1 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Legal Issues in Cybercrime Cases: IP Crimes CJ341.

Slides:



Advertisements
Similar presentations
Intellectual Property Protection – Critical Issues to Consider in Business Ventures John F. Letchford, Esquire Archer & Greiner, P.C.
Advertisements

COPYRIGHT AND COPYWRONG Respect Copyright, Celebrate Creativity.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
Introduction to Copyright Principles © 2005 Patricia L. Bellia. May be reproduced, distributed or adapted for educational purposes only.
Copyright Infringement Present by: Shao-Chuan Fang Jaime McDermott Emily Nagin Michael Piston Fan Yang Carnegie Mellon Group Presentation Date:
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
1 Copyright © 2013 M. E. Kabay, D. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Introduction to Intellectual Property Law CJ341 – Cyberlaw.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
1 Introduction to Software Engineering Lecture 38 – Intellectual Property.
Copyright Law Boston College Law School February 25, 2003 Rights - Reproduction, Adaptation.
Intellectual Property Boston College Law School January 26, 2007 Copyright – Rights – Fair Use.
P A R T P A R T Crimes & Torts Crimes Intentional Torts Negligence & Strict Liability Intellectual Property & Unfair Competition 2 McGraw-Hill/Irwin Business.
Chapter 5 Intellectual Property & Internet Law
INTERNET and CODE OF CONDUCT
What is copyright? the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or.
1 Copyright & Other Legal Issues. 2 WHAT IS COPYRIGHT? Copyright is the form of protection provided by the laws of the United States to authors of “original.
COPYRIGHT LAW 2002 Professor Fischer CLASS 27: TECHNOLOGICAL PROTECTION MEASURES, REMEDIES.
Gerri Spinella Ed.D. Elizabeth McDonald Ed.D.
Teachers and the Law, 8 th Edition © 2011 Pearson Education, Inc. All rights reserved. Teachers and the Law, 8e by David Schimmel, Leslie R. Stellman,
Canadian Copyright Act Became law in January 1924 and was amended in 1988 (Phase I) The second phase amendments were completed in 1997 when Bill C-32.
Copyright. US Constitution Article I – Section 8 Congress shall have the power to promote the Progress of Science and useful Arts, by securing for limited.
Copyright and Fair Use Guidelines: Using Protected Materials to Enhance Instruction.
NEW SOLUTIONS FOR A DIGITAL WORLD Angela Teal LIBM 6320 FALL 2011.
INTELLECTUAL PROPERTY TRADE SECRETS COPYRIGHTS PATENTS.
COPYRIGHT LAW 2004 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
Computer Ethics Christina McCorkle.
1 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Legal Issues in Cybercrime Cases: Search & Seizure.
U.S. Copyright Enforcement Benjamin Hardman Attorney / Advisor Office of Intellectual Property Policy & Enforcement, USPTO.
Exhausted yet? A 15-minute crash course in the First Sale Doctrine Eric Harbeson Music Library Association 26 February, 2015.
Chapter 08.  Describes property that is developed through an intellectual and creative process  Inventions, writings, trademarks that are a business’s.
4.1 Chapter 4 Copyrights © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
Copyright Laws & Regulations Created by The University of North Texas in partnership with the Texas Education Agency.
Class Seven: Intellectual Property Patents, Trademarks and Copyrights.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 5 Intellectual Property.
PROTECTING YOUR IP RIGHTS Waldo Steyn, Senior Associate, Intellectual Property December 2012.
Copyright and Fair Use. Topics Intellectual Property What is Copyright? What is Fair Use? Common Violations Guidelines TEACH Act 2002.
Copyright Laws & Regulations. Copyright © Texas Education Agency, All rights reserved. 22 A.Title 17 of U. S. Code 1. Protection provided by law.
Class 22 Copyright, Spring, 2008 Copyright and the Constitution Randal C. Picker Leffmann Professor of Commercial Law The Law School The University of.
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
Copyrights. Copyright Definition 17 U.S.C. 102 C’ (a) Copyright protection subsists, in accordance with this title, in original works of authorship fixed.
Internet and Intellectual Property  University of Palestine  Eng. Wisam Zaqoot  Feb 2010 ITSS 4201 Internet Insurance and Information Hiding.
The Quest for Copyright Understanding Miguel Guhlin
Copyrights on the internet vincent yee. Digital Millennium Copyright Act October 28, 1998, President Clinton signed the Act into law.
The Ethical Use of Electronic Media. V Computer Ethics  Resources such as images and text on the Internet are copyrighted.  Plagiarism (using.
Copyright: What Every Teacher and Student Should Know Katie Amend Casey Moffett.
Becky Albitz Electronic Resources Librarian
Ethics...as related to computer technology. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate.
4.1 Chapter 4 Copyrights © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
COPYRIGHT LAW 2003 Columbus School of Law The Catholic University of America Prof. Fischer March 19, 2003.
The Ethical Use of Electronic Media. Guilford County SciVis V
PENALTY FOR COPYRIGHT INFRINGEMENT FAIR USE CLAUSE USE OF MULTIMEDIA IN THE CLASSROOM CONDITIONS FOR USING SOMEONE ELSE’S WORDS CONDITIONS FOR USING ANOTHER’S.
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 6 Business Torts, Intellectual Property and Cyberlaw.
Intellectual Property. An original (creative) work, invention or information protected by law through a trademark, patent, copyright or trade secret.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
6/18/2016 COPYRIGHT AND Fair Use Guidelines “Respect Copyright, Celebrate Creativity”
Intellectual Property. An original (creative) work, invention or information protected by law through a trademark, patent, copyright or trade secret.
Intro to Intellectual Property 3.0
Copyright Treasure Hunt
Intellectual Property
A Gift of Fire Third edition Sara Baase
Copyright By: Grace Collins.
Update on the Computer Fraud and Abuse Act
INTELLECTUAL PROPERTY AND CYBER PIRACY
Computer ethics in computer science curriculum
Intellectual Property
Chapter # 6 Intellectual Property
Presentation transcript:

1 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Legal Issues in Cybercrime Cases: IP Crimes CJ341 – Cyberlaw & Cybercrime Lecture #24 M. E. Kabay, PhD, CISSP-ISSMP D. J. Blythe, JD School of Business & Management

2 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Copyright Review  Criminal copyright enforcement = federal function  Copyright violations codified in Titles 17 & 18 of USC.  Challenges presented by technology  17 USC § 506(a): key criminal statute  Any person who infringes a copyright willfully and for purposes of commercial advantage or private financial gain shall be punished as provided in section 2319 of title 18  Punishment by imprisonment, fine (18 USC 2319) Base sentence 0-6 months Copyright © Government of Switzerland Used by kind permission of the Federal Institute of Intellectual Property

3 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Elements of Copyright Infringement Prosecution shows: 1.Existence of valid copyright 2.Infringement of the copyright by defendant 3.Defendant acted willfully, either 4.for purposes of:  commercial advantage or  private gain or  by the reproduction or distribution of one or more copies or phonorecords of 1 or more works during any 180-day period which have a retail value > $1,000 Copyright © Government of Switzerland. Used by kind permission of the Federal Institute of Intellectual Property

4 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Defenses to Criminal Copyright Infringement  No valid copyright  Not registered Note: Copyright registration not required at time of infringement  Fraud Copyright registrant was not author Gov’t must prove validity as element "For him that doth ill and doth sin with this book, in retribution for what he has done, I send this curse, and for him that would alter this book: may he be annihilated by leprosy, and may his name be erased from the book of the living and may he join the Devil for all Eternity." 13th century book curse adapted from Eike von Repgow, «Sachsenspiegel.»

5 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Authorized Use  Defeats willfulness element  Copyright Act does not define authorization  “Apparent authority” as possible defense Good-faith belief copy permitted Copyright © Government of Switzerland Used by kind permission of the Federal Institute of Intellectual Property

6 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Statutory Exceptions – No Infringement  Reproduction of limited number of copies by libraries and archives  First Sale Doctrine  Fair Use Doctrine Copyright © Government of Switzerland Used by kind permission of the Federal Institute of Intellectual Property

7 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. First Sale Doctrine  Copyright Act §109 distinguishes between physical copy and intellectual property  Ownership of physical copy of work permits  Lending (not CD/DVDs)  Reselling  Disposing  Does not permit  Reproduction  Public display or performance (outside home)  Software, music, video sold by license  Original may be sold only if copies deleted  Cannot be rented out without special contracts with copyright owner See

8 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Fair Use Reviewed  4 factors considered to determine if use complies with Fair Use Doctrine: 1. Purpose and nature of use 2. Nature of the copyrighted work 3. Amount and substantiality of the portion used in relation to the copyrighted work as a whole 4. The effect of the use upon the potential market or the value of the work Copyright © Government of Switzerland Used by kind permission of the Federal Institute of Intellectual Property

9 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Copyright Misuse (1)  Courts tend to look to see whether copyright owner has acted against public policy  Defendant can claim owner is using copyright in manner that violates public policy  Renders copyright unenforceable  Used where owner attempts to extend rights beyond those granted under Copyright Act Copyright © Government of Switzerland Used by kind permission of the Federal Institute of Intellectual Property

10 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Copyright Misuse (2)  Qad. Inc. v. ALN (1992)  Defendants copied part of Plaintiffs’ software  Raised the affirmative defense of misuse, claiming plaintiff’s had copied another company’s program and had improperly extended their ownership rights  Court allowed the defense and found against Plaintiff based on their misuse of copyright

11 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved.  Trafficking in Counterfeit Labels or Computer Program Documentation or Packaging  18 USC 2318  Trafficking = transferring, transporting or disposing of the materials  Prohibits 1. Trafficking in counterfeit labels affixed or designed to be affixed to a phonorecord, a copy of a computer program, documentation or packaging of a computer program, motion picture or other audiovisual work; and 2. Trafficking in counterfeit documentation or packaging of a computer program  Fine + Imprisonment Copyright © Government of Switzerland Used by kind permission of the Federal Institute of Intellectual Property Counterfeit Labels

12 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved.  Undercover investigation (2005)  FBI & Rapid Enforcement Allied Computer Team (REACT) Task Force  Operation Remaster  Federal search warrants at 13 locations in CA & TX  Seized contraband:  3 CD/DVD replicators  494,000 pirated music, software & movie disks  6,135 stampers to generate copies of disks (these are molds that create a copy in 3 seconds) Counterfeit Anti-Counterfeit Labels (2007) [1]

13 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Counterfeit Anti-Counterfeit Labels (2007) [2]  Counterfeits included  Adobe Photoshop  Norton Antivirus  Music from many artists  Counterfeit labels with FBI Anti-Piracy Seal placed on the counterfeits!  San Jose, CA US Attorneys charged three defendants with massive piracy violations  Sentences  Yaobin Zhai (34): 37 months prison & $6.9M restitution  Ye Teng Wen (31) & Hao He (32): 37 months prison & $125K fines

14 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Live Performances  Unauthorized fixation of and trafficking in sound recordings and music videos of live performance  18 USC 2319(a) protects live performances  Criminalizes bootleg recordings of live performances  Up to $250K fines + 5 years imprisonment  Greater fines for repeat offenders

15 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Bootleg Recordings [1] (2004) ISBN X (1996) ISBN

16 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Bootleg Recordings [2]  Books by Heylin focus on rock music industry  Origins in Southern CA in 1969  Excerpts available on GOOGLE BOOKS books?id=saWBw9ZG2cgC books?id=saWBw9ZG2cgC  But Louis Armstrong “gained his interest in tape recording after hearing bootleg recordings of his Carnegie Hall concert in 1947.”

17 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. DMCA  Digital Millennium Copyright Act  Amended Copyright Act to address digital information and Internet  §1201  Prohibitions on circumvention of technological measures used to protect copyright systems  Fair use = defense  §1202  Protects against concealment of copyright infringement caused by tampering with CMI (copyright management information)  E.g., tampering with identification info  Up to $500K fine + imprisonment  Enhanced penalties for repeat offenders Copyright © Government of Switzerland Used by kind permission of the Federal Institute of Intellectual Property

18 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Defenses to DMCA Violations  Constitutional challenges  U.S. v. Elcom (2002)  Defendant sold the Advanced eBook Processor, which permitted removal of use restrictions from Adobe Acrobat PDF files and files formatted for the eBook Reader  Defendant moved to dismiss on constitutional grounds, claiming DMCA violates First Amendment  Court found computer code is protected speech at some level, but that DMCA prohibits certain code related to function, not content, so no First Amendment fair use right and DMCA not overbroad  See

19 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Copyright Removal & False Application  Removal of copyright notice or fraudulent use = criminal acts  Fines possible  Section 506(e) prohibits false representations on copyright application  Knowing violations = subject to fine  Key: knowledge – intent to knowingly supply erroneous info

20 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Economic Espionage Act of 1996  Goal to protect info guarded by  “Reasonable” secrecy measures &  Maintain competitiveness of critical U.S. industries  Criminalizes theft of trade secrets  Previously, Trade Secrets Act dealt only with civil litigation

21 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. EEA Cases [1] US v. Ho (1998).  Employee sent to competitor’s company requesting info relating to competitor’s technology  Employee arrested under terms of EEA !?!

22 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. EEA Cases [2] US v. Martin (2000).  Maine chemist and California scientist corresponded via e- mail  Chemist sent resume and confidential company info to scientist  Scientist prodded for more info  On chemist’s last day of work, mistakenly sent correspondence to her employer discussing confidential info she had sent to scientist  Scientist convicted for conspiracy to steal trade secrets

23 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. EEA Cont.  Insiders / Employees make up most cases  Situations where EEA red flag might go off 1. Company hires an employee who has intimate knowledge of former employer’s IP 2. Company buys a business that has employees who recently worked for competitors or other industry employers 3. Company uses consultants who have access to technical and marketing info  Do not allow employees to breach confidentiality agreements by asking improper questions

24 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. EEA Defenses  Parallel Development  Argue possession of a trade secret was derived through independent work  Reverse engineering  But beware DMCA violations  Must not disable technological barriers  General knowledge & skills  Strongest argument – challenges patent or supports no violation trade secrets  First Amendment rights  Bizarre idea!

25 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Now go and study