Chapter 6 Intellectual Property

Slides:



Advertisements
Similar presentations
Intellectual Property Protection – Critical Issues to Consider in Business Ventures John F. Letchford, Esquire Archer & Greiner, P.C.
Advertisements

Ethics in Information Technology, Second Edition
Ethics in Information Technology, Fourth Edition
Adapted from David G Kay -- SIGCSE 2003 Intellectual Property.
1 Introduction to Software Engineering Lecture 38 – Intellectual Property.
Chapter 7.5 Intellectual Property Content, Law and Practice.
Intellectual Property An intangible asset, considered to have value in a market, based on unique or original human knowledge and intellect. Intellectual.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Chapter 14 Legal Aspects of Sport Marketing
P A R T P A R T Crimes & Torts Crimes Intentional Torts Negligence & Strict Liability Intellectual Property & Unfair Competition 2 McGraw-Hill/Irwin Business.
Chapter 5 Intellectual Property & Internet Law
IP=Increased Profits How to Make Your IP Work For You Rachel Lerner COSE Fall 2006.
Patents and trade secrets 6 6 Chapter. Patents  Grant of property rights to inventors  Issued by the U.S. Patent and Trademark Office (USPTO)  Permits.
Chapter 6 Intellectual Property See My Pointers (Local Access only)
Intellectual Property
Chapter 25 Intellectual Property Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written.
Copyright. US Constitution Article I – Section 8 Congress shall have the power to promote the Progress of Science and useful Arts, by securing for limited.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 10 Intellectual Property Rights and the Internet Twomey Jennings.
© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Intellectual Property
MSE602 ENGINEERING INNOVATION MANAGEMENT
CIS 318: Ethics for the IT Professional Week 5
Intellectual Property Intellectual Property. Intellectual Property Intellectual effort, not by physical labor Intangible property Lawsuits involve infringement.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 10 Intellectual.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Ethics in Information Technology, Second Edition 1 Computer & Society Week 7 Marwan Al-Namari.
Chapter 08.  Describes property that is developed through an intellectual and creative process  Inventions, writings, trademarks that are a business’s.
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
Chapter 12 Intellectual Property McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
TTS1133 : INTERNET ETHICS AND CYBER LAW
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 24 Intellectual Property.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 5 Intellectual Property.
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
Internet and Intellectual Property  University of Palestine  Eng. Wisam Zaqoot  Feb 2010 ITSS 4201 Internet Insurance and Information Hiding.
AOF Entrepreneurship Unit 3, Lesson 10 Intellectual Property Protections Copyright © 2009–2012 National Academy Foundation. All rights reserved.
INTELLECTUAL PROPERTY Chapter 6. WHAT IS INTELLECTUAL PROPERTY? Intellectual Property is a term used to describe works of the mind (art, books, films,
Ethics in Information Technology, Second Edition Chapter 6 Intellectual Property.
Trade Secrets, Trademarks and Copyrights. Secrecy Prevention of imitation can be obtained by keeping things secret and reducing the diffusion of information.
Intellectual property (cont.) 1. Software as intellectual property 2  The law concerning software is not clear and is steal being formulated  In USA.
Intellectual Property Legal Implications. What is Intellectual Property? The product of creativity and intellectual endeavour Intellectual Property Rights.
Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst appears behind the blue triangles,
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Essentials Of Business Law Chapter 25 Intellectual Property McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Fundamentals of Intellectual Property
Intellectual Property
Chapter 18 The Legal Aspects of Sport Marketing. Objectives To introduce the key legal concepts and issues that affect the marketing of the sport product.
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 6 Business Torts, Intellectual Property and Cyberlaw.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
IP and the working archive Issues arising from the use of Mass Observation Elizabeth Dunn Gaby Hardwicke - Solicitors & Trade Mark Attorneys.
Lecture 11. Intellectual Property SPRING 2016 GE105 Introduction to Engineering Design College of Engineering King Saud University.
Intellectual Property. An original (creative) work, invention or information protected by law through a trademark, patent, copyright or trade secret.
©2005 by West Legal Studies in Business A Division of Thomson Learning Fundamentals of Business Law 6 th Edition Chapter 5 Intellectual Property and Internet.
Chapter 10 Intellectual Property and Internet Law.
Plagiarism, Fair Use and Copyright Laws
Intellectual Property
Intro to Intellectual Property 3.0
Essentials of the legal environment today, 5e
Ethics in Information Technology, Fourth Edition
Intellectual Property
Ethics in Information Technology
INTELLECTUAL PROPERTY AND CYBER PIRACY
Intellectual Property
Intellectual Property
Computer ethics in computer science curriculum
Essentials of the legal environment today, 5e
Ethics in Information Technology, Fourth Edition
Intellectual Property
Chapter 10 INTELLECTUAL PROPERTY RIGHTS AND THE INTERNET
Chapter # 6 Intellectual Property
Intellectual Property
Presentation transcript:

Chapter 6 Intellectual Property Ethics in Information Technology Chapter 6 Intellectual Property

Learning Objectives What does the term intellectual property encompass, and why are organizations so concerned about protecting intellectual property? What are the strengths and limitations of using copyrights, patents, and trade secret laws to protect intellectual property? What is plagiarism, and what can be done to combat it?

Learning Objectives What is reverse engineering, and what issues are associated with applying it to create a lookalike of a competitor’s software program? What is open source code, and what is the fundamental premise behind its use? What is the essential difference between competitive intelligence and industrial espionage, and how is competitive intelligence gathered? What is cybersquatting, and what strategy should be used to protect an organization from it?

Intellectual Property Describes works of the mind that are distinct and owned or created by a single person or group Protected through Copyright Patent Trade secret laws Owner controls and receive compensations for the use of their intellectual property

Copyright Exclusive right to distribute, display, perform, reproduce an original work in copies or prepare derivative works based on the work Copyright infringement: Violation of the rights secured by the owner of a copyright Sonny Bono Copyright Term Extension Act Establishes time limits for copy right protected work

Copyright Eligibility criteria Fair use doctrine Work should be original and must fall within one of the categories described in Title 17 of the U.S. Code Fair use doctrine Allows portions of copyrighted materials to be used without permission Depends on purpose, character, nature, relation, and effect of the copyrighted work Software copyright protection Proving infringement requires showing resemblance that could be explained only by copying

Measures for Protection of Intellectual Property Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of 2008 Increased trademark and copyright enforcement and substantially increased penalties for infringement General Agreement on Tariffs and Trade (GATT) Multilateral agreement governing international trade WTO and the WTO TRIPS Agreement (1994) Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) Establishes minimum levels of protection that each government must provide to the intellectual property of all WTO members

Measures for Protection of Intellectual Property World Intellectual Property Organization (WIPO) Copyright Treaty (1996) Encourages use of intellectual property as a means to stimulate innovation and creativity Digital Millennium Copyright Act (DMCA) Implements the WIPO Copyright Treaty and the WIPO Performances

Summary of the WTO TRIPS Agreement Form of Intellectual Property Key Terms of Agreement Copyright Computer programs are protected as literary works Authors of computer programs and producers of sound recordings have the right to prohibit the commercial rental of their works to the public Patent Patent protection is available for any invention whether a product or process Does not permit discrimination on basis of place of invention Trade secret Must be protected against breach of confidence and other acts that are contrary to honest commercial practices

Patents Grant of a property right issued by the United States Patent and Trademark Office (USPTO) to an inventor Prevent independent creation and copying Require filing application with USPTO Prior art: Existing body of knowledge available to a person of ordinary skill in the art Software patents Protects feature, function, or process embodied in instructions executed on a computer

Patents Patent infringement: Unauthorized use of another’s patent Laws for granting patents Must be as per Title 35 of the U.S. Code Following cannot be patented Abstract ideas Laws of nature Natural phenomenon

Figure 6.2 - Patents Applied for and Granted Source Line: U.S. Patent Statistics Calendar Years 1963–2011, www.uspto.gov/web/offices/ac/ido/oeip/taf/us_stat.pdf

Leahy-Smith America Invents Act (2011) Changed the patent system from a first-to-invent to first-inventor-to-file Expanded the definition of prior art used to determine the novelty of an invention and whether it can be patented

Cross-Licensing Agreements Each party agrees not to sue the other over patent infringements Small businesses must pay an additional cost from which many larger companies are exempt Usually settles and licenses its patents to the large company

Trade Secrets Business information that: Represents something of economic value Has required effort or cost to develop Has some degree of uniqueness or novelty Is generally unknown to the public Is kept confidential

Advantages of Trade Secret Laws No time limitations on the protection of trade secrets No need to file an application, make disclosures to any person or agency, or disclose a trade secret to outsiders to gain protection Trade secrets cannot be ruled invalid by the courts

Protecting Trade Secret Uniform Trade Secrets Act (UTSA) Established uniformity across the states in area of trade secret law Economic Espionage Act (EEA) of 1996 Imposes penalties for the theft of trade secrets Nondisclosure clauses Prohibits employees from reveling company secrets Noncompete agreement Prohibits an employee from working for any competitors for a period

Plagiarism and Actions to Combat Student Plagiarism Plagiarism: Act of stealing someone’s ideas or words and passing them off as one’s own Actions Help students understand what constitutes plagiarism and why they need to cite sources Show students how to document Web pages Schedule major writing assignments in portions due over the course of the term Tell students that instructors are aware of Internet paper mills and plagiarism detection services Incorporate detection software and services

Table 6.3 - Partial List of Plagiarism Detection Services and Software Source Line: Course Technology/Cengage Learning

Reverse Engineering Process of taking something apart in order to understand it, build a copy of it, or improve it Applicable for both hardware and software Violates copyright and trade secret laws Software license agreements forbid reverse engineering

Open Source Code Program whose source code is made available for use or modification, as users or other developers see fit Produces better software than the traditional closed model Reasons for developing open source code Respect Reputation Recovering maintenance cost Hassle of license and marketing

Table 6.4 - Commonly Used Open Source Software Source Line: Course Technology/Cengage Learning

Competitive Intelligence Legally obtained information that is gathered to help a company gain an advantage over its rivals Integrated into a company’s strategic plans and decision making Not same as industrial espionage Industrial espionage: Use of illegal means to obtain business information not available to the general public Sources of data Rapportive, Crunchbase, CORI, ThomasNet.com, WhoGotFunded.com

Trademark Infringement Logo, package design, phrase, sound, or word that enables a consumer to differentiate one company’s products from another’s Can be renewed forever, so long as a mark is in use Lanham Act of 1946 - Defines the use of a trademark as process for obtaining a trademark from the Patent and Trademark Office Outlines penalties associated with trademark infringement

Trademark Infringement Nominative fair use - Defense employed by the defendant in trademark infringement case, requires proving following Plaintiff’s product or service cannot be readily identifiable without using the plaintiff’s mark It uses only as much of the plaintiff’s mark as necessary to identify the defendant’s product or service Defendant does nothing with the plaintiff’s mark that suggests endorsement or sponsorship by the plaintiff

Cybersquatting Cybersquatters: Register domain names for famous trademarks or company names to which they had no connection Hope that the trademark’s owner would eventually buy the domain name for a large sum of money Tactics to circumvent cybersquatting - Register all possible domain names .com, .edu, .gov, .int, .mil, .net, .org, arpa, .aero, .biz, .coop, .info, .museum, .name, .pro, .asia, .cat, .mobi, .tel, .travel, and .xxx

Internet Corporation for Assigned Names and Numbers (ICANN) Nonprofit corporation responsible for managing the internet’s domain name system Current trademark holders are given time to assert their rights in the new top-level domains before registrations are opened to the general public Has a Uniform Domain Name Dispute Resolution Policy Anticybersquatting Consumer Protection Act allows trademark owners to challenge foreign cybersquatters

Summary Intellectual property is protected by laws for: Copyrights Patents Trademarks Trade secrets Plagiarism is stealing and passing off the ideas and words of another as one’s own Reverse engineering Process of breaking something down in order to understand, build a copy of, or improve it

Summary Open source code Competitive intelligence Made available for use or modification as users or other developers see fit Competitive intelligence Uses legal means and public information Trademark infringement Use of other’s trademark in a Web site can lead to issues Cybersquatting Registration of a domain name by an unaffiliated party