Intellectual Property

Slides:



Advertisements
Similar presentations
Ethics in Information Technology, Second Edition
Advertisements

Introduction to Copyright Principles © 2005 Patricia L. Bellia. May be reproduced, distributed or adapted for educational purposes only.
Ethics in Information Technology, Fourth Edition
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Copyright © 2008 by Nelson, a division of Thomson Canada Limited ENTREPRENEURSHIP A PROCESS PERSPECTIVE Robert A. Baron Scott A. Shane A. Rebecca Reuber.
1 Introduction to Software Engineering Lecture 38 – Intellectual Property.
Chapter 7.5 Intellectual Property Content, Law and Practice.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Intellectual Property OBE 118 Fall 2004 Professor McKinsey Some property, very valuable property, exists only in our minds, in our imagination. It is intangible.
Chapter 14 Legal Aspects of Sport Marketing
P A R T P A R T Crimes & Torts Crimes Intentional Torts Negligence & Strict Liability Intellectual Property & Unfair Competition 2 McGraw-Hill/Irwin Business.
IP=Increased Profits How to Make Your IP Work For You Rachel Lerner COSE Fall 2006.
Patents and trade secrets 6 6 Chapter. Patents  Grant of property rights to inventors  Issued by the U.S. Patent and Trademark Office (USPTO)  Permits.
Chapter 6 Intellectual Property See My Pointers (Local Access only)
What is copyright? the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or.
Intellectual Property Rights and Computer Technology
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
Chapter Two Ethical & Legal Issues.
Copyright. US Constitution Article I – Section 8 Congress shall have the power to promote the Progress of Science and useful Arts, by securing for limited.
Intro to Intellectual Property 05/13/2015. Exponential Inventor Intro to Intellectual Property 05/13/2015 Why is IP Important? Everyone makes a big deal.
Intellectual Property
MSE602 ENGINEERING INNOVATION MANAGEMENT
CIS 318: Ethics for the IT Professional Week 5
Introduction to IP Ellen Monson Director Intellectual Property Office University of Cincinnati.
Intellectual Property Intellectual Property. Intellectual Property Intellectual effort, not by physical labor Intangible property Lawsuits involve infringement.
Using IP to Protect IST/SRA Innovations Prof. John W. Bagby on for Prof. Anna Squicciarini.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Ethics in Information Technology, Second Edition 1 Computer & Society Week 7 Marwan Al-Namari.
Chapter 08.  Describes property that is developed through an intellectual and creative process  Inventions, writings, trademarks that are a business’s.
The Legal Environment What laws and regulation apply to businesses?
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
Ethical and Social...J.M.Kizza1 Module 5: Intellectual Property Rights and Computer Technology  Computer Products and Services  Instruments of Protection.
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
Internet and Intellectual Property  University of Palestine  Eng. Wisam Zaqoot  Feb 2010 ITSS 4201 Internet Insurance and Information Hiding.
The Quest for Copyright Understanding Miguel Guhlin
INTELLECTUAL PROPERTY Chapter 6. WHAT IS INTELLECTUAL PROPERTY? Intellectual Property is a term used to describe works of the mind (art, books, films,
Ethics in Information Technology, Second Edition Chapter 6 Intellectual Property.
The Ethical Use of Electronic Media. V Computer Ethics  Resources such as images and text on the Internet are copyrighted.  Plagiarism (using.
The Ethical Use of Electronic Media.
Chapter 6 Intellectual Property
Intellectual Property Basics: What Rules Apply to Faculty, Staff, and Student Work Product? Dave Broome Vice Chancellor and General Counsel October 15,
Intellectual property (cont.) 1. Software as intellectual property 2  The law concerning software is not clear and is steal being formulated  In USA.
Prentice Hall © PowerPoint Slides to accompany The Legal Environment of Business and Online Commerce 4E, by Henry R. Cheeseman Chapter 8 Intellectual.
Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst appears behind the blue triangles,
Chapter 10 Intellectual Property Rights Twomey, Business Law and the Regulatory Environment (14th Ed.)
Legal and Ethical Issues in Computer Security Csilla Farkas
Lecture 27 Intellectual Property. Intellectual Property simply defined is any form of knowledge or expression created with one's intellect. It includes.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Essentials Of Business Law Chapter 25 Intellectual Property McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Fundamentals of Intellectual Property
CISB 412 Social and Professional Issues Understanding Intellectual Property.
Chapter 18 The Legal Aspects of Sport Marketing. Objectives To introduce the key legal concepts and issues that affect the marketing of the sport product.
The Ethical Use of Electronic Media. Guilford County SciVis V
Intellectual Property. An original (creative) work, invention or information protected by law through a trademark, patent, copyright or trade secret.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
6/18/2016 COPYRIGHT AND Fair Use Guidelines “Respect Copyright, Celebrate Creativity”
Intellectual Property. An original (creative) work, invention or information protected by law through a trademark, patent, copyright or trade secret.
Technology Transfer Office
Essentials of the legal environment today, 5e
Intellectual Property
Ethics in Information Technology, Fourth Edition
Ethics in Information Technology
Intellectual Property
Computer ethics in computer science curriculum
Ethics in Information Technology, Fourth Edition
Intellectual Property
Chapter # 6 Intellectual Property
Presentation transcript:

Intellectual Property

Objectives 1. What does the term intellectual property encompass, and why are organizations so concerned about protecting intellectual property? 2. What are the strengths and limitations of using copyrights, patents, and trade secret laws to protect intellectual property? 3. What is plagiarism, and what can be done to combat it? 4. What is reverse engineering, and what issues are associated with applying it to create a look-alike of a competitor’s software program? 5. What is open source code, and what is the fundamental premise behind its use? 6. What is the essential difference between competitive intelligence and industrial espionage, and how is competitive intelligence gathered? 7. What is cybersquatting, and what strategy should be used to protect an organization from it?

Intellectual property Defined as: is a term used to describe works of the mind such as art, books, films, formulas, inventions, music, and processes—that are distinct, and owned or created by a single person or group. Intellectual property is protected through copyright, patent, and trade secret laws.

A copyright is the exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work. Copyright infringement is a violation of the rights secured by the owner of a copyright. Infringement occurs when someone copies a substantial and material part of another’s copyrighted work without permission.

Copyrights, patents, trademarks, and trade secrets provide a complex body of law relating to the ownership of intellectual property, which represents a large and valuable asset to most companies. If these assets are not protected, other companies can copy or steal them, resulting in significant loss of revenue and competitive advantage.

Eligible Works The types of work that can be copyrighted include architecture, art, audiovisual works, choreography, drama, graphics, literature, motion pictures, music, pantomimes, pictures, sculptures, sound recordings, and other intellectual works, as described in Title 17 of the U.S. Code. To be eligible for a copyright, a work must fall within one of the preceding categories, and it must be original.

Fair Use Doctrine Fair use doctrine allows portions of copyrighted materials to be used without permission under certain circumstances. Title 17, section 107, of the U.S. Code established four factors that courts should consider when deciding whether a particular use of copyrighted property is fair and can be allowed without penalty: The purpose and character of the use (such as commercial use or nonprofit, educational purposes) The nature of the copyrighted work The portion of the copyrighted work used in relation to the work as a whole The effect of the use on the value of the copyrighted work12

Copyright law has proven to be extremely flexible in covering new technologies, including software, video games, multimedia works, and Web pages. However, evaluating the originality of a work can be difficult and has led to litigation. • Copyrights provide less protection for software than patents; software that produces the same result in a slightly different way may not infringe a copyright if no copying occurred.

Software Copyright Protection The use of copyrights to protect computer software raises many complicated issues of interpretation. For example, a software manufacturer can observe the operation of a competitor’s copyrighted program and then create a program that accomplishes the same result and performs in the same manner.

The Digital Millennium Copyright Act makes it illegal to circumvent a technical protection or develop and provide tools that allow others to access a technologically protected work. • The Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of 2008 increased trademark and copyright enforcement; it also substantially increased penalties for infringement.

General Agreement on Tariffs and Trade (GATT) The original General Agreement on Tariffs and Trade (GATT) was signed in 1947 by 150 countries. Since then, there have been eight rounds of negotiations addressing various trade issues. The Uruguay Round, completed in December 1993, resulted in a trade agreement among 117 countries. This agreement also created the World Trade Organization (WTO) in Geneva, Switzerland, to enforce compliance with the agreement. GATT includes a section covering copyrights called the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS).

OWTO and the WTO TRIPS Agreement (1994) The World Trade Organization (WTO) deals with rules of international trade based on WTO agreements that are negotiated and signed by members of the world’s trading nations. The WTO is headquartered in Geneva, Switzerland, and had 153 member nations as of July 2008.

Summary of the WTO TRIPS Agreement Form of intellectual property Key terms of agreement Copyright Computer programs are protected as literary works. Authors of computer programs and producers of sound recordings have the right to prohibit the commercial rental of their works to the public. Patent Patent protection is available for any invention—whether a product or process—in all fields of technology without discrimination, subject to the normal tests of novelty, inventiveness, and industrial applicability. It is also required that patents be available and patent rights enjoyable without discrimination as to the place of invention and whether products are imported or locally produced. Trade secret Trade secrets and other types of undisclosed information that have commercial value must be protected against breach of confidence and other acts that are contrary to honest commercial practices. However, reasonable steps must have been taken to keep the information secret.

The World Intellectual Property Organization (WIPO) Copyright Treaty (1996) The World Intellectual Property Organization (WIPO), headquartered in Geneva, Switzerland An agency of the United Nations established in 1967. WIPO is dedicated to developing “A balanced and accessible international intellectual property (IP) system, which rewards creativity, stimulates innovation and contributes to economic development while safeguarding the public interest.”

The Digital Millennium Copyright Act (1998) The Digital Millennium Copyright Act (DMCA) was signed into law in November 1998; it was written to bring U.S. law into compliance with the global copyright protection treaty from WIPO. The DMCA added new provisions, making it an offense to do the following: Circumvent a technical protection Develop and provide tools that allow others to access a technologically protected work Manufacture, import, provide, or traffic in tools that enable others to circumvent protection and copy a protected work

P A T E N T S A patent enables an inventor to sue people who manufacture, use, or sell the invention without permission while the patent is in force. A patent prevents copying as well as independent creation (which is allowable under copyright law).

The main body of law that governs patents is contained in Title 35 of the U.S. Code, which states that an invention must pass the following four tests to be eligible for a patent: • It must fall into one of five statutory classes of items that can be patented: (1) processes, (2) machines, (3) manufactures (such as objects made by humans or machines), (4) compositions of matter (such as chemical compounds), and (5) new uses in any of the previous four classes. It must be useful. It must be novel. It must not be obvious to a person having ordinary skill in the same field.

Software Cross-Licensing Agreements Many large software companies have cross-licensing agreements in which each party agrees not to sue the other over patent infringements. For example, Microsoft is working to put in place 100 or more agreements with firms such as IBM, Sun Microsystems, SAP, Hewlett-Packard, Siemens, Cisco, Autodesk, Brother, Lexmark, Cadence, Pioneer, and Nikon by 2010

Defensive Publishing and Patent Trolls Inventors sometimes employ a tactic called defensive publishing as an alternative to filing for patents. Under this approach, a company publishes a description of its innovation in a bulletin, conference paper, or trade journal, or on a Web site. Patent troll is a firm that acquires patents with no intention of manufacturing anything, instead licensing the patents to others. Intellectual Ventures is an example of such a firm; it has built a portfolio of more than 20,000 patents, most for IT-related technology.

Submarine Patents and Patent Farming A standard is a definition that has been approved by a recognized standards organization or accepted as a de facto standard within a particular industry. Standards exist for communication protocols, programming languages, operating systems, data formats, and electrical interfaces. submarine patent A patented process or invention that is surreptitiously included within a standard without being made public until after the standard is broadly adopted is called a submarine patent.

Patent farming: A devious patent holder might influence a standards organization to make use of its patented item without revealing the existence of the patent. Later, the patent holder might demand royalties from all parties that use the standard. This strategy is known as patent farming.

Patent infringement Software Patents Monetary penalties are limited, if the court determines that a patent has been intentionally infringed it can award up to triple the amount of the damages claimed by the patent holder. Software Patents A software patent claims as its invention some feature or process embodied in instructions executed by a computer. Prior to 1981, the courts regularly turned down requests for such patents, giving the impression that software could not be patented. In the 1981 Diamond v. Diehr (1st Patent)

Trade Secret a trade secret, information must have economic value and must not be readily ascertainable. In addition, the trade secret’s owner must have taken steps to maintain its secrecy. Trade secret laws do not prevent someone from using the same idea if it was developed independently or from analyzing an end product to figure out the trade secret behind it.

Three Key Advantages of Trade Secret Law Trade secret law has three key advantages over the use of patents and copyrights in protecting companies from losing control of their intellectual property: (1) There are no time limitations on the protection of trade secrets, unlike patents and copyrights; (2) There is no need to file any application or otherwise disclose a trade secret to outsiders to gain protection (3) There is no risk that a trade secret might be found invalid in court.

Employees and Trade Secrets Employees are the greatest threat to the loss of company trade secrets—they might accidentally disclose trade secrets or steal them for monetary gain. Organizations must educate employees about the importance of maintaining the secrecy of corporate information. Nondisclosure clauses Because organizations can risk losing trade secrets when key employees leave, they often try to prohibit employees from revealing secrets by adding nondisclosure clauses to employment contracts.

Noncompete agreement A noncompete agreement prohibits an employee from working for any competitors for a period of time, often one to two years. When courts are asked to settle disputes over noncompete agreements, they consider the reasonableness of the restriction and how the restriction protects the legitimate interests of the former employer.

Plagiarism Plagiarism is the act of stealing someone’s ideas or words and passing them off as one’s own. The following databases of electronic content: • More than 5 billion pages of publicly accessible electronic content on the Internet • Millions of works published in electronic form, including newspapers, magazines, journals, and electronic books • A database of papers submitted to the plagiarism detection service from participating institutions

Partial list of plagiarism detection services and software Name of service Web site Provider iThenticate www.ithenticate.com iParadigms Turnitin www.turnitin.com SafeAssign www.safeassign.com Blackboard Glatt Plagiarism Services www.plagiarism.com EVE Plagiarism Detection www.canexus.com/eve CaNexus

Plagiarize is to steal someone’s ideas or words and pass them off as one’s own. Plagiarism detection systems enable people to check the originality of documents and manuscripts. Reverse engineering is the process of breaking something down in order to understand it, build a copy of it, or improve it. Reverse engineering as originally applied to computer hardware, but is now commonly applied to software. In some situations, reverse engineering might be considered unethical because it enables access to information that another organization may have copyrighted or classified as a trade secret.

Open source code Open source code is any program whose source code is made available for use or modification, as users or other developers see fit. Competitive intelligence is legally obtained information that is gathered to help a company gain an advantage over its rivals. For example, some companies have employees who monitor the public announcements of property transfers to detect any plant or store expansions of competitors. Competitive intelligence analysts must take care to avoid unethical or illegal behavior, including lying, misrepresentation, theft, bribery, or eavesdropping with illegal devices.

Cyber Squatter Cybersquatters register domain names for famous trademarks or company names to which they have no connection, with the hope that the trademark’s owner will eventually buy the domain name for a large sum of money. The main tactic organizations use to circumvent cybersquatting is to protect a trademark by registering numerous domain names and variations as soon as they know they want to develop a Web presence.