[go: up one dir, main page]

0% found this document useful (0 votes)
30 views13 pages

Ethics Unit-Iii

Download as doc, pdf, or txt
Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1/ 13

EXCEL ENGINEERING COLLEGE

(Autonomous)
Department of Aeronautical Engineering
VI Semester
20AE603 Professional ethics in engineering
Regulations 2020
Question Bank
UNIT –III (ENGINEER’S RESPONSIBILITY FOR SAFETY)
PART- A
Q.No Questions Marks CO BL
Define Risk?
A risk is the potential that something unwanted and harmful may
1 2 CO3 U
occur.
Risk = Probability X Consequences.
What happens to the products that are not safe?
Products that are not safe incur secondary costs to the manufacturer
2 beyond the primary costs that must also be taken into account costs 2 CO3 U
associated with warranty expenses, loss of customer will and even
loss of customers and so.
Give the criteria which helps to ensure a safety design?
The minimum requirement is that a design must comply with the
applicable laws.
An acceptable design must meet the standard of “accepted
engineering practice.”
3 2 CO3 R
Alternative designs that are potentially safer must be explored.
Engineer must attempt to foresee potential misuses of the product
by the consumer and must design to avoid these problems.
Once the product is designed, both the prototypes and finished
devices must be rigorously tested.
What are the factors for safety and risk?
Voluntary and Involuntary risk
Short-term and Long-term risk
Expected probability
4 2 CO3 U
Reversible effects
Threshold levels to risk
Delayed or Immediate risk etc

What are the drawbacks in the definition of Lawrence?


Underestimation of risks
5 2 CO3 R
Overestimation of risks
No estimation of risks
What is the knowledge required to assess the risk?
Data in design.
Uncertainties in design.
6 2 CO3 U
Testing for safety.
Analytical testing.
Risk-benefit analysis.
7 What is the knowledge required to assess the risk? 2 CO3 R
Data in design.
Uncertainties in design.
Testing for safety.
Analytical testing.
Risk-benefit analysis.
What are the analytical methods?
Scenario analysis
8 2 CO3 R
Failure modes & effect
Event tree analysis etc.
What are the analytical methods?
Scenario analysis
9 2 CO3 R
Failure modes & effect
Event tree analysis etc.
How will an engineer assess the safety?
The project or product must be tested and then either carried out or
manufactured
The risks connected to a project or product must be identified.
10 2 CO3 U
The purposes of the project or product must be identified and
ranked in importance.
Costs of reducing risks must be estimated.
.

What are the reasons for Risk-Benefit Analysis?


Risk-benefit analysis is concerned with the advisability of
11 undertaking a project. 2 CO3 R
It helps in deciding which design has greater advantages.
It assists the engineers to identify a particular design scores higher
with that of the Another one.
Are the engineers responsible to educate the public for safe
operation of the equipment? How?
12 Yes, as per the engineers are concerned with they should have their 2 CO3 R
duty as to protect for the safety and well being of the general public.
Analyzing the risk and safety aspects of their designs can do this.
Define Safety?
In the definition stated by William W. Lawrence safety is defined, as
a thing is safe if its risks are acceptable. A thing is safe with respect
13 to a given person or group, at a given time, if its risk is fully known, if 2 CO3 R
those risks would be judged acceptable, in light of settled value
principles. In the view of objective, safety is a matter of how people
would find risks acceptable or unacceptable.
What is the definition of risks?
A risk is the potential that something unwanted and harmful may
occur. Risk is the possibility of suffering harm or loss. It is also
14 defined as the probability of a specified level of hazardous 2 CO3 R
consequences, being realized. Hence Risk (R) is the product of
Probability (P) and
consequence(C) (i.e) R=P*C
Define Acceptability of risks?
A risk is acceptable when those affected are generally no longer
15 apprehensive about it. 2 CO3 R
Doubtfulness depends mainly on how the people take the risk or
how people perceive it.
16 What are the safety measures an engineer must know before 2 CO3 U
assessing a risk of any product?
The factors are:
Does the engineer have the right data?
Is he satisfied with the present design?
How does he test the safety of a product?
How does he measure and weigh the risks with benefits for a
product.
What does Strict Liability mean?
Strict liability means if the sold product is defective; the manufacturer
17 2 CO3 R
concerned is liable for
any harm that results to users. Negligible is not at all an issue based.
Explain the two types of Risk?
Personal Risk: An individual, who is given sufficient information,
will be in a position to decide whether to take part in a risky activity
or not. They are more ready to take on voluntary risks than
18 2 CO3 U
involuntary risks.
Public Risks: Risks and benefits to the public are more easily
determined than to individuals, as larger number of people is taken
into account. Involuntary risks are found here.
Define Risk-Benefit Analysis?
Risk benefit analysis is a method that helps the engineers to analyze
the risk in a project and to determine whether a project should be
19 2 CO3 R
implemented or not. In risk benefit analysis, the
risks and benefits of a product are allotted to money amounts, and
the most benefit able ratio between risks and benefits is calculated.
What are the positive uncertainties in determining risks?
There are three positive uncertainties. They are:
20 Purpose of designing 2 CO3 U
Application of the product
Materials and the skill used for producing the product.

PART- B
Q.No Questions Marks CO BL
1 Explain the concept of risk-benefit analysis? 16 CO3 U
RISK BENEFIT ANALYSIS
Risk- benefit analysis is a method that helps the engineers to
analyze the risk in a project and to determine whether a project
should be implemented or not. It is very much closer to cost-benefit
analysis.
In risk-benefit analysis, the risks and benefits of a product are
allotted to money amounts, and the most beneficial ration between
risks and benefits is calculated. But it is a very difficult job, as the
risks are very much harder to quantify and more difficult to put a
realistic price tag on.
But when used objectively, this analysis will be a useful technique as
part of a larger analysis. When applying the risk benefit analysis, a
person must consider who takes the risks and who harvests the
benefits. Therefore, for an engineer, the only ethical way to conduct
a risk-benefit analysis is to ensure to the greatest extent possible
that the risks as well as the benefits of his design are equally shared
in the society around him.
Risk – benefit analysis is being conducted for finding out answers for
the following questions:
Is the product worth applying the risk-benefit analysis?
What are the benefits?
Do they over weigh the risks?
REASONS FOR RISK BENEFIT ANALYSIS
Risk-benefit analysis is concerned with the advisability of
undertaking a project.
It helps in deciding which design has greater advantages
It assists the engineers to identify a particular design that scores
higher with that of another one.
ETHICAL IMPLICATIONS OF RISK-BENEFIT ANALYSIS
Risk – benefit analysis is also helpful to find answers to the following
questions in an ethical
way
When is a person given a right to impose a risk on another in view
of a supposed benefit to others?
How do we consider the worst case scenarios of persons exposed
to maximum risks while they are receiving only minimum benefits?
Are their rights violated?
Are they provided with safer alternatives?
So engineers should keep in mind that risks to known persons are
perceived differently from statistical risks and they have no control
over the grievances redressed.
WEIGHING THE RISKS AND BENEFITS
To weigh the risks and benefits, an engineer should keep in his mind
the ethical question ― Under what condition, some one in society
can be entitled to impose a risk on someone on behalf of a
supposed benefit to yet others.
REDUCING RISK
A number of techniques are available to reduce the risk. Some are
listed below
1) Application of inherent safety concepts in design
2) Use of diversity and redundancy principles in instrument
protection systems
3) Regular inspection and testing safety systems to ensure reliability
4) Training of operating personnel and regular audits to ensure
workability of
the systems and procedures
5) Development of a well-considered emergency plan together with
regular drills to ensure preparedness.
CHERNOBYL CASE STUDY
This disaster happened in the nuclear power plant complex in
Chernobyl near Ukraine in April 1986. this disaster happened during
the construction of units 5 & 6. the reactors were called RBMK.
The RBMK reactors were graphite – moderated and use boiling –
water pressure tubes. The engineers were on a test on reactor 4 to
decide how long the mechanical inertia of the turbine – generators
rotating mass could keep the generator turning and producing
electric power after the shut off the steam supply. This test was
arranged to conduct during the scheduled plant shut down for a
general maintenance purposes.
To produce 1200 Megawatts output the RBMK reactor requires 3600
megawatts of thermal power. To conduct the test, the unit had been
reduced its output up to 700 megawatts. But due to an unexpected
demand, the power dispatch controller of Ukraine requested the
officials of plant 4 to maintain the high output. This necessitates the
postponement of the rest.
But for conducting the test, the reactor operators had already
disconnected the emergency core – cooling system. This was the
first mistake done; moreover another mistake
was that a control device was not properly reprogrammed to
maintain power at 700 to 1000 megawatts level.
The power output was only 200 megawatts. This was very low as far
as the test was concerned. Yet the test was continued. Circulating
pumps had to be started. Under normal levels of power output it
would be helpful to the safety of the reactor. But at an output of 200
Megawatts, it required many manual adjustments to maintain the
balance between steam and water. The operators stopped all the
emergency signals and automatic shut down controls.
This made the reactor in unsafe position. It allowed the reactor to run
freely. With this dangerous condition of the reactor, the engineers
started the test. They closed the steam valves and removed the
steam load in an effective manner.
The temperature of the reactor increased. In the RBMK reactor
water was used only as a medium for transferring the heat. Due to
the increase in the temperature, it became hotter and the fission rate
was increased. This made the increase of the power of the reactor
4. The effect of the power was equivalent to half ton of TNT inside
the reactor core. Due to the malfunctioning, the fuel deprived of its
protection cover shield mixed with the water. Within a second, a
large explosion occurred.
The explosion of nuclear power heavily damaged the concrete floor
of the building and separated the reactor from the refueling area.
Because of the formation of hydrogen gas, the reactor caught fire.
This caused the graphite to glow and the fuel cast out over the
compound of the plant and also the radioactive waves began to
spread out in air.But the surrounding people did not know about this.
Hey came to know only after come hours later.After the disaster, the
reactor was put into a concrete base but it was not an air tight box,
so the radioactive dust could easily escape.
2 Define the term risk and safety. How will an engineer 16 CO3 U
assess the safety?
Safety was defined as the risk that is known and judged as
acceptable. But, risk is a potential that something unwanted and
harmful may occur. It is the result of an unsafe situation, sometimes
unanticipated, during its use.
Probability of safety = 1 – Probability of risk
Risk = Probability of occurrence × Consequence in magnitude
Different methods
are available to determine the risk (testing for safety)
1. Testing on the functions of the safety-system components.
2. Destructive testing: In this approach, testing is done till the
component fails. It is too expensive, but very realistic and useful.
3. Prototype testing: In this approach, the testing is done on a
proportional scale model with all vital components fixed in the
system. Dimensional analysis could be used to project the results at
the actual conditions.
4. Simulation testing: With the help of computer, the simulations are
done. The safe boundary may be obtained. The effects of some
controlled input variables on the outcomes can be predicted in a
better way.
ASSESSMENT OF SAFETY AND RISK
Uncertainties in Assessment
There are many positive uncertainties in determining the risk of a
product/service.
1. Restricted access to knowledge on risk: Some organizations do
not disclose the data, citing legal restrictions.
2. Uncertain behavior of materials: Test data supplied by the
suppliers are only statistical. The individual parts may behave
considerably (? 3 a) different from the statistical mean obtained from
the tests on random samples.
3. Uncertain and varying behavior of user environments such as
physical shock, thermal shock, fatigue, creep, impulse and self-
excited vibrations in components or structures due to winds, snow
fall, and rains cause sudden failure-of the whol structure. An error or
wrong procedure during assembly or joining the components may
cause additional stress leading to early failure.
4. The use or misuse of materials/products, remaining untracked,
e.g,, exposure to rain or snow or damp weather is likely to change
the properties.
5. Newer applications of obsolete technologies, remaining
unpublished.
6. Substitution of newer materials whose behavior are not disclosed,
and
7. The unexpected and unintended outcomes of the product/project.
All these aspects make the estimation of risk complex and
unreliable. Hence, the data are to be monitored continuously and
risk estimation updated periodically.
For example, a few friends live very near the cement plant, as they
are unable to choose a better location for their house. The group
work as motor mechanics in an automobile servicestation nearby.
The air is full of dust and some drainage canals cut across their
house sites. They hold that they are exposed to involuntary risk,
from dust and drain. But the same persons have previously-owned
motor cycles, with which they travel during weekends to their villages
through muddy roads.
Now they are willing to take risk voluntarily, i.e., they have no
apprehensions on this travel. Statistical study indicates that
individuals are more ready to accept voluntary risks (hunting, skiing,
fighting in wars) than the involuntary risks (electric shock, natural
calamity).
Even though the oluntary risks are thousand times more fatal than
involuntary ones,
individuals meet them, for the thrill or adrenal quest or for
achievement and for a page in the
Guinness record . Another stand or perception closely related to this
example is that of ‗Control„. There
are people who choose to play stunts such as jumping through fire
gates, skiing and flying, car racing through tortuous terrains. Most of
these people exhibit extraordinary confidence in them and on their
gadgets and also believe that the hazards are under their control .
SAFE EXIT
In the study of safety, the ‗safe exit„ principles are recommended.
The conditions referred
to as „safe exit„ are:
1 The product, when it fails, should fail safely
2 The product, when it fails, can be abandoned safely (it does not
harm others by
explosion or radiation)
3 The user can safely escape the product (e.g., ships need sufficient
number of life
boats for all passengers and crew; multi-storeyed buildings need
usable fire
escapes)
3 Write short notes on occupational crime? 16 CO3 R
An occupational crime may be committed by (1) wrong actions of a
person through
one„s lawful employment or (2) crime by an employee to promote
ones own or employer„s interest or (3) theft or pilferage by the
employee or (4) damage to the property or an employee of one's
organization. These are also called white-collared crimes.
Many of these crimes are examples of conflicts of interest. These
are motivated by the greed. Corporate ambition, and misguided
loyalty, Even the crime to promote the interests of the employer, is
an occupational crime. Some of the examples of occupational crimes
are:
1. Price Fixing
Fixing the bidding rate by companies, in collusion with other
companies, especially for the co n ra.ctise ry ices, is called price
fixing. This is an occur pational crime, pre valent in electrical
equipments industries, where there used to be a few contractors but
large number of contracts, Because of this, public as well as the
government incur huge loss.
Industrial Espionage
It means simply spying for personal or company benefits, e.g., in the
Silicon Valley area, there are several company manufacturing
computer chips, ICs, and microprocessors. There are a lot of
engineers who are entrepreneurs and venture capitalists. The
espionage is more
prevalent here because of the following factors:
The development of chips is extremely competitive and on fast track,
Profit and loss
can be made quicker,
Manufacture of chips is very costly. Huge saving through reverse
engineering could be made only by breaking open die competitors'
gadgets or fast tests. Some organizations prefer to steal the design
details through illegal means rather testing and development.
The components involved are very small. Hence, pilferage or
removal of gadgets could be done easily and without being caught.
The crime detection and law enforcement are difficult and ineffective.
Employees do not carry out the activities directly, but through
engineers who were
employees or through the weakest link in the supplier-producer
chain,
2. Bootlegging
Manufacturing, selling or transporting products (liquor and narcotics)
that are prohibited by law, is called bootlegging. In engineering
context, it refers to working on projects which are prohibited or no
properly authorized.
3. Endangering Lives (Occupational Hazards)
Industries who expose their employees to hazards usually escape
penalties. Victims have the right to sue, but only to claim some
monetary compensation. The asbestos industries in USA were
responsible for the death of one latch workers and 27 million workers
afflicted with cancer, in the 80s. Even after 22 years since Bhopal
gas tragedy, appropriate compensation has not been paid. Even the
government could not bring to book the culprits for the crime
committed.

4 What is whistle blowing? Discuss briefly about types of 16 CO3 U


whistle blowing moral guidelines and procedures of
whistle blowing?
WHISTLE BLOWING
Whistle blowing is defined as conveying information by an employee,
on an important moral problem to somebody in a position to take
action on the problem. Further, this is done outside the approved
organizational channels.
There are four aspects of whistle blowing,namely:
1. Basis of disclosure: The basis for disclosure may be intentional,
or under pressure from superiors or others not to disclose.
2. Relevance of topic: The whistle blower believes that the
information is about a significant problem for the organization or its
business ally. It can be a threat to the public or employees„ health,
safety and welfare or a criminal activity, or unethical policies or
practices, or an injustice to the workers within the organization.
3. Agent: The person disclosing the information may be a current or
former employee or a person having a close link to the organization.
4. Recipient: The person or organization, who receives the
information, is in a position to remedy the problem or alert the
affected parties. Usually, the recipients are not aware of the
information fully or even partially.
Types
Based on the destination (recipient), whistle blowing is classified into
types, as:
(a) Internal: In this case, the information is conveyed to a person
within the organization, but beyond the approved channels.
(b) External: This happens when the information is transmitted
outside the organization. The recipient may be a municipal chairman
or member of legislature or minister. It becomes severe if the
information reaches the press and through them the public. The
damage is maximum and sometimes poses difficulty in remedying
the situation.
Based on the origin or source (agent), this can be divided into three
types, as follows:
(a) Open: The originator reveals his identity as he conveys the
information. This information is reliable and true, but sometimes
partially true.
(b) Anonymous: The identity is concealed. The information may or
may not be true.
But the agent anticipates perhaps some repression or threat, if
identity is revealed.
(c) Partly anonymous (or partly open): Such a situation exists
when the individualWHISTLE BLOWING
Whistle blowing is defined as conveying information by an employee,
on an important moral problem to somebody in a position to take
action on the problem. Further, this is done outside the approved
organizational channels.
There are four aspects of whistle blowing,namely:
1. Basis of disclosure: The basis for disclosure may be intentional,
or under pressure from superiors or others not to disclose.
2. Relevance of topic: The whistle blower believes that the
information is about a significant problem for the organization or its
business ally. It can be a threat to the public or employees„ health,
safety and welfare or a criminal activity, or unethical policies or
practices, or an injustice to the workers within the organization.
3. Agent: The person disclosing the information may be a current or
former employee or a person having a close link to the organization.
4. Recipient: The person or organization, who receives the
information, is in a position to remedy the problem or alert the
affected parties. Usually, the recipients are not aware of the
information fully or even partially.
Types
Based on the destination (recipient), whistle blowing is classified into
types, as:
(a) Internal: In this case, the information is conveyed to a person
within the organization, but beyond the approved channels.
(b) External: This happens when the information is transmitted
outside the organization. The recipient may be a municipal chairman
or member of legislature or minister. It becomes severe if the
information reaches the press and through them the public. The
damage is maximum and sometimes poses difficulty in remedying
the situation.
Based on the origin or source (agent), this can be divided into three
types, as follows:
(a) Open: The originator reveals his identity as he conveys the
information. This information is reliable and true, but sometimes
partially true.
(b) Anonymous: The identity is concealed. The information may or
may not be true.
But the agent anticipates perhaps some repression or threat, if
identity is revealed.
(c) Partly anonymous (or partly open): Such a situation exists
when the individual reveals his identity to the journalist, but insists
that the name be withheld from others.
Under the following situations, the whistle blowing may be
justified:
1. When the potential harm existing is identified as serious, or
anticipated to occur with a high probability, in the near future.
2. When sufficient data on the harm had been gathered and
adequately documented.
This condition may not be required if revealing the information would
jeopardize the national interests or help the competitors. A request
to the appropriate authority for external investigation or permission
by a court to release the information may be a solution.
3. The concerns have been reported earlier to the immediate
superiors and no satisfactory response was forthcoming from them,
within a reasonable time.
4. Regular channels within the organization have been used to
transport the information to the highest level of management and the
information has reached them. Situations
3 and 4 may not be appropriate, when one's supervisors are the
main source of the problem or when urgency demands that regular
channels are expected to only add the delay.
5. There is a reasonable hope that the whistle blowing can prevent
or remedy the damage existing or anticipated.
Professional societies, unions, and some central laws are there to
protect the genuine whistle blowers, but the route is full of adventure
still. Laws alone are not sufficient. The engineers and other
employees have to act as watch dogs and provide necessary legal
assistance to the blowers. The IEEE has taken active roles by
assisting the members, backing them when they are to face legal
proceedings, helping the engineers discharged unjustly, and
honoring the courageous whistle blowers with public recognitions.
To conclude, the whistle blower has to consider (a) the personal
obligation to family (b) right to pursue one's career and (c) sometime
sacrifices, before this venture.
Before you Blow the Whistle
There are some of the instructions that should be followed before
blowing the whistle:
I. One should familiarize with the rules for appealing within the
organization. Normal organizational channels, up to the ombudsman
or top ethics committee, should be tried, except when extreme
urgency conditions exist.
2. Consult the trusted colleagues for advice and to avoid isolation.
3. Use polite and tactful language. Avoid any personal criticisms that
may antagonize and divert the attention towards solving the
problems.
4. Keep the supervisors informed of your actions, through informal
discussion and formal memorandum.
5. Keep your observations and claims precise and accurate. Prepare
formal records of events in support of your claims.
6. Before going outside the organization, consult the ethics
committee of your professional society.
7. If necessary consult a lawyer regarding potential litigations.
8. Offering to resign is one of the peaceful and effective methods of
blowing your views.

5 Discuss briefly about the intellectual property rights? 16 CO3 U


Introduction
The intellectual property rights (IPR) will have wide ange of socio
economic technological and political impacts. The obligation under
the Trade Related Intellectual
Property Rights Systems (TRIPS) means all the members of World
Trade Organizations
(WTO) are supposed to implement natural systems of minimum
standards.
Rapid technology obsolescence and fierce competitions lead one
protect the innovations using the tools of IPR such as patents, trade
marks, service marks, industrial design reistation, copy rights and
trade secrets.
The prime importance of intellectual property in India is well
established almost at all levels like statutory, administrative and
judicial. The agreement established by the World
Trade Organization (WTO) and agreed by Trade related aspects of
Intellectual Property
Systems (TRIPSwas ratified by india in January 1995.
This agreement has established some minimum standards for
protection thereby enforcing the intellectual property rights in
member countries. Such agreements establish the norms and
conditions with regard to the following intellectual properties.
a. Patents
b. Plant varieties
c. Undisclosed information
d. Design of integrated circuits
e. Industrial design
f. Trademarks
g. Copyrights and
h. Geographical indications.
Intellectual property (IP) is the information and original expression
that derives its original value from creative ideas with a commercial
value. Intellectual property permits the people to have fully
independent ownership for their innovations and creativity like that
for their own physical property.
ESSENTIAL ELEMENTS OF INTELLECTUAL PROPERTY RIGHTS
IPR is a broad term for covering
1. Patents for innovations
2. Copyrights for materials
3. Trademarks for broad identity
4. Trade secrets.
PATENTS
This refers to innovations – new or improved product and
processess which are meant
for industrial applications. This is a teritorial right whuch needs
registration for a limited time.
Patent is a contract between an inventor as an individual and the
society as a whole.
Requirements for patents
While applying for a patent certain documents haveto be submitted
as essential requirements. Some of them are as follows:
1. Problem of invention
2. current report of the problem to be addressed
3. solution or procedute to the problem
4. extent of novelty or inventive
5. application or uses
6. details of the inventor
7. resources of funds
TYPES OF PATENTS
Utility Patents
It can be granted to anyone who invents or discovers any new and
useful process, machine, manufacturer or composion of matter, or
any new and useful improvement thereof. Utility time is of 20 years.
Design patents
It can be granted to anyone who invents a new, original ornamental
design of an article of manufacture.a design patent protects the
ornamental design (appearance) of the article. A design patent has a
term of 14 years from the date of filing.
Plant patents
Plant patent can be granted to anyone who invents or discovers ans
asexually reproduces a new variety of plant. A plant patent has a
term of 20 years from the date of filing.
COPY RIGHTS
A copyright is a very specific and exclusive right even for
reproduction of an original work. This is for material,
literacy,aesthetic material, music. Film, sound recording,
broadcasting, software and multimedia.
This provides automatic right for protecting any original creation,
which is not in need of registration but wuith limited time. There is no
need to seek lawyer„s help for settlement.
TRADE MARKS
Trademark is for broad identity of specific goods and services
permitting differences to be made among different trades. This is a
territorial right, which needs registration, but without any time limit.
Lawyer is needed for guidelines. It is better to have some sort of lack
of confusion with other trade marks.
Trademarks are basically intended to indicate clearly the source of
any sign or combination of signs of goods. Some times this is called
as service to point out the source of services so as to distinguish one
service from others.
TRADE SECRETS
A trade secret means information, which is kept confidential as a
secret. This is
generally not known in the relevant industry, providing an advantage
to its owner over other competitors. This trade secret is a ―do – it –
yourself‖ form of protection.
The trade secrets are not normally registered like other types of
intellectual property.
The information of the trades is simply kept confidential. The
protection covers as long as the secret is kept confidential.
International theft of trade secrets may constitute a crime and under
both the state and federal laws.
NEED FOR PROTECTION TO IPR
The protection of intellectual property rights is an essential element
of economic policy for any nation. It is very important issue is plan to
protect the intellectual property rights. The
main needs are to
Prevent plagiarism
Prevent others using it
Prevent using it for financial gain
Fulfill obligation to funding agency
Support income generation strategy
Importance of IPR
The intellectual property rights are granted to the inventors for their
freedom for further creation.
These rights are very important as they
Give the inventors exclusive rights of dealing
Permit avoiding of competitors and raise entry barriers
Permit entry to a technical market
Generate steady income by issuing license

(Note:*Blooms Level (R – Remember, U – Understand, AP – Apply, AZ – Analyze, E – Evaluate, C – Create)


PART A- Blooms Level : Remember, Understand, Apply
PART B- Blooms Level: Understand, Apply, Analyze, Evaluate(if possible)
Marks: 16 Marks, 8+8 Marks, 10+6 Marks)

Subject In charge Course Coordinator HOD IQAC


(Name & Signature) (Name & Signature)

You might also like