This preview shows page 1. Sign up to view the full content.
Unformatted text preview: client appears to use some distinctive techniques
within its IT infrastructure, such as novel processes of encrypting data or unique
methods of thwarting denial of service attacks, the auditor should investigate whether
such processes are already patented by other entities. If so, the auditor should ensure
that the client has legally procured the right to use such patents.
that If the IT auditor learns that the client owns one or more patents pertaining to the IT
infrastructure, such as those mentioned above, the IT auditor should investigate whether
and how the company continually scans the environment to ensure that other persons or
entities are not infringing on the client’s patent(s). If the company has no policies or
activities aimed at protecting its patent(s) in this regard, the IT auditor could add value to
the engagement by suggesting several scanning methods.
the If the IT auditor discovers that the client has developed unique and novel components of
the digital IT infrastructure that give competitive advantage to the company, such as
those mentioned above, the IT auditor could suggest that the client consider the
possibility of applying for patents, if it has not already done so. If successful, the client
will be able to legally protect its intellectual property rights. Cybercrime Examples & Related Issues
Trademarks If the IT auditor observes that the client appears to use the trademarks of other
entities in its digital communications, the auditor should ensure that client is not
illegally using such trademarks. For example, if the company were to attach
the Nike ‘Swoosh’ logo (which represents the wing of the Greek Goddess
Nike) on its digital communications, they might be in violation of Nike’s
trademark If the client places its own unique logo on its digital communications, the IT
auditor should investigate whether and how the company continually scans the
environment to ensure that other persons or entities are not using the company
logo. If the company has no policies or activities aimed at protecting its logo,
the IT auditor...
View Full Document
- Spring '13