, or message authentication codes³.
- VPN: This is an optional but recommended process of creating a secure, encrypted tunnel between the Wi-
Fi network and the internet. VPN can protect the user's online privacy, hide their IP address, and bypass
georestrictions¹⁴.

Some of the best practices for Wi-Fi security management are:

- Using a strong password and changing it regularly


- Disabling SSID broadcast and remote administration
- Using MAC filtering and firewall
- Updating the firmware and software of the devices
- Avoiding public or unsecured Wi-Fi networks
- Scanning the devices for malware and viruses¹³

12. Write a note on IPR issues in cyber space.

Ans: IPR issues in cyber space in India are related to the protection of intellectual property rights (IPRs) of
the creators and owners of intangible assets such as trademarks, patents, copyrights, etc. in the online
environment.
Some of the challenges faced by IPR holders in cyberspace are:

• The ease of copying, modifying, and distributing digital content without authorization or payment.
• The difficulty of identifying and tracking the infringers and enforcing the rights across different
jurisdictions.
• The lack of awareness and respect for IPRs among the internet users and service providers.
• The inadequacy of the existing legal framework and the IT Act of 2000 to address the specific issues
of IPRs in cyberspace.

Some of the possible solutions to enhance the security of IPRs in cyberspace are:

• Developing and implementing technical measures such as encryption, digital watermarking, digital
rights management, etc. to prevent unauthorized access and use of digital content.
• Educating and sensitizing the internet users and service providers about the importance and benefits
of respecting IPRs in cyberspace.
• Strengthening the legal framework and the IT Act of 2000 to include provisions for the recognition,
protection, and enforcement of IPRs in cyberspace.
• Promoting and facilitating the cooperation and coordination among the stakeholders such as the
government, the judiciary, the industry, the academia, and the civil society to address the IPR issues
in cyberspace.

13. Write and explain the different types of cyber crimes. (any 4)

Ans: The different types of cyber crimes are


• Theft via cyberspace: Cyber theft is a sort of cybercrime that includes an individual infiltrating
another person’s or company’s system in order to steal wealth, private information, financial
information, or proprietary information. Identity theft and embezzlement are examples of fraudulent
crimes that might be classified as cyber theft crimes.
• Cyberbullying: Bullying an individual online is referred to as cyberbullying. Cyberbullying includes
any threat to a person’s safety, coercion of a person to say or do anything, and expressions of hatred
or subjectivity against someone. While children are more likely to be victims of cyberbullying, adults
are not exempt. According to a survey, 40% of polled teens said they had encountered online
harassment, while 24% of adults aged 26–35 said they had experienced cyberbullying.
• Malware: Malware is a term that refers to any software program that is meant to infiltrate or harm a
device. Viruses are a type of software that falls under the malware category. Viruses may cause a
range of problems once they enter a device. They may delete files, record your keystrokes, erase your
disk drive, or otherwise corrupt your data.
• Phishing: Phishing happens when fraudsters act as an organization in order to dupe victims into
disclosing important information. Scare techniques, such as notifying the victim that their bank
account or personal device is under assault, are frequently used by cybercriminals to effectively fulfil
their phishing aims.

14. Write the different tools available for cyber security.

Ans: The different tools available for cyber security are


2. Password Managers: The need to keep private digital information protected is highlighted
by the prevalence of growing cyber attacks. Password managers are being used to keep track
of and generate secure passwords. The user has to only remember one password, that of the
password manager.
Password managers like Lastpass,Dashlane, Sticky Password and KeepassX can be used. 2.
Virtual Private Network (VPN): A VPN connection establishes a secure connection between
you and the internet. Via the VPN, all your data traffic is routed through an encrypted virtual
tunnel. This disguises your IP address when you use the internet, making its location invisible
to everyone. You can still access all online services using the VPN. VPNs offer the best
protection available when it comes to your online security. Therefore, you should leave your
VPN on at all times to protect from data leaks and cyberattacks.
3. Blockchain Technology: Blockchain technology, a decentralized distributed ledger of
transactions, offers the next level of cyber security.

15. Write and explain about data protection laws in India.


Ans: Data protection laws in India are currently undergoing a major transformation. As of now, there is no
separate legislation that specifically governs data protection or privacy in India. The main laws that deal
with data protection are the Information Technology Act, 2000 (IT Act) and the Information Technology
(Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (SPDI
Rules). However, these laws are not comprehensive and have several limitations and challenges.

In 2017, the Supreme Court of India recognized privacy as a fundamental right and highlighted the need to
protect personal data online³. In response, the government proposed the Personal Data Protection (PDP) Bill
in 2019, which aimed to establish a robust framework for data protection in India. The PDP Bill covered
various aspects such as data consent, data fiduciaries, data principals, data protection authority, data
localization, crossborder data transfers, and individual rights. However, the PDP Bill was referred to a Joint
Parliamentary Committee (JPC) for further review and deliberation.

Some of the key features of the DPDP Bill are:

- It covers both personal and non-personal data, and defines different categories of data such
as sensitive personal data, critical personal data, anonymized data, and metadata.
- It introduces the concept of data trusts, which are entities that can collect, store, process, and
share data for specific purposes, such as health, education, agriculture, etc.
- It provides for the establishment of a Data Protection Board of India, which will be the apex
regulatory body for data protection in India. The Board will have the power to issue
guidelines, standards, codes of practice, and enforce the provisions of the DPDP Bill.
- It grants various rights to data principals, such as the right to access, correction, erasure,
portability, and objection. It also introduces the right to be forgotten, which allows data
principals to request the removal of their personal data from online platforms under certain
conditions.
- It imposes various obligations on data fiduciaries, such as obtaining consent, providing notice,
ensuring data quality, implementing security safeguards, conducting data protection impact
assessments, and appointing data protection officers.
- It mandates data localisation for critical personal data, which means such data can only be
processed and stored within India. It also imposes restrictions and conditions on cross-border
data transfers for other types of data.
- It prescribes penalties and remedies for violations of the DPDP Bill, which can range from
warnings and admonitions to fines and imprisonment.

The DPDP Bill is expected to bring a paradigm shift in the data protection landscape in India, and align it with
the global standards and best practices. However, the DPDP Bill is still subject to parliamentary approval and
public consultation, and may undergo further changes before it becomes a law. Therefore, data protection
laws in India are still evolving and uncertain, and may pose various challenges and opportunities for data
users and providers in the near future.

16. With examples write the different cyber crime cases in India.

Ans: Cyber Law Cases in India 1.


Shreya Singhal v. UOI:
• Challenge to the constitutionality of Section 66A of the IT Act, which criminalized
offensive online comments.
• The Supreme Court emphasized freedom of speech, distinguishing between
discussion and incitement. Section 66A was found capable of restricting all
communication, violating free speech.
2. Shamsher Singh Verma v. State of Haryana:
• Recognized Compact Discs as documents.
• No need for personal admission or denial of documents; they can be proven without it.
3. Syed Asifuddin and Ors. v. State of Andhra Pradesh and Anr.:
• Hacking ESNs of mobile handsets.
• Court found that mobile handsets fall under the definition of "computer" in the IT Act, and
altering ESN is an offense under Section 65.
Note: In the case "Syed Asifuddin and Ors. v. State of Andhra Pradesh and Anr.," the
term "ESN" stands for "Electronic Serial Number." Electronic Serial Number is a
unique identifier associated with a mobile device, particularly in the context of
older analog and early digital cellular networks. It is used to track and identify
individual mobile devices on a network. The ESN is distinct from the International
Mobile Equipment Identity (IMEI) number, which is used in modern mobile devices
to serve a similar purpose.
4. Shankar v. State Rep:
• Unauthorized access to a protected system.
• Court ruled that the charge sheet couldn't be quashed regarding non-granting of prosecution
sanction under Section 72 of the IT Act.
5. Christian Louboutin SAS v. Nakul Bajaj & Ors.:
• Trademark violation by an e-commerce portal.
• Court found the e-commerce platform was more than an intermediary, exempting
it from Section 79 protections.
6. Avnish Bajaj v. State (NCT) of Delhi:
• CEO of Bazee.com arrested for cyber pornography.
• Court ruled that Bazee.com wasn't involved in broadcasting porn, but its platform could earn
from sales and advertisements.
7. State of Tamil Nadu v. Suhas Katti:
• Conviction in a cyber harassment case in 7 months.
• Accused convicted under Sections 67 of the IT Act and Indian Penal Code sections.
8. CBI v. Arif Azim (Sony Sambandh case):
• Unauthorized funds transfer from Citibank accounts.
• Court found the accused guilty of offenses under the IT Act and IPC.
9. SMC Pneumatics (India) Pvt. Ltd. vs. Jogesh Kwatra:
• Defamatory emails sent by an employee.
• Plaintiff's request for perpetual injunction denied due to lack of certified evidence.
10.Pune Citibank Mphasis Call Center Fraud

• Summary: In 2005, $350,000 was fraudulently taken from the Citibank accounts of four U.S.
customers through the internet and transferred to fake accounts. The fraudsters gained
customers' trust and acquired their PINs by posing as helpful advisors during difficult
situations. Instead of breaking encryption or firewalls, they exploited weaknesses in the
MphasiS system.

• Court Decision: The accused were former employees of the MphasiS call center. These
employees were observed upon entry and exit, indicating that they likely memorized
customer account details. They used the SWIFT (Society for Worldwide Interbank Financial
Telecommunication) service for transferring funds, involving unauthorized access to customer
electronic accounts. This falls under "cybercrimes." The court applied Section 43(a) of the IT
Act, 2000 due to unauthorized access. The accused were also charged under Section 66 of the
IT Act, 2000, and Sections 420 (cheating), 465, 467, and 471 of the Indian Penal Code, 1860.

Conclusion
The Cyber Law regime in India is governed by the IT Act and related rules. However, it
may not cover all evolving cybercrimes. With India's "Digital India" movement,
cybercrimes continue to evolve, and the existing legal framework may need to adapt to
address new challenges effectively.

17. Write the steps for installation and configuration of Anti-virus in computers.
Ans: There are different ways to install and configure antivirus software on your computer, depending on the
type of antivirus program you choose and the operating system you use. Here are some general steps that
can help you with this process:
• First, make sure your computer is updated with the latest security patches and updates from your
operating system. This will help prevent any compatibility issues or conflicts with the antivirus
software.
You can check for updates manually or enable automatic updates in your system settings.
• Second, research your antivirus options and select the one that suits your needs and preferences.
You can use online reviews, ratings, and comparisons to help you decide. Some popular antivirus
programs for Windows include Bitdefender, Webroot, McAfee, and Malwarebytes. For Mac, you can
choose from apps like Norton, Intego, Kaspersky, and Sophos.
• Third, download the antivirus software from a trusted source or insert the installation disk into your
computer. If you download the software, make sure it is from the official website of the antivirus
provider or a reputable download site. Avoid clicking on any suspicious links or pop-ups that claim to
offer antivirus software, as they may be malware in disguise.
• Fourth, run the installer file and follow the instructions on the screen. You may need to grant
permission for the software to make changes to your computer or disable your existing antivirus
program temporarily. You may also need to choose the type of installation (such as full, custom, or
express) and the features you want to enable (such as real-time protection, firewall, or browser
extensions).
• Fifth, after the installation is complete, restart your computer and open the antivirus program. You
may need to activate your license or create an account to use the software. You should also update
the antivirus program with the latest virus definitions and scan your computer for any threats. You
can adjust the settings of the antivirus program according to your preferences, such as the frequency
of scans, the level of protection, and the actions to take when a threat is detected.
• These are the basic steps for installing and configuring antivirus software on your computer.

18. What are the procedures for patent registration and copyrights registration

Ans: Patent Registration process can be completed in multiple stages, beginning from Patent Search to the
issuance of Patent Registration Certificate. These stages involve legal intricacies which can be better handled
by an experienced IPR Professional. So, we strongly recommend approaching a Patent Service Provider like
Setindiabiz, or an experienced legal practitioner for patent filing in India.

Here is a detailed explanation of the Patent Registration process in India:

Step 1: Patent Search

Patent Search is the first step of Patent Filing procedure in India and is conducted worldwide to determine
the novelty of an invention. Generally, it is considered safe to do patent searches before patent application
filing. If an invention is found in prior arts or closely resembling prior arts, then the novelty of that invention
can be challenged by the Indian Patent Office and the application can be objected to. Therefore, it is
important to perform prior patent searches to assess the chances of your patent getting approved by the
Patent Office.

Step 2: Drafting Patent Specification

After conducting thorough searches worldwide, the specification of the invention is written in a techno-legal
language with or without the inventor’s claims. Without claims is the provisional specification and with
claims is the complete specification. The specification outlines the field of invention, detailed description of
the invention with working examples, and the best method to use the invention so that when it comes to
the knowledge of a person skilled in the art, it can be easily used. Legal protection to the patent is granted
when the specification is drafted with the inventor’s claim and is complete.

Step 3: Patent Application Filing

After drafting the Patent Specification, you can begin the procedure for Filing Patent Application in India. As
we discussed earlier, patent applications can be provisional or complete, based on the specifications drafted.
The drafted provisional or complete specification is filed in Form-2 while Patent Application form is filed in
Form 1 as prescribed by the Indian Patent Act. If a provisional patent specification is filed, then within 12
months of its filing, a complete specification has to be filed with the inventor’s claims. There are 6 different
types of Patent Application forms which can be filed on the basis of their purpose. These are:

• Ordinary patent application: Used to file a patent application directly in India, seeking protection
only within the Indian territory.
• PCT National phase patent application: Used to enter the national phase of PCT or Patent
Cooperation Treaty in India, after which the applicant will be allowed to seek patent protection in
multiple countries.
• PCT International patent application: Used to file a single patent application for patent registration in
multiple countries which are members of the PCT, providing a centralized process for seeking patent
protection internationally.
• Convention patent application: Used to claim priority based on an earlier application filed in a
convention country, allowing applicants to secure the priority date for their invention.
• Divisional patent application: Used to divide an existing patent application into multiple separate
applications, typically when the existing application contains multiple inventions.
• Patent of addition application: Used to file an application for an improvement or modification of an
already existing invention for which a patent has already been granted.

Step 4: Patent Publication for Public Opposition

Once the patent application process is complete, then after the expiry of 18 months from the date of patent
filing or date of priority whichever is earlier, the patent is published in an official journal and is open for
public viewing and inspection. This provides an opportunity to the general public to raise an objection to the
patent on valid grounds.

Step 5: Requesting Patent Examination

The patent application is examined only when a request for examination has been filed. The request for
examination has to be filed within 48 months of the patent filing date or date of the priority. The patent
examiner examines a patent application and issues an examination report. The examination report contains
a series of objections raised by an examiner. The response to an examination report has to be filed within 12
months of the issuance of the examination report. If needed, the examiner can call the applicant or his
agent for a show cause hearing to resolve the objections. That’s why this phase is also called patent
prosecution.

Step 6: Grant of a Patent

After all objections to the examination report have been replied to and the examiner is satisfied with the
reply of the applicant, the application is put in order for grant of Patent Registration. This marks the end of
the procedure for registration of Patent. On the other hand, if the examiner is not satisfied with the reply
and arguments of the applicant, then he/she can reject the patent application. In this case, the applicant will
again have to repeat the entire patent procedure in India again to get patent protection.

Copyrights registration:
The procedure for copyright registration in India is as follows123:

Application: An author or applicant can apply for registration of Copyright himself or via his authorized legal
representative.

Examination: Once the application is filed, a diary number is received.

Registration: The Registrar will then examine the application and, if satisfied, will issue a Certificate of
Registration.
Copyright filing in India is done through online application for copyright accompanied by four copies of the
work is to be made on Form IV (Including Statement of Particulars and Statement of Further Particulars)
along with the prescribed fee by visiting the website of the Copyright Office at www.copyright.gov.in, or as
an alternative, such application is to be sent by Speed Post/Registered Post to the Copyright Office in the
prescribed.

5.Write any 2 password Policies.

1. BIOS (Basic Input/Output System)

2. Administrator accounts

3. Standard User accounts.

10. Write a short note on IPR.

Ans: Intellectual Property Rights (IPR) in cyberspace refer to legal rights that are granted to individuals or entities over
their intellectual creations or inventions in the digital realm. These rights are designed to protect the interests of
creators and innovators, encouraging them to continue producing and sharing their work while providing a framework
for fair use and compensation. In the context of cyberspace, intellectual property can take various forms, and several
legal mechanisms protect these creations.

Here are some key aspects of Intellectual Property Rights in cyberspace:

1. Types of Intellectual Property in Cyberspace:


• Copyright: Protects original works of authorship, such as text, images, music, and software.
• Trademarks: Safeguards symbols, names, and slogans that distinguish goods or services.
• Patents: Grant exclusive rights to inventors of new, useful, and non-obvious inventions.
• Trade Secrets: Protects confidential business information, processes, or formulas.
• Digital Assets: Intellectual property extends to digital assets, including digital content, online databases, and virtual
creations.
2. Challenges in Cyberspace

• Digital Piracy: Unauthorized copying or distribution of digital content.


• Cyber Theft: Theft of digital assets, trade secrets, or patented technologies.
• Domain Name Disputes: Conflicts arising from the registration and use of domain names.
• Plagiarism: Unauthorized use or reproduction of someone else's work.
3. Legal Frameworks for IPR Protection in Cyberspace

• Digital Millennium Copyright Act (DMCA): Addresses copyright issues related to digital content.
• Uniform Domain-Name Dispute-Resolution Policy (UDRP): Provides a mechanism to resolve domain name disputes.
• World Intellectual Property Organization (WIPO): Offers services for the registration and protection of intellectual
property rights globally.
4. Enforcement and Protection

• Cybersecurity Measures: Protecting intellectual property involves implementing robust cybersecurity measures to
prevent unauthorized access and theft.
• Legal Action: Pursuing legal action against infringers, which may involve filing lawsuits or using dispute resolution
mechanisms.
• Digital Watermarking and Encryption: Techniques to embed information into digital content for tracking and
protection.
5. Global Cooperation:

• International Treaties: Countries often cooperate through international treaties and agreements to harmonize
intellectual property protection.
• Cross-Border Enforcement: Addressing challenges related to cross-border enforcement of intellectual property
rights.
6. Balancing Access and Protection:

• Fair Use: Recognizing exceptions to copyright for purposes such as criticism, commentary, news reporting, teaching,
scholarship, and research.
• Open-Source Movements: Encouraging collaborative development and sharing of software code.

3.What is hacking?

Ans: Hacking is the process of gaining unauthorized access to a device, making changes to enable continued
access, and altering the configuration, operation, or service of the target equipment without the owners'
knowledge or consent.

4.Define ransom ware.

Ans: Ransomware is a type of malicious software (malware) that threatens to publish or blocks access to
data or a computer system, usually by encrypting it, until the victim pays a ransom fee to the attacker.

5.What do you mean by net banking?


Ans: Net Banking also known as Internet Banking, is a digital method to conduct banking transactions by the
means of the internet, it is a time savvy facility offered by all standard banks. Individual can conduct banking
activities from home through their smartphones, tablets, laptops and desktops.

6.What is UPI? Mention its benefits.

Ans: Unified Payments Interface (UPI) is a system that powers multiple bank accounts into a single mobile
application (of any participating bank), merging several banking features, seamless fund routing & merchant
payments into one hood.

1. Instant Transfers
2. Convenience and Accessibility
3. Cost-Effective
4. Enhanced Security
5. Flexibility in Payments
6. Real-Time Monitoring
7. Integration of Multiple Bank Accounts
8. 24/7 Availability 9. Universal Platform

7.What is cyber security?

Ans: Cybersecurity refers to the practice of protecting systems, networks, and programs from digital attacks,
theft, damage, or unauthorized access. It encompasses a range of technologies, processes, and practices
designed to safeguard sensitive information and ensure the integrity, confidentiality, and availability of data.

8.What is patent?

Ans: A patent is a legal right granted by a government to an inventor or assignee for a limited period,
typically 20 years from the filing date, giving them exclusive rights to make, use, sell, and distribute an
invention. In exchange for this exclusivity, the inventor must publicly disclose the details of the invention,
allowing others to learn from it once the patent expires.

You might also like