Presentation is loading. Please wait.

Presentation is loading. Please wait.

Intellectual Property Rights An Overview of Laws, Licenses and Copyright Protection A Presentation by Team 9 Perhaps the Greatest Team Ever to Exist…EVER!

Similar presentations


Presentation on theme: "Intellectual Property Rights An Overview of Laws, Licenses and Copyright Protection A Presentation by Team 9 Perhaps the Greatest Team Ever to Exist…EVER!"— Presentation transcript:

1 Intellectual Property Rights An Overview of Laws, Licenses and Copyright Protection A Presentation by Team 9 Perhaps the Greatest Team Ever to Exist…EVER! Cole Hoosier, Alex Stampbach, Leanne Gray, Ryan Hannebaum, Matthew Cook

2 Intellectual Property Laws

3 an umbrella term for various legal entitlements which attach to certain types of information, ideas, or other intangibles in their expressed form an umbrella term for various legal entitlements which attach to certain types of information, ideas, or other intangibles in their expressed form Intellectual Property

4 Software Copyright Infringement Several different types Several different types Creating a copy for resale Creating a copy for resale “Bulletin board” sharing “Bulletin board” sharing “Softlifting” “Softlifting” Unauthorized copying as ethical choice Unauthorized copying as ethical choice Existing and proposed laws Existing and proposed laws TRIPS TRIPS EULA EULA UCITA UCITA

5 The Scope of the Problem RankProductValue 1Marijuana 141.80 Billion 2 Counterfeit Technology Products 100 Billion 3Cocaine 70.45 Billion 4Opium/Heroin 64.82 Billion 5 Pirated Web Videos 60 Billion 6 Counterfeit Pharmaceutical Drugs 40 Billion 7 Pirated Software 34 Billion 8 Human Trafficking 32 Billion 9Amphetamines/Meth 28.25 Billion 10 Animals and Wildlife Smuggling 20 Billion http://www.havocscope.com/products.htm

6 Attempts to Stop the Problem Genuine Microsoft Software Tools Genuine Microsoft Software Tools (http://www.microsoft.com/resources/howtotell/ww/windows/default.mspx) http://www.microsoft.com/resources/howtotell/ww/windows/default.mspx Genuine copies allow users to get updates Genuine copies allow users to get updates “Customers who purchase counterfeit products could find they are missing key elements, such as user manuals, product keys, certificates of authenticity and even software code. They may also find that the counterfeit software contains viruses or does not work as well as the genuine product does.” (Microsoft Product Activation FAQ) “Customers who purchase counterfeit products could find they are missing key elements, such as user manuals, product keys, certificates of authenticity and even software code. They may also find that the counterfeit software contains viruses or does not work as well as the genuine product does.” (Microsoft Product Activation FAQ)

7 Software Distribution

8 Freeware Software is free to use Software is free to use No limitations are placed on the program No limitations are placed on the program Author may *ask* for donations, but won’t demand them Author may *ask* for donations, but won’t demand them Examples: Vim, several flash-type games Examples: Vim, several flash-type games

9 Shareware use is completely free use is completely free product is not fully functional unless "unlocked“ product is not fully functional unless "unlocked“ Unlocking usually is by entering a key that is purchased Unlocking usually is by entering a key that is purchased Example: WinZip Example: WinZip

10 Demoware Type of shareware Type of shareware Feature set of the software is limited in some manner Feature set of the software is limited in some manner Examples: Can’t save state or program halts after 15 minutes Examples: Can’t save state or program halts after 15 minutes

11 Licensing Mi casa es su casa?

12 GNU General Public License Source is available Source is available “Copyleft” “Copyleft” Uses copyright laws to ensure that modified versions retain the same freedoms Uses copyright laws to ensure that modified versions retain the same freedoms Lesser (or Library) GPL Lesser (or Library) GPL Can be linked into non-GPL program Can be linked into non-GPL program Example: most software for Linux Example: most software for Linux

13 BSD-style Licenses Closer to public domain than GPL Closer to public domain than GPL Has been called “copycenter” Has been called “copycenter” Allows proprietary commercial use, and for the software released under the license to be incorporated into proprietary commercial products Allows proprietary commercial use, and for the software released under the license to be incorporated into proprietary commercial products Example: NetBSD Example: NetBSD

14 MIT License Very (very) similar to the BSD-style licenses Very (very) similar to the BSD-style licenses Example: X11 for Linux Example: X11 for Linux

15 Copyright Protection

16 Security – Software Validation Validation Key checks Key checks Registration Registration Limitations Limitations

17 Validation Making the software legal Making the software legal Verifying the user has the proper rights to use the software Verifying the user has the proper rights to use the software

18 Key checks Software requires you to enter a product key Software requires you to enter a product key Software will not function without a valid key Software will not function without a valid key Only given a valid key when you purchase the software Only given a valid key when you purchase the software

19 Key checks Bnetd project Bnetd project Free online community Free online community Distributed open source code Distributed open source code Bnetd allowed users to create chat rooms, connect to other users, and play games Bnetd allowed users to create chat rooms, connect to other users, and play games Blizzard uses battle.net but uses CD key checks Blizzard uses battle.net but uses CD key checks Blizzard sued them because they didn’t check authenticity to the game Blizzard sued them because they didn’t check authenticity to the game

20 CD Cracks CD crack codes can get around key checks CD crack codes can get around key checks Eliminate the use of a CD Eliminate the use of a CD

21 Registration Some products require you to register the product Some products require you to register the product Registration can be used as a validation technique Registration can be used as a validation technique You have to have a registration to get updates You have to have a registration to get updates

22 Limitations File Sharing File Sharing Peer to Peer (P2P) Peer to Peer (P2P) Improve existing software Improve existing software

23 Protection Through Documents Passwords Passwords Dials Dials Manuals Manuals “Bottom of Page 6” “Bottom of Page 6” Hidden Hidden Vital Information Vital Information Manual contains data necessary to use software Manual contains data necessary to use software

24 Protection Through Hardware Dongles – 1980’s Dongles – 1980’s USB keys, Parallel USB keys, Parallel Implementations Implementations Check for Dongle’s presence Check for Dongle’s presence Store key parts of Program on Dongle Store key parts of Program on Dongle CD Check CD Check Lenslok Lenslok Hold a Prism up to Screen Hold a Prism up to Screen

25 www.zock.com

26 Protection Through People “Honor System” “Honor System” Software reminds you that the free trial is over Software reminds you that the free trial is over Propaganda Propaganda Shorts before Movies Shorts before Movies Posters Posters Fake MP3 files in Sharing Networks Fake MP3 files in Sharing Networks

27 Questions?


Download ppt "Intellectual Property Rights An Overview of Laws, Licenses and Copyright Protection A Presentation by Team 9 Perhaps the Greatest Team Ever to Exist…EVER!"

Similar presentations


Ads by Google