SlideShare une entreprise Scribd logo
1  sur  79
Privacy in computing
What is privacy?
•How would you define it?
•What do you think its aspects are?
– Three key aspects:
• Controlled disclosure.
• Sensitive data
• Affected subject.
Computer Related Privacy Problems
• Data collection: what issue do you see?
• No informed consent:
– Examples: real age.
• Loss of control: class discussion.
– Example: posting on a blog.
• What are the ramifications vs. writing a letter?
• Ownership of data.
Computer Related Privacy Problems
• Data collection: what issue do you see?
• No informed consent:
– Examples: real age.
• Loss of control: class discussion.
– Example: posting on a blog.
• What are the ramifications vs. writing a letter?
• Ownership of data.
Protections provided
• Privacy Policies;
– First step: fair information policies:
• Regulate these;
– Collection of information.
– Data quality.
– Purpose specification (use of information)
– Use limitation.
– Security safeguards.
– Openness.
– Individual participation.
– Accountability.
U.S privacy laws
– Are usually applied to individual data types:
– HIPAA
– Financial organizations: Gramm-Leach-Bliley Act
(GLBA)
– Important in Radford: Federal Educational Rights and
Privacy Act (FERPA).
• Somethings are not clear: example class
discussion.
U.S govt. websites.
• Privacy laws controlled by the FTC.
• Address 5 factors:
– Notice (must be informed)
– Choice
– Access (contest accuracy of data collected)
– Security. (data collectors must secure against
unauthorized use).
– Enforcement (sanctions on noncompliance)
• In 2002, the US e-government act.
What about commercial
websites?
• Federal trade commission can prosecute for
deceptive practices. (e.g., false advertising)
– E.g., JetBlue and the DOD.
Other issues with Privacy
• Anonymity.
– Issues with anonymity.
• Multiple identities (online id)
How to protect against privacy
loss?
• Get/give as little data as possible.
• Data anonymization.
• Audit trail: record who has accessed what
data.
• Security and controlled access
• Training, quality, Restricted usage, data left
in place.
• Policy.
Issues in Computer Security:
Data mining and privacy.
• Government data mining.
• Privacy preserving data mining:
– Data mining is “extracting hidden patterns from
large amounts of data”
– Solutions to preserve privacy:
• Remove id information. Doesn’t work.
– E.g., Sweeney’s report: > 87% US population can be
identified by: 5 digit zip code, gender and date of birth.
• Data perturbation. Example. Needs to be done
carefully.
Privacy on the web
• Think about this:
– On the web: every word you speak (blog) can
be read
– Someone selling something may have ads on
their site for something else.
– Identity of the other person may not be known!
• Some issues on the web are protected.
– Can you name them?
Privacy on the web
• Credit card payments are protected.
– But not necessarily private.
– Paypal etc.. May solve the privacy issues.
• Site and portal registrations:
– Beware of “we will enhance your browsing experience”
– Using email as id on some sites. Issues?
• Third party ads.
• Contests and offers: Free Iphones!
Privacy issues
• Cookies:
– Be-aware
• Third party cookies. E.g., Double Click and online profiling.
• Adware
• Web-bug.
• Spyware: keystroke loggers.
Email security
• Interception of email.
– Can be encrypted using PGP or S/MIME
– Email monitored legallly.
• Anonymous E-mail and remailers
– Sending anonymous emails.
• Spoofing and spamming.
Digital Rights Management
(DRM)
History of DRM
• In the pre-digital era, people's ability to do various things to or with content
were limited.
• The networked digital age makes it possible to do just about anything to digital
content, instantaneously and at virtually no cost.
• While this is a great opportunity for new content business models, it threatens
the livelihood of content creators by making rampant piracy possible
• Also, more and more public and private entities are going digital and doing
business online. Information is increasing retrieved through computer networks
by customers, employees and partners etc.
 Thus, we see the need for a technology that enables the secure creation,
management, distribution and promotion of digital content on the Internet.
DRM
 Set of technologies that enable content owners to specify and control:
 the access they want to give consumers and
 the conditions under which it is given.
 It includes:
– Persistent Protection: Technology for protecting files via encryption and allowing access
to them only after the entity desiring access has had its identity authenticated and its rights
to that specific type of access verified
– Business rights: Capability of associating business rights with a content by contract, e.g.
author’s rights to an article or musician’s rights to a song
– Access tracking: Capability of tracking access to and operations on content
– Rights licensing: Capability of defining specific rights to content and making them
available by contract
DRM Functional
Architecture
• IP Asset Creation and Capture Module
– Rights Validation to ensure content being created
includes the rights to do so
– Rights Creation to allow rights to be assigned to new
content
– Rights Workflow to allow for content to be processed
through series of workflow steps
• IP Asset Management Module
– Repository functions to enable the access/retrieval of
content in potentially distributed databases and the
access/retrieval of metadata
– Trading functions to enable assignment of licenses to
parties who have traded agreements for rights over
content, including payments from licensees to rights
Interested Players in
DRM• Government Agencies
– Interested in controlled viewing and sharing of highly secure and
confidential documents, audio and video data.
– “Need to know basis”
• Private Corporations
– Want to limit the sharing of their proprietary information
– Track accesses and any modifications made to it.
– E.g. news agencies like Reuters
• Owners of commercial content
– Content owners, artists, and publishers want to gain revenue through sale and
promotions
– But are concerned about protecting their copyrighted works from illegal use
Interested Players in DRM
contd.• Intermediaries (service providers, content distributors etc.)
– Concerned about minimizing costs of providing services
– Cautious about protecting themselves from lawsuits over illegal distribution
• Producers of end user equipment (PCs, players, etc.)
– Concerned about minimizing design and production costs
– Unwilling to pay for features that only some users need
• End users
– Interested in immediate access to desired content
– Want to use the content conveniently
Thus, we see…
 DRM can help ensure companies, corporations, and other
entities who share similar business that:
 Rights are tracked at ingestion
 Access is controlled during production processes
 Protection for the content extends throughout product lifecycles
 Additionally, DRM can integrate persistent content protection
with content management to ensure:
 Proper business practices
 Implementation of new business models
 Compliance with regulatory requirements in industries such as financial
services, healthcare, and government
Business Imperatives for DRM:
Control Access During Workflow
 Controlling allowed uses of digital content is a critical function of DRM
technology.
 By predetermining and controlling the exact use(s) for content, DRM
technology extends and enhances the traditional role-based access.
 Example: A draft manufacturing guideline is circulated among an international
standards committee and participating qualified companies. Using DRM
technology, this becomes a closed circulation.
The draft guidelines are in a tamper-proof format, with print-only user-rights,
limited to a pre-determined timeframe, after which the draft is withdrawn and
replaced by the final set of guidelines.
The owner of the content, in this instance the standards committee, can withdraw,
alter, or grant permissions related to the content at any time.
Business Imperatives for DRM:
Downstream Use
 Companies need to deliver controlled access downstream so that
content can be licensed, deployed and repurposed by business partners
in accordance with the terms of agreements.
 Example: Music publishers license DRM-enabled content to online
transactional or subscription services. The DRM-enabled content allows
both distributors and consumers to choose from multiple fee/free business
models.
For example, the content could be included in both the free-play list for one-
time use on multiple devices, or it could be licensed on a fee-for play use
by media companies, publishers corporate, government or institutional
users.
Further, with DRM-enabled content, owners may chose to permit licensees
the ability to re-distribute or enter into republication agreements.
Business Imperatives for DRM:
Modification of Rights Over Time
 Systems must be able to accommodate changes by updating parameters of rights and
usage as needed to accommodate new distribution models.
 Lack of ability to change access rights to content can be a serious business liability,
cost a lot of money and be a disincentive to customers.
 Example: The U.S. Supreme Court decision in New York Times v. Tasini (2001)
compelled content industry vendors to remove or modify core research records in
database archives, because creators of content in those archives were not being
properly compensated. Compliance costs for vendors included additional staffing
to re-code or remove records, systems development expenses, along with
increased demand on customer service and marketing departments.
 DRM, in such cases, can facilitate collaboration, creating the ‘trusted environment’
needed for collaboration by persistently protecting critical Intellectual Property (IP)
beyond the boundaries of business processes and corporate organizations.
Business Imperatives for DRM:
Regulatory and Business Standards
 Integrity, authentication, security, privacy and accountability are
‘watchwords’ for new legislative and regulatory standards.
 Example: HIPPA regulations mandate new levels for privacy and
authentication for document management in healthcare institutions and
the medical community.
 Example: Warranties and liability requirements demand strict
assurances that the latest, most comprehensive, and appropriate
instructions, product information and warning of potential hazards are
in the hands of the users.
 Integrated DRM-CMS solutions can offer corporations, public sector
institutions and regulated industries enterprise-wide assurance that
content and document operations comply with current regulatory
regimes, accountability, privacy, and security legislation.
Business Imperatives for DRM: Outsourcing
• Offshore processing and data-conversion service bureaus have long been a
staple of trade, technical, professional and database publishers.
• Software and entertainment products are routinely outsourced. There is a
growing trend to rely on outsourced personnel for the roles companies
traditionally reserved for employees.
• Bottom line is many people working on digital content products and processes
do not have long-term commitment or loyalty to the company.
• Security and communication become large issues and require a level of
embedded knowledge within core business processes.
 DRM ensures that information expressed in a standard format to minimize
uncertainty, provide an efficient and accurate way to update operational
routines, and assure appropriate levels of accountability.
Business Imperatives for DRM:
Protection throughout Content Lifecycles
 Piracy, whether of software, music, film, images, or text, costs
billions of dollars each year.
 It squanders valuable company time and resources by
requiring costly efforts to detect and deter theft.
 Further, it creates an atmosphere of distrust that can become
counterproductive to developing new business models for
digital content.
 DRM-enabled protection continues throughout the distribution
of the content, auditing its use and accounting for its fees and
licenses.
The Divide
• The content development industry, which consists of the recording industry
and the movie studios, has repeatedly emphasized the need for immediate
DRM solutions that stop all unauthorized copying and distribution.
• Meanwhile, the IT industry is emphasizing that DRM solutions should
support the concept of "fair use," which allows consumers to make copies
of some types of copyrighted content for their own personal use.
Fair Use
 Copyright principle based on the belief that the public is
entitled to freely use portions of copyrighted materials for
purposes of commentary and criticism.
 Unfortunately, if the copyright owner disagrees with your fair
use interpretation, the dispute will have to be resolved by
courts or arbitration.
 The four factors for measuring fair use:
 the purpose and character of your use
 the nature of the copyrighted work
 the amount and substantiality of the portion taken, and
 the effect of the use upon the potential market.
Digital Copyright Millennium Act (DCMA)
• 1998 law designed to increase copyright holders' rights.
• Creates civil and criminal penalties for creation or distribution of
DRM circumvention tools.
• As a result, a user attempting to circumvent copyright protection, even
for legitimate reasons, violates federal law.
• What this means?
– Open-source software developers rely on reverse engineering to write
programs that can interact with hardware. This practice is illegal under the
DCMA.
– Reverse Engineering and Cryptanalysis can also be interpreted as illegal
under the DCMA.
– Is Norton Anti-Virus illegal?
The Future of DRM
• DRM is emerging as a formidable new challenge, and it is essential for
DRM systems to provide interoperable services.
• Solutions to DRM challenges will enable untold amounts of new
content to be made available in safe, open, and trusted environments.
• The technology can be expected to be heavily used in the future to
support digital library collections, code and software development,
distance education, and networked collaboration, among other
applications.
The Future of DRM
contd.
• DRM standardization is occurring in a number of open
organizations.
• The OpenEBook Forum [OEBF] and the MPEG group
[MPEG] are leading the charge for the ebook and multimedia
sectors.
• The Internet Engineering Task Force [IETF] and the World
Wide Web Consortium [W3C] have also commenced work on
DRM issues.
• Their work will be important for the entire DRM sector, and
it is also important that all communities be heard during these
standardization processes in industry and sector-neutral
standards organizations.
Are you a thief?
Plagiarism
Plagiarism is THEFT!
It is theft of intellectual property
Plagiarism
Plagiarism is the use of other
people's ideas without due
acknowledgment.
It is about presenting other people's
ideas as your own.
Plagiarism
Plagiarism can be intentional – which is unethical and
totally unacceptable. It may also be illegal or actionable
and your employment prospects can be severely affected
Likewise your academic prospects!
Plagiarism
Plagiarism can be intentional – which is unethical and
totally unacceptable. It may also be illegal or actionable
and your employment prospects can be severely affected
Likewise your academic prospects!
Plagiarism can also be unintentional – you don't realise
you are doing it. This is lazy,sloppy and unprofessional
Plagiarism
Plagiarism can be intentional – which is unethical and
totally unacceptable. It may also be illegal or actionable
and your employment prospects can be severely affected
Likewise your academic prospects!
Plagiarism can also be unintentional – you don't realise
you are doing it. This is lazy,sloppy and unprofessional
Whatever the case, plagiarism is plagiarism and cases
are always treated in the same way
Plagiarism
Here are some examples:
Copying someone's project report, with or without
their knowledge
Claiming to have done something someone else did
Fabricating experimental results
Pasting text or pictures straight from the web
Typing in passages from text books
Plagiarism
The first is usually easy to spot and
the penalties can be severe
Complicit copying (collusion): 50% of mark down to zero
and possibly a note in student progress record - usually
up to module leader or Degree Programme Director.
Plagiarism
The first is usually easy to spot and
the penalties can be severe
Complicit copying (collusion): 50% of mark down to zero
and possibly a note in student progress record - usually
up to module leader or Degree Programme Director.
Explicit copying: usually zero marks plus a warning.
In repeat or outrageous cases, appearance before
HoS – perhaps even report to Registrar
Explicit copying also covers using a work from a
previous year
Plagiarism
Claiming someone else's work as
their own can also be spotted from
a knowledge of a student's capability
An example might be where a student submits a
design report using work that someone else in
the group actually did
Plagiarism
Fabricating results:
Some famous examples of scientists fabricating
results – but students also do it.
Miss the labs and make up the data.
Easy to spot – data is usually too good and the student
misses the obvious flaws of the equipment.
Plagiarism
Pasting text or pictures straight
from the web or typing in passages
from text books and journals
Plagiarism
Pasting text or pictures straight
from the web or typing in passages
from text books and journals
Nothing wrong with this if it is done correctly and the
audience knows what's going on.
Plagiarism
Pasting text or pictures straight
from the web or typing in passages
from text books and journals
Nothing wrong with this if it is done correctly and the
audience knows what's going on.
Sometimes you may need permisssion
Plagiarism
Text, quotations, ideas from other
sources may be used to support
your arguments – but they must
be referenced, and due credit given.
Plagiarism
Some examples
Plagiarism (Some examples)
It is a truism that everyone
cares about the environment and agrees that actions
must be taken but no one wants to take responsibility
for actions which directly affect members of the public
as individuals.
The recent statements emanating from
the USA that in fact global warming might well increase
agricultural production challenge popular opinion even
further. We do not concur with this point of
view ...........
Plagiarism
Chunks of actual text, such as quotations,
should be put between quote marks (“text”).
Use a referencing system or a footnote to
acknowledge.
According to Harvey [2004] “It is a truism that everyone cares about
the environment and agree that actions must be taken but no one
wants to take responsibility for actions which directly affect members
of the public as individuals. The recent statements emanating from
the USA that in fact global warming might well increase agricultural
production challenge popular opinion even further.” We do not concur
with this point of view ...........
Plagiarism
Alternatively, you may want to make a statement but the
statement is derived from some other work. The source
must be acknowledged (referenced).
........ Commitments from various countries to energy reduction
may have been perceived to be relevant to ordinary members of
the public until the refusal of the USA to implement the Kyoto
agreement challenged popular opinion [Fells, 2000]
Finally
Basic rules for students:
DO NOT:
+ write about someone else’s ideas as if they were your own
+ write about someone else’s ideas without giving a reference
+ use someone else’s words exactly without indicating
that it is a direct quote and referencing it
+ use more or less the same words as another writer even if you
acknowledge their work
+ copy another student’s work
+ submit work written for you by another person
+ cut and paste material from the internet, putting pieces of text together
to form an essay.
ALWAYS:
+ cite your references
Introduction to
Intellectual Property and
Intellectual Property
Rights
What is meant by “intellectual property” and
“intellectual property rights”?
Which are the IP protection tools available?
•Patent
•Utility Model
•Industrial Design
•Trademark
•Copyright
• What is meant by “intellectual property” and
“intellectual property rights”?
Intangible assets:
• Results of creative efforts from the human intellect
• Such creations cannot be materially measured
Business assets
• Tangible Assets e.g. buildings, machinery,
infrastructures ...
• Intangible Assets (intellectual property)
e.g. know-how, human resources, business
relationships, brands …
The IP Chain of Activities
• Creation
• Innovation
• Commercialization
• Protection
• Enforcement
IP as a property
• Can be sold
• Can be bought
• Can be lease or rent
• Can pass under a will
• Can be assigned
The Legal Framework for IP
• MyIPO is the legal custodian.
• Three machinery of administration
• - the IP office
• - the external machinery
• - the court
International Convention for IP
• Paris Convention for Protection of
Industrial Property 1967 ( 1989)
• Berne Convention for the Protection of
Literary and Artistic Works 1971 ( 1990)
• Trade-related aspects of Intellectual
Property Agreement 1994 ( 1995)
The Laws For Intellectual Property
Protection
• Copyright Act 1987
• Trademarks Act 1976
• Patent Act 1983
• Industrial Design Act 1996
• Geographical Indications Act 2000
• Law of Tort
• -passing-off
• Confidential information
References
benjaminvibez@gmail.com
END

Contenu connexe

Tendances

Digital Rights Management PPT
Digital Rights Management PPTDigital Rights Management PPT
Digital Rights Management PPTSuresh Khutale
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e businessKdnk Kiriti
 
Intellectual property rights (IPR) and digital
Intellectual property rights (IPR) and digitalIntellectual property rights (IPR) and digital
Intellectual property rights (IPR) and digitalDheeraj Negi
 
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...Jason Haislmaier
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerceHimanshu Pathak
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacysalehnia
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and SecurityAnuMarySunny
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceNicholas Davis
 
UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final nycgarcia
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management Endcode_org
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethicsKriscila Yumul
 
Big data privacy security regulation
 Big data privacy security regulation Big data privacy security regulation
Big data privacy security regulationcjw119
 

Tendances (20)

Digital Rights Management PPT
Digital Rights Management PPTDigital Rights Management PPT
Digital Rights Management PPT
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
Intellectual property rights (IPR) and digital
Intellectual property rights (IPR) and digitalIntellectual property rights (IPR) and digital
Intellectual property rights (IPR) and digital
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerce
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
 
Big data privacy security regulation
 Big data privacy security regulation Big data privacy security regulation
Big data privacy security regulation
 

Similaire à Privacy in computing & interlectual property

What is Digital Rights Management System and How does it work : Ameva Tech
What is Digital Rights Management System and How does it work : Ameva TechWhat is Digital Rights Management System and How does it work : Ameva Tech
What is Digital Rights Management System and How does it work : Ameva TechAmeva Tech
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdfstirlingvwriters
 
ICIC 2013 Conference Proceedings Kim Zwollo Rights Direct
ICIC 2013 Conference Proceedings Kim Zwollo Rights DirectICIC 2013 Conference Proceedings Kim Zwollo Rights Direct
ICIC 2013 Conference Proceedings Kim Zwollo Rights DirectDr. Haxel Consult
 
2021091518365700015701 mdia6055 digital auvi streaming session 17_18 (1)
2021091518365700015701 mdia6055 digital auvi streaming   session 17_18 (1)2021091518365700015701 mdia6055 digital auvi streaming   session 17_18 (1)
2021091518365700015701 mdia6055 digital auvi streaming session 17_18 (1)IhzaNugroho
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital MarketersOne North
 
Why We Require GDPR?
Why We Require GDPR?Why We Require GDPR?
Why We Require GDPR?Jatin Kochhar
 
"Everything as a Service" Contracts - Presentation
"Everything as a Service" Contracts  - Presentation "Everything as a Service" Contracts  - Presentation
"Everything as a Service" Contracts - Presentation MorningstarLaw
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfSecureCurve
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxKRITARTHBANSAL1
 
The interface between data protection and ip law
The interface between data protection and ip lawThe interface between data protection and ip law
The interface between data protection and ip lawFrancesco Banterle
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskShawn Tuma
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion
 
Lead generation and data retention-What should you know as an IT manager?
Lead generation and data retention-What should you know as an IT manager?Lead generation and data retention-What should you know as an IT manager?
Lead generation and data retention-What should you know as an IT manager?Monomit Bhowmik
 
Inventor boot camp 2010
Inventor boot camp 2010Inventor boot camp 2010
Inventor boot camp 2010dr2tom
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.pptamreena6
 

Similaire à Privacy in computing & interlectual property (20)

What is Digital Rights Management System and How does it work : Ameva Tech
What is Digital Rights Management System and How does it work : Ameva TechWhat is Digital Rights Management System and How does it work : Ameva Tech
What is Digital Rights Management System and How does it work : Ameva Tech
 
Digital Rights Management
Digital Rights Management Digital Rights Management
Digital Rights Management
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
Case 1
Case 1Case 1
Case 1
 
ICIC 2013 Conference Proceedings Kim Zwollo Rights Direct
ICIC 2013 Conference Proceedings Kim Zwollo Rights DirectICIC 2013 Conference Proceedings Kim Zwollo Rights Direct
ICIC 2013 Conference Proceedings Kim Zwollo Rights Direct
 
2021091518365700015701 mdia6055 digital auvi streaming session 17_18 (1)
2021091518365700015701 mdia6055 digital auvi streaming   session 17_18 (1)2021091518365700015701 mdia6055 digital auvi streaming   session 17_18 (1)
2021091518365700015701 mdia6055 digital auvi streaming session 17_18 (1)
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
 
Why We Require GDPR?
Why We Require GDPR?Why We Require GDPR?
Why We Require GDPR?
 
"Everything as a Service" Contracts - Presentation
"Everything as a Service" Contracts  - Presentation "Everything as a Service" Contracts  - Presentation
"Everything as a Service" Contracts - Presentation
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptx
 
The interface between data protection and ip law
The interface between data protection and ip lawThe interface between data protection and ip law
The interface between data protection and ip law
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
Lead generation and data retention-What should you know as an IT manager?
Lead generation and data retention-What should you know as an IT manager?Lead generation and data retention-What should you know as an IT manager?
Lead generation and data retention-What should you know as an IT manager?
 
Inventor boot camp 2010
Inventor boot camp 2010Inventor boot camp 2010
Inventor boot camp 2010
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.ppt
 
5362098
53620985362098
5362098
 

Dernier

8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 

Dernier (20)

8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 

Privacy in computing & interlectual property

  • 1. Privacy in computing What is privacy? •How would you define it? •What do you think its aspects are? – Three key aspects: • Controlled disclosure. • Sensitive data • Affected subject.
  • 2. Computer Related Privacy Problems • Data collection: what issue do you see? • No informed consent: – Examples: real age. • Loss of control: class discussion. – Example: posting on a blog. • What are the ramifications vs. writing a letter? • Ownership of data.
  • 3. Computer Related Privacy Problems • Data collection: what issue do you see? • No informed consent: – Examples: real age. • Loss of control: class discussion. – Example: posting on a blog. • What are the ramifications vs. writing a letter? • Ownership of data.
  • 4. Protections provided • Privacy Policies; – First step: fair information policies: • Regulate these; – Collection of information. – Data quality. – Purpose specification (use of information) – Use limitation. – Security safeguards. – Openness. – Individual participation. – Accountability.
  • 5. U.S privacy laws – Are usually applied to individual data types: – HIPAA – Financial organizations: Gramm-Leach-Bliley Act (GLBA) – Important in Radford: Federal Educational Rights and Privacy Act (FERPA). • Somethings are not clear: example class discussion.
  • 6. U.S govt. websites. • Privacy laws controlled by the FTC. • Address 5 factors: – Notice (must be informed) – Choice – Access (contest accuracy of data collected) – Security. (data collectors must secure against unauthorized use). – Enforcement (sanctions on noncompliance) • In 2002, the US e-government act.
  • 7. What about commercial websites? • Federal trade commission can prosecute for deceptive practices. (e.g., false advertising) – E.g., JetBlue and the DOD. Other issues with Privacy • Anonymity. – Issues with anonymity. • Multiple identities (online id)
  • 8. How to protect against privacy loss? • Get/give as little data as possible. • Data anonymization. • Audit trail: record who has accessed what data. • Security and controlled access • Training, quality, Restricted usage, data left in place. • Policy.
  • 9. Issues in Computer Security: Data mining and privacy. • Government data mining. • Privacy preserving data mining: – Data mining is “extracting hidden patterns from large amounts of data” – Solutions to preserve privacy: • Remove id information. Doesn’t work. – E.g., Sweeney’s report: > 87% US population can be identified by: 5 digit zip code, gender and date of birth. • Data perturbation. Example. Needs to be done carefully.
  • 10. Privacy on the web • Think about this: – On the web: every word you speak (blog) can be read – Someone selling something may have ads on their site for something else. – Identity of the other person may not be known! • Some issues on the web are protected. – Can you name them?
  • 11. Privacy on the web • Credit card payments are protected. – But not necessarily private. – Paypal etc.. May solve the privacy issues. • Site and portal registrations: – Beware of “we will enhance your browsing experience” – Using email as id on some sites. Issues? • Third party ads. • Contests and offers: Free Iphones!
  • 12. Privacy issues • Cookies: – Be-aware • Third party cookies. E.g., Double Click and online profiling. • Adware • Web-bug. • Spyware: keystroke loggers.
  • 13. Email security • Interception of email. – Can be encrypted using PGP or S/MIME – Email monitored legallly. • Anonymous E-mail and remailers – Sending anonymous emails. • Spoofing and spamming.
  • 15. History of DRM • In the pre-digital era, people's ability to do various things to or with content were limited. • The networked digital age makes it possible to do just about anything to digital content, instantaneously and at virtually no cost. • While this is a great opportunity for new content business models, it threatens the livelihood of content creators by making rampant piracy possible • Also, more and more public and private entities are going digital and doing business online. Information is increasing retrieved through computer networks by customers, employees and partners etc.  Thus, we see the need for a technology that enables the secure creation, management, distribution and promotion of digital content on the Internet.
  • 16. DRM  Set of technologies that enable content owners to specify and control:  the access they want to give consumers and  the conditions under which it is given.  It includes: – Persistent Protection: Technology for protecting files via encryption and allowing access to them only after the entity desiring access has had its identity authenticated and its rights to that specific type of access verified – Business rights: Capability of associating business rights with a content by contract, e.g. author’s rights to an article or musician’s rights to a song – Access tracking: Capability of tracking access to and operations on content – Rights licensing: Capability of defining specific rights to content and making them available by contract
  • 17. DRM Functional Architecture • IP Asset Creation and Capture Module – Rights Validation to ensure content being created includes the rights to do so – Rights Creation to allow rights to be assigned to new content – Rights Workflow to allow for content to be processed through series of workflow steps • IP Asset Management Module – Repository functions to enable the access/retrieval of content in potentially distributed databases and the access/retrieval of metadata – Trading functions to enable assignment of licenses to parties who have traded agreements for rights over content, including payments from licensees to rights
  • 18. Interested Players in DRM• Government Agencies – Interested in controlled viewing and sharing of highly secure and confidential documents, audio and video data. – “Need to know basis” • Private Corporations – Want to limit the sharing of their proprietary information – Track accesses and any modifications made to it. – E.g. news agencies like Reuters • Owners of commercial content – Content owners, artists, and publishers want to gain revenue through sale and promotions – But are concerned about protecting their copyrighted works from illegal use
  • 19. Interested Players in DRM contd.• Intermediaries (service providers, content distributors etc.) – Concerned about minimizing costs of providing services – Cautious about protecting themselves from lawsuits over illegal distribution • Producers of end user equipment (PCs, players, etc.) – Concerned about minimizing design and production costs – Unwilling to pay for features that only some users need • End users – Interested in immediate access to desired content – Want to use the content conveniently
  • 20. Thus, we see…  DRM can help ensure companies, corporations, and other entities who share similar business that:  Rights are tracked at ingestion  Access is controlled during production processes  Protection for the content extends throughout product lifecycles  Additionally, DRM can integrate persistent content protection with content management to ensure:  Proper business practices  Implementation of new business models  Compliance with regulatory requirements in industries such as financial services, healthcare, and government
  • 21. Business Imperatives for DRM: Control Access During Workflow  Controlling allowed uses of digital content is a critical function of DRM technology.  By predetermining and controlling the exact use(s) for content, DRM technology extends and enhances the traditional role-based access.  Example: A draft manufacturing guideline is circulated among an international standards committee and participating qualified companies. Using DRM technology, this becomes a closed circulation. The draft guidelines are in a tamper-proof format, with print-only user-rights, limited to a pre-determined timeframe, after which the draft is withdrawn and replaced by the final set of guidelines. The owner of the content, in this instance the standards committee, can withdraw, alter, or grant permissions related to the content at any time.
  • 22. Business Imperatives for DRM: Downstream Use  Companies need to deliver controlled access downstream so that content can be licensed, deployed and repurposed by business partners in accordance with the terms of agreements.  Example: Music publishers license DRM-enabled content to online transactional or subscription services. The DRM-enabled content allows both distributors and consumers to choose from multiple fee/free business models. For example, the content could be included in both the free-play list for one- time use on multiple devices, or it could be licensed on a fee-for play use by media companies, publishers corporate, government or institutional users. Further, with DRM-enabled content, owners may chose to permit licensees the ability to re-distribute or enter into republication agreements.
  • 23. Business Imperatives for DRM: Modification of Rights Over Time  Systems must be able to accommodate changes by updating parameters of rights and usage as needed to accommodate new distribution models.  Lack of ability to change access rights to content can be a serious business liability, cost a lot of money and be a disincentive to customers.  Example: The U.S. Supreme Court decision in New York Times v. Tasini (2001) compelled content industry vendors to remove or modify core research records in database archives, because creators of content in those archives were not being properly compensated. Compliance costs for vendors included additional staffing to re-code or remove records, systems development expenses, along with increased demand on customer service and marketing departments.  DRM, in such cases, can facilitate collaboration, creating the ‘trusted environment’ needed for collaboration by persistently protecting critical Intellectual Property (IP) beyond the boundaries of business processes and corporate organizations.
  • 24. Business Imperatives for DRM: Regulatory and Business Standards  Integrity, authentication, security, privacy and accountability are ‘watchwords’ for new legislative and regulatory standards.  Example: HIPPA regulations mandate new levels for privacy and authentication for document management in healthcare institutions and the medical community.  Example: Warranties and liability requirements demand strict assurances that the latest, most comprehensive, and appropriate instructions, product information and warning of potential hazards are in the hands of the users.  Integrated DRM-CMS solutions can offer corporations, public sector institutions and regulated industries enterprise-wide assurance that content and document operations comply with current regulatory regimes, accountability, privacy, and security legislation.
  • 25. Business Imperatives for DRM: Outsourcing • Offshore processing and data-conversion service bureaus have long been a staple of trade, technical, professional and database publishers. • Software and entertainment products are routinely outsourced. There is a growing trend to rely on outsourced personnel for the roles companies traditionally reserved for employees. • Bottom line is many people working on digital content products and processes do not have long-term commitment or loyalty to the company. • Security and communication become large issues and require a level of embedded knowledge within core business processes.  DRM ensures that information expressed in a standard format to minimize uncertainty, provide an efficient and accurate way to update operational routines, and assure appropriate levels of accountability.
  • 26. Business Imperatives for DRM: Protection throughout Content Lifecycles  Piracy, whether of software, music, film, images, or text, costs billions of dollars each year.  It squanders valuable company time and resources by requiring costly efforts to detect and deter theft.  Further, it creates an atmosphere of distrust that can become counterproductive to developing new business models for digital content.  DRM-enabled protection continues throughout the distribution of the content, auditing its use and accounting for its fees and licenses.
  • 27. The Divide • The content development industry, which consists of the recording industry and the movie studios, has repeatedly emphasized the need for immediate DRM solutions that stop all unauthorized copying and distribution. • Meanwhile, the IT industry is emphasizing that DRM solutions should support the concept of "fair use," which allows consumers to make copies of some types of copyrighted content for their own personal use.
  • 28. Fair Use  Copyright principle based on the belief that the public is entitled to freely use portions of copyrighted materials for purposes of commentary and criticism.  Unfortunately, if the copyright owner disagrees with your fair use interpretation, the dispute will have to be resolved by courts or arbitration.  The four factors for measuring fair use:  the purpose and character of your use  the nature of the copyrighted work  the amount and substantiality of the portion taken, and  the effect of the use upon the potential market.
  • 29. Digital Copyright Millennium Act (DCMA) • 1998 law designed to increase copyright holders' rights. • Creates civil and criminal penalties for creation or distribution of DRM circumvention tools. • As a result, a user attempting to circumvent copyright protection, even for legitimate reasons, violates federal law. • What this means? – Open-source software developers rely on reverse engineering to write programs that can interact with hardware. This practice is illegal under the DCMA. – Reverse Engineering and Cryptanalysis can also be interpreted as illegal under the DCMA. – Is Norton Anti-Virus illegal?
  • 30. The Future of DRM • DRM is emerging as a formidable new challenge, and it is essential for DRM systems to provide interoperable services. • Solutions to DRM challenges will enable untold amounts of new content to be made available in safe, open, and trusted environments. • The technology can be expected to be heavily used in the future to support digital library collections, code and software development, distance education, and networked collaboration, among other applications.
  • 31. The Future of DRM contd. • DRM standardization is occurring in a number of open organizations. • The OpenEBook Forum [OEBF] and the MPEG group [MPEG] are leading the charge for the ebook and multimedia sectors. • The Internet Engineering Task Force [IETF] and the World Wide Web Consortium [W3C] have also commenced work on DRM issues. • Their work will be important for the entire DRM sector, and it is also important that all communities be heard during these standardization processes in industry and sector-neutral standards organizations.
  • 32. Are you a thief? Plagiarism Plagiarism is THEFT! It is theft of intellectual property
  • 33. Plagiarism Plagiarism is the use of other people's ideas without due acknowledgment. It is about presenting other people's ideas as your own.
  • 34. Plagiarism Plagiarism can be intentional – which is unethical and totally unacceptable. It may also be illegal or actionable and your employment prospects can be severely affected Likewise your academic prospects!
  • 35. Plagiarism Plagiarism can be intentional – which is unethical and totally unacceptable. It may also be illegal or actionable and your employment prospects can be severely affected Likewise your academic prospects! Plagiarism can also be unintentional – you don't realise you are doing it. This is lazy,sloppy and unprofessional
  • 36. Plagiarism Plagiarism can be intentional – which is unethical and totally unacceptable. It may also be illegal or actionable and your employment prospects can be severely affected Likewise your academic prospects! Plagiarism can also be unintentional – you don't realise you are doing it. This is lazy,sloppy and unprofessional Whatever the case, plagiarism is plagiarism and cases are always treated in the same way
  • 37. Plagiarism Here are some examples: Copying someone's project report, with or without their knowledge Claiming to have done something someone else did Fabricating experimental results Pasting text or pictures straight from the web Typing in passages from text books
  • 38. Plagiarism The first is usually easy to spot and the penalties can be severe Complicit copying (collusion): 50% of mark down to zero and possibly a note in student progress record - usually up to module leader or Degree Programme Director.
  • 39. Plagiarism The first is usually easy to spot and the penalties can be severe Complicit copying (collusion): 50% of mark down to zero and possibly a note in student progress record - usually up to module leader or Degree Programme Director. Explicit copying: usually zero marks plus a warning. In repeat or outrageous cases, appearance before HoS – perhaps even report to Registrar Explicit copying also covers using a work from a previous year
  • 40. Plagiarism Claiming someone else's work as their own can also be spotted from a knowledge of a student's capability An example might be where a student submits a design report using work that someone else in the group actually did
  • 41. Plagiarism Fabricating results: Some famous examples of scientists fabricating results – but students also do it. Miss the labs and make up the data. Easy to spot – data is usually too good and the student misses the obvious flaws of the equipment.
  • 42. Plagiarism Pasting text or pictures straight from the web or typing in passages from text books and journals
  • 43. Plagiarism Pasting text or pictures straight from the web or typing in passages from text books and journals Nothing wrong with this if it is done correctly and the audience knows what's going on.
  • 44. Plagiarism Pasting text or pictures straight from the web or typing in passages from text books and journals Nothing wrong with this if it is done correctly and the audience knows what's going on. Sometimes you may need permisssion
  • 45. Plagiarism Text, quotations, ideas from other sources may be used to support your arguments – but they must be referenced, and due credit given.
  • 47. Plagiarism (Some examples) It is a truism that everyone cares about the environment and agrees that actions must be taken but no one wants to take responsibility for actions which directly affect members of the public as individuals. The recent statements emanating from the USA that in fact global warming might well increase agricultural production challenge popular opinion even further. We do not concur with this point of view ...........
  • 48. Plagiarism Chunks of actual text, such as quotations, should be put between quote marks (“text”). Use a referencing system or a footnote to acknowledge. According to Harvey [2004] “It is a truism that everyone cares about the environment and agree that actions must be taken but no one wants to take responsibility for actions which directly affect members of the public as individuals. The recent statements emanating from the USA that in fact global warming might well increase agricultural production challenge popular opinion even further.” We do not concur with this point of view ...........
  • 49. Plagiarism Alternatively, you may want to make a statement but the statement is derived from some other work. The source must be acknowledged (referenced). ........ Commitments from various countries to energy reduction may have been perceived to be relevant to ordinary members of the public until the refusal of the USA to implement the Kyoto agreement challenged popular opinion [Fells, 2000]
  • 50. Finally Basic rules for students: DO NOT: + write about someone else’s ideas as if they were your own + write about someone else’s ideas without giving a reference + use someone else’s words exactly without indicating that it is a direct quote and referencing it + use more or less the same words as another writer even if you acknowledge their work + copy another student’s work + submit work written for you by another person + cut and paste material from the internet, putting pieces of text together to form an essay. ALWAYS: + cite your references
  • 51. Introduction to Intellectual Property and Intellectual Property Rights
  • 52. What is meant by “intellectual property” and “intellectual property rights”? Which are the IP protection tools available? •Patent •Utility Model •Industrial Design •Trademark •Copyright
  • 53. • What is meant by “intellectual property” and “intellectual property rights”? Intangible assets: • Results of creative efforts from the human intellect • Such creations cannot be materially measured
  • 54. Business assets • Tangible Assets e.g. buildings, machinery, infrastructures ... • Intangible Assets (intellectual property) e.g. know-how, human resources, business relationships, brands …
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74. The IP Chain of Activities • Creation • Innovation • Commercialization • Protection • Enforcement
  • 75. IP as a property • Can be sold • Can be bought • Can be lease or rent • Can pass under a will • Can be assigned
  • 76. The Legal Framework for IP • MyIPO is the legal custodian. • Three machinery of administration • - the IP office • - the external machinery • - the court
  • 77. International Convention for IP • Paris Convention for Protection of Industrial Property 1967 ( 1989) • Berne Convention for the Protection of Literary and Artistic Works 1971 ( 1990) • Trade-related aspects of Intellectual Property Agreement 1994 ( 1995)
  • 78. The Laws For Intellectual Property Protection • Copyright Act 1987 • Trademarks Act 1976 • Patent Act 1983 • Industrial Design Act 1996 • Geographical Indications Act 2000 • Law of Tort • -passing-off • Confidential information