Back forward

Attention! Preview slides are for informational purposes only and may not represent the full extent of the presentation. If you are interested this work please download the full version.

Lesson type: combined.

Teaching method: explanatory and illustrative.

Goals and objectives of the lesson:

  • to help students get an idea about the types of software, ways to implement copyright on software products, about electronic signature;
  • education of information culture of students;
  • development of thinking, cognitive interests.

Students must:

know (understand): the concepts of "information ethics and law", "information security", about offenses in information sphere and measures to prevent them;

be able to: use information, taking into account the legal and ethical aspects of its dissemination.

Equipment: computer, multimedia projector.

During the classes

Before the lesson, students are surveyed about the software products installed on their home computer and about the rights granted to these programs. The results of the survey are reflected in the diagrams of the presentation.

Question Answer options Student choice
1 Have you ever installed any programs yourself? Yes
No
2 Where do you get new programs from? I buy in the store
Downloading from the Internet
I take from a friend
Bought a computer with installed programs
3 What is the name of the document granting the right to install and work with programs.
Don't know
4 If a licensed program installed on your computer has expired, what will you do? I will pay for the right to use the program
I will use the pirated version of this program
I will install a similar program, freely distributed
delete the program
5 Do you have GNU free software on your computer? Yes
No
6 Do you consider it possible to use programs without a license? Yes
No

I. Organizational moment. (1 minute.)

Greeting, checking those present. Explanation of the lesson.

II. Actualization. (8 min.)

(view presentation<Presentation1> "Legal and ethical aspects information activity)

The information culture of a modern person is determined not only by knowledge and skills in the field of ICT, but also strict observance of legal norms in this region.

The conducted research shows that in the field of legal regulation of the use of software products, 8th grade students are not competent:

  • the majority of students download programs from the Internet (63%) and install them themselves (76%).
  • only 29% of students know the name of the document allowing the use of a particular program;
  • 88% of students believe that it is possible to work with programs without licenses.
  • 47% of respondents do not know about free software, but would like to work with such programs (50%).

III. Theoretical part. (20 minutes.)

Protection of programs and databases. Already at an early stage of progress towards the information society, measures of legal regulation of newly emerging relations are needed. Legal regulation in the information sphere is a new and important task for the state. In the Russian Federation, there are a number of laws in this area.

Legal protection programs for computers and databases was first fully introduced in the Russian Federation by the Law of the Russian Federation "On the legal protection of programs for electronic computers and databases", which came into force in 1992. The legal protection provided by law extends to all types of computer programs (including Operating Systems and software complexes) that can be expressed in any language and in any form, including source code in a programming language and machine code.

To recognize and exercise copyright in computer programs, it is not required to register it with any organization. Copyright for computer programs arises automatically when they are created. To assert its rights, the developer of a program may, starting from the first release of the program, use a copyright sign consisting of three elements:

  • letters C in a circle or parentheses c;
  • the name of the copyright holder;
  • year of the program's first release.

A software license is a legal instrument that governs the use and distribution of copyrighted software. Typically, a software license permits the recipient to use one or more copies of the program, and without the license, such use would be considered legally an infringement of the publisher's copyright.

Software licenses are generally divided into two large groups: not free(proprietary; and semi-free) and free and open source licenses. Their differences greatly affect the rights of the end user regarding the use of the program.

Main characteristic proprietary licenses is that the publisher of the software in the license gives permission to its recipient to use one or more copies of the program, but at the same time remains the copyright holder of all these copies.

An organization or a user legally owning a copy of the program (purchasing a license to use it) has the right, without obtaining additional permission from the developer, to carry out any actions related to the operation of the program, including its recording and storage in computer memory.

Unlike proprietary, free and open licenses do not leave the rights to a particular copy of the program to its publisher, but transfer the most important of them to the end user, who becomes the owner.

An example of a free license is GNU General Public License(GPL), which gives the user the right to distribute the software under this license, participate in its reverse development, or modify it in other ways. However, the enumerated rights oblige the user of GPL-covered software to be subject to certain rules, for example, any changes to the program made by the user and distributed further must be accompanied by source code these changes.

The principle of "inheritance" of rights is called " copyleft".

Copyleft is the concept and practice of using copyright laws to secure impossibility restrict any person's right to use, modify and distribute both the original work and works derived from it.

In contrast to the traditional approach to copyright, which restricts the freedom to copy works, copyleft seeks to use copyright laws to expand the rights and freedoms of people.

From 01.01.2008 together with the law of the Russian Federation "On the legal protection of programs for electronic computers and databases", part 4 of the Civil Code of the Russian Federation (in accordance with the federal law of December 18, 2006 No. 231-FZ) section VII - "Rights to the results of intellectual activity and means individualization". In this section, intellectual property is defined as a list of results of intellectual activity and means of individualization that are granted legal protection.

Licensed, shareware and free programs. All programs according to their legal status can be divided into three large groups: licensed, shareware and freely distributed programs (freeware).

Licensed programs are distributed by developers on the basis of agreements with users on a paid basis. Quite often, developers provide significant discounts when purchasing licenses to use the program on a large number of computers or to use the program in educational institutions.

Some software companies offer users conditional free programs(trialware) for the purpose of their advertising and promotion to the market. The user is provided with a version of the program with a limited validity period (after the expiration of the specified period, the program stops working if payment has not been made for it) or a version of the program with limited functionality(in case of payment, the user is given a code that includes all functions), or the program is fully functional, but advertising banners constantly appear.

A significant share of the software market is occupied by open source programs (Open source). These are operating systems of the Linux family, FreeBSD and software for them. All of them are also freeware programs that can be distributed, installed and used on any computer at home, in offices, schools, universities, as well as commercial and government institutions without restrictions.

The place of free software in today's software market is very significant, and many commercial and government enterprises use free software directly or indirectly. Actually, indirectly, all Internet users use, for example, the free program Bind, which provides a DNS service. Many organizations, especially those providing services via the Internet, use the free Apache web server, on which their profit directly depends, not to mention the servers on the Linux platform. The benefits of using free software are obvious. You don't have to pay for it, and if you have to, it costs much less than patented counterparts.

Electronic signature. In 2002, the Law of the Russian Federation "On Electronic Digital Signature" was adopted, which became the legislative basis for electronic document management in Russia. According to this law, electronic digital signature in electronic document is recognized as legally equivalent to a signature in a paper document.

When registering a digital signature in specialized centers, the correspondent receives two keys: secret and public. The secret key is stored on a floppy disk or smart card and should be known only to the correspondent himself. public key should be available to all potential recipients of documents and is usually distributed by e-mail.

The process of electronic signing of a document consists in processing using secret key message text. Next, the encrypted message is sent by e-mail to the subscriber. The subscriber uses the public key to authenticate the message and the electronic signature.

IV. Consolidation of the studied material. (12 min.)

What are the differences between licensed, shareware, and freeware?

Why software piracy hurting society?

Name free software.

v. Homework. (2 minutes.)

Tutorial 2.8.1-2.8.2.

Using the capabilities of Scribus based on the materials in this lesson, develop a brochure or leaflet about the types of software licenses.<ПРИЛОЖЕНИЕ1>

VI. Summary of the lesson. (2 minutes.)

Summing up the lesson. Grading.

Literature.

  1. Law of the Russian Federation "On digital signature". [ Electronic resource] http://www.consultant.ru
  2. Law of the Russian Federation "On the legal protection of programs for electronic computers and databases". - [Electronic resource] http://www.consultant.ru
  3. Civil Code of the Russian Federation Part 4 Section VII "Rights to the results of intellectual activity and means of individualization". [Electronic resource] http://www.consultant.ru
  4. Kupriyanov A.I., Sakharov A.V., Shevtsov V.A. Fundamentals of information security - M .: Academy, 2006.
  5. Ugrinovich N.D. Informatics and ICT: a textbook for grade 8 - 2nd ed., Spanish. - M.: BINOM. Knowledge Lab, 2010.

Logical addition. Truth table.

Folders and files (file type, file name). File system. Basic file operations in the operating system

File. All programs and data are stored in the computer's non-volatile (external) memory as files. A file is a certain amount of information (program or data) that has a name and is stored in long-term (external) memory.

The file name consists of two parts separated by a dot: the actual file name and an extension that defines its type (program, data, etc.). The actual file name is given by the user, and the file type is usually set automatically by the program when it is created.

On various operating systems, there are various formats file names. In the MS-DOS operating system, the file name itself must contain no more than eight letters of the Latin alphabet and numbers, and the extension consists of three Latin letters, for example:

In the operating room Windows system the file name can have up to 255 characters, and the use of the Russian alphabet is allowed, for example:

Information units.doc

File system. On each storage medium (flexible, rigid or laser disc) can store a large number of files. The order in which files are stored on a disk is determined by the installed file system.

For disks with a small number of files (up to several dozen), it is convenient to use a single-level file system, when the directory (disc table of contents) is a linear sequence of file names.

If hundreds and thousands of files are stored on the disk, then for the convenience of searching, the files are organized into a multi-level hierarchical file system, which has a "tree" structure.

The initial, root, directory contains nested directories of the 1st level, in turn, each of them has nested directories of the 2nd level, etc. It should be noted that files can be stored in directories of all levels.

Operations on files. In the process of working on a computer, the following operations are most often performed on files: copying (a copy of the file is placed in another directory); moving (the file itself is moved to another directory); deletion (the record about the file is removed from the directory); renaming (changes the file name).

Graphical representation of the file system. The MS-DOS hierarchical file system, containing directories and files, is represented in the Windows operating system by GUI in the form of a hierarchical system of folders and documents. A folder in Windows is analogous to an MS-DOS directory.

However, the hierarchical structures of these systems are somewhat different. In a hierarchical file system MS-DOS, the top of the object hierarchy is the root directory of the disk, which can be compared to the trunk of a tree - branches (subdirectories) grow on it, and leaves (files) are located on the branches.

On Windows, at the top of the folder hierarchy is the Desktop folder (Figure 10). Next level

Represented by My Computer, Recycle Bin and network environment(if the computer is connected to a local network).



In the algebra of logic, the union of two (or more) statements using the union "or" is called the operation of logical addition or disjunction.

A compound statement formed as a result of logical addition (disjunction) is true when at least one of the simple statements included in it is true.

The operation of logical addition (disjunction) is usually denoted either by the sign "v" or the addition sign "+":

We have written the formula for the logical addition function, the arguments of which are the logical variables A and B, which take the values ​​true (1) and false (0).

The logical addition function F can also take only two values: true (1) and false (0). The value of a logical function can be determined using the truth table of this function, which shows what values ​​the logical function takes for all possible sets of its arguments (Table 3).

According to the truth table, it is easy to determine the truth of a compound statement formed using the logical addition operation. Consider, for example, the compound statement "2 x 2 = 4 Or 3 x 3 = 10". The first simple proposition is true-* before (A = 1), and the second proposition is false (B = 0); according to the table, we determine that the logical function takes the value true (F = 1), i.e., this compound statement is true.

Legal protection of programs and data. The legal protection of computer programs and databases was first fully introduced in the Russian Federation by the Law "On the legal protection of programs for electronic computers and databases", which entered into force on October 20, 1992.

The legal protection granted by this law extends to all types of computer programs (including operating systems and software packages) that can be expressed in any language and in any form.

To assert its rights, the developer of a program may, starting from the first release of the program, use a copyright sign consisting of three elements:

The letters C in circles or parentheses;

Name (name) of the right holder;

The year the program was first released.

Data protection.

Protection against illegal copying and use. Software protection to prevent copying distribution floppy disks may consist in applying non-standard formatting. In addition, an encoded software key may be placed on a floppy disk or CD-ROM, without which the program becomes unusable and which is lost during copying.

Hardware protection against illegal use can be implemented using a hardware key, which is usually attached to the computer's parallel port.

Computer access protection. Passwords are used to protect against unauthorized access to data stored on your computer. The computer allows access to its resources only to those users who are registered and have entered the correct password. Each user can only be allowed access to certain information resources. In this case, it is possible to register all attempts of unauthorized access.

Protection of disks, folders and files. Each disk, folder and file can be protected from unauthorized access: for example, set certain access rights (full or read only), and different for different users.

Information protection on the Internet. Servers on the Internet host various important information: Web sites, files, etc. If a computer is connected to the Internet, then in principle any user also connected to the Internet can access the information resources of this server. He is able to change or replace the Web page of the site, delete or, conversely, write a file, etc. To prevent this from happening, access to the information resources of the server (its administration) is performed using a password.

If the server has a connection to the Internet and simultaneously serves as a local network server (Intranet server), then unauthorized access from the Internet to local network. To avoid this, a software or hardware barrier is installed between the Internet and the Intranet using a firewall. The firewall monitors data transfer between networks and prevents unauthorized access.

Legal protection of programs and data. Data protection

Legal protection of information

Legal protection of programs and databases. The protection of intellectual property rights, as well as property rights, extends to all types of computer programs that can be expressed in any language and in any form, including source code in a programming language and machine code. However, legal protection does not extend to the ideas and principles underlying the program, including the ideas and principles of organizing the interface and algorithm.

The legal protection of computer programs and databases was first fully introduced in the Russian Federation by the Law "On the legal protection of programs for electronic computers and databases", which entered into force in 1992.

To recognize copyright in a computer program, it is not required to register it with any organization. Copyright for a program arises automatically when it is created. To assert its rights, the developer of a program may, starting from the first release of the program, use a copyright sign consisting of three elements:
- the letters "C" in a circle © or parentheses (c);
- title (name) of the right holder;
- the year the program was first published.

The author of the program has the exclusive right to reproduce and distribute the program by any means, as well as to modify the program. An organization or a user that legally owns a copy of the program (having bought a license to use it) can perform any actions related to the operation of the program, including its recording and storage in computer memory.

You must know and comply with existing laws that prohibit illegal copying and use of licensed software. With respect to organizations or users that infringe copyright, the developer may seek damages through the courts and compensation from the infringer.

Electronic signature. An electronic digital signature in an electronic document is recognized as legally equivalent to a signature in a paper document.

In 2002, the Law "On Electronic Digital Signature" was adopted, which became the legislative basis for electronic document management in Russia.

When registering an electronic digital signature in specialized centers, the correspondent receives two keys: secret and open. The secret key is stored on a floppy disk or smart card and should be known only to the correspondent himself. The public key must be available to all potential recipients of documents and is usually distributed via email.

The process of electronic signing of a document consists in processing the text of the message using a secret key. Next, the encrypted message is sent by e-mail to the subscriber. The subscriber uses the public key to authenticate the message and the electronic signature.

test questions

Licensed, Shareware, and Freeware

Programs according to their legal status can be divided into three large groups: licensed, shareware and freely distributed.

Licensed programs. In accordance with license agreement program developers guarantee it normal functioning in a particular operating system and are responsible for it.

Developers usually sell licensed programs to users in the form of boxed distributions.

The box contains CDs from which the program is installed on users' computers, and a user manual for working with the program (Fig. 7.3).


Rice. 7.3. Boxed distributions of operating systems Windows, Linux and Mac OS

Quite often, developers provide significant discounts when purchasing licenses to use the program on a large number of computers or to use the program in educational institutions.

Shareware programs. Some software companies offer shareware programs to users for advertising and marketing purposes. The user is provided with a version of the program with a limited validity period (after the expiration of the specified period, the program stops working if payment has not been made for it) or a version of the program with limited functionality (in case of payment, the user is provided with a code that includes all functions).

Freeware programs. Many software and computer hardware manufacturers are interested in the wide distribution of software free of charge. To such software tools can be attributed:
- new unfinished (beta) versions of software products (this allows them to be widely tested);
- software products that are part of fundamentally new technologies (this allows you to conquer the market);
- additions to previously released programs that correct found errors or expand capabilities;
- drivers for new or improved drivers for existing devices.

test questions

1. What is the difference between licensed, shareware and freeware?

2. What types of programs are usually distributed free of charge?

Data protection

Protection against unauthorized access to information. Passwords are used to protect against unauthorized access to data stored on your computer. The computer allows access to its resources only to those users who are registered and have entered the correct password. Each specific user may be allowed access only to certain information resources. In this case, all unauthorized access attempts can be logged.

Password protection is used when the operating system boots (when the system boots, the user must enter his password). However, such protection is easily overcome, since the user can refuse to enter a password. Password login can be set in the program BIOS Setup, the computer will not start loading the operating system unless the correct password has been entered. It is not easy to overcome such protection, moreover, there will be serious data access problems if the user forgets this password.

Every disk, folder and file can be protected from unauthorized access local computer. Certain access rights can be set for them (full, read only, by password), and the rights can be different for different users.

Currently, to protect against unauthorized access to information are increasingly used biometric identification systems. The characteristics used in these systems are inalienable qualities of a person's personality and therefore cannot be lost and forged. Biometric information security systems include identification systems by fingerprint, systems speech recognition, as well as identification systems on the iris of the eye.

Protection of programs from illegal copying and use. Computer pirates, illegally replicating software, devalue the work of programmers, make software development an economically unprofitable business. In addition, software pirates often offer unfinished programs, programs with bugs, or demo versions of programs to users.

For computer software to function, it must be installed (installed). Software distributed by manufacturers in the form of distribution kits on CD-ROM. Each distribution has its own serial number, which prevents illegal copying and installation of programs.

Special protections can be used to prevent illegal copying of programs and data stored on the CD-ROM. The CD-ROM may contain an encrypted software key, which is lost during copying and without which the program cannot be installed.

Protection against illegal use of programs can be implemented using a hardware key, which is usually attached to the computer's parallel port. The protected application accesses the parallel port and requests secret code. If a hardware key is not connected to the computer, then the protected application determines the situation of protection violation and stops its execution.

Physical protection of data on disks. To ensure greater reliability of data storage on hard drives, RAID arrays (Reduntant Arrays of Independent Disks - a redundant array of independent disks) are used. Several hard drives are connected to the RAID controller, which treats them as a single logical storage medium. When information is written, it is duplicated and stored on several disks at the same time, so if one of the disks fails, data is not lost.

Information protection on the Internet. If a computer is connected to the Internet, then, in principle, any intruder who is also connected to the Internet can gain access to the information resources of this computer. If a server connected to the Internet is also a local network server, then unauthorized access from the Internet to the local network is possible.

A particularly dangerous variant is often used to access data on a computer connected to the Internet. computer viruses - Trojans. Trojans spread across computer networks and integrated into the operating system of the computer. For a long time, they can send important data (passwords for accessing the Internet, numbers bank cards etc.) to the attacker.

Such computer viruses have been called Trojans by analogy with a Trojan horse. The poem of Homer describes the siege of the city of Troy by the ancient Greeks (about 1250 BC). The Greeks built a huge horse, placed warriors in it and left it at the gates of the city. The unsuspecting Trojans dragged the horse into the city, and at night the Greeks got out of the horse and captured the city.

Antivirus programs are used to protect against Trojans and other computer viruses.

The greatest threat to Internet servers is hacker attacks. During such attacks, numerous requests are sent to a specific Internet server from many Internet addresses, which can lead to a "freeze" of the server.

To protect a computer connected to the Internet from network viruses and hacker attacks hardware or software is installed between the Internet and a computer firewall . The firewall monitors data transfer between the Internet and the local computer, detects suspicious activity and prevents unauthorized access to the data.

test questions

1. What methods of personal identification are used when providing access to information?

2. Why does software piracy harm society?

3. What is the difference between copying files and installing programs? Why does each distribution have a serial number?

4. What are the software and hardware ways to protect information?

» [Computer Science Exam] [Ticket #25]

Ethical and legal aspects of information activity. Legal protection of programs and data. Data protection.

Data protection. Licensed, shareware and free programs.

Programs according to their legal status can be divided into three large groups: licensed, shareware and freely distributed programs (freeware).

Distributions of licensed programs (floppy disks or CD-ROMs from which programs are installed on users' computers) are distributed by developers on the basis of contracts with users on a paid basis, in other words, licensed programs are sold. Quite often, developers provide significant discounts when purchasing licenses to use the program on a large number of computers or to use the program in educational institutions. In accordance with the license agreement, the developers of the program guarantee its normal functioning in a certain operating system and bear responsibility for this.

Some software companies offer shareware programs to users to advertise and market them. The user is provided with a version of the program with a limited validity period (after the expiration of the specified period, the program stops working if payment is not made for it) or a version of the program with limited functionality (in case of payment, the user is provided with a code that includes all functions).

Many software and computer hardware manufacturers are interested in the wide distribution of software free of charge. Such software includes the following:

  • new unfinished (beta) versions of software products (this allows them to be widely tested);
  • software products that are part of fundamentally new technologies (this allows you to conquer the market);
  • additions to previously released programs that fix found errors or expand capabilities;
  • outdated versions of programs;
  • drivers for new devices or improved drivers for existing ones.

Legal protection of information

Legal protection of programs and databases. The legal protection of computer programs and databases was first fully introduced in the Russian Federation by the Law of the Russian Federation "On the legal protection of programs for electronic computers and databases", which entered into force in 1992.

The legal protection granted by this law extends to all types of computer programs (including operating systems and software packages) that can be expressed in any language and in any form, including source text in a programming language and machine code. However, legal protection does not extend to the ideas and principles underlying the computer program, including the ideas and principles of interface and algorithm organization.

To assert its rights, the developer of a program may, starting from the first release of the program, use a copyright sign consisting of three elements:

  • letters C in a circle or parentheses ©;
  • title (name) of the right holder;
  • year of the program's first release.

An organization or a user who legally owns a copy of the program (who has bought a license to use it) has the right, without obtaining additional permission from the developer, to carry out any actions related to the operation of the program, including its recording and storage in the computer memory. Recording and storage in the computer memory is allowed in relation to one computer or one user in the network, unless otherwise provided by the contract with the developer.

You must know and comply with existing laws that prohibit illegal copying and use of licensed software. In relation to organizations or users that infringe copyright, the developer may seek damages and compensation from the infringer in an amount determined at the discretion of the court from 5,000 times to 50,000 times the minimum monthly wage.

Electronic signature.

In 2002, the Law of the Russian Federation "On Electronic Digital Signature" was adopted, which became the legislative basis for electronic document management in Russia. Under this law, an electronic digital signature in an electronic document is recognized as legally equivalent to a signature in a paper document.

When registering a digital signature in specialized centers, the correspondent receives two keys: secret and public. The secret key is stored on a floppy disk or smart card and should be known only to the correspondent himself. The public key must be available to all potential recipients of documents and is usually distributed via email.

The process of electronic signing of a document consists in processing the text of the message using a secret key. Next, the encrypted message is sent by e-mail to the subscriber. The subscriber uses the public key to authenticate the message and the electronic signature.

Data protection.

Computer access protection.

Passwords are used to prevent unauthorized access to data stored on the computer. The computer allows access to its resources only to those users who are registered and have entered the correct password. Each specific user may be allowed access only to certain information resources. In this case, all unauthorized access attempts can be logged.

The protection of user settings is available in the Windows operating system (when the system boots, the user must enter his password), but such protection is easily overcome, since the user can refuse to enter a password. Password login can be set in the BIOS Setup program, the computer will not boot into the operating system unless the correct password is entered. It is not easy to overcome such protection, moreover, there will be serious data access problems if the user forgets this password.

Currently, to protect against unauthorized access to information, biometric authorization and user identification systems are increasingly used. The characteristics used in these systems are inalienable qualities of a person's personality and therefore cannot be lost and forged. Biometric information security systems include speech recognition systems, fingerprint identification systems, and iris identification systems.

Protection of programs from illegal copying and use.

Computer pirates, illegally replicating software, devalue the work of programmers, make software development an economically unprofitable business. In addition, software pirates often offer users unfinished programs, programs with errors, or their demo versions.

In order for the computer software to function, it must be installed (installed). The software is distributed by manufacturers in the form of distribution kits on CD-ROM. Each distribution kit has its own serial number, which prevents illegal copying and installation of programs.

Special protections can be used to prevent illegal copying of programs and data stored on the CD-ROM. The CD-ROM may contain an encrypted software key, which is lost during copying and without which the program cannot be installed.

Protection against illegal use of programs can be implemented using a hardware key, which is usually attached to the computer's parallel port. The protected application accesses the parallel port and requests a secret code; if the hardware key is not connected to the computer, the protected application determines the situation of protection violation and stops its execution.

Disk data protection.

Each disk, folder and file of the local computer, as well as a computer connected to the local network, can be protected from unauthorized access. Certain access rights can be set for them (full, read only, by password), and the rights can be different for different users.

To ensure greater reliability of data storage on hard drives, RAID arrays (Redantant Arrays of Independent Disks - a redundant array of independent disks) are used. Several hard drives are connected to a special RAID controller, which treats them as a single logical storage medium. When information is written, it is duplicated and stored on several disks at the same time, so if one of the disks fails, data is not lost.

Information protection on the Internet. If a computer is connected to the Internet, then in principle any user also connected to the Internet can access the information resources of this computer. If the server has an Internet connection and simultaneously serves as a local network server (Intranet server), then unauthorized access from the Internet to the local network is possible.

The mechanisms for penetration from the Internet to a local computer and to a local network can be different:

  • Web pages loaded into the browser may contain active ActiveX controls or Java applets that can
    perform destructive actions on the local computer;
  • some Web servers host text messages on the local computer. cookies, using which you can
    get confidential information about the user of the local computer;
  • by using special utilities you can access disks and files on the local computer, etc.

To prevent this from happening, a software or hardware barrier is installed between the Internet and the Intranet using a firewall (firewall - firewall). The firewall monitors the transfer of data between networks, monitors current connections, detects suspicious activity and thereby prevents unauthorized access from the Internet to the local network.

Computer programs and databases are referred by the Law of the Russian Federation to the legal protection of programs for electronic computers and databases "to objects of copyright. Computer programs are granted legal protection as works of literature, and databases - as collections. Copyright extends to any programs for Computers and databases, both published and not published, presented in an objective form, regardless of their material carrier, purpose and dignity.

Copyright extends to computer programs and databases that are the result of the creative activity of the author. The creative nature of the author's activity is assumed until proven otherwise. Legal protection extends to all types of computer programs (including operating systems and software packages) that can be expressed in any language and in any form, including source text and object code.

Legal protection extends to databases, which are the result of creative work in the selection and organization of data. Databases are protected whether the data on which they are based or which they contain is subject to copyright. Legal protection does not extend to the ideas and principles underlying the computer program or database or any of their elements, including the ideas and principles of interface and algorithm organization, as well as programming languages.

Copyright for computer programs and databases is not associated with the ownership of their material carrier. Any transfer of rights to the material Media does not entail the transfer of any rights to computer programs and databases.

Copyright in a computer program or database arises by virtue of their creation. For the recognition and exercise of copyright in a computer program or database, data is not required to deposit registration or other formalities. The copyright holder may, starting from the first release of a computer program or database, use a copyright protection sign consisting of three elements to inform about his rights.

  • * letters C in a circle or in parentheses;
  • * title (name) of the copyright holder;
  • * the year of the first release of the computer program or database.

Copyright is valid from the moment a computer program or database is created, throughout the life of the author and 50 years after his death. The expiration date of copyright for a computer program and a database created in co-authorship is calculated from the time of the death of the last author who outlived other co-authors. Copyright in a computer program or database published anonymously or under a pseudonym is valid from the moment of their publication for 50 years.

The personal rights of the author to the computer program or database are protected indefinitely. Copyright to a computer program or database first released to the public on the territory of the Russian Federation or not released to the public, nor located on its territory in any objective form, shall be valid on the territory of the Russian Federation. It is recognized for the author, his heirs or other legal successors of the author, regardless of citizenship. Copyright is also recognized for citizens of the Russian Federation whose computer program or database has been published or is in any objective form on the territory of a foreign state, or for their successors. For other persons, copyright in a computer program or database, first released to the public or located in any objective form on the territory of a foreign state, is recognized in accordance with international treaties of the Russian Federation.

The author of a computer program or database is a natural person, as a result of whose creative activity they were created. If a computer program or database is created by the joint creative activity of two or more individuals, then regardless of whether the computer program or database consists of parts, each of which has an independent value, or is indivisible, each of these persons is recognized as the author of such a computer program or database. If parts of a computer program or database are of independent importance, each of the authors has the right of authorship to the part created by him. The author of a computer program or database, regardless of his property rights, owns the following personal rights: the right of authorship - i.e. the right to be considered the author of a computer program or database; the right to a name - i.e. the right to determine the form of indicating the author's name in a computer program or database: under his own name, under a conditional name (pseudonym) or anonymously; the right to inviolability (integrity) - i.e. the right to protection of both the computer program itself or the database, as well as their names, from any kind of distortion or other encroachment that could damage the honor and dignity of the author.

Property rights to a computer program or database may be transferred in whole or in part to other natural or legal entities but by agreement. The contract is concluded in writing and must establish the following essential conditions: the scope and methods of using the computer program or database, the payment procedure and the amount of remuneration, the term of the contract.

Property rights to a computer program or database are inherited in accordance with the procedure established by law. The property rights to a computer program or database created in the course of performance of official duties or on the instructions of the employer belong to the employer, unless otherwise provided in the contract between him and the author. The procedure for payment and the amount of remuneration are established by an agreement between the author and the employer. The right holder of all property rights to a computer program or database, directly or through his representative, during the term of copyright may, at his request, register a computer program or database by filing an application with Russian agency for the legal protection of computer programs, databases and topologies of integrated circuits (hereinafter referred to as the Agency).

An agreement on the full assignment of all property rights to a registered computer program or database is subject to registration with the Agency. The use of a computer program or database by third parties (users) is carried out on the basis of an agreement with the copyright holder, with the exception of resale.

Resale or transfer in any other way of ownership or other property rights to a copy of a computer program or database after the first sale or other transfer of ownership of this copy is allowed without the consent of the copyright holder and without paying him additional remuneration. When selling and providing mass users with access to computer programs and databases, it is allowed to apply a special procedure for concluding contracts, for example, by setting out standard terms of the contract on transferred copies of computer programs and databases. A person who lawfully owns a copy of a computer program or database is entitled, without obtaining additional permission from the copyright holder, to carry out any actions related to the operation of the computer program or database in accordance with its purpose, including recording and storing in computer memory, as well as correcting obvious mistakes. Recording and storage in the computer memory is allowed in relation to one computer or one user in the network, unless otherwise provided by an agreement with the right holder.

A person lawfully possessing a copy of a computer program or database has the right, without the consent of the right holder and without paying him additional remuneration: to adapt the computer program or database; make or commission the making of a copy of a computer program or database, provided that this copy is intended only for archival purposes and, if necessary, to replace a legally acquired copy.

At the same time, a copy of the computer program or database cannot be used for other purposes and must be destroyed if the further use of this computer program or database ceases to be lawful.

A person lawfully in possession of a copy of a computer program has the right, without the consent of the right holder and without paying additional remuneration, to decompile or commission the decompilation of a computer program in order to study the coding and structure of this program under the following conditions: information necessary for the interaction of a program independently developed by this person for A computer with other programs is not available from other sources; the information obtained as a result of this decompilation can only be used to organize the interaction of a computer program independently developed by this person with other programs, and not to compile new program for a computer that is essentially similar in appearance to a decompiled computer program or for performing any other act that violates copyright; decompilation is carried out with respect to only those parts of the computer program that are necessary for organizing such interaction.

Copies of a computer program or database are recognized as counterfeit, the production or use of which entails a violation of copyright.

Copies of a computer program or database imported into Russian Federation from the state in which this computer program or database has never been protected or has ceased to be protected by law.

The author of a computer program or database and other copyright holders have the right to demand: recognition of his rights; restoration of the situation that existed before the violation of the right, and termination of actions that violate the right or create a threat of its violation; compensation for damages, the amount of which includes the amount of income illegally received by the violator; payment by the violator of compensation in the amount determined at the discretion of the court, arbitration or arbitral tribunal from 5,000 times to 50,000 times the minimum wage established by law in cases of violation for the purpose of making profit instead of compensating for losses; in addition to compensation for damages or payment of compensation, at the discretion of the court or arbitration court, a fine in the amount of 10% of the amount awarded by the court or arbitration court in favor of the plaintiff may be collected to the income of the republican budget of the Russian Federation; adoption of other measures provided for by legislative acts related to the protection of their rights.

For the protection of their rights, right holders can apply to a court, arbitration or arbitration court. The release under one's own name of someone else's computer program or database, or the illegal reproduction or distribution of such works, entails criminal liability in accordance with the law.

With regard to databases, the Law of the Russian Federation "On the legal protection of programs for electronic computers and databases" provides protection only in terms of the selection and arrangement of material included in the database.

In general, the database as an object of information legal relations should be protected by two institutions of law - intellectual property and real property. (6. p. 148-152)