Cyber Crime PDF
Cyber Crime PDF
5. Define Hackers.
Ans A hacker is a person skilled in information technology who achieves goals by non-standard
means.
Ans: To report a cybercrime in India online, you can submit a complaint through the National Crime
Reporting Portal of India, accessible at National Cyber Security Report Portal
STEP 1: Go to https://cyber crime.gov.in/Accept.aspx
STEP 2: Click on 'Report other cyber crimes' on the menu.
STEP 3: Click on 'File a Complaint'.
STEP 4: Read the conditions and accept them.
STEP 5: Register your mobile number and fill in your name and State.
STEP 6: Fill in the relevant details about the offence.
● Document the incident: Write down a detailed description of the cybercrime incident including the date,
time and location. Gather any evidence you have such as screenshots, emails, chat logs or any other relevant
files. ●Contact Information: Prepare your contact information including your full name, address, phone
number and email address.
●Relevant Personal Information: Provide any relevant Personal Information about yourself, such as your
occupation or association with the affected organization ( if applicable)
● Description of the cybercrime: Clearly describe the nature of the Cybercrime, such as hacking, online
fraud, identity theft, harassment or any other offense. Include specific details about the incident such as
unauthorized access, compromised accounts or stolen data.
● Impact assessment: Assess the impact of the cybercrime on you or your organization including financial
loss, reputational damage or any other consequences.
●Previous actions taken: Note any actions you have taken prior to reporting the cybercrime, such as
contacting your internet service provider, blocking the attacker or preserving evidence.
● Relevant details about the offender: If you have any information about the offender, provide details such
as username, email addresses, IP addresses or any other identifying information.
●Witnesses or suspected third parties: If there were any witnesses to the cybercrime or you suspect the
involvement of third parties, provide their contact information or any other relevant details.
● Secure your systems: Take steps to secure your systems and prevent further damage. This may involve
changing passwords, updating security software or seeking professional assistance.
● Reporting Channels: Research the cybercrime police station or law enforcement agency responsible for
handling cybercrime cases in your area. Determine the appropriate reporting channel such as online form or
inperson visit.
● Compile the checklist: Organize the above information into a checklist or document to ensure you have
everything ready when reporting the cybercrime.
• Use a VPN
Virtual Private Network is an encryption tool. If you want to keep your conversations, messages, and
calls secure this is the best solution.
• Internet is Permanent
Always consider that anything you post stays there forever. Even if you delete your account, someone
may already print/copy your content.
• Personal Information
Careful who you reveal personal information. Always be suspicious of anyone who asks for your
personal information over any social media platform.
• App Authorisation
Every time you log in to another site using the option of using a social media login you are granting
authorisation to your account.
They tell you what data this app will have access to before you agree but if you stop using that site
remember to revoke authorisation.
• Password Manager
Your passwords are valuable, so treat them that way.
There are a number of password manager software available that help you store and organize
passwords. This enables you to log in with just one main password that then allows you to access all
your accounts.
9. Explain how security settings can be applied on Mobile wallets and UPI’s.
Ans Mobile wallets and UPIs are popular modes of digital payments that offer convenience and speed.
However, they also require users to be vigilant about the security of their transactions and personal
information.
Here are some ways to apply security settings on mobile wallets and UPIs:
Set a strong UPI PIN: Your UPI PIN is the primary authentication for UPI transactions. Choose a unique and
complex PIN that is not easily guessable. Never share your UPI PIN with anyone, even if they claim to be
from your bank or UPI provider. Change your UPI PIN regularly to ensure maximum security.
Download official UPI apps: Always download the official UPI app from a trusted source such as the Google
Play Store or Apple App Store. Avoid downloading UPI apps from WhatsApp and SMS, as they could
potentially have harmful software or put your device at risk. Keep your UPI app updated to benefit from the
latest security patches and enhancements.
Verify transaction details: Before authorizing any UPI transaction, carefully review the transaction details
displayed on the app or payment interface. Ensure that the payment amount, receiver details, and purpose
of the transaction are accurate. Be cautious of unexpected or suspicious requests for payments and cross-
check any unfamiliar transaction details with the intended recipient before proceeding.
Be wary of phishing attempts: Phishing attacks are common in the digital realm, and UPI is not exempt from
such threats. Be cautious of emails, text messages, or calls claiming to be from your bank or UPI provider,
asking for sensitive information or UPI PINs. Legitimate institutions will never ask for such details through
unsecured channels. Avoid clicking on suspicious links or providing personal information to unknown
sources. When in doubt, contact your bank or UPI provider directly to verify the authenticity of the
communication.
Use secure networks: When conducting UPI transactions, ensure that you are connected to a secure and
trusted network. Public Wi-Fi networks, especially those without password protection, can be vulnerable to
data breaches and interception. Avoid making UPI transactions on public networks or shared devices, as
they may compromise the security of your personal and financial information. Instead, use a secure and
passwordprotected network or consider using a virtual private network (VPN) for an added layer of security.
Regularly monitor account activity: Keep track of your UPI transactions and account balance by checking
your statements and notifications regularly. Report any unauthorized or suspicious transactions to your
bank or UPI provider immediately. You can also set transaction limits and alerts to control your spending
and prevent fraud.
Install security software: Protect your device from malware and viruses by installing a reliable security
software. Scan your device regularly and remove any unwanted or suspicious apps. Enable automatic device
updates to ensure that you have the latest security patches installed.
Keep your device secure: Ensure the security of your device by implementing basic security measures. Set a
strong device password or use biometric authentication features if available. Enable remote wipe or lock
features in case your device is lost or stolen. Do not store your UPI PIN or other sensitive information on
your device or cloud storage.
By following these security settings, you can use mobile wallets and UPIs safely and securely
10. Write the different tools for cyber security.
11. Write the steps for installation and configuration of Anti-virus in computers
Ans: There are different ways to install and configure antivirus software on your computer, depending on the
type of antivirus program you choose and the operating system you use. Here are some general steps that
can help you with this process:
• First, make sure your computer is updated with the latest security patches and updates from your
operating system. This will help prevent any compatibility issues or conflicts with the antivirus
software.
You can check for updates manually or enable automatic updates in your system settings.
• Second, research your antivirus options and select the one that suits your needs and preferences.
You can use online reviews, ratings, and comparisons to help you decide. Some popular antivirus
programs for Windows include Bitdefender, Webroot, McAfee, and Malwarebytes. For Mac, you can
choose from apps like Norton, Intego, Kaspersky, and Sophos.
• Third, download the antivirus software from a trusted source or insert the installation disk into your
computer. If you download the software, make sure it is from the official website of the antivirus
provider or a reputable download site. Avoid clicking on any suspicious links or pop-ups that claim to
offer antivirus software, as they may be malware in disguise.
• Fourth, run the installer file and follow the instructions on the screen. You may need to grant
permission for the software to make changes to your computer or disable your existing antivirus
program temporarily. You may also need to choose the type of installation (such as full, custom, or
express) and the features you want to enable (such as real-time protection, firewall, or browser
extensions).
• Fifth, after the installation is complete, restart your computer and open the antivirus program. You
may need to activate your license or create an account to use the software. You should also update
the antivirus program with the latest virus definitions and scan your computer for any threats. You
can adjust the settings of the antivirus program according to your preferences, such as the frequency
of scans, the level of protection, and the actions to take when a threat is detected.
• These are the basic steps for installing and configuring antivirus software on your computer.
Ans: Patent Registration process can be completed in multiple stages, beginning from Patent Search to the
issuance of Patent Registration Certificate. These stages involve legal intricacies which can be better handled
by an experienced IPR Professional. So, we strongly recommend approaching a Patent Service Provider like
Setindiabiz, or an experienced legal practitioner for patent filing in India.
Patent Search is the first step of Patent Filing procedure in India and is conducted worldwide to determine
the novelty of an invention. Generally, it is considered safe to do patent searches before patent application
filing. If an invention is found in prior arts or closely resembling prior arts, then the novelty of that invention
can be challenged by the Indian Patent Office and the application can be objected to. Therefore, it is
important to perform prior patent searches to assess the chances of your patent getting approved by the
Patent Office.
Step 2: Drafting Patent Specification
After conducting thorough searches worldwide, the specification of the invention is written in a techno-legal
language with or without the inventor’s claims. Without claims is the provisional specification and with
claims is the complete specification. The specification outlines the field of invention, detailed description of
the invention with working examples, and the best method to use the invention so that when it comes to
the knowledge of a person skilled in the art, it can be easily used. Legal protection to the patent is granted
when the specification is drafted with the inventor’s claim and is complete.
After drafting the Patent Specification, you can begin the procedure for Filing Patent Application in India. As
we discussed earlier, patent applications can be provisional or complete, based on the specifications drafted.
The drafted provisional or complete specification is filed in Form-2 while Patent Application form is filed in
Form 1 as prescribed by the Indian Patent Act. If a provisional patent specification is filed, then within 12
months of its filing, a complete specification has to be filed with the inventor’s claims. There are 6 different
types of Patent Application forms which can be filed on the basis of their purpose. These are:
• Ordinary patent application: Used to file a patent application directly in India, seeking protection
only within the Indian territory.
• PCT National phase patent application: Used to enter the national phase of PCT or Patent
Cooperation Treaty in India, after which the applicant will be allowed to seek patent protection in
multiple countries.
• PCT International patent application: Used to file a single patent application for patent registration in
multiple countries which are members of the PCT, providing a centralized process for seeking patent
protection internationally.
• Convention patent application: Used to claim priority based on an earlier application filed in a
convention country, allowing applicants to secure the priority date for their invention.
• Divisional patent application: Used to divide an existing patent application into multiple separate
applications, typically when the existing application contains multiple inventions.
• Patent of addition application: Used to file an application for an improvement or modification of an
already existing invention for which a patent has already been granted.
Once the patent application process is complete, then after the expiry of 18 months from the date of patent
filing or date of priority whichever is earlier, the patent is published in an official journal and is open for
public viewing and inspection. This provides an opportunity to the general public to raise an objection to the
patent on valid grounds.
The patent application is examined only when a request for examination has been filed. The request for
examination has to be filed within 48 months of the patent filing date or date of the priority. The patent
examiner examines a patent application and issues an examination report. The examination report contains
a series of objections raised by an examiner. The response to an examination report has to be filed within 12
months of the issuance of the examination report. If needed, the examiner can call the applicant or his
agent for a show cause hearing to resolve the objections. That’s why this phase is also called patent
prosecution.
After all objections to the examination report have been replied to and the examiner is satisfied with the
reply of the applicant, the application is put in order for grant of Patent Registration. This marks the end of
the procedure for registration of Patent. On the other hand, if the examiner is not satisfied with the reply
and arguments of the applicant, then he/she can reject the patent application. In this case, the applicant will
again have to repeat the entire patent procedure in India again to get patent protection.
Part - C
In 2017, the Supreme Court of India recognized privacy as a fundamental right and highlighted the need to
protect personal data online³. In response, the government proposed the Personal Data Protection (PDP) Bill
in 2019, which aimed to establish a robust framework for data protection in India. The PDP Bill covered
various aspects such as data consent, data fiduciaries, data principals, data protection authority, data
localization, crossborder data transfers, and individual rights. However, the PDP Bill was referred to a Joint
Parliamentary Committee (JPC) for further review and deliberation.
- It covers both personal and non-personal data, and defines different categories of data such
as sensitive personal data, critical personal data, anonymized data, and metadata.
- It introduces the concept of data trusts, which are entities that can collect, store, process, and
share data for specific purposes, such as health, education, agriculture, etc.
- It provides for the establishment of a Data Protection Board of India, which will be the apex
regulatory body for data protection in India. The Board will have the power to issue
guidelines, standards, codes of practice, and enforce the provisions of the DPDP Bill.
- It grants various rights to data principals, such as the right to access, correction, erasure,
portability, and objection. It also introduces the right to be forgotten, which allows data
principals to request the removal of their personal data from online platforms under certain
conditions.
- It imposes various obligations on data fiduciaries, such as obtaining consent, providing notice,
ensuring data quality, implementing security safeguards, conducting data protection impact
assessments, and appointing data protection officers.
- It mandates data localization for critical personal data, which means such data can only be
processed and stored within India. It also imposes restrictions and conditions on cross-border
data transfers for other types of data.
- It prescribes penalties and remedies for violations of the DPDP Bill, which can range from
warnings and admonitions to fines and imprisonment.
The DPDP Bill is expected to bring a paradigm shift in the data protection landscape in India, and align it with
the global standards and best practices. However, the DPDP Bill is still subject to parliamentary approval and
public consultation, and may undergo further changes before it becomes a law. Therefore, data protection
laws in India are still evolving and uncertain, and may pose various challenges and opportunities for data
users and providers in the near future.
There are different types of password policy settings that can be done in a computer, depending on the
operating system and the domain. Some common password policy settings are:
Password length: This setting determines the minimum number of characters required for a password. A
longer password is usually more secure than a shorter one.
Password complexity: This setting determines whether a password must contain a combination of different
types of characters, such as uppercase and lowercase letters, numbers, and symbols. A complex password is
usually harder to guess or crack than a simple one.
Password expiration: This setting determines how often a user must change their password. A frequent
password change can reduce the risk of a password being compromised, but it can also increase the user’s
frustration and the likelihood of forgetting the password.
These are some examples of password policy settings, but there may be others depending on the specific
system and environment.
18. What is Gi? Explain the different indicators of GI and its significance
Geographical Indications (GIs) are special labels indicating a product’s origin, protecting unique items linked
to specific places. GIs ensure authenticity, preventing imitation. They’re like identity tags, preserving the
distinctiveness of local products and supporting regional economies.
Geographical Indications: Laws & Treaties
Geographical Indications (GIs) are special labels on products that link them to a specific geographic origin.
These labels help protect the product’s unique qualities, traditional methods, and reputation associated
with that location. Various laws and treaties govern GIs globally, ensuring fair competition and safeguarding
regional identities.
WTO
The WTO is like a referee for global trade. It helps countries make fair trade rules and solve trade problems.
Members talk, negotiate, and agree on trade rules. The WTO makes sure countries follow these rules. It’s
like a big meeting place where countries discuss and sort out trade issues peacefully.
Trade Related Aspects of Intellectual Property Rights (TRIPS) Agreement
The Trade-Related Aspects of Intellectual Property Rights (TRIPS) Agreement is an international treaty that
sets global standards for intellectual property protection. It’s part of the World Trade Organization (WTO)
and aims to ensure fair and uniform rules for patents, copyrights, trademarks, and trade secrets among
member countries. TRIPS promotes innovation by granting creators exclusive rights over their inventions
and creations. While it encourages a balance between protecting intellectual property and facilitating access
to knowledge, critics argue that it may sometimes hinder access to essential medicines and technology,
especially in developing nations. TRIPS plays a crucial role in shaping global trade and innovation policies.
Geographical Indications (GIs) of Law passed in India
These laws collectively safeguard the unique identity and quality of products originating from specific
geographical locations in India, promoting local heritage and preventing unauthorized use of such
indications. The Geographical Indications of Goods (Registration and Protection) Act, 1999: Establishes a
framework for the registration and protection of geographical indications in India.
The Geographical Indications of Goods (Registration and Protection) Rules, 2002: Provides detailed
guidelines and procedures for the registration and protection of geographical indications.
Amendment to the Geographical Indications of Goods (Registration and Protection) Act, 2008:
Introduces changes to enhance the effectiveness of the legislation. Geographical Indication (GIs)
Registered Products in India
India boasts several Geographical Indication (GI) registered products, denoting their unique origin and
quality. Basmati Rice
Darjeeling Tea
Alphonso Mangoes
Banarasi Silk
Kanchipuram Silk Sarees
Nagpur Orange
wine,
Characteristics of Cybercrime
In general, cybercrime is a type of crime that uses computer technology based on the internet. This
crime has unique characteristics, including:
Ans: To report a cybercrime in India online, you can submit a complaint through the National Crime
Reporting Portal of India, accessible at National Cyber Security Report Portal
● Document the incident: Write down a detailed description of the cybercrime incident including the date,
time and location. Gather any evidence you have such as screenshots, emails, chat logs or any other relevant
files. ●Contact Information: Prepare your contact information including your full name, address, phone
number and email address.
●Relevant Personal Information: Provide any relevant Personal Information about yourself, such as your
occupation or association with the affected organization ( if applicable)
● Description of the cybercrime: Clearly describe the nature of the Cybercrime, such as hacking, online
fraud, identity theft, harassment or any other offense. Include specific details about the incident such as
unauthorized access, compromised accounts or stolen data.
● Impact assessment: Assess the impact of the cybercrime on you or your organization including financial
loss, reputational damage or any other consequences.
●Previous actions taken: Note any actions you have taken prior to reporting the cybercrime, such as
contacting your internet service provider, blocking the attacker or preserving evidence.
● Relevant details about the offender: If you have any information about the offender, provide details such
as username, email addresses, IP addresses or any other identifying information.
●Witnesses or suspected third parties: If there were any witnesses to the cybercrime or you suspect the
involvement of third parties, provide their contact information or any other relevant details.
● Secure your systems: Take steps to secure your systems and prevent further damage. This may involve
changing passwords, updating security software or seeking professional assistance.
● Reporting Channels: Research the cybercrime police station or law enforcement agency responsible for
handling cybercrime cases in your area. Determine the appropriate reporting channel such as online form or
inperson visit.
● Compile the checklist: Organize the above information into a checklist or document to ensure you have
everything ready when reporting the cybercrime.
Ans: Phishing attacks are extremely common and involve sending mass amounts of fraudulent
emails to unsuspecting users, disguised as coming from a reliable source. The fraudulent emails
often have the appearance of being legit, but link the recipient to a malicious file or script
designed to grant attackers access to your device to control it or gather recon, install malicious
scripts/files, or to extract data such as user information, financial info, and more.
Phishing attacks can also take place via social networks and other online communities, via direct
messages from other users with a hidden intent. Phishers often leverage social engineering and
other public information sources to collect info about your work, interests, and activities—giving
attackers an edge in convincing you they’re not who they say.
There are several different types of phishing attacks, including:
• Spear Phishing—targeted attacks directed at specific companies and/or individuals.
• Whaling—attacks targeting senior executives and stakeholders within an organization.•
Pharming—leverages DNS cache poisoning to capture user credentials through a fake login
landing page.
Phishing attacks can also take place via phone call (voice phishing) and via text message (SMS
phishing).
11. Explain the process of Wi-Fi security management in Computer and Mobile.
Ans: Wi-Fi security management is the process of protecting devices and networks connected in a wireless
environment from unauthorized access, eavesdropping, data theft, and other threats. Wi-Fi security
management involves the following steps:
- Authentication: This is the process of verifying the identity of the devices and users who want to access the
Wi-Fi network. Authentication can be done using methods such as Wired Equivalent Privacy (WEP),
Extensible Authentication Protocol (EAP), or two-factor authentication (2FA)¹².
- Encryption: This is the process of transforming the data that is transmitted over the Wi-Fi network into a
secret code that can only be deciphered by authorized recipients. Encryption can be done using standards
such as Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), or Wi-Fi Protected Access 3
(WPA3)¹³. - Integrity: This is the process of ensuring that the data that is transmitted over the Wi-Fi
network is not altered, corrupted, or tampered with by malicious actors. Integrity can be done using
techniques such as checksums, digital signatures, or message authentication codes³.
- VPN: This is an optional but recommended process of creating a secure, encrypted tunnel between the Wi-
Fi network and the internet. VPN can protect the user's online privacy, hide their IP address, and bypass
georestrictions¹⁴.
Ans: IPR issues in cyber space in India are related to the protection of intellectual property rights (IPRs) of
the creators and owners of intangible assets such as trademarks, patents, copyrights, etc. in the online
environment.
Some of the challenges faced by IPR holders in cyberspace are:
• The ease of copying, modifying, and distributing digital content without authorization or payment.
• The difficulty of identifying and tracking the infringers and enforcing the rights across different
jurisdictions.
• The lack of awareness and respect for IPRs among the internet users and service providers.
• The inadequacy of the existing legal framework and the IT Act of 2000 to address the specific issues
of IPRs in cyberspace.
Some of the possible solutions to enhance the security of IPRs in cyberspace are:
• Developing and implementing technical measures such as encryption, digital watermarking, digital
rights management, etc. to prevent unauthorized access and use of digital content.
• Educating and sensitizing the internet users and service providers about the importance and benefits
of respecting IPRs in cyberspace.
• Strengthening the legal framework and the IT Act of 2000 to include provisions for the recognition,
protection, and enforcement of IPRs in cyberspace.
• Promoting and facilitating the cooperation and coordination among the stakeholders such as the
government, the judiciary, the industry, the academia, and the civil society to address the IPR issues
in cyberspace.
13. Write and explain the different types of cyber crimes. (any 4)
In 2017, the Supreme Court of India recognized privacy as a fundamental right and highlighted the need to
protect personal data online³. In response, the government proposed the Personal Data Protection (PDP) Bill
in 2019, which aimed to establish a robust framework for data protection in India. The PDP Bill covered
various aspects such as data consent, data fiduciaries, data principals, data protection authority, data
localization, crossborder data transfers, and individual rights. However, the PDP Bill was referred to a Joint
Parliamentary Committee (JPC) for further review and deliberation.
- It covers both personal and non-personal data, and defines different categories of data such
as sensitive personal data, critical personal data, anonymized data, and metadata.
- It introduces the concept of data trusts, which are entities that can collect, store, process, and
share data for specific purposes, such as health, education, agriculture, etc.
- It provides for the establishment of a Data Protection Board of India, which will be the apex
regulatory body for data protection in India. The Board will have the power to issue
guidelines, standards, codes of practice, and enforce the provisions of the DPDP Bill.
- It grants various rights to data principals, such as the right to access, correction, erasure,
portability, and objection. It also introduces the right to be forgotten, which allows data
principals to request the removal of their personal data from online platforms under certain
conditions.
- It imposes various obligations on data fiduciaries, such as obtaining consent, providing notice,
ensuring data quality, implementing security safeguards, conducting data protection impact
assessments, and appointing data protection officers.
- It mandates data localisation for critical personal data, which means such data can only be
processed and stored within India. It also imposes restrictions and conditions on cross-border
data transfers for other types of data.
- It prescribes penalties and remedies for violations of the DPDP Bill, which can range from
warnings and admonitions to fines and imprisonment.
The DPDP Bill is expected to bring a paradigm shift in the data protection landscape in India, and align it with
the global standards and best practices. However, the DPDP Bill is still subject to parliamentary approval and
public consultation, and may undergo further changes before it becomes a law. Therefore, data protection
laws in India are still evolving and uncertain, and may pose various challenges and opportunities for data
users and providers in the near future.
16. With examples write the different cyber crime cases in India.
• Summary: In 2005, $350,000 was fraudulently taken from the Citibank accounts of four U.S.
customers through the internet and transferred to fake accounts. The fraudsters gained
customers' trust and acquired their PINs by posing as helpful advisors during difficult
situations. Instead of breaking encryption or firewalls, they exploited weaknesses in the
MphasiS system.
• Court Decision: The accused were former employees of the MphasiS call center. These
employees were observed upon entry and exit, indicating that they likely memorized
customer account details. They used the SWIFT (Society for Worldwide Interbank Financial
Telecommunication) service for transferring funds, involving unauthorized access to customer
electronic accounts. This falls under "cybercrimes." The court applied Section 43(a) of the IT
Act, 2000 due to unauthorized access. The accused were also charged under Section 66 of the
IT Act, 2000, and Sections 420 (cheating), 465, 467, and 471 of the Indian Penal Code, 1860.
Conclusion
The Cyber Law regime in India is governed by the IT Act and related rules. However, it
may not cover all evolving cybercrimes. With India's "Digital India" movement,
cybercrimes continue to evolve, and the existing legal framework may need to adapt to
address new challenges effectively.
17. Write the steps for installation and configuration of Anti-virus in computers.
Ans: There are different ways to install and configure antivirus software on your computer, depending on the
type of antivirus program you choose and the operating system you use. Here are some general steps that
can help you with this process:
• First, make sure your computer is updated with the latest security patches and updates from your
operating system. This will help prevent any compatibility issues or conflicts with the antivirus
software.
You can check for updates manually or enable automatic updates in your system settings.
• Second, research your antivirus options and select the one that suits your needs and preferences.
You can use online reviews, ratings, and comparisons to help you decide. Some popular antivirus
programs for Windows include Bitdefender, Webroot, McAfee, and Malwarebytes. For Mac, you can
choose from apps like Norton, Intego, Kaspersky, and Sophos.
• Third, download the antivirus software from a trusted source or insert the installation disk into your
computer. If you download the software, make sure it is from the official website of the antivirus
provider or a reputable download site. Avoid clicking on any suspicious links or pop-ups that claim to
offer antivirus software, as they may be malware in disguise.
• Fourth, run the installer file and follow the instructions on the screen. You may need to grant
permission for the software to make changes to your computer or disable your existing antivirus
program temporarily. You may also need to choose the type of installation (such as full, custom, or
express) and the features you want to enable (such as real-time protection, firewall, or browser
extensions).
• Fifth, after the installation is complete, restart your computer and open the antivirus program. You
may need to activate your license or create an account to use the software. You should also update
the antivirus program with the latest virus definitions and scan your computer for any threats. You
can adjust the settings of the antivirus program according to your preferences, such as the frequency
of scans, the level of protection, and the actions to take when a threat is detected.
• These are the basic steps for installing and configuring antivirus software on your computer.
18. What are the procedures for patent registration and copyrights registration
Ans: Patent Registration process can be completed in multiple stages, beginning from Patent Search to the
issuance of Patent Registration Certificate. These stages involve legal intricacies which can be better handled
by an experienced IPR Professional. So, we strongly recommend approaching a Patent Service Provider like
Setindiabiz, or an experienced legal practitioner for patent filing in India.
Patent Search is the first step of Patent Filing procedure in India and is conducted worldwide to determine
the novelty of an invention. Generally, it is considered safe to do patent searches before patent application
filing. If an invention is found in prior arts or closely resembling prior arts, then the novelty of that invention
can be challenged by the Indian Patent Office and the application can be objected to. Therefore, it is
important to perform prior patent searches to assess the chances of your patent getting approved by the
Patent Office.
After conducting thorough searches worldwide, the specification of the invention is written in a techno-legal
language with or without the inventor’s claims. Without claims is the provisional specification and with
claims is the complete specification. The specification outlines the field of invention, detailed description of
the invention with working examples, and the best method to use the invention so that when it comes to
the knowledge of a person skilled in the art, it can be easily used. Legal protection to the patent is granted
when the specification is drafted with the inventor’s claim and is complete.
After drafting the Patent Specification, you can begin the procedure for Filing Patent Application in India. As
we discussed earlier, patent applications can be provisional or complete, based on the specifications drafted.
The drafted provisional or complete specification is filed in Form-2 while Patent Application form is filed in
Form 1 as prescribed by the Indian Patent Act. If a provisional patent specification is filed, then within 12
months of its filing, a complete specification has to be filed with the inventor’s claims. There are 6 different
types of Patent Application forms which can be filed on the basis of their purpose. These are:
• Ordinary patent application: Used to file a patent application directly in India, seeking protection
only within the Indian territory.
• PCT National phase patent application: Used to enter the national phase of PCT or Patent
Cooperation Treaty in India, after which the applicant will be allowed to seek patent protection in
multiple countries.
• PCT International patent application: Used to file a single patent application for patent registration in
multiple countries which are members of the PCT, providing a centralized process for seeking patent
protection internationally.
• Convention patent application: Used to claim priority based on an earlier application filed in a
convention country, allowing applicants to secure the priority date for their invention.
• Divisional patent application: Used to divide an existing patent application into multiple separate
applications, typically when the existing application contains multiple inventions.
• Patent of addition application: Used to file an application for an improvement or modification of an
already existing invention for which a patent has already been granted.
Once the patent application process is complete, then after the expiry of 18 months from the date of patent
filing or date of priority whichever is earlier, the patent is published in an official journal and is open for
public viewing and inspection. This provides an opportunity to the general public to raise an objection to the
patent on valid grounds.
The patent application is examined only when a request for examination has been filed. The request for
examination has to be filed within 48 months of the patent filing date or date of the priority. The patent
examiner examines a patent application and issues an examination report. The examination report contains
a series of objections raised by an examiner. The response to an examination report has to be filed within 12
months of the issuance of the examination report. If needed, the examiner can call the applicant or his
agent for a show cause hearing to resolve the objections. That’s why this phase is also called patent
prosecution.
After all objections to the examination report have been replied to and the examiner is satisfied with the
reply of the applicant, the application is put in order for grant of Patent Registration. This marks the end of
the procedure for registration of Patent. On the other hand, if the examiner is not satisfied with the reply
and arguments of the applicant, then he/she can reject the patent application. In this case, the applicant will
again have to repeat the entire patent procedure in India again to get patent protection.
Copyrights registration:
The procedure for copyright registration in India is as follows123:
Application: An author or applicant can apply for registration of Copyright himself or via his authorized legal
representative.
Registration: The Registrar will then examine the application and, if satisfied, will issue a Certificate of
Registration.
Copyright filing in India is done through online application for copyright accompanied by four copies of the
work is to be made on Form IV (Including Statement of Particulars and Statement of Further Particulars)
along with the prescribed fee by visiting the website of the Copyright Office at www.copyright.gov.in, or as
an alternative, such application is to be sent by Speed Post/Registered Post to the Copyright Office in the
prescribed.
2. Administrator accounts
Ans: Intellectual Property Rights (IPR) in cyberspace refer to legal rights that are granted to individuals or entities over
their intellectual creations or inventions in the digital realm. These rights are designed to protect the interests of
creators and innovators, encouraging them to continue producing and sharing their work while providing a framework
for fair use and compensation. In the context of cyberspace, intellectual property can take various forms, and several
legal mechanisms protect these creations.
• Digital Millennium Copyright Act (DMCA): Addresses copyright issues related to digital content.
• Uniform Domain-Name Dispute-Resolution Policy (UDRP): Provides a mechanism to resolve domain name disputes.
• World Intellectual Property Organization (WIPO): Offers services for the registration and protection of intellectual
property rights globally.
4. Enforcement and Protection
• Cybersecurity Measures: Protecting intellectual property involves implementing robust cybersecurity measures to
prevent unauthorized access and theft.
• Legal Action: Pursuing legal action against infringers, which may involve filing lawsuits or using dispute resolution
mechanisms.
• Digital Watermarking and Encryption: Techniques to embed information into digital content for tracking and
protection.
5. Global Cooperation:
• International Treaties: Countries often cooperate through international treaties and agreements to harmonize
intellectual property protection.
• Cross-Border Enforcement: Addressing challenges related to cross-border enforcement of intellectual property
rights.
6. Balancing Access and Protection:
• Fair Use: Recognizing exceptions to copyright for purposes such as criticism, commentary, news reporting, teaching,
scholarship, and research.
• Open-Source Movements: Encouraging collaborative development and sharing of software code.
3.What is hacking?
Ans: Hacking is the process of gaining unauthorized access to a device, making changes to enable continued
access, and altering the configuration, operation, or service of the target equipment without the owners'
knowledge or consent.
Ans: Ransomware is a type of malicious software (malware) that threatens to publish or blocks access to
data or a computer system, usually by encrypting it, until the victim pays a ransom fee to the attacker.
Ans: Unified Payments Interface (UPI) is a system that powers multiple bank accounts into a single mobile
application (of any participating bank), merging several banking features, seamless fund routing & merchant
payments into one hood.
1. Instant Transfers
2. Convenience and Accessibility
3. Cost-Effective
4. Enhanced Security
5. Flexibility in Payments
6. Real-Time Monitoring
7. Integration of Multiple Bank Accounts
8. 24/7 Availability 9. Universal Platform
Ans: Cybersecurity refers to the practice of protecting systems, networks, and programs from digital attacks,
theft, damage, or unauthorized access. It encompasses a range of technologies, processes, and practices
designed to safeguard sensitive information and ensure the integrity, confidentiality, and availability of data.
8.What is patent?
Ans: A patent is a legal right granted by a government to an inventor or assignee for a limited period,
typically 20 years from the filing date, giving them exclusive rights to make, use, sell, and distribute an
invention. In exchange for this exclusivity, the inventor must publicly disclose the details of the invention,
allowing others to learn from it once the patent expires.