Case study Engineering Ethics Mahmoud Darawsheh. Psystar corporation  Psystar Corporation was a company based in Florida, owned by Rudy and Robert Pedraza.

Slides:



Advertisements
Similar presentations
EECS 690 Patents and Software 23 February Patents Must be applied for In order to be patentable, a device or process must be: –New –Useful –Non-Obvious.
Advertisements

COPYRIGHT INFRINGEMENT C AROL K OTERMANSKI C HRIS I OFFREDA M IRKO A ZIS M IKE B OLSTER E THAN F RIER.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Unit 1 Living in the Digital WorldChapter 4 – Smart Working This presentation will cover the following topics: Software choices Name:
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Legal Issues in Software CS 415, Software Engineering II Mark Ardis, Rose-Hulman Institute April 11, 2003.
W15D3. Protection (recap) Common sense Antivirus software (some free, eg: AVG) Update OS Verify the validity of info in s received  Use search.
High Tech Products and Intellectual Property Erinn Woodcock Rick Nortz Paula Ramko Lance Gomes.
Ethics of Copyright Infringement Thomas H. Mak CS 301.
Ed Felton v. RIAA Fredrik Lundberg Matt Gong Sung Noh.
Copyright Law Boston College Law School February 25, 2003 Rights - Reproduction, Adaptation.
1 CS 502: Computing Methods for Digital Libraries Lecture 25 Access Management.
CS 501: Software Engineering Fall 2000 Lecture 7 Management II Business and Legal Aspects of Software Engineering.
Jiahuan Liu MGQ B7. Definition A copyright provides legal protection to a written or an artistic work Protected work may include images, symbols, novels,
Copyright Laws and Software By Shana Jenkins Carol Dickinson Brittany Caldarulo Sarah Hunkeler.
Company LOGO Software Piracy Software Piracy Software Pirate Gets 7 Years in Prison Cannelle Cuvelier.
THE INTELLECTUAL PROPERTY OF SOURCE CODE Michael Musick.
Chapter 40 Franchises and Special Forms of Business
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
Software Patents for Higher Education ICPL August 12, 2008.
JOURNAL QUESTIONS FOR CHOOSE TWO TO ANSWER! Why is it important for consumers to know what is in food products? What kinds of things do you need.
COPYRIGHT LAW 2002 Professor Fischer CLASS 27: TECHNOLOGICAL PROTECTION MEASURES, REMEDIES.
Definition: The value of property determined by tax officials. Assessed Valuation.
INTELLECTUAL PROPERTY COPYRIGHTS, PATENTS AND TRADE MARKS.
By Jordan Davenport. Identifying the Problem Legal Protections  Software granted copyright protection as a “literary work” in 1980 by Copyright Act.
>>APMG 8119: DIGITAL ENTERPRISE. Copyright ??  Copyright is a exclusive right that gives the right to owner for ownership, transfer or sell to others.
CSCI 101 R 3:30 Dr. Garrison.  What is software? ◦ Set of computer programs that tells the computer what to do and enables it to perform different tasks.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Computer Ethics for Computer Users
Digital Millennium Copyright Act of 1998 Jason Fu Andy Lee.
Development, Marketing, Licensing, and Distribution.
Section 2 Software.
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
For Computer Use in Business
Intellectual Property. Copyright The right to copy or reproduce a created work –federal legislation gives this right to author or owner and controls infringements.
CS 501: Software Engineering Fall 1999 Lecture 19 Management II Business and legal aspects of software engineering.
1. Contents  EULAs, piracy and copyright  So why do we use computers anyway? So why do we use computers anyway?  The Digital Divide The Digital Divide.
Copyright and the Law For more information contact:
Copyright Law in Education Amber Glivens. Introduction  Let’s Be Honest: All teachers love to beg, borrow, or steal great ideas and lessons!  Educators.
Ethics. Technology  Technology is not an immutable force – people make decisions about what technologies and products to develop and how to use them.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Software Licensing Lauren Kennington CSCI 101 Tues 3:30 Extra Credit #5.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
Ethics...as related to computer technology. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate.
Digital Millennium Copyright Act (DMCA) The Digital Millennium Copyright Act is a United States copyright law that was signed into law by Bill Clinton.
Computer Hardware Software, Memory & Storage Internet & EthicsPowerPoint
Legal and Ethical Issues in Computer Security Csilla Farkas
Patent Cases IM 350 Lamoureux & Baron Sept. 6, 2009.
Michelle Olivacce’
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
COPYRIGHT Rules and Regulations By Maria Soorma. WHAT IS COPYRIGHT?  Copyright is a form of protection provided by the laws of the United States to the.
Computer Technology Timpview High School
CODES OF CONDUCT IN GAMES DEVELOPMENT. By Nikku (Nick)
Adam Jarrah 4/16/08. What is Psystar? Manufactures/sells hardware and software for various business uses (i.e., communication systems, employee management.
Software Installation and Copyrights Basic Computer Concepts Installation Basics  Installation Process  Copy files from distribution disks.
Ethics Self Imposed Right and Wrong Behavior Described as:
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
Boston New York San Francisco Washington, DC Woods Hole Oceanographic Institute Understanding Intellectual Property June 4, 2008.
Patent Enforcement & Forum Shopping in China Liu, Shen & Associates: Jun Qiu September 2014.
Read and Summarize Proceedings that allege breach of fiduciary duties of officers and directors to the corporation often are derivative actions, and actions.
By Cindy Ravalo $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400.
Software Piracy and Copyright
A Gift of Fire Third edition Sara Baase
Software licensing.
Computer Law th class: Open Source.
Copyright, Designs and Patents Act 1988
Plagiarism/Fair Use/Copyright
Software License Agreements
Student Name Student Class
Presentation transcript:

Case study Engineering Ethics Mahmoud Darawsheh

Psystar corporation  Psystar Corporation was a company based in Florida, owned by Rudy and Robert Pedraza  Sold Open Computers with pre-installed with Mac OS X Leopard, under the name of "hackintosh" computers.  They could hack the Apple Boot loader and break so it become installable on IBM PCs

Business Model  As they had some good technical engineer they were buying the Mac OS X from apple market modify it and install it under the name of Hackintosh on the PC  The company started to sell these computers after installing the Hackintosh on them  Although they bought the Software from Apple market, they started modifying it without to read the Apple EULA (End User License Agreement).

Legal issues  Inside EULA :  Forbids third-party installations of Mac OS X  Hackentosh violation because Hackentosh is not installed using fully apple installer  Apple Software must not be used on non Apple branded Hardware without Apple Authority  The core Hackentosh business is based on installing it on much cheaper computers

Eula Sample

Psystar Against Apple  Apple called Psystar to stop selling Hackentosh, but Psystar reject that.  They claimed they work is legal as they buy the OS from apple before modify it.  Psystar claimed that law don’t allow Apple to control what end user do with the software after buying it

Licensing is not selling  Actually Apple don’t sell the product to their customers they all life licensing using it but it still owned by Apple as what written in EULA, so Apple has the right to ask Psystar to stop Selling Hackentosh  Psystar deny that and completed selling Hackentosh

Apple Lawsuit Psystar  July 3, 2008, Apple filed a lawsuit against Psystar.  November 27, 2008, Apple claimed "Psystar violated the Digital Millennium Copyright Act (DMCA) by dodging copy-protection technologies Apple uses to protect Mac OS X.  August 20, 2009, California Judge Alsup ordered Psystar to pay $5,000 of Apple's legal fees

Apple Lawsuit Psystar  April 2009, Apple showed to court that their sales has been decreased due to hackentosh and Psystar still selling  August 20, 2009, Court ordered Psystar to pay $5,000 of Apple's legal fees.  October 8, 2009, the court ruled that Psystar was not entitled to Apple’s profit margin data  November 13, 2009, the court granted Apple's copyrights were violated

Apple Lawsuit Psystar  December 1, 2009, Psystar had to pay Apple $2.7 million for copyright infringement, breach of contract, violation of the Digital Millennium Copyright Act, additional damages and attorneys.  December 15, 2009, the judge in the California action issued a permanent injunction barring Psystar from manufacturing, distributing, or assisting anyone with any sort of device or technology

Conclusion  It is important for any software based project to read EULA carefully and to apply it.  Software owner usually comes after the product is being produce,sold and ask to their right after mass production has been done.  Be away from pirating software.

Ethical Issue  Due to IEEE-CS code of ethics  2.02 ensure that resources are authentically approved  2.03 only use property authorized by owner  3.11 use data legitimately 

Thank you This slides are available at