Архитектура Аудит Военная наука Иностранные языки Медицина Металлургия Метрология
Образование Политология Производство Психология Стандартизация Технологии


Word formation. Complete this table by filling in the correct forms.



Verb Noun
authorize  
protect  
  application
  advisor
  distribution
secure  
sign  
warn  
disclose  
  identity
  assistance
serve  
infringe  
  misrepresentation
  prosecution

 

Match the columns.

a.

1. legal 2. illegal 3. computer 4. unauthorized 5. virus 6. identity 7. personal 8. fake 9. money 10. criminal a. laundering b. access c. advisor d. information e. prosecution f. spreading g. activities h. theft i. sites j. security

 

b.

1. to commit 2. to disclose 3. to draft 4. to distribute 5. to infringe 6. to affect a. crimes b. business c. information d. legislation e. regulations  

 

Fill in the gaps with prepositions if necessary.

1) An unauthorized access _____ a computer is known as hacking.

2) The law deals _____ the disclosure of personal information.

3) If you do not have adequate security systems, your business is _____ risk.

4) Cybercrimes may affect _____your business.

5) He was charged _____ ID theft.

6) Elderly people are often taken _____ by fraudsters.

7) Never give _____ personal information to anyone on-line.

8) He sent the e-mail _____ reply to my request.

9) The businessman was tricked ____ illegal activities by his partner.

10) Please, provide me ______ information about that project.

11) Our company entered _____ a contract yesterady.

Read the text and decide whether the statements are true (T) or false (F).

1) New Internet technologies have led to innovative illegal activities.

2) Hacking includes both the breach of computer security and unauthorized access to a computer.

3) The process of stealing personal information and obtaining financial benefit thereby is known as money laundering.

4) When users are moved to fake web sites, it is called fishing.

5) When fraudsters use phishing or pharming, they are subject to administrative proceeding.

6) Data Protection legislation regulates the way employers collect, store and distribute personal information of their employees.

7) The management of a company must have the agreement of the Board of Directors to make personal staff information available.

SPEAKING

Answer the questions:

1) Have you ever been a victim of identity theft?

2) Give examples of real cybercrimes you know (have read about or learnt through mass media or Internet).

3) Give advice to your mates how to protect yourself against identity theft/cybercrimes.

 

 

ADDITIONAL READING

IDENTITY THEFTS

Changing addresses

According to experts, members of the public are placing themselves at considerable risk from identity theft, and are being told that they must be more vigilant about discarding personal records.

With enough biographical information, a criminal can take over another person’s identity to commit a wide range of crimes; for example, a false applications for loans, fraudulent withdrawls from bank accounts or obtaining other goods which criminals might otherwise be denied. If the criminal has the bill for the falsely obtained credit card sent to an address other than the victim’s, the victim may not become aware of what is happening until the criminal has already inflicted substantial damage on the victim’s assets, credit and reputation. The same is true of bank statements showing unauthorized withdrawls.

If you think you may become the victim of identity theft, you should place a fraud alert on your credit report as soon as possible. You should then review your credit reports carefully. Look for enquiries from companies you haven’t contacted, accounts you did not open and debts on your accounts that you cannot explain.

Once you have placed a fraud alert on your credit report, potential creditors must use what the law refers to as ‘reasonable polices and procedures’ to verify your identity before issuing credit in your name.

Phishing

Phishing involves people being fooled by fake e-mails, claiming to be from a bank, into giving out bank or credit card details to online fraudsters. The term is also used to describe the practice of creating look-alike websites, often of banks and other financial institutions, and duping people into visiting them and giving out their personal information.

While banks generally repay money lost to victims of such crimes, they may refuse to compensate the same person more than once if the customer’s negligence was a contributory factor. So, could banks themselves do more to protect their customers? Banks often claim they would never send requests for confidentaial information by e-mail. However, according to the recent research, some banks do just that. This sends out a mixed message, confusing vulnerable customers who cannot tell which e-mails are genuine and which are not.

Bin-raidning

A shocking new survey has revealed the potential extent of bin raiding by British fraudsters. The report shows how easy it is for ID thieves to obtain personal information from household rubbish. An examination of the content of 400 domestic bins found that:

· 72% of bins contained the full name and the full address of at least one members of a household;

· two in five contained a whole credit- or debit- card number that could be linked to an individual;

· one of five bins contained a bank-account number and sort code that could be related to an individual’s name and address.

In the US, the practice has been recognized as a real risk to consumers and businesses for many years; 9.9 million Americans have been the victims of identity theft, as an avarage cost per person of $ 5, 000.

 

Do the task.

Match the types of identity thefts with their definitions.

1. bin raiding

2. skimming

3. phishing

4. changing addresses

5. stealing

6. pretexting

 

a. stealing credit/debit card numbers by using a special storage device when processing cards (often in order to make illegal copies);

b. fraudulently gaining access to personal information from financiaal institutions, telephone companies and other sources;

c. taking wallets, mail and other items containing personal information without permission

d. pretending to be a financial institution or company and sending spam or pop messages to get people reveal personal information;

e. sending someone’s billing statements to another location by completeing a change of address form;

f. looking through rubbish for bills and other papers containing detailed information.

 

UNIT 7

INTELLECTUAL PROPERTY LAW

ACTIVE VOCAVULARY

own creativity and innovation –владеть творческим потенциалом и инновационными разработками legal rights – законные права intangible products of the intellect – нематериальный продукт разума grant exclusive rights – предоставить исключительные права intangible assets – нематериальные активы copyright– авторское право industrial property – промышленная собственность original creations – исходные создания software – программное обеспечение typography of published editions – печатное оформление текстов copyright holder – владелец авторского права prohibit unauthorized use – запретить несанкционированный доступ infringing on the rights – нарушение прав invention - изобретение for a statutory period of years – на установленный законом срок novel – ранее не существовавший trade mark – торговый знак indicate the identity of a business – указать на конкретную компанию overall presentations – общий вид applicable legislation – соответствующе законодательство distinctive – отличительный от других   an identifier of the origin of the goods – идентифицирующий знак происхождения изделия thereby –в силу этого avoid confusion/deception – избежать путаницы/обмана deception has been deemed – считается, что обман cybersquatting – покупка и регистрация доменного имени, могущего служить торговой маркой, с целью последующей его перепродажи service mark – знак обслуживания industrial designs – промышленный дизайн product appearance – внешний вид объекта governed by the statutes – регулируется законом registered owner – владелец регистрации remedies for infringement – средства правовой защиты в случае нарушения result in enforcement actions – привести к принудительным действиям brought against the infringing party – применяемые в отношении нарушившей стороны damages – компенсация ущерба injunction– судебный запрет account of profits – требование отчетности о полученной прибыли extent and nature of the infringement – масштаб и суть нарушения

 

 

Intellectual property, often known as IP, is a fast-moving and sometimes complex area of law. It covers a wide range of diverse issues and allows people to own their creativity and innovation in the same way they can own physical property. The term ‘intellectual property’ refers to the group of legal rights (not to the intellectual product itself) connected with the intangible products of the intellect. In other words, under intellectual property law owners are granted certain exclusive rights to a variety of intangible assets. Like other forms of property, intellectual property can be bought and sold.

IP typically includes two branches, namely copyright and industrial property. The latter includes such major areas as: patent law, trademarks and industrial designs.

Copyrights applies to original creations in the literary, dramatic, musical and artistic fields, sound recordings and broadcasts, including software and multimedia, cable programs, as well as the typography of published editions. Copyright holders possess economic rights associated with their works, including the essential right to prohibit unauthorized use of the works. The most common requirements for copyright protection are that the work must be in material form (i.e. not just an idea) and it must be original in the sense that the work 'originates' from the relevant author. Copyright only provides a partial monopoly in a work, as various rules provide exceptions by which a work may be copied without infringing on the rights of the author.

Patent is a monopoly right in an invention. Patents grant an inventor the right to exclude others from producing or using inventor’s discovery for a statutory period of years, e.g. 20 years in the UK. Most patent legislation requires that a patentable invention: 1) is novel; 2) involves an inventive step; 3) is useful or capable of industrial application; and 4) is an invention. Many things are excluded from patentable subject matter due to unsuitability, public policy and morality.

Registered trade marks are similar to patents in that they provide the holder with an exclusive right to use a 'distinctive' mark in relation to a product or a service. Trade marks are generally names, logos or drawings used to indicate the identity of a business. Trade mark status may also be granted to distinctive and unique packing, color combination, building design, and overall presentations. A common aspect of applicable legislation is that the mark must be distinctive. In other words, it must be capable of functioning as an identifier of the origin of the goods and thereby avoid confusion, deception or mistake. Deception has been deemed to include, for example, the use by another of a domain name that is substantially similar to the trade mark, so-called cybersquatting.

Service marks also receive legal protection but are meant to distinguish services rather than products.

Industrial designs protect elements of product appearance (that is, shape or pattern, not function) resulting from the features of the lines, colors, shape, texture of the product itself or its ornamentation.

Each of the areas is governed by the statutes that set out conditions for creation, the process of registration, rights of the registered owner, remedies for infringement and rights of public to use the property.

Infringement of intellectual property rights may result in enforcement actions being brought against the infringing party. As part of these actions, remedies might include damages, injunctions and account of profits, depending on the right infringed and the extent and nature of the infringement.

 

LANGUAGE FOCUS

1. Give Russian equivalents for the following English words and phrases:

to prohibit unauthorized use to infringe on the rights to avoid confusion/deception legal rights intangible assets copyright industrial property copyright holders statutory period of years trade mark the origin of the goods cybersquatting service mark remedies for infringement enforcement actions infringing party damages injunction account of profits overall presentations

 


Поделиться:



Популярное:

Последнее изменение этой страницы: 2017-03-08; Просмотров: 1466; Нарушение авторского права страницы


lektsia.com 2007 - 2024 год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! (0.03 с.)
Главная | Случайная страница | Обратная связь