Intellectual Property Rights An Overview of Laws, Licenses and Copyright Protection A Presentation by Team 9 Perhaps the Greatest Team Ever to Exist…EVER!

Slides:



Advertisements
Similar presentations
A Lawyer Looks at the Open Source Revolution Robert W. Gomulkiewicz Director, Intellectual Property Law & Policy Program Associate Professor of Law University.
Advertisements

Computer Software 3 Section A Software Basics CHAPTER PARSONS/OJA
Introduction to Information Literacy 1 M06: Economic, Legal, and Social Issues for Use of Information See also: Chapter 7, Riedling.
Upgrading Software CIT 1100 Chapter4.
The Importance of Open Source Software Networking 2002 Washington, D.C. April 18, 2002 Carol A. Kunze Napa, California.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Security, Privacy, and Ethics Online Computer Crimes.
IS Spring The Basics of Open Source Reinhardi A. Haqi Mohamed Umar Shakeel Advanced Topics for Systems Development.
W15D3. Protection (recap) Common sense Antivirus software (some free, eg: AVG) Update OS Verify the validity of info in s received  Use search.
Protects works of “intellectual property” -- creative expressions of ideas in fixed symbolic form.
Intellectual Property
1 Intellectual Property Includes the results of intellectual activities in the arts, sciences, and industry Includes the results of intellectual activities.
Key Issues in Licensing Software and Associated Intellectual Property: Matching Licensing Models to Business Strategies Steve Mutkoski Regional Director,
HOMEWORK PAGE STAND ALONE PROGRAMS FUNCTION ON THEIR OWN AND SOMETIMES CANNOT SHARE DATA WITH OTHER PROGRAMS. INTEGRATED SOFTWARE COMBINES.
Professor Michael J. Losacco CIS 1110 – Using Computers Application Software Chapter 3.
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 7 Software Management 1 Morrison / Wells / Ruffolo.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
COMP 6005 An Introduction To Computing Session Two: Computer Software Acquiring Software.
CHAPTER 6 OPEN SOURCE SOFTWARE AND FREE SOFTWARE
Chapter 4 Application Software: Programs that Let You Work and Play
Practical PC, 7th Edition Chapter 3: Getting Started with Software
Get More from Your Software The Genuine Windows Vista™ Experience.
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
Copyright and Software and You. What is copyright? The Copyright Act of 1976 prevents the unauthorized copying of a work of authorship. – However, only.
Computer Concepts – Illustrated 8 th edition Unit C: Computer Software.
Licenses A Legal Necessity Copyright © 2015 – Curt Hill.
Programming and Application Packages
Benefits of a SUSE ® Subscription Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Computer Ethics for Computer Users
Section 2 Software.
APPLICATION SOFTWARE. EXAMPLE S What’s an application software ? Application software consists of programs designed to make users more productive and/or.
UEC 01 : Computer Skills & Programming Concepts I 1PUA – Computer Engineering Department – UEC01 – Dr. Mona Abou - Of Lecture 6: Applications Software.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Activating Clarity  Activating Clarity  Activation  Online Activation  Fax Activation  Review and Verify Activation and License Terms  Updating.
CPS 82, Fall Open Source, Copyright, Copyleft.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 17 Software as Intellectual Property.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
Web 2.0: Making the Web Work for You, Illustrated Unit B: Finding Media for Projects.
Software : Applications Software
Chapter 3 Installing and Learning Software. 2Practical PC 5 th Edition Chapter 3 Getting Started In this Chapter, you will learn: − What is in an application.
Adobe Dreamweaver CS3 Revealed CHAPTER SIX: MANAGING A WEB SERVER AND FILES.
Open Source Software This permits users to use, change, and improve the software, and to redistribute it in modified or unmodified forms. It is very often.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Chapter 1 Software Installation and Creating a New Company Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
1 Computer Technician Computer Software: Types, Setup, and Ethical Boundaries Copyright © Texas Education Agency, All rights reserved.
Software Installation and Copyrights Basic Computer Concepts Installation Basics  Installation Process  Copy files from distribution disks.
Commercial software.. Introduction.  Computer software comes in three different flavors: freeware, shareware, and commercial software. Freeware is free.
IPEmotion License Management PM (V1.2).
P1 - Software licenses. Different types of license and software Single-user license Multi-user license Proprietary software Freeware Shareware.
Social Ethical and Legal Issues Web Design. 3.4 Social, Ethical, and Legal Issues Focus on Reading Main Ideas Ethical, social, and legal guidelines govern.
Computer Technology Internet, ethics, and . EthicsInternetMisc.Internet
Chapter 3 Applications Software: Getting the Work Done.
Software piracy and software patents
Chapter 3 Installing and Learning Software
A Gift of Fire Third edition Sara Baase
Unit A: Exploring Computer Systems
What is Copyright?.
Related to data, hardware, and software
Chapter 3 Installing and Using Software
Managing a Web Server and Files
Freeware, Shareware, and Public Domain
Computers Tools for an Information Age
Computer Concepts Module 3
Presentation transcript:

Intellectual Property Rights An Overview of Laws, Licenses and Copyright Protection A Presentation by Team 9 Perhaps the Greatest Team Ever to Exist…EVER! Cole Hoosier, Alex Stampbach, Leanne Gray, Ryan Hannebaum, Matthew Cook

Intellectual Property Laws

an umbrella term for various legal entitlements which attach to certain types of information, ideas, or other intangibles in their expressed form an umbrella term for various legal entitlements which attach to certain types of information, ideas, or other intangibles in their expressed form Intellectual Property

Software Copyright Infringement Several different types Several different types Creating a copy for resale Creating a copy for resale “Bulletin board” sharing “Bulletin board” sharing “Softlifting” “Softlifting” Unauthorized copying as ethical choice Unauthorized copying as ethical choice Existing and proposed laws Existing and proposed laws TRIPS TRIPS EULA EULA UCITA UCITA

The Scope of the Problem RankProductValue 1Marijuana Billion 2 Counterfeit Technology Products 100 Billion 3Cocaine Billion 4Opium/Heroin Billion 5 Pirated Web Videos 60 Billion 6 Counterfeit Pharmaceutical Drugs 40 Billion 7 Pirated Software 34 Billion 8 Human Trafficking 32 Billion 9Amphetamines/Meth Billion 10 Animals and Wildlife Smuggling 20 Billion

Attempts to Stop the Problem Genuine Microsoft Software Tools Genuine Microsoft Software Tools ( Genuine copies allow users to get updates Genuine copies allow users to get updates “Customers who purchase counterfeit products could find they are missing key elements, such as user manuals, product keys, certificates of authenticity and even software code. They may also find that the counterfeit software contains viruses or does not work as well as the genuine product does.” (Microsoft Product Activation FAQ) “Customers who purchase counterfeit products could find they are missing key elements, such as user manuals, product keys, certificates of authenticity and even software code. They may also find that the counterfeit software contains viruses or does not work as well as the genuine product does.” (Microsoft Product Activation FAQ)

Software Distribution

Freeware Software is free to use Software is free to use No limitations are placed on the program No limitations are placed on the program Author may *ask* for donations, but won’t demand them Author may *ask* for donations, but won’t demand them Examples: Vim, several flash-type games Examples: Vim, several flash-type games

Shareware use is completely free use is completely free product is not fully functional unless "unlocked“ product is not fully functional unless "unlocked“ Unlocking usually is by entering a key that is purchased Unlocking usually is by entering a key that is purchased Example: WinZip Example: WinZip

Demoware Type of shareware Type of shareware Feature set of the software is limited in some manner Feature set of the software is limited in some manner Examples: Can’t save state or program halts after 15 minutes Examples: Can’t save state or program halts after 15 minutes

Licensing Mi casa es su casa?

GNU General Public License Source is available Source is available “Copyleft” “Copyleft” Uses copyright laws to ensure that modified versions retain the same freedoms Uses copyright laws to ensure that modified versions retain the same freedoms Lesser (or Library) GPL Lesser (or Library) GPL Can be linked into non-GPL program Can be linked into non-GPL program Example: most software for Linux Example: most software for Linux

BSD-style Licenses Closer to public domain than GPL Closer to public domain than GPL Has been called “copycenter” Has been called “copycenter” Allows proprietary commercial use, and for the software released under the license to be incorporated into proprietary commercial products Allows proprietary commercial use, and for the software released under the license to be incorporated into proprietary commercial products Example: NetBSD Example: NetBSD

MIT License Very (very) similar to the BSD-style licenses Very (very) similar to the BSD-style licenses Example: X11 for Linux Example: X11 for Linux

Copyright Protection

Security – Software Validation Validation Key checks Key checks Registration Registration Limitations Limitations

Validation Making the software legal Making the software legal Verifying the user has the proper rights to use the software Verifying the user has the proper rights to use the software

Key checks Software requires you to enter a product key Software requires you to enter a product key Software will not function without a valid key Software will not function without a valid key Only given a valid key when you purchase the software Only given a valid key when you purchase the software

Key checks Bnetd project Bnetd project Free online community Free online community Distributed open source code Distributed open source code Bnetd allowed users to create chat rooms, connect to other users, and play games Bnetd allowed users to create chat rooms, connect to other users, and play games Blizzard uses battle.net but uses CD key checks Blizzard uses battle.net but uses CD key checks Blizzard sued them because they didn’t check authenticity to the game Blizzard sued them because they didn’t check authenticity to the game

CD Cracks CD crack codes can get around key checks CD crack codes can get around key checks Eliminate the use of a CD Eliminate the use of a CD

Registration Some products require you to register the product Some products require you to register the product Registration can be used as a validation technique Registration can be used as a validation technique You have to have a registration to get updates You have to have a registration to get updates

Limitations File Sharing File Sharing Peer to Peer (P2P) Peer to Peer (P2P) Improve existing software Improve existing software

Protection Through Documents Passwords Passwords Dials Dials Manuals Manuals “Bottom of Page 6” “Bottom of Page 6” Hidden Hidden Vital Information Vital Information Manual contains data necessary to use software Manual contains data necessary to use software

Protection Through Hardware Dongles – 1980’s Dongles – 1980’s USB keys, Parallel USB keys, Parallel Implementations Implementations Check for Dongle’s presence Check for Dongle’s presence Store key parts of Program on Dongle Store key parts of Program on Dongle CD Check CD Check Lenslok Lenslok Hold a Prism up to Screen Hold a Prism up to Screen

Protection Through People “Honor System” “Honor System” Software reminds you that the free trial is over Software reminds you that the free trial is over Propaganda Propaganda Shorts before Movies Shorts before Movies Posters Posters Fake MP3 files in Sharing Networks Fake MP3 files in Sharing Networks

Questions?