Public Procurement of Services: A Way to Protect Innovations Finnish Transport Agency Kari Hiltunen P4ITS 10.6.2014.

Slides:



Advertisements
Similar presentations
Delivering solutions Applying the Future Today - Intelligent Transport Systems (ITS) Presentation by Dr Adrian Withill Technical Director - WSP.
Advertisements

Brief on STP – ECN and GMI Currenex. Platforms: GMI ICTS FX Platform GMI MT4 Platform.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Seven Police Technology Communications Dispatch.
IDEAL INFORMATION WORLD Integration (documents, tasks, records, applications) Common (Shared) User Database Effective Workflow (with reminders) Easy, Logical.
True Business-Class Remote Online Backup 44% Of All Computer Users Have Reported At Least One Permanent Data Loss Your Business Data IS Your Business –
Copyright Hub Software Engineering Ltd 2010All rights reserved Hub Document Exchange Product Overview Secure Transmission for Transaction-based Documents.
SECURITY AND INFORMATION SYSTEMS THE EVOLUTION OF SECURITY SYSTEMS Created By: Jamere Hill Instructor: Kyhia Bostic Section University of Houston.
Patents and Intellectual Property by Kari Barnes
The problematic immaterial property rights Case: Travel time info procurement Kari Hiltunen P4ITS June
EProcurement in Japanese Construction Industry April 2008, 7 th Jun-Ichi Yamashita.
Chapter 16 General Ledger and Reporting System Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 16-1.
Our transport management solution is designed to enable the effective and efficient management of the delivery of goods within the supply chain. Having.
Open data based RWIS for mobile devices Mikael Holmström, Intrinsic Oy.
 Summary: The government protects the ownership of resources, such as land, personal possessions, physical assets, and intellectual property Examples:
5/25/ A Just Perfect Proposal 5/25/20153 INCREASE SALES AND REVENUE.
Enterprise Architecture The Arkansas Approach. Key Areas What is enterprise architecture? Why is it important? How you can participate Current status.
Brooke Banks Information Security. Security is your business.
Basic Attitude  USA welcomes foreign investment  Everybody is encouraged to do business in the US  But - there are restrictions:  National Security.
Chapter 3 Applications Software: Getting the Work Done.
Live dashboards for Progress built by anyone, available anywhere. Introducing DataPA OpenAnalytics Nick Finch CTO.
Computer ethics. Lesson objectives To learn about Computer Ethics and Copyright Intellectual Property Biometrics Commercial software Open Source Software.
1 FDA Thailand By HIV Module/Marketing Group Mr. Manaswee Arayasiri.
Copyright © Tekes Safety and Security Programme The Finnish Funding Agency for Technology and Innovation Tekes.
9/15/ A Just Perfect Proposal Matrix Warehouse Computers.
Functions of a Database Management System
MKTG 442 FOOD MARKETING REGULATIONS Lars Perner, Instructor 1 FOOD MARKETING REGULATIONS  Types of regulations –Economic –Food safety –Consumer protection.
1 Web Commerce Definition Benefits Impacts Other Types of Electronic Commerce.
Help Desk Services Hervey Allen Network Startup Resource Center AFNOG 2001 Workshop This Presentation and related materials will be available at:
Product Overview Copyright © 2005 Towson University Center for Geographic Information Sciences Center for Geographic Information Sciences © Matt Felton.
Enterprise Risk Management. What has been done regarding risk management in the past ● Agency level safety an security issues have.
Copyright © First Option 2008 First Option WebCheck The 1st Option in IT.
Importing and Exporting Data - QuickBooks Simon Hutchinson – Reckon Product Management.
Software What has changed?. Software  Software continues to increase in sophistication  Many companies use bespoke or specialist software to support.
Traffic Management Transit Management Emergency Management Fixed Point-to-Fixed Point Communications Roadway Toll Administration Remote Traveler Support.
Instituto de Plasmas e Fusão Nuclear Instituto Superior Técnico Lisbon, Portugal B. Gonçalves | Lisboa, February 6, 2010 | IST.
DIS 605 BY DOROBIN AGOTI REG NO: D61/71443/2008 ICT INNOVATION, LEGAL AND PIRACY ISSUES.
Handbook for Developing a Transportation Management Center Operations Manual Sponsored by the TMC Pooled-Fund Study Single.
What is SBIR?  SBIR is a federal program where small businesses compete for up to $670,000 to research, develop and commercialize a new technology. 
CHARM Pre Commercial Procurement Support of Cooperative ITS Functions Ian Chalmers Highways Agency P4ITS Network Meeting Brussels Feb 2015.
1 Ethics of Computing MONT 113G, Spring 2012 Session 32 Software as Intellectual Property.
Software Life Cycle The software life cycle is the sequence of activities that occur during software development and maintenance.
NETWORKING & SYSTEM UPDATES
INFORMATION SECURITY AWARENESS Whose Job is it Anyway? Ron Freedman Ron Freedman Vice President VCampus Corporation Scott Wright Scott WrightPresident.
TM 8-1 Copyright © 1999 Addison Wesley Longman, Inc. Client/Server and Middleware.
A Year in the Life of a Client Portfolio Review and Rebalancing Analysis Create Client Summary, Performance Reports, and Recommendation.
Chapter 30 Secured Transactions Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written.
Using system security metrics to enhance resiliency Dr. Sara Bitan ENGINEERING RESILIENT & ROBUST SYSTEMS 24-Jan-2011 Bitan: Using system security metrics.
Ministry of Finance of the Republic of Azerbaijan State Treasury Agency Public Finance Management Information System.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Enhancing Digital Business Opportunities Nordic Digital Day 27 May 2016 Anne Miettinen.
Florida Realtor Zone Click to add text. Ask the Experts Real Estate Experts Help You to Avoid Five Common Mistakes that Homeowners and Property Investors.
Securely Managing VMS from a Windows Environment 1.
Welcomes YOU To Meet your requirement in one Place.
LEB Lecture 5 Case 5 Matti Rudanko.
1Z0-071 Exam : Oracle Database 12c SQL
Standardisation : current and future work at CEN Henk Vanhoutte
Just Enterprise Business support and development services to enterprising third sector organisations across Scotland.
Exam : Implementing Microsoft Azure Infrastructure Solutions
Project proposal for ISO 27001:2013 implementation
Jeopardy Security Risks Hardware & Software Computer Types Networking
For you ― Finnish Tax Administration's eServices
- Euro-SICS as an example
Session 2: OSS panel discussion
ENGINUITY TUTORIAL The Job Cycle
Make It Happen - Trafi Kirsi Pulkamo, Head of Department
Cost Xpert Group Copyright © 2001, Marotz, Inc..
Economic Questions Chapter 2 Section 1.
Why start anywhere else?
Preparing your business for EU Exit
FAR part 1.
Presentation transcript:

Public Procurement of Services: A Way to Protect Innovations Finnish Transport Agency Kari Hiltunen P4ITS

To Procure a System or a Service? Kari Hiltunen 2 TMS, Traffic incident management system for TMC TMS, Traffic incident management system for TMC Digitraffic, Real time traffic data for service providers Digitraffic, Real time traffic data for service providers Market product candidate Tailored system Definition process Pre Study of needs Definition of requirements e.g. Design of System 1.Interfaces (input-output) 2.Tasks (put-put) 3.Database 4.Technology 5.Safety and security 6.? 1.Yes 2.Not needed 3.Not needed 4.Not needed 5.Yes 6.Help desk NeededNot needed

Payments Kari Hiltunen 3 TMS, Tailored system TMS, Tailored system Digitraffic, Service Digitraffic, Service TMSPayment typeDigitraffic IncludedInvestmentNot included Keeping up the know how for software updating Monthly payments during the production Depreciation and interest of investment Service production including e.g. metadata updating Help desk TMS, Tailored system TMS, Tailored system

Immaterial property rights Kari Hiltunen 4 Digitraffic, Service Digitraffic, Service TMS, Tailored system TMS, Tailored system TMSDigitraffic ProviderRight to use the knowhow All IPR´s Client (Finnish Transport Agency) Free use and copyright of software Restricted right for own use

Innovator: Do we dare to make a bid? ● The threat is: Our innovation might become public although we would not win the deal. ● The answer may be: The risks are smaller when you sell service: ● The client defines (almost) just the user interface. It´s up to you how you produce the service. ● You can keep the IPR´s to make a successful product Kari Hiltunen 5