Cybercrime examples related issues examples patents if

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: client appears to use some distinctive techniques If within its IT infrastructure, such as novel processes of encrypting data or unique methods of thwarting denial of service attacks, the auditor should investigate whether such processes are already patented by other entities. If so, the auditor should ensure that the client has legally procured the right to use such patents. that If the IT auditor learns that the client owns one or more patents pertaining to the IT If infrastructure, such as those mentioned above, the IT auditor should investigate whether and how the company continually scans the environment to ensure that other persons or entities are not infringing on the client’s patent(s). If the company has no policies or activities aimed at protecting its patent(s) in this regard, the IT auditor could add value to the engagement by suggesting several scanning methods. the If the IT auditor discovers that the client has developed unique and novel components of If the digital IT infrastructure that give competitive advantage to the company, such as those mentioned above, the IT auditor could suggest that the client consider the possibility of applying for patents, if it has not already done so. If successful, the client will be able to legally protect its intellectual property rights. Cybercrime Examples & Related Issues Examples Trademarks If the IT auditor observes that the client appears to use the trademarks of other If entities in its digital communications, the auditor should ensure that client is not illegally using such trademarks. For example, if the company were to attach the Nike ‘Swoosh’ logo (which represents the wing of the Greek Goddess Nike) on its digital communications, they might be in violation of Nike’s trademark rights. trademark If the client places its own unique logo on its digital communications, the IT If auditor should investigate whether and how the company continually scans the environment to ensure that other persons or entities are not using the company logo. If the company has no policies or activities aimed at protecting its logo, the IT auditor...
View Full Document

Ask a homework question - tutors are online