Week 13 - Thursday.  What did we talk about last time?  E-mail security  Privacy in emerging technologies.

Slides:



Advertisements
Similar presentations
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Advertisements

Ownership of Computer Software Ethical Questions and Concerns.
1 Introduction to Software Engineering Lecture 38 – Intellectual Property.
Copyright Myths. "If it doesn't have a copyright notice, it's not copyrighted." This was true in the past, but today almost all major nations follow the.
Chapter 7.5 Intellectual Property Content, Law and Practice.
Computer Engineering 294 IP R.Smith 5/ Intellectual Property What is it? Why is it important? – What is it designed to do? What are its basic forms?
© Suzanne Scotchmer 2007 Contents May Be Used Pursuant to Creative Commons Attribution-NoDerivs-NonCommercial Common Deed 1.0 Attribution-NoDerivs-NonCommercial.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Copyright in Cyberspace Copyright Law Larry Lessig David Post Eugene Volokh
Intellectual Property OBE 118 Fall 2004 Professor McKinsey Some property, very valuable property, exists only in our minds, in our imagination. It is intangible.
Chapter 14 Legal Aspects of Sport Marketing
P A R T P A R T Crimes & Torts Crimes Intentional Torts Negligence & Strict Liability Intellectual Property & Unfair Competition 2 McGraw-Hill/Irwin Business.
Patents and trade secrets 6 6 Chapter. Patents  Grant of property rights to inventors  Issued by the U.S. Patent and Trademark Office (USPTO)  Permits.
Professional Ethics for Computer Programmers
Copyright Basics. What is Copyright? Copyright allows authors, musicians, artists, etc. to make money off of their labor. Copyright allows authors, musicians,
JRN 440 Adv. Online Journalism Copyright, trademark, public domain Monday, 3/12/12.
Intellectual Property and Internet Law
What is copyright? the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or.
Intellectual Property Rights and Computer Technology
K. Salah1 Legal, Privacy, & Ethical Issues. K. Salah2 Overview Human Controls Applicable to Computer Security The Basic Issues Computer Crime Privacy.
COMM 226 Intellectual property rights Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University,
Intro to Intellectual Property 05/13/2015. Exponential Inventor Intro to Intellectual Property 05/13/2015 Why is IP Important? Everyone makes a big deal.
Crime and Punishment: Piracy and the Law Adapted from Internet Piracy Exposed Chapter 2 by Guy Hart-Davis.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
7/3/08 Created by Mae Thomas Property Rights There can be consequences if you violate others' intellectual property rights. (That is, if you copy something.
 Copyright protects creative expression that has been reduced to a tangible form, such as a book, piece of recorded music, computer program, screenplay,
Legal and Ethical Issues in Computer Security Csilla Farkas
Intellectual Property Rights and the Web: Common Myths Presentation by Jean Mistele.
Legal and Ethical Issues in Computer Security
26-Oct-2005cse ip © 2005 University of Washington1 Intellectual Property INFO/CSE 100, Autumn 2005 Fluency in Information Technology
13 Intellectual Property 1 Aaron Schiff ECON Reading: Cabral p , Deak p
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
The Legal Environment What laws and regulation apply to businesses?
© 2004 West Legal Studies in Business, a Division of Thomson Learning 13.1 Chapter 13 Intellectual Property and Technology.
Class Seven: Intellectual Property Patents, Trademarks and Copyrights.
Intellectual Property Chapter 5. Intellectual Property Property resulting from intellectual, creative processes—the products of an individual’s mind.
TMK 264: COMPUTER SECURITY
Ethical and Social...J.M.Kizza1 Module 5: Intellectual Property Rights and Computer Technology  Computer Products and Services  Instruments of Protection.
Intellectual Property & Ecommerce Issues. What is Intellectual Property? Any product or result of a mental process that is given legal protection against.
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
Intellectual Property (Quinn Chapter 4) CS4001 Kristin Marsicano.
Intellectual Property Basics
Intellectual Property A brief explanation. Intellectual Property is a name used for material, or something that is intangible. You may not be able to.
Internet and Intellectual Property  University of Palestine  Eng. Wisam Zaqoot  Feb 2010 ITSS 4201 Internet Insurance and Information Hiding.
11 Copyright Myths By: Michael Armstrong. What is a copyright? A copyright is the exclusive right to make copies, license, and otherwise exploit a literary,
1.The Nature, Impact, and Issue of Information Technology 1.5Basic Legal Framework relating to the Use of IT.
Intellectual Property Basics: What Rules Apply to Faculty, Staff, and Student Work Product? Dave Broome Vice Chancellor and General Counsel October 15,
HSC: All My Own Work What is copyright and what does it protect? How does it relate to me?
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
“ 10 Big Myths about Copyright Explained” By: Brad Templeton Presented By: Nichole Au December 6, 2007.
Legal Issues Now that we have looked at ethics, some of these issues are also dealt by the law. We will consider laws in the following catagories: Intellectual.
Legal and Ethical Issues in Computer Security Csilla Farkas
Fundamentals of Intellectual Property
CHAPTER 8 Legal, Privacy and Ethical Issues in Computer Security (c) by Syed Ardi Syed Yahya Kamal, UTM
Slide Set Eleven: Intellectual Property Patents, Trademarks and Copyrights 1.
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
Entrepreneurship CHAPTER 8 SECTION 1.  When you develop a new product or service, you create an asset that must be protected.  Intellectual property.
Intro to Intellectual Property 3.0
Intellectual Property and Cyber Piracy
A Gift of Fire Third edition Sara Baase
Copyright and Fair Use Guidelines
Legal and Ethical Issues in Computer Security
Week 13 - Monday CS363.
INTELLECTUAL PROPERTY AND CYBER PIRACY
Chapter 9 Internet Law and Intellectual Property
Intellectual Property Patents, Trademarks and Copyrights
Intellectual Property
Legal Issues Facing Start-Ups
Presentation transcript:

Week 13 - Thursday

 What did we talk about last time?  security  Privacy in emerging technologies

 Heartbleed updates!  It's true that attackers can get arbitrary chunks of data, possibly including user passwords  Analysts at Cloudflare believe it is difficult to use Heartbleed to steal private SSL keys  The ones that the servers use that are central to all of public key infrastructure  However, one attacker was successful in recovering such keys 

 Another possible exploit for Heartbleed is session hijacking  Taking over a user's session after he or she logs in  More information:  A Bloomberg article says that the NSA knew and used Heartbleed for two years  said-to-have-used-heartbleed-bug-exposing- consumers.html  NSA denies prior knowledge of Heartbleed

Cartoon from:

 Motivations for studying legal issues:  To know what protection the law gives us for computers and data  To respect laws that protect the rights of others with respect to computers and data  To help, as experts, to recommend improvements to these laws  Computer law is complicated  Computer law changes quickly, but never as fast as technology itself

 We will look at four areas where the law intersects with the usage of computers:  Protecting computer systems against criminals ▪ What is your legal recourse when criminals attack?  Protecting code and data ▪ What are the copyright issues at stake?  Protecting programmers' and employers' rights ▪ What is the legal environment of a software development workplace?  Protecting users of programs ▪ What is your legal recourse if a program you buy doesn't work?

 Copyright protects the expression of an idea  Two people could have had the same idea independently  Many laws including the copyright law of 1978 and the DMCA apply to copyright  Copyright applies to an original work which must be in some tangible medium of expression  Works with no clear author or that are old enough are in the public domain, owned by everyone  Copyright is supposed to promote the free exchange of ideas by protecting the authors

 Fair use includes the uses that a copyrighted work can be put to  If you buy a work, you can use it in the ways outlined in the purchasing agreement  Without purchasing the work, it can be used and copied for criticism, comment, reporting, teaching, and research  Piracy includes any uses of a copyrighted work that do not fall under fair use  Copyright gives the author rights to the first sale  After the first sale, the purchaser can sell it to someone else  This system is reasonable for books or works of art but more complex for software

 Copyrighted material must be clearly marked with the word "copyright" or ©, the author's name, and the year  Registering a copyright is unnecessary at a philosophical level  But you are not able to claim damages until you have done so  In the US, a copyright lasts for 70 years after the death of the last surviving author or 95 years after publication for a work copyrighted by a company  International standards give only 50 years after the death of the last surviving author or 50 years after publication

 If someone has violated the protections of your copyright (called infringing), you must go to court to claim damages  The infringement must be substantial, and it must be copying, not coincidentally creating the same thing  If two people create the same thing independently, they can both copyright their versions

 Copyrights are good for books, songs, and photographs  Copying is obvious  The line between public domain and creativity is clear  Computer programs can be copyrighted but it doesn't work as well  You can copyright the source code, the expression of the idea  But that won't copyright the algorithm, the idea behind it  You also have to publish the source code in order to copyright it

 The Digital Millennium Copyright Act (DMCA) of 1998 clarified some aspects of copyright law about digital objects  Digital objects can be copyrighted  It is a crime to disable antipiracy measures built into an object  It is a crime to make, sell, or provide devices that disable antipiracy measures or copy digital objects ▪ Except for educational purposes  You can make a backup copy of a digital object to protect against hardware and software failures  Libraries can make up to 3 copies of a digital object to lend to other libraries

 Some things in the DMCA are quite vague  A lawyer could argue that you can't rip music from a CD and put it on an MP3 player  Is it a backup or not?  Courts have ruled that a computer menu design can be copyrighted but its "look and feel" cannot be  Copyrights probably need a real update for the computer age  An emerging idea behind music and software copyrights is that you don't buy the music or software itself, you buy the right to use it

 Patents are another form of legal protection  They focus on inventions, tangible objects, and ways to make them  Unlike copyright protection which applies directly to works of the mind  Patents apply to a "new and useful process, machine, manufacture, or composition of matter"  They explicitly do not apply to "newly discovered laws of nature … [and] mental processes"  Patents protect a way to carry out some idea

 The object patented has to be novel and nonobvious  Unlike copyrights, two people cannot hold patents for simultaneously inventing something  The person who invented it first gets the patent (not the person who files first)  Copyrights are easy to get, but a patent requires that you convince the U.S. Patent and Trademark Office that your invention deserves a patent  Lawyers are usually involved

 Unlike copyrights, an inventor must oppose all infringement or risk losing patent rights  However, infringement occurs even in the case of independent invention  Defenses when charged with patent infringement:  My invention is sufficiently different from yours  Your patent is invalid  Your invention really wasn't novel  I invented the object first

 The Patent Office has discouraged patents for computer software  In 1981 two cases won patents for industrial processes that use computer programs as part of a larger process  Since then, algorithms have been recognized as processes by the Patent Office and thousands of software patents have been issued  The time and expense is often not justified for small software developers

 Copyrights and patents both require that the underlying work or details of an invention are made public  A trade secret is some information that gives a company an advantage over others  The formula for Coca-cola  Trade secrets must be kept secret  If a product can be reverse engineered, a trade secret gives no protection  If an idea or process is independently discovered, there is still no protection  The only protection is when a trade secret is improperly obtained

 Trade secret protection is a typical protection for computer software  Microsoft does not explain all the details of its software  Unfortunately, software is not too difficult to reverse engineer  Even with only machine code  Trade secret protection is hard to enforce  They try to do it with a lot of Nondisclosure Agreements

CopyrightPatentTrade Secret Protects Expression of idea, not idea itself Invention, the way something works A secret, a competitive advantage Protected object made public Yes, all about promoting publication Filed at patent officeNo Requirement to distribute YesNo Ease of filingEasy, do it yourself Complicated, usually needs lawyers No filing Duration Life of author + 70 years, 95 years for corporations 19 years As long as you can keep it secret Legal protection Sue if unauthorized copy sold Sue if invention copied Sue if secret improperly obtained

 The book incorrectly claims that the song "Happy Birthday to You" is so widely known that it would be hard to claim a copyright  In fact, the song has a long history of copyright with ownership transferred to Time-Warner in 1998  Time-Warner collected over $2 million in royalties for performances of the song in 2008  Don Pablo's, Outback, Olive Garden, and other large chains almost always sing some bizarre customized birthday song instead of paying royalties  Some experts argue that the copyright is not valid  If it is valid, it will expire in 2016 in Europe and 2030 in the US

 Hardware designs can, in general, be patented  Firmware is tough  The hardware it is stored on can be patented  The code itself is hard to copyright  Trade secrets are probably the right choice  Object (machine) code  Uncertain! Companies file copyrights, but there is no guarantee they will apply  Source code  You can file a copyright  You have to publicize the first and last 25 pages of sourced code (but those can contain nothing useful)  Trade secrets are typical

 The documentation of a program must be copyrighted separately from the source code  Web content is perhaps the easiest to link to traditional copyrights  It is mostly text and pictures  Much of the code online is visible, so trade secrets don't work  Domain names, URLs, company names, product names, and commercial symbols are protected by a trademark

 This is from 2000, a relatively old story  Hacker magazine 2600 went to register the domain name verizonsucks.com  They discovered that Verizon had already registered it  They registered verizonreallysucks.com  Verizon sued them under a new law but lost because 2600 was not trying to profit from the domain  In response, someone registered the longest domain name supported by the system at that time: VerizonShouldSpendMoreTimeFixingItsNetworkAndLe ssMoneyOnLawyers.com  Read more: 

 Traditionally, actual things like cannon balls, horses, and eggplants were sold  Service industries such as hair stylist or accountant have existed for a long time as well  Information can also be sold, but it has different properties

 Information is not depletable  Information can be replicated (often exactly)  Information has a small marginal cost  Marginal cost is the price to make another thing after you've made the first one  It's much lower for computer-based information ▪ Reprinting a newspaper by hand is hard, but distributing software is not  The value of information is often time dependent  Information can be transferred intangibly

 Information has some value, but it is hard to pin down  There are technological approaches to dealing with piracy, but we need better legal remedies  Electronic publishing  How do you protect content that you have published online only for subscribers?  They can copy the material and distribute it  Data in a database  Courts can't figure out what is and isn't protected in a database  Can some specific subset be protected?  Databases often contain a great deal of public data  Electronic commerce  How do you prove that a digital sale of electronic items actually occurred?  What if Steam took your money and didn't give you a game?  There are essentially no legal ways to redress a situation where you pay real money for equipment in Diablo 3 and don't get it

 Statutes are laws that say that certain actions are illegal  Violating a statute can result in a criminal trial  The goal is to punish the criminal  A tort is harm that does not come from violating a statute but still runs counter to precedents  Perpetrators can be sued, usually for money  Contract law is another form of civil law  It involves an offer, an acceptance, and a consideration  Contracts do not have to be written

Criminal LawCivil Law Defined byStatutes Contracts Common law Cases brought byGovernment Individuals and companies Wronged partySocietyIndividuals and companies RemedyJail or fineDamages, usually money

 Employee and employer rights  Software failures  Computer crime  No class on Monday!

 Keep reading Chapter 11  Work on Assignment 5  Due next Friday before midnight  Turn in your Project 3 code by midnight!  Then get cracking!