By Gil Lan Lawyer and Adjunct Law Professor B.Sc., LL.B., LL.M., Ph.D. (candidate) Qualified lawyer in Canada and USA * presentation is general information.

Slides:



Advertisements
Similar presentations
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Advertisements

FRAUD & DECEPTION Unit 7 Consumer Skills By: Doris Reins.
Tuesday, January 21, 2014 Review Copyright Basics and Fair Use (for test) Share “Case Research”
Business and Government #3 Today I will: Take notes and be fascinated! So I can: Explain how government, by establishing laws and regulations, can improve.
Copyright Infringement
CS CS 5150: Software Engineering Lecture 5 Legal Aspects of Software Engineering 1.
Ownership of Computer Software Ethical Questions and Concerns.
Computer Engineering 294 IP R.Smith 5/ Intellectual Property What is it? Why is it important? – What is it designed to do? What are its basic forms?
Intellectual Property/Copyright and The Public Domain.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
For Students. What is Copyright? “The exclusive right to produce or reproduce (copy), to perform in public, or to publish an original literary or artistic.
CS 501: Software Engineering Fall 2000 Lecture 7 Management II Business and Legal Aspects of Software Engineering.
Chapter 14 Legal Aspects of Sport Marketing
P A R T P A R T Crimes & Torts Crimes Intentional Torts Negligence & Strict Liability Intellectual Property & Unfair Competition 2 McGraw-Hill/Irwin Business.
Intellectual Property Rights and Computer Technology
Protecting Your Ideas. The hardest part of becoming an entrepreneur is thinking of a good idea – Be it invention, innovation, etc Intellectual Property.
COMM 226 Intellectual property rights Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University,
MIS 2000 Chapter 4 Social, Legal and Ethical Issues.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
CHAPTER 14, SECTION 3 UNINSURABLE RISKS. IDENTIFYING AND REDUCING RISKS Businesses cannot insure many of the risks they face. Some are too expensive to.
Protecting Intellectual Property (IP) Evan Kuenzli Grant Miller.
7/3/08 Created by Mae Thomas Property Rights There can be consequences if you violate others' intellectual property rights. (That is, if you copy something.
Principles and Rules of Copyright Copyright is protection for intellectual property.
S. Chornenki TGJ3/4M Communications Technology Intellectual Properties.
Intellectual Property Intellectual Property. Intellectual Property Intellectual effort, not by physical labor Intangible property Lawsuits involve infringement.
13 Intellectual Property 1 Aaron Schiff ECON Reading: Cabral p , Deak p
Entrepreneurship and Extracting Value from IP Dr. Corrinne Lobe Innovate LLP Entrepreneurship, Innovation and Commercialization of.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
The Legal Environment What laws and regulation apply to businesses?
What is Copyright? Copyright is a form of intellectual property protection granted under Indian law to the creators of original works of authorship such.
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
Intellectual Property. Copyright The right to copy or reproduce a created work –federal legislation gives this right to author or owner and controls infringements.
CS 501: Software Engineering Fall 1999 Lecture 19 Management II Business and legal aspects of software engineering.
The Four Laws relating to ICT Health and safety Data protection act Copyright Computer misuse act By Marcus Ellis.
IPR Intellectual Property Rights Violation of IPR – basically, this means knowingly or unknowingly stealing other people’s works and ideas.
Ethical and Social...J.M.Kizza1 Module 5: Intellectual Property Rights and Computer Technology  Computer Products and Services  Instruments of Protection.
PROTECTING YOUR IP RIGHTS Waldo Steyn, Senior Associate, Intellectual Property December 2012.
1 CS 501 Spring 2004 CS 501: Software Engineering Lecture 5 Legal Aspects of Software Engineering I.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Intellectual Property (Quinn Chapter 4) CS4001 Kristin Marsicano.
Created for Mrs. Stanfield’s class. What is copyright? Copyright protects the creations of an original artist, musician, or author Copyright provides.
AOF Entrepreneurship Unit 3, Lesson 10 Intellectual Property Protections Copyright © 2009–2012 National Academy Foundation. All rights reserved.
CS CS 5150: Software Engineering Lecture 6 Legal Aspects of Software Engineering 2.
Copyright and related rights n The Berne Convention for the Protection of Literary and Artistic Works (1896). Important revisions in 1967 and Latest.
The Ethical Use of Electronic Media. V Computer Ethics  Resources such as images and text on the Internet are copyrighted.  Plagiarism (using.
Presented by: Jody and Kenneth1 Copyright and Other Legal Issues in Distance Education Presented by Jody & Kenneth.
1 CS 501 Spring 2003 CS 501: Software Engineering Lecture 5 Legal Aspects of Software Engineering I.
Intellectual Property Legal Implications. What is Intellectual Property? The product of creativity and intellectual endeavour Intellectual Property Rights.
W ELCOME Topic: Intellectual Property. D EFINITION Intellectual property includes ideas, discoveries, writings, works of art, software, collections and.
Legal and Ethical Issues in Computer Security Csilla Farkas
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Lecture 27 Intellectual Property. Intellectual Property simply defined is any form of knowledge or expression created with one's intellect. It includes.
Fundamentals of Intellectual Property
CISB 412 Social and Professional Issues Understanding Intellectual Property.
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 6 Business Torts, Intellectual Property and Cyberlaw.
Copyright Rules and Regulations. What is copyright Copyright is a form of protection grounded in the U.S. Constitution and granted by law for original.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
MT311 – Business Law I Seminar Presentation UNIT 3 Criminal Law and Cyber Crimes I. Chapter 5, Intellectual Property and Internet Law II. Chapter 6, Criminal.
1 CS 501 Spring 2004 CS 501: Software Engineering Lecture 6 Legal Aspects of Software Engineering II.
Lecture 11. Intellectual Property SPRING 2016 GE105 Introduction to Engineering Design College of Engineering King Saud University.
Intellectual property (IP) - What is it?. Intellectual property (IP) Refers to creations of the mind, such as inventions; literary and artistic works;
Intellectual Property
Intro to Intellectual Property 3.0
Technology Management Activities and Tools
U. S. Copyright Basics.
Intellectual Property
Intellectual Property
Intellectual Property Rights
Intellectual Property (Part 3)
Presentation transcript:

By Gil Lan Lawyer and Adjunct Law Professor B.Sc., LL.B., LL.M., Ph.D. (candidate) Qualified lawyer in Canada and USA * presentation is general information only. If you require legal advice, you should consult a lawyer about your unique situation

 Technology and the law  many different areas of discussion  Presentation is on laws in U.S.A., Canada and U.K.  Focus on two topics: one specific and one broad ◦ Alteration of Digital Photos (specific) ◦ Intellectual Property for computer scientists (broad)

 Manipulation of photos ◦ the changing of a photograph’s original image ◦ long and old history of this technique – example – President Lincoln of USA

Classic Photograph of US President Lincoln

Abraham Lincoln and John Calhoun Abraham Lincoln and John Calhoun

 Old technique, so why recent concerns?  Introduction of new technology ◦ Cheaper and more accessible ◦ Easy to use software (ex. Adobe Photoshop) ◦ Many images available on internet ◦ Also, very easy to circulate altered photos via internet or

 Useful applications ◦ Show possible designs and creations in the future ◦ Artistic creations ◦ Restoration of old photos ◦ Enhance (personal vanity?)  Socially negative uses ◦ Defamatory or personally misleading photos ◦ Misrepresent products or services ◦ Obscene pictures (ex. Child pornography)

 Is there any specific law that prohibits all photo manipulation?  Answer: NO

 A range of negative behavior from relatively trivial (vanity) to serious (child pornography)  However, many positive aspects too  A complete ban on photo altering technology ◦ Not desirable since would lose positive aspects ◦ Impractical to enforce  Find the middle path: law attacks problem indirectly by focusing on negative behaviors

 Technique used by Western laws ◦ Technology neutral  addresses consequences rather than technology ◦ Written in sections – easy to amend or revise ◦ Many different laws covering different aspects

 Criminal law: ◦ Child pornography: even mere possession is a crime and includes any form of depiction ◦ Fraud – attempt to dishonestly make money ◦ Mischief / Nuisance  Competition Law and consumer laws ◦ Unfair practices  misleading or false advertising ◦ Jail, fines and possibly compensation to the victim

 Defamation Law ◦ If the photo is false or misleading – then can lead to compensation for damage to reputation ◦ Includes personal reputation and business reputation (ex. Products)  Copyright Law ◦ Moral rights of creator  brings work or reputation of author in a negative light

 Employment Law ◦ Any illegal act by employee may be good reason to terminate employment and sue employee ◦ Employer may be liable for employees actions

 Special relationship between law and technology ◦ Law regulates technology but technology can also help law enforcement ◦ Detects forgeries and altered documents ◦ Trace criminals on internet ◦ Find fingerprints and other evidence on documents and pictures

 Very complex  specialized area of study  For computer scientists two main important areas: ◦ Patents ◦ Copyright

 Patent is the exclusive right to make, use or sell an invention within a certain country  Registered on a country by country basis  Protects things such as: ◦ Machines ◦ Processes ◦ Composition of materials

 Exclusive protection for 20 years from date of application  Application process is long  Expensive to apply (at least US $25,000)  Requirements: ◦ Useful ◦ Inventive (goes beyond industry common knowledge) ◦ Novel  Powerful  independent creation not a defence

 Novel  dangerous trap for scientists and scholars ◦ In order to be “novel”, the invention cannot be disclosed to public for more than 12 months before application ◦ However, many scientists and scholars don’t know this and disclose their invention at conferences or seminars  apply more than 12 months later is too late!!!!!

 Can you patent software?  Not clear: must be more than algorithm or formulae  US Patent Office has been allowing some  If you have enough money, it is may be worth a try: ◦ EU Patent Convention specifically prohibited patent for software BUT went and allowed some applications anyway

 Copyright protects the form of the expression of an idea (but not the idea itself) ◦ Books ◦ Music ◦ Movies ◦ Pictures and paintings  Creator has exclusive right to reproduce or perform work in public  Generally  rights last lifetime of author + 70 years (USA)

 Some scholars are uncertain about the future of US copyright law  1998  Disney Company’s copyright was going to expire in 2003  Asked US government to amend the law  Amend to protect US copyrights again in 20 years?!

 Computer scientists: ◦ Software programs: copyright is where most computer programs are protected: will only protect the certain unique parts of the program  not all of the program ◦ Graphic interface: very difficult to protect under US and Canadian law unless extremely unique ◦ Database information: very little protection under copyright law (however cannot steal lists from employer)

 How to establish when you created it? ◦ In Canada and US, it is possible to register it with the government office ◦ However, what if you want to keep it a secret for now or don’t have such registration procedures in a particular country?

 One old technique is to mail it to yourself!!! Not the most reliable though.

 Laws about technology are rapidly evolving  Western models are very new themselves and may not be appropriate in different countries  Very optimistic about China’s future based on what I have seen and studied