Software Security SC Lecture 2: Software Law

Slides:



Advertisements
Similar presentations
Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Advertisements

INTRODUCTION TO PATENT RIGHTS The Business of Intellectual Property
Vladimir Misic: 10 Professionalism and Ethics Ownership and Protection.
1 Copyright © 2013 M. E. Kabay, D. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Introduction to Intellectual Property Law CJ341 – Cyberlaw.
Copyright © 2008 by Nelson, a division of Thomson Canada Limited ENTREPRENEURSHIP A PROCESS PERSPECTIVE Robert A. Baron Scott A. Shane A. Rebecca Reuber.
Legal Issues in Software CS 415, Software Engineering II Mark Ardis, Rose-Hulman Institute April 11, 2003.
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
1 Introduction to Software Engineering Lecture 38 – Intellectual Property.
Chapter 7.5 Intellectual Property Content, Law and Practice.
Introduction to Intellectual Property using the Federal Acquisitions Regulations (FAR) To talk about intellectual property in government contracting, we.
1 CS 502: Computing Methods for Digital Libraries Lecture 25 Access Management.
INTRODUCTION TO INTELLECTUAL PROPERTY LAW Professor Fischer Class 1: Introduction August 20, 2009.
Intellectual Property (IP) GE 105 Introduction to Engineering Design.
Patents and trade secrets 6 6 Chapter. Patents  Grant of property rights to inventors  Issued by the U.S. Patent and Trademark Office (USPTO)  Permits.
Intellectual Property
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
K. Salah1 Legal, Privacy, & Ethical Issues. K. Salah2 Overview Human Controls Applicable to Computer Security The Basic Issues Computer Crime Privacy.
Legal Protection of Software and Databases Jennifer Pierce.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Intellectual Property, Nondisclosure agreements, Electronically Monitored Workplaces, And high level thinking questions.
Intellectual Property GE 105 Introduction to Engineering Design.
 You will face ethical dilemmas in your career – count on it!  Your decisions will affect: ◦ your professional reputation. ◦ your employability. ◦ the.
Legal and Ethical Issues in Computer Security
Introduction to IP Ellen Monson Director Intellectual Property Office University of Cincinnati.
Today discussion Intellectual property. What exactly is intellectual property ? Types of intellectual property. Patents, Trademarks and Designs. The ”BIG.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Chapter 08.  Describes property that is developed through an intellectual and creative process  Inventions, writings, trademarks that are a business’s.
The Legal Environment What laws and regulation apply to businesses?
Intellectual Property (Quinn Chapter 4) CS4001 Kristin Marsicano.
INTELLECTUAL PROPERTY Chapter 6. WHAT IS INTELLECTUAL PROPERTY? Intellectual Property is a term used to describe works of the mind (art, books, films,
Ownership of Software Software represents the results of intellectual rather than purely physical efforts and is therefore inherently non- tangible. So.
Nadya Reingand, PhD Yan Hankin, Esq. Washington DC, USA © Copyright. All rights reserved. Intellectual Property and Business Aspects of Digital Holography.
Legal and Ethical Issues in Computer Security Csilla Farkas
Lecture 27 Intellectual Property. Intellectual Property simply defined is any form of knowledge or expression created with one's intellect. It includes.
PATENTS, INTEGRATED CIRCUITS, AND INDUSTRIAL DESIGNS Presented By: Navdeep World Trade Organization.
CPS Digital Copyright. CPS Copyright US Constitution (Article I, Section 8, Clause 8): “To promote the Progress of Science and useful.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
1 Intellectual Property Rights David Worrall – Legal Department.
Lecture 11. Intellectual Property SPRING 2016 GE105 Introduction to Engineering Design College of Engineering King Saud University.
Boston New York San Francisco Washington, DC Woods Hole Oceanographic Institute Understanding Intellectual Property June 4, 2008.
Entrepreneurship CHAPTER 8 SECTION 1.  When you develop a new product or service, you create an asset that must be protected.  Intellectual property.
Patent Review Overview Summary of different types of Intellectual Property What is a patent? Why would you want one? What are the requirements for patentability?
01. Intellectual Property An introduction BELAJAR DARI : Tutor: Moh. Isrok, SH.,CN.,MH Sentra HKI Univ. Muhammadiyah Malang.
Technology Transfer Office
Plagiarism, Fair Use and Copyright Laws
Professional Engineering Practice
Intellectual Property
Ethical and Legal Issues
How To Protect Intellectual Property:
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Legal and Ethical Issues in Computer Security
U. S. Copyright Basics.
Intellectual Property
Welcome to IST e-Lab Entrepreneurship Lab, 3rd Session, 06 November 2017.
Computer Law th class: Open Source.
By Jake Schmitt, Seth Raleigh, Neil McLain
Intellectual Property
Intellectual Property
Computer ethics in computer science curriculum
Intellectual Property
Intellectual Property
Chapter # 6 Intellectual Property
Legal Issues Facing Start-Ups
What are the types of intellectual property ?
Intellectual Property
What are the types of intellectual property?
What You Didn’t Know That You Didn’t Know About Patents
Intellectual Property Considerations in Forming and Scaling a Business
Jonathan D’Silva MMI Intellectual Property 900 State Street, Suite 301
Intellectual Property
Presentation transcript:

Software Security 415.725SC Lecture 2: Software Law Clark Thomborson University of Auckland 11-Dec-19 SW law

“The Age of Software Patents” Kenneth Nichols IEEE Computer, April 1999 “As a computer professional, it is highly unlikely that you have ever read a patent… however… patents will play a pivotal role in future software products and research.” 11-Dec-19 SW law

Outline Tutorials Editorials Essentials of US patent law, for software US trade secrets and copyright, for software Editorials Why software is different from all other inventions Why software patents don’t work Software patents may be harmful Public good of encouraging invention, versus the harm of restricting use “… but software patents are neither inherently good nor bad.” 11-Dec-19 SW law

What is a Patent? “A patent is a legal monopoly granted for the use, manufacture and sale of an invention.” It is valid for twenty years. Legal monopoly = your right to be “in control” of your invention, will be defended by the US government. This is a form of “intellectual property.” 11-Dec-19 SW law

What is an Invention? An invention is a device or process that is both novel and useful. What is not an invention? Anything that is neither a device nor a process. (Is software a device? A process?) Anything that has been “disclosed” previously, including all patent applications filed earlier than yours. Anything that is not in “the useful arts” including literary, decorative, or entertaining innovations: “A technique for constructing novels would not qualify for a patent.” (!) 11-Dec-19 SW law

The Process of Patenting 1. You invent something. 2. You apply for a US patent prior to disclosure, or for a NZ patent within 12 months of first disclosure. 3. A patent examiner reviews your application, to decide if your description is sufficiently “enabling” to be a disclosure of an invention that is both novel and useful. 4. You answer any objections or questions the examiner may raise, possibly revising your “claims” that will define the coverage of your patent. 5. Your patent is “issued” (or it may be denied ;-). 11-Dec-19 SW law

What Can You Do with a Patent? You may “assign” your patent to someone who will pay the (substantial) costs of filing and defending it. You may sell licenses to your patent, allowing others to manufacture something containing your invention. If you discover someone “infringing” your patent, you may offer to sell them a license, and you may refuse to let them use your patent. Why is your right of refusal in the public interest? 11-Dec-19 SW law

Trade Secrets for Software 1. You write some clever software. 2. You don’t reveal your “secret” cleverness, except to people who have signed a “nondisclosure agreement” (NDA). 3. You can prosecute anyone who reveals your secret, if they have signed an NDA. 4. You have limited protection over people who “reverse engineer” your software to discover your clever idea. 11-Dec-19 SW law

Software Copyright 1. You write some software. 2. You obtain copyright protection (easy!). 3. You can prosecute (almost) anyone who copies your software. 4. Everyone has the right to make a “derivative work” by changing some visual or auditory elements. 5. The “look and feel” of the GUI for the Microsoft and Macintosh OS are protected by US copyright law. 6. Text-only interfaces (DOS, Unix) are not protected. 7. Crown Copyright differs from US Copyright, but there are international agreements. 11-Dec-19 SW law

Conclusion All software developers should know at least a little bit about patents, copyrights and trade secrets. This article is an excellent introduction. 11-Dec-19 SW law

“Encoding the Law into Digital Libraries” Pamela Samuelson Comm “Encoding the Law into Digital Libraries” Pamela Samuelson Comm. ACM, April 1998 “One of the burning questions in the field of cyberlaw is to what extent law or public policy should intervene to tell technologists what they can and can’t code.” 11-Dec-19 SW law

Outline How copyright constrains digital libraries A copyright owner may restrict copying, within limits. Libraries have a right to permit copying, within limits. Technologists tend to oversimplify copyright limits, which are complicated for good reason. Privacy considerations (records of “who borrowed what”) “Code as code” = software can be like a legal system Hacking = civil disobedience? Laws may be passed (in the US and elsewhere) to circumvent anti-copying code. Do you care? 11-Dec-19 SW law

Restrictions on Copying If a digital library has a license or contract saying “no more than three users can access a document at one time” then you, as the software developer for the library, should enforce this restriction by limiting concurrent access. If your code allows six concurrent accesses, then your library would be in violation of both contract law and copyright law (because authors have the right to control access). 11-Dec-19 SW law

A Murky Question If a copyright is about to expire, can the copyright owner insist that the document be “destroyed” after expiration? Yes, if the library agrees to sign the contract. No, such contracts are unenforceable because the “public good” served by a copyright (of a limited-term monopoly to control access) would be subverted. Note: the term is 75 years or more. Which legal theory will apply in the US? Elsewhere? 11-Dec-19 SW law

Another Murky Question Can a copyright holder insist that a digital library add software security, to severely limit unauthorised readings and “private performances”? Yes, this is a reasonable restriction, otherwise a single copy at an online library will make it very difficult for an author to sell any more copies of their work. No, private performances and “fair use” copying (e.g. for education and research, within limits) is expressly allowed by US copyright law. Which legal theory will apply in the US? Elsewhere? 11-Dec-19 SW law

Conclusion This article poses some intriguing questions in public policy, regarding how copyright does (and “should”) affect digital libraries. I would strongly recommend it to any computer science major who shows any interest in digital libraries, computer law, or public policy. 11-Dec-19 SW law

Readings for Next Week Monday: Wednesday: Thursday: Bibliography for 415.725SC, select a paper for your oral report! Wednesday: C. Pfleeger, “Ethical issues in computer security” (§11.5 of Security in Computing) C. Mann, “Who will own your next good idea?”, The.Standard.com, 19 June 2000. P. Radatti, “CyberSoft, Incorporated Moral Guidelines”, www.cyber.com/papers/lock.html. Thursday: Collberg & Thomborson, “Watermarking, Tamper-Proofing, and Obfuscation -- Tools for Software Protection”, July 2000. 11-Dec-19 SW law