Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 4 Intellectual Property Dr. Alaa El-Halees.

Similar presentations


Presentation on theme: "Chapter 4 Intellectual Property Dr. Alaa El-Halees."— Presentation transcript:

1 Chapter 4 Intellectual Property Dr. Alaa El-Halees

2 Outline Definition Information Technology and Intellectual Property Types of Intellectual Property Trade secrets Trademarks and service marks Patents and Design Patients Copyrights Software Piracy Types of Software Ethical Analysis

3 Definition Property usually refers to tangible (touchable) assets over which someone has or claims control. Originally it meant land. Now it could also refer to a car, a machine, a jacket or a toothbrush. In all these cases the property claim is of control of the physical entity.

4 Definition If I claim a land as my property I am saying I can control who has access to that land and what they do there. I can build a fence around it, rent it out, or drill for oil on it. If a car is my property, I get the keys to it. I can exclude others from using it and use it myself for whatever I want, as long as I do not threaten the lives or property of others.

5 Definition Intellectual Property is a term used to describe works of the mind. It is objects that are intangible although they usually have tangible expressions. Example: The intellectual property in a book is not the physical paper and ink, but the arrangement of words that the ink marks on the paper represent. The ink marks can be translated into regions of magnetic polarization on a computer disk, and the intellectual property, and whatever claims there are to that property, will be the same.

6 Definition The owner of a song claims control, not of the CD on which the song is recorded, but of the song itself, of where when and how it can be performed and recorded. Value of intellectual properties much greater than value of media Creating first copy is costly Duplicates cost almost nothing

7 Definition Intellectual property refers to creations of the mind, any unique product of the human intellect that has commercial value Products depend on Intellectual property Books, songs, movies Paintings, drawings Inventions, chemical formulas, computer programs

8 Philosophical Justification for Intellectual Property labor theory of property: According to Locke, a person acquires property rights to something by investing labor in it. For example if someone goes out into the forest, cuts down a tree and saws it into firewood, that wood becomes his property. Even though he did not own the tree or the land it was on and did nothing to plant the tree or make it grow, by putting the work into turning the tree into something useful, the product becomes his. He can use it as he wants, whether to sell or to heat his house, and, more importantly, he can exclude others from its use.

9 Philosophical Justification for Intellectual Property The labor theory is often used today, implicitly at least, to justify claims to intellectual property rights. For example software developers who cite the enormous time and effort that goes into developing a piece of commercial software. The unfairness of others benefiting from it without pay costs to the developer.

10 Information Technology and Intellectual Property 1 ) Computer technology has created a new revolution in how intellectual property is created, stored, reproduced and disseminated; and with that has come new challenges to our understanding of intellectual property and how to protect it.

11 2) Computers have given rise to a whole new category of intellectual property, namely computer software. A major commercial program can take a team of one hundred or more highly skilled and highly paid programmers years to create and can sell for hundreds, or even hundreds of thousands, of dollars per copy. Yet someone with access to such a program can make a copy in moments at practically no cost. Information Technology and Intellectual Property

12 3) As more and more traditional forms of intellectual property, such as writing, music and other sound, movies and videos, photographs, and so on, are being made publicly available on computer networks, they can be copied, manipulated, reworked, excerpted, recombined, and distributed much more easily than before Information Technology and Intellectual Property

13 Types of Intellectual Property Trade secrets Trademarks and service marks Patents and Design Patents Copyrights

14 Trade Secret Trade secret was defined as business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential.

15 Trade Secret Businesses often develop valuable ideas and information “know-how ”.This “know-how” may be a manufacturing process, a specialized customer list, a computer program, or business method which provides the company with a competitive advantage in producing or selling their goods or services. In many cases, much of the commercial success of the company is directly attributable to the fact that competitors do not have access to the company’s valuable know-how.

16 Trade Secret Trade Secret “Confidential piece of intellectual property such as formula, pattern, device or compilation of information which is used in one’s business, and which gives him an opportunity to obtain an advantage over competitors who do not know or use it.”

17 Trade Secret Never expires A trade secret does not require formal registration in order to obtain protection. No application fees are required to protect a trade secret. Any information can qualify as a trade secret, so long as it has competitive value and is kept confidential.

18 Example: After Sam discovered a new method for manipulating images in multimedia works, he demonstrated his new method to a number of other developers at a multimedia conference. Sam lost his trade secret protection for the image manipulation method because he failed to keep his method. Trade Secret

19 If competitors come up with the same idea on their own, it is not stealing; in other words, the law doesn’t prevent someone from using the same idea if it was developed independently.

20 Trade Secret Examples a manufacturing process, and sensitive propriety information, and stock-picking formulae, pricing information, non-public financial data, and customer lists that are not readily available from other sources. The formula for Coca-Cola is the most famous trade secret.

21 Trade Secret Employees are the greatest threat to the loss of company trade secrets—they might accidentally disclose trade secrets or steal them for monetary gain. Organizations must educate employees about the importance of maintaining the secrecy of corporate information. Trade secret information should be labeled clearly as confidential and should only be accessible by a limited number of people.

22 Trade Secret Losing customer information to competitors is a growing concern in industries in which companies struggle for many of the same clients. There are numerous cases of employees making unauthorized use of their employer’s customer list.

23 Trade Secret For example, the Ohio State Supreme Court upheld a verdict against a man who left a financial services firm and recruited former clients to start his own firm. His former employer sued him, even though the former employee had not stolen a client list. “This ruling says, it doesn’t matter if the confidential list is on paper or in your memory if it qualifies as a trade secret,”

24 Trade Secret Another Example: IBM sued Mark Papermaster, a microchip expert, for violating an agreement when he announced that he intended to leave the company to join Apple as its head of device hardware engineering. The lawsuit was settled when Papermaster agreed he must twice submit to IBM a written declaration that states he is not using confidential IBM material in his role at Apple.

25 Trademark Trademarks are commercial identifiers used by businesses to identify their products and services to consumers. They can take virtually any form, and they help the public to distinguish the goods or services of one company from those of its competitors.

26 Trademark The most common trademark forms are is a word, symbol, picture, sound, color or smell. However, trademarks can take the form of essentially anything that becomes recognized as representation of a specific enterprise or its products or services. One business commonly develops and maintains several different trademarks (e.g., the fast food company, McDonalds, asserts trademark protection over many different marks, including its name, its golden arches logo, and the “Mc” prefix for its products).

27 Trademark Society benefits from branding because branding allow consumers to have more confidence in the quality of products they purchase. Does not expire, Need registration and usually need renewing registering every 10 years.

28 Trademark For example, assume a developer wishes to use the character Simba, the character in Disney’s The Lion King, in a multimedia work about the living habits of lions in the wild. Unless a usage license is obtained, this would not only infringe the copyright in the character’s illustrated design, but the trademark rights in its name as used in connection with marketing and promoting the film. Further, the developer might face additional liability under unfair competition law for falsely implying that Disney had endorsed its product.

29 Trademark Trademark business to Identify goods Service mark: Identifies services. A service mark differs from a trademark in that the mark is used on the advertising of the service rather than on the packaging or delivery of the service, since there is generally no "package" to place the mark on, which is the practice for trademarks

30 Trademark By grading a trademark or service mark, a government gives a company the right to use it and the right to prevent other companies from using it. Company can establish a “brand name”

31 Trademark Marks that have “generic” meanings (i.e., meanings that have nothing to do with the company in question) are more difficult to protect as Trademarks, Example of trademark that have both generic and trademark status is “Apple”.This words has generic meanings, but it has also been established as an enforceable trademark through commercial use and the development of a secondary meaning associated with a specific company.

32 Trademark The law does not permit the trademark owner to block uses of the mark that involve the mark’s generic meaning. Accordingly, Apple Computer can effectively enforce its trademark rightness to the mark, “Apple,” in its classes of use (e.g., the computer industry), but it cannot stop parties who use that mark in other fields in which the term is generic and thus not protected as a trademark (e.g., the produce industry).

33 Trademark Another problem if the Trademark become generic name. If brand name becomes common noun, trademark may be lost. For example “aspirin” and “Kleenex”

34 Patents and Design Patents Patents A public document that provides detailed description of invention. Patent should be registered usually in ministry of commerce ( for example, office of patent and trademarks in USA). Provides owner with exclusive right to the invention. Owner can prevent others from making, using, or selling invention for 20 years

35 Patents and Design Patents Example : This technology enables translations of instant messages to facilitate conversations between speakers of different languages, especially for English-to-non-English conversations.

36 Patents and Design Patents Holographic keyboard (US 20020070921 A1)

37 Patents and Design Patents Difference between trade secret and patent - A patent and a trade secret cannot coexist on the same invention information. - They are mutually exclusive. A patent presents exclusive rights to prevent others from making, using or selling the patented subject matter. - The trade off is that the patent, once issued, is published for the entire world to know and the inventor cannot hold any information back. Thus, nothing in an issued patent or published patent application can be a trade secret

38 Patents and Design Patents Also, unlike a trade secret, a patent prevents independent creation. Even if someone else invents the same item independently and with no prior knowledge of the patent holder’s invention, the second inventor is excluded from using the patented device without permission of the original patent holder.

39 Patents and Design Patents Until a patent issues, the Patent and Trademark Office retains the patent application subject to trade secret protection and will not disclose the information, because there is always the possibility that a patent will not issue.

40 Patents and Design Patents Design patent is a patent granted on the ornamental (decorative ) design of a functional item. Design patents are a type of industrial design right. Ornamental designs of jewelry, furniture, beverage containers and computer icons are examples of what can be covered by design patents.

41 Patents and Design Patents Example: Google has a design patent on its famously simple search box.

42 Patents and Design Patents Comparison to patents Patents (which called utility patent) protect the functionality of a given item. They are generally valid for up to 20 years from the date of filing. Design patents cover the ornamental nonfunctional design of an item. Design patents can be invalidated if the design has practical utility (e.g. the shape of a gear). Design patents are valid for 14 years from the date of issue.

43 Patents and Design Patents Software Patent In USA, Since the early 1980s, the Patent office has granted as many as 20,000 software-related patents per year. Applications software, business software, expert systems, and system software have been patented, as well as such software processes as compilation routines, editing and control functions, and operating system techniques. Even electronic font types and icons have been patented.

44 Patents and Design Patents Example A small company Cygnus Systems alleged in late 2008 that Apple, Google, and Microsoft infringed a patent that Cygnus filed for in 2001. Cygnus says that the three firms violated its patent on the use of document-preview icons(thumbnails).

45 Copyright Copyright is how government provides owner of an original work that they have been written. The five rights are: 1) The right to reproduce the copyrighted work. 2) The right to distribute copies of the work to public 3) The right to display copies of the work in public 4) The write to perform the work in public 5) The write to produce new works derived from copyrighted work.

46 Copyright Industries rely upon copyright law for production are: movie industry, music industry, software industry, and book publishing.

47 Copyright Copyright lasts for many years. Most often it lasts for the life of the work’s creator (its author) plus 70 years. In cases where the creator is a business, the copyright lasts between 95 and 120 years.

48 Copyright Copyright law is important for multimedia developers and publishers for two reasons: Original multimedia works are protected by copyright. The Copyright Act’s exclusive rights provision gives developers and publishers the right to control unauthorized use of their works. Multimedia works are created by combining “content” – music, text, graphics, illustrations, photographs, software – that is protected under copyright law. Developers and publishers must avoid infringing copyrights owned by others.

49 Copyright Difference Between a Copyright and Patent A copyright protects a form of expression, but not the subject matter of the work. For example, if someone wrote an article about a new car on the market, the text would be copyrighted, preventing someone else from using that particular material. However, a copyright does not prevent others from writing their own original article about this new car, or from using or making the car themselves.

50 Copyright Difference Between a Copyright and Trademark Copyright laws specifically do not protect names, titles or short phrases. That's where trademark law comes in. For example: Title of a book is protected by trademark but the text of the book protected by copyright.

51 Copyright Fair Use Of Copyright: has been used to balance the interests of authors, publishers, and the public. For example: Fair use in a copyright principle based on the belief that the public is entitled to freely use portions of copyrighted materials for purposes of commentary and criticism. if you wish to criticize a novelist, you should have the freedom to quote a portion of the novelist's work without asking permission. Absent this freedom, copyright owners could stop any negative comments about their work.

52 Copyright In fair use of copyright four factors that need to be considered: 1) What is the purpose and character of the use? An educational use is more likely to be permissible than a commercial use. 2) What is the nature of the work being copied? Published works are preferred over unpublished work 3) How much of the copyrighted work is being used? Brief paragraphs are more likely to be permissible than entire chapters. 4) How will this use affect market for copyrighted work? 5) Use of out-of-print materials is more likely to be permissible than use of readily available work.

53 Copyright If your multimedia work serves traditional "fair use" purposes - criticism, comment, news reporting, teaching, and research - you have a better chance of falling within the bounds of fair use than you do if your work is a sold to the public for entertainment purposes and for commercial gain.

54 Copyright Example: Google’s massive book-scanning project that makes complete copies of books without an author’s permission is perfectly legal under U.S. copyright law, a federal judge ruled today, deciding an 8-year-old legal battle in 2013. Google’s limited use of the work makes the scanning “fair use” under copyright law.

55 Copyright Example : A map on my web page? “Due to licensing restrictions, we cannot authorize you to put a map image directly on a web page. However, you can add ``map of'' links to your (non- commercial) web pages as fair use.

56 Copyright What is the difference between patenting and copyrighting software? Copyright : automatic and free protection of a literary work. Patent : protects a function, independently of the grammatical construction of the lines of code.

57 Copyright Patents and copyrights are two different types of intellectual property rights. Patent law gives the patent holder the right to prevent others from making, using, selling or importing a program that performs the same function or process as the patented software, even if the code is entirely different from the patented software, whereas copyright law protects only the code as it is written. It is possible to protect some software under both copyright and patent law.

58 Intellectual Property and Software Under what Intellectual Property the following computer parts will be under: 1. Computer Hardware 2. Methods 3. Software Name 4. Analysis and Design Of Software 5. Object Code Software 6. Execution Code Software 7. Source Code Software 8. Use Interface 9. Menu and Screen Design 10. Report Layout 11. Documentation 12. Domain Name for Website 13. IP 14. Web site Logo 15. Web site contains 16. Web Site layout and Design

59 Software Piracy Software piracy is the illegal distribution and/or reproduction of software applications for business or personal use. Unlike other things you purchase, the software applications you buy don't belong to you. Instead, you become a licensed user — you purchase the right to use the software on a single computer, but you can't put copies on other machines or pass that software along to colleagues.

60 Software Piracy Types of Software Piracy 1) Softlifting Softlifting occurs when a person purchases a single licensed copy of a software program and loads it on several machines, in violation of the terms of the license agreement. Typical examples of softlifting include, "sharing" software with friends and co-workers and installing software on home/laptop computers if not allowed to do so by the license.

61 Software Piracy 2)Unrestricted Client Access Unrestricted client access piracy occurs when a copy of a software program is copied onto an organization's servers and the organization's network "clients" are allowed to freely access the software in violation of the terms of the license agreement. A violation also occurs when the organization has a client- server license, the organization is not enforcing user restrictions outlined in the license. For instance, when the license places a restriction on the number of concurrent users that are allowed access to that program and the organization is not enforcing that number.

62 Software Piracy 3) Hard-disk Loading Hard-disk loading occurs when an individual or company sells computers preloaded with illegal copies of software. Often this is done by the vendor as an incentive to buy certain hardware. If you buy or rent computers with preloaded software, your purchase documentation and contract with the vendor must specify which software is preloaded and that these are legal, licensed copies. If it does not and the vendor is unwilling to supply you with the proper documentation, do not deal with that vendor.

63 Software Piracy 4) OEM Piracy /Unbundling Some software, known as OEM (original equipment manufacturer) software, is only legally sold with specified hardware. When these programs are copied and sold separately from the hardware, this is a violation of the distribution contract between the vendor and the software publisher. Similarly, the term "unbundling" refers to the act of selling software separately that is legally sold only when bundled with another package.

64 Software Piracy 5) Commercial Use of Noncommercial Software Using educational or other commercial-use-restricted software in violation of the software license is a form of software piracy. Software companies will often market special non-commercial software aimed at a particular audience. For example, many software companies sell educational versions of their software to public schools, universities and other educational institutions. The price of this software is often greatly reduced by the publisher in recognition of the educational nature of the institutions. Acquiring and using noncommercial software hurts not only the software publisher, but also the institution that was the intended recipient of the software.

65 Software Piracy 6) Counterfeiting Counterfeiting is the duplication and sale of unauthorized copies of software in such a manner as to try to pass off the illegal copy as if it were a legitimate copy produced or authorized by the legal publisher.

66 Software Piracy 7) CD-R Piracy CD-R piracy is the illegal copying of software using CD-R recording technology. This form of piracy occurs when a person obtains a copy of a software program and makes a copy or copies and re-distributes them to friends or for re-sale. Although there is some overlap between CD-R piracy and counterfeiting, with CD-R piracy there may be no attempt to try to pass off the illegal copy as a legitimate copy - it may have hand-written labels and no documentation at all.

67 Software Piracy 8) Internet Piracy Internet piracy is the uploading of commercial software (on to the Internet for anyone to copy or copying commercial software from any of these services. Internet piracy also includes making available or offering for sale pirated software over the Internet.

68 Software Piracy There are several reasons not to use pirated or pirate software. Increase the chances that the software will not function correctly or will fail completely; Lose access to customer support, upgrades, technical documentation, training, and bug fixes; Have no warranty to protect themselves; Increase their risk of exposure to a debilitating virus that can destroy valuable data; Are subject to significant fines for copyright violation; and Risk potential negative publicity and public and private humiliation.

69 Types of Software Distribution Software can be classified into Five broad categories in terms of copyright: 1) Commercial Software Commercial software includes a major share of software purchased from software publishers, commercial computer stores etc. The purchasing of software, entitles you with the license to use the software and not to own it. The commercial software licenses requires that the software is being covered by copyright. Although one archival copy of the software can be made, the back up copy cannot be used except when the original package fails or is destroyed. Modifications of the software is not permitted. Decompiling (i.e. reverse engineering) of the program code is not allowed without the permission of the copyright holder. Development of new works built on package too requires permission.

70 Types of Software Distribution 2) Shareware Software Shareware software too comes under copyright and the purchase will only give you the license to use it, not the ownership. Shareware software licenses require that, even if one archival copy of the software can be made, the back up copy cannot be used except when the original package fails or is destroyed. Modifications to the software is not allowed. Decompiling (i.e. reverse engineering) of program code is not allowed without the permission of the copyright holder. Development of new work built upon the package is not allowed without the permission of the copyright holder. Shareware has license limitation as commercial software but the developer does not get fees from it.

71 Types of Software Distribution 3) Freeware Freeware also comes under the copyright protection and subject to the conditions defined by the holder of the copyright. The conditions for freeware are in direct opposition to normal copyright restrictions. Freeware software licenses require that the software is covered by copyright. Copies of the software can be made for both archival and distribution purposes.

72 Types of Software Distribution 4) Public domain Public domain software comes into being when the original copyright holder explicitly leave all rights to the software. All intellectual works are being protected as soon as they are committed to a medium. For something to be a public domain, it must be clearly marked as a public domain. Freeware is not necessarily in the public domain; the author may choose to give it away for free but wish to retain copyright... to prevent it from being sold by a third party, for example, or to insist that modified copies cannot be distributed because the author wants to retain some kind of quality control.

73 Types of Software Distribution 5) Open source is an alternative way of distributing software. Licenses for open-source program have the following key characteristics: 1) No restrictions preventing others from selling or giving away software. 2) Source code included in distribution. 3) No restrictions preventing others from modifying source code. 4) No restrictions regarding how people can use software. 5) Same rights apply to everyone receiving redistributions of the software.

74 Types of Software Distribution No thing in the guidelines that say an open-source program must be given for free. While people may freely exchange open-source programs, a company has the right to sell an open-source program. However, company can not stop other from selling it either. In order to successfully selling open-source software that people can find it free on the Internet., it must add some additional value to the software. Perhaps it packages the software so it particularly easy to install. It may provide great manuals, or it may provide support after the sale.

75 Types of Software Distribution Beneficial Consequences of Open-Source Software 1) Gives everyone opportunity to improve program 2) New versions of programs appear more frequently 3) Eliminates tension between obeying law and helping others 4) Programs belong to entire community 5) Shifts focus from manufacturing to service

76 Types of Software Distribution Critique of the Open-Source Software 1) No maintenance and support 2) No warranties regarding media, viruses, and performance 3) Without an “owner,” incompatible versions may arise 4) License terms are NOT standard: thus important to pay close attention to terms. 5) Poor mechanism for stimulating innovation (no companies will spend billions on new programs)

77 Ethical Analysis To evaluate an action as an ethical the following guideless can be used: 1) Divine Theory (Religious) 2) Ethical theories (Philosophy) 3) Local legislations (laws) 4) Codes of Conduct (Professionalism)

78 Divine Theory (Religious) قرار مجمع الفقه الاسلامي الدولي بشأن الحقوق المعنوية ان مجلس الفقه الاسلامي المنعقد في دورة مؤتمره الخامس بالكويت من 1 الى 6 جمادى الاولي سنة 1409 بعد الاطلاع على البحوث المقدمة من الاعضاء والخبراء في موضوع الحقوق المعنوية واستماعه للمناقشات التي دارت حوله قرر مايأتي : اولا : الاسم التجاري ، والعنوان التجاري ، والعلامة التجارية، والتأليف والاختراع والابتكار ، هي حقوق خاصة لاصحابها أصبح لها في العرف المعاصر قيمة مالية معتبرة لتمول الناس لها ، وهذه الحقوق يعتد بها شرعا ، فلا يجوز الاعتداء عليها. ثانيا : يجوز التصرف في الاسم التجاري ، او العنوان التجاري ، او العلامة التجارية ونقل أي منها بعوض مالي اذا انتفى الغرر و التدليس و الغش ، باعتبار ان ذلك اصبح حقا ماليا ثالثا : حقوق التأليف والاختراع والابتكار مصونة شرعا ولاصحابها حق التصرف فيها و لايجوز الاعتداء عليها. والله أعلم

79 Divine Theory (Religious) ولقد اصدرت اللجنة الدائمة للبحوث العلمية والافتاء بالمملكة العربية السعودية فتوى برقم ( 18453) وتاريخ 2/1/1417 بخصوص نسخ برامج الحاسب الالي التي يمنع اصحابها نسخها وجاء فيها ( الحمد لله وحده والصلاة والسلام على من لا نبي بعده... وبعد فقد اطلعت اللجنة الدائمة للبحوث العلمية والافتاء على ماورد الى سماحة المفتي العام و المحال من الامانة العامة لهيئة كبار العلماء برقم ( 2144) وتاريخ 8 /5/1416 وقد سأل المستفتي سؤال هذا نصه : ( أعمل في مجال الحاسب الالي منذ فترة ، ومنذ ان بدأت العمل في هذا المجال أقوم بنسخ البرامج للعمل عليها ، ويتم ذلك دون ان أشتري النسخ الاصلية لهذه البرامج ، علما بانه توجد على هذه البرامج عبارات تحذيرية من النسخ مؤداها ان حقوق النسخ محفوظه تشبه عبارة ( حقوق الطبع محفوظه ) الموجودة على بعض الكتب ، وقد يكون صاحب البرنامج مسلما او كافر وسؤالي هو : هل يجوز النسخ بهذه الطريقة ام لا )

80 Divine Theory (Religious) وبعد دراسة اللجنة للاستفتاء أجابت بأنه لا يجوز نسخ البرامج التي يمنع أصحابها نسخها الا بإذنهم لقوله صلى الله عليه وسلم ( المسلمون على شروطهم ) ولقوله صلى الله عليه وسلم ( لايحل مال امرئ مسلم الا بطيبة عن نفسه ) وقوله ( من سبق الى مباح فهو أحق به ) سواء كان صاحب هذا البرنامج مسلما او كافر غير حربي ، لان حق الكافر غير الحربي كحق المسلم والله أعلم

81 Ethical theories (Philosophy) Kant theory Analysis One would say “ It is acceptable for me to steal Intellectual property validly own be creator or producer of property” To maximize “ Ever one did this” This lead to destruction of all organizations and companies depend on Intellectual property in his work such as software companies and book publishing.

82 Ethical theories (Philosophy) Utility theory Analysis Argument against copying - Copying software reduces software purchases. - If less software is purchased, less money will flow to the producers of software. - As a result, less new software will be produced. - As a whole, new software titles benefit society. When the number of new titles drop, society is harmed.

83 Ethical theories (Philosophy) Social Contract Theory Locke consider property is natural right, Justification of that in his theory (labor theory) as stated above.

84 Local legislations (laws) قانون حماية الملكية الفكرية الفلسطيني لسنة 2003 الباب الأول الملكية الصناعية تابع لوزارة الاقتصاد الوطني الفصل الثاني براءات الاختراع مادة (4) ” يكون الاختراع قابلا للحماية بالبراءة إذا توافرت فيه الشروط الآتية :... الخ “ ” مدة براءة الاختراع عشرون سنة... ”

85 Local legislations (laws) الفصل الثالث العلامات التجارية المادة 40 ” كل من يرغب في استعمال علامة تجارية لتمييز بضائع من إنتاجه أو صنعه... الخ “ ” مدة الحماية المترتبة على تسجيل العلامة التجارية عشر سنوات... الخ ” الفصل الخامس الرسوم الصناعية والنماذج الصناعية مادة (86) ” يكون الرسم الصناعي أو النموذج الصناعي قابلاً للتسجيل بتوافر الشروط التالية... الخ “ ” مدة حماية الرسم الصناعي أو النموذج الصناعي خمس عشرة سنة ”

86 Local legislations (laws) الفصل التاسع الأسرار التجارية مادة (106) ” تتمتع بالحماية طبقا لأحكام هذا القانون الأسرار التجارية، وتشمل ما يلي... الخ “ حق المؤلف والحقوق المجاورة يتبع وزارة الثقافة تشمل الحماية بوجه خاص المصنفات التالية : المادة 134 6. ” مصنفات الحاسب الآلي من برامج وقواعد بيانات وما يماثلها.“ تحمى الحقوق المالية للمؤلف المنصوص عليها في هذا الباب مدة حياته ولخمسين سنة

87 Codes of Conduct (Professionalism) Association of Computer Machinery (ACM) Code of Conduct 1.5 Honor property rights including copyrights and patents 1.6 Give proper credit for intellectual property


Download ppt "Chapter 4 Intellectual Property Dr. Alaa El-Halees."

Similar presentations


Ads by Google