SlideShare une entreprise Scribd logo
1  sur  47
Chapter 4 - Intellectual
Property
IT 5105 – Professional Issues in IT
OpenArc Campus - BIT UCSC - Sem V 2016
Upekha Vandebona
upe.vand@gmail.com
Ref : Tavani, Herman T., “Ethics and technology: controversies, questions, and strategies for ethical computing” , 4th Edition.
Instructional Objectives
 Distinguish among copyrights, patents, trademarks and
trade secrets.
 Discuss the ramifications of non-disclosure agreements
(NDAs).
 Discuss the implications of plagiarism, both in education and
the profession.
 Discuss the consequences of software piracy on information
technology and the role of relevant enforcement
organizations.
 Discuss how intellectual property laws vary internationally.
 Describe consequences of the Digital Millennium Copyright
Act.
INTELLECTUAL
PROPERTY ACT,
No. 36 OF
2003:
What is Intellectual Property (IP)?
Boralugoda (බ ොරලුබ ොඩ) owns a Dell
laptop computer.
He can control who has access to his
computer and how it is used;
For example Boralugoda has the right to exclude
Galpaatha ( ල්පාත) from using the laptop computer, or,
as its owner, he can grant him unlimited access to it.
Consider once again, Boralugoda’s laptop computer, is a
physical tangible object.
So when Galpaatha have it, then Boralugoda cannot
have it, and vice versa.
Therefore Boralugoda’s laptop is an exclusionary object.
What is Intellectual Property (IP)?
Consider a word processing program which is intangible that
resides in Boralugoda’s computer.
If Boralugoda makes a copy of that program, then both the
Galpaatha and Boralugoda have copies of it.
Therefore word processing program is
non-exclusionary.
Intellectual Objects vs Other Objects
 Unlike physical property, intellectual property
consists of objects that are not tangible.
 These non-tangible(intangible), or intellectual,
objects represent literary/ creative works and
inventions, which are the manifestations or
expressions of ideas.
 Unlike tangible objects, which are exclusionary in
nature, intellectual objects (e.g., software
programs) are non-exclusionary:
Intellectual Objects vs Other Objects
 Quantitative Limitations of Ownership/Production
 Countless digital copies of a software program can be
produced and each at a relatively low cost.
 But a land cannot be produce/own that much.
 Way of protection or legal claim
 Physical objects have clear visibility of boundary.
 For intellectual objects difficult to define the
boundary.
Protection of IP
 For a literary or artistic idea to be protected it
must be expressed in some medium such as a
book or a sheet of paper containing a musical
score.
 If the idea is functional in nature, such as an
invention, it must be expressed as a machine or a
documented design.
 Whereas authors are granted copyright
protections for expressions of their literary ideas,
inventors are given an incentive, in the form of a
patent protection, for expressions of their
functional ideas.
Why Protect?
 Social constructs designed to encourage creators
and inventors to better serve society in general by
bringing forth their creative works and practical
inventions into the market-place.
 To encourage authors and inventors, it is believed
that it is necessary to grant them property rights
in the form of limited monopolies that can result
in financial advantages for them.
SW & HW as IPs
 Introduction of computer software has created
questions regarding intellectual property laws for
which there are no easy answers.
 Innovations in computer hardware, on the contrary,
have clearly qualified for patent protection, and in
this sense, computer hardware inventions are no
different than other kinds of inventions involving
physical objects.
 But questions about whether and how software, as a
kind of intellectual object, should be protected have
been strongly debated in the courts.
Theft
 The legal definition of theft involves taking away
a piece of someone’s property with the
intention permanently to deprive them of it.
 Duplicating software is not identical to stealing
physical property, but we can show that it may
cause harm.
Theft
If Shaggy steals Boralugoda’s laptop, he deprives
Boralugoda of Boralugoda’s right to use a device that
Boralugoda own;
When Fred makes an unauthorized
copy of a proprietary program that
Boralugoda own (as the copyright
holder), he deprives Boralugoda of
income to which Boralugoda entitled.
Theft
 If someone steals your bicycle, you no longer have
it. If someone takes away a computer belonging to
a company, the company no longer has it.
 If you invent a drug that will cure known illnesses
and leave the formula on your desk, someone can
come along, read the formula, remember it, and
go away and make a fortune out of manufacturing
the drug.
 But you still have the formula even though the
other person now has it as well. This shows that
the formula is not a property in the same way that
the bicycle is.
Theft
 Unauthorized copying is harmful because it is a
misuse, misappropriation, or “unfair taking” of
another person’s property against the property
owner’s will.
 Many nations have enacted specific laws and statutes
to protect the rights and interests of “owners” of
computer software programs and applications (as
forms of intellectual property).
 We examine four different types of schemes for
protecting intellectual property rights: copyright law,
patents, trademarks, and trade secrets
DMCA
 Digital Millennium Copyright Act (US copyright law)
Search to download a movie At the bottom of the search results,
you’ll see… HomeWork 1 : Go to the
links provided and read.
Fair Use and First Sale
 To balance the exclusive controls given to copyright
holders against the broader interests of society,
these two provisions have been developed.
• First-sale provision, applies once the original
work has been sold for the first time.
• At this point, the original owner loses rights
over the previously protected work.
• For example, once you purchase a copy of a
(physical) book, you are free to give away,
resell, or even destroy your copy.
• It is not clear, however, that one can give
away media in digital format that is licensed
for use but not, strictly speaking, owned by
a user.
First-sale
• According to the fair-use principle, every
author or publisher may make limited use of
another person’s copyrighted work for
purposes such as criticism, comment, news,
reporting, teaching, and research.
Fair use
First Sale Vs Technology
 Technology could also be seen as threatening the
principle of first sale. Consider that in the case of
a physical book, one can do whatever one wishes
after purchasing it.
 For example, one can give the book to a friend.
Also, one can resell that book, in compliance with
the first-sale provision of copyright law.
 The same is not true, however, of e-books,
because the digitized information contained in
those books cannot be subsequently exchanged
without permission of the copyright holder.
Software Piracy as Copyright Infringement
 Software manufacturers claim to have lost millions of
dollars of potential revenue because of software piracy
by individuals and organizations, both nationally and
globally.
 There are some debatable arguments regard to American
software manufacturers about their loss of revenue due
to the use of pirated software in developing countries.
 Many people and organizations in those countries could not
afford to pay the prices set by American software companies for
their products, so the companies have not lost any (real)
revenues, because their (expensive, by American standards)
software would not sell on the open market in most developing
countries.
Sharing Digital Music & Movies
 Popular Case : Napster (P2P 1st Generation)
 Napster provided a distribution center for
proprietary digital information. Napster’s users
were able to exchanged copyrighted music files,
in MP3 format, with one another.
 In December 1999, the Recording Industry
Association of America (RIAA) sued the Napster
Web site for illegally distributing copyrighted
music on the Internet.
P2P Effect
 P2P systems comprise three categories:
 a centralized indexing system (such as in the original
Napster site),
 a decentralized indexing system,
 a supernode system (where a group of computers can act
as indexing servers).
 Another P2P protocol is Bit Torrent, which enables
large files, such entire music CDs, to be exchanged
more efficiently through a system of networked
computers designated as “peers” and “seeds.”
(Pirate Bay)
Prohibiting
 The entertainment industry, in its effort to crack
down on illicit file sharing, has not been deterred
by the fact that later P2P systems were able to
avoid the legal pitfalls surrounding the
centralized indexing method used by Napster.
 Prohibiting through ISPs for their customers,
through policies in workers/students in
organizations.
The Guilty  Technology ?
 Is it legal to prohibit the use of technology merely
because it could result in copyright infringement?
 Popular Case : Sony v. Universal Studios
 Universal sued to ban the sale of video cassette
recorder (VCR) technology, claiming that Sony,
who manufactured it (Betamax) was liable for
copyright infringement, either directly or
indirectly, because the new technology could be
used to make illegal copies of movies.
“Sony Safe Harbor” Precedent
 The Court ruled that simply because VCR technology
could be used to do something illegal is not sufficient
grounds for banning that technology.
 In essence, it concluded that as long as the
technology was capable of “substantial non-infringing
uses”(SNIU), it could not be barred from sale and
distribution.
 So, in effect, the Court also determined that VCRs did
not violate copyright law merely because they were
capable of substantial copyright infringement.
IP Laws (Globally & Locally)
 Intellectual property laws have been very difficult to
enforce globally, in large part because of jurisdictional
issues.
 In recent years, however, there has been considerable
international cooperation in prosecuting digital piracy
cases across jurisdictional lines.
 For example, in 2009, the owners and operators of the
internationally controversial (Sweden-based) PirateBay
site, who were found guilty of “unlawful transfer” of
copyrighted material, received both fines and jail
sentences.
IP Laws (Globally & Locally)
 In countries such as the United States, some laws
affecting intellectual property apply at the state
level. These laws apply to the sale of goods, as
well as to contracts involved in those sales, and
they often vary from state to state.
Moral Rights
 The personality account of property is sometimes
referred to as the “moral rights”(droits morals)
theory of property.
 The personality theory provides an interesting
interpretation of why an author should have
control over the ways in which his or her work can
be displayed and distributed.
 To ensure this control, authors given protection
for their artistic work even if they have no legal
claim to any monetary reward associated with it.
FOSS Movement
 Collaboration of people who views software
ownership as a form that disregards the general
welfare of society and against it.
 As an alternative to this they proposes that
programmers work together to make software
freely available for humankind rather than
supporting efforts to restrict its use.
 GNU’s goal was to develop an entire Unix-like
operating system, complete with system utilities,
that was “open” and freely accessible.
Free Software
 Four “freedoms” are essential for free software.
 These include freedom to:
1. run the program, for any purpose;
2. study how the program works, and adapt it for your
needs;
3. redistribute copies so you can help your neighbor;
4. improve the program, and release your improvements
to the public so that the whole community benefits.
http://www.fsf.org : Visit web page of Free Software
Foundation and meet Richard M. Stallman, the man behind
the mindset.
GPL
 Free softwares typically accompanied by a
licensing agreement that is designed to keep it
freely available to other users “downstream,”
who can continue to modify the source code.
 The best known of these is the GNU Public License
(GPL). The kind of protection granted by this
license is also known as copyleft.
Copyleft
 Copyright law restrict the right to make and
redistribute copies of a particular work.
 Copyleft license included in GPL, uses an alternative
scheme that challenge the traditional copyright
mechanism in order to ensure that every person who
receives a copy, or derived version of a work, can
use, modify, and also redistribute both the work and
the derived version of the work.
 All derivative works of GPL software must also be
licensed under GPL.
 In this way, the four freedoms are propagated in
future software developments under this agreement.
Open Source Software
 The ability of a software user to look at,
understand, modify, and redistribute the source
code for that software.
 Requires that its source code be freely available.
 Concentrated its efforts more on promoting the
open source model as an alternative methodology
to “closed-source” development for software.
 Significant threat to companies that produce
proprietary software, such as Microsoft.
Free Software (FS)
Requires that all derivative
pieces of software be subject
to the original requirements
and thus remain “free” and
nonproprietary.
Requires that users must
strictly adhere to its GPL
license in all derivative uses of
its software.
Less anti-commercial
Open Source Software
(OSS)
More flexible with respect to
its derivative software.
Supports less restrictive
licenses Ex: Berkeley’s
Software Distribution (BSD)
and Netscape’s Mozilla Public
License (MPL) [These licenses
are considered more “light”
than GPL because they
permit programmers to alter
the open source software and
to release it as a proprietary
product.]
FOSS = Free Software + Open Source Software
Plagiarism
 “Stealing and publication" of another author's
"language, thoughts, ideas, or expressions" and the
representation of them as one's own original work.
 Plagiarism is considered academic dishonesty and a
breach of journalistic ethics.
 It is subject to sanctions like penalties, suspension,
and even expulsion.
 Plagiarism is not a crime as such, but in academia and
industry, it is a serious ethical offense and cases of
plagiarism can constitute copyright infringement.
Plagiarism
 Tools are becoming available to help identify
plagiarism.
 There are a range of approaches that attempt to
limit online copying(Content scraping), such as
disabling right clicking.
 Visit http://www.plagiarism.org
Common forms of student plagiarism
 Submitting someone’s work as their own.
 Taking passages from their own previous work without adding citations.
 Re-writing someone’s work without properly citing sources.
 Using quotations, but not citing the source.
 Interweaving various sources together in the work without citing.
 Citing some, but not all passages that should be cited.
 Melding together cited and uncited sections of the piece.
 Providing proper citations, but fails to change the structure and wording
of the borrowed ideas enough.
 Inaccurately citing the source.
 Relying too heavily on other people’s work. Fails to bring original thought
into the text.
Sharing and Caring Vs Intellectual Rights
 Consider the traditional practice of borrowing books
from public libraries. Physical books had always been
available in libraries and there is no limit on how
many times a book could circulate.
 In terms of the digital media content, does the same
practice suitable?
 Copyright laws, originally intended to cover print
media.
 For digital media it inhibit the distribution of
electronic information.
 The distribution of digitized information is now being
discouraged in some sectors.
Sharing and Caring Vs Intellectual Rights
 Copyright laws were originally designed to encourage
the flow of information in print media with a
protection, via their fair-use provisions.
 Yet, for digital media it have been discourages the
flow, and thus the sharing, of electronic information.
 Consider that the ability to share information
contributed to the development of the World Wide
Web.
 Also consider what might have happened if the
inventors of the Internet and the Web had been more
entrepreneurial-minded and less concerned with
sharing information.
e.g.: Tim Berners-Lee
 Tim Berners-Lee, who invented HTTP (the protocol
used on the Web), never bothered to apply for a
patent for his invention or for a copyright for his
programming code.
 As a physicist working at CERN (a physics laboratory
on the Franco-Swiss border), he desired to develop a
common protocol for Internet communication so that
scientists could share information more easily with
each other.
 Berners-Lee’s goal in developing the Web was to
provide a forum where information could be shared.
Sharing and Caring Vs Intellectual Rights
 A person whose interests were more
entrepreneurial could have sought intellectual
property protection for his or her contributions,
thereby reducing the amount of information that
could be shared.
 Consider also how the sharing of information has
benefited many of those entrepreneurs who now
seek to control the flow of information in
cyberspace.
e.g.: GUI
(https://en.wikipedia.org/wiki/Apple_Computer,_Inc._v._Microsoft_Corp.)
 It has been argued that Microsoft benefited
significantly from the work done by Apple Corporation
on its graphical user interface (the system of icons
that users can point to and click on to accomplish a
task).
 And it is well known that when Steve Jobs was at
Apple, he visited Xerox PARC (Palo Alto Research
Center), where he discovered that a graphical
interface had already been invented by researchers
there.
 So it is reasonably accurate to say that current user
interfaces have benefited from the sharing of
information along the way.
Sharing and Caring Vs Intellectual Rights
 Would it be fair to credit any one company or
person with exclusive rights to a graphical user
interface?
 Would doing so not also eliminate, or certainly
impede, the possibility of incremental
development and innovation?
 And more importantly, would it not also prevent
us from sharing that important information?
Building up Commons
 It is very easy to underestimate the importance of
the commons.
 We often take for granted the public parks, public
beaches, and public gathering places that have
been set aside for general use.
 Imagine the quality of our lives without them, and
consider that without proper foresight, planning,
and management, our parks could easily have
been turned over to entrepreneurs for private
development.
So How?
 If we defend the principle that information wants
to be shared (but not totally free), then perhaps
it will be possible to frame reasonable
intellectual property policies that would both
encourage the flow of information in digital form
and reward fairly the creators of intellectual
objects, including software manufacturers.
CC (http://creativecommons.org)
 One promising scheme for accomplishing these
objectives can be found in the kind of licensing
agreements currently issued in the Creative Commons
(CC) initiative.
 One of CC’s goals is to expand the range of creative
work available to others legally to build upon and
share.
 To accomplish this objective, CC provides a set of
licensing options that help artists and authors give
others the freedom and creativity to build upon their
creativity.
CC
 Such a “creative” scheme for licensing is needed
because many people now realize that the current
intellectual property rights regime does not make
sense in the digital world.
 Note that CC does not aim to undermine the
principle of copyright.
 CC provides a “middle ground” with respect to
copyright protection because it makes possible a
“some rights reserved” approach vs. an “all rights
reserved” policy.
https://www.youtube.com/watch?v=CW0DUg63lqU

Contenu connexe

Tendances

Copyright Slide Show
Copyright Slide ShowCopyright Slide Show
Copyright Slide Showkjohnson
 
intellectual property rights
intellectual property rightsintellectual property rights
intellectual property rightsmam141931
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of ExpressionMark Jhon Oxillo
 
Copyright Protection for Philippine Publications
Copyright Protection for Philippine PublicationsCopyright Protection for Philippine Publications
Copyright Protection for Philippine PublicationsFe Angela Verzosa
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property RightsJamil AlKhatib
 
Copyright Law in the Digital Age
Copyright Law in the Digital AgeCopyright Law in the Digital Age
Copyright Law in the Digital AgeSharonYang
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Law relating to intellectual property
Law relating to intellectual property Law relating to intellectual property
Law relating to intellectual property Maxwell Ranasinghe
 
Copyright and its infringement
Copyright and its infringement Copyright and its infringement
Copyright and its infringement Dhara sharma
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issuesatuljaybhaye
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Intellectual Property for Startups
Intellectual Property for StartupsIntellectual Property for Startups
Intellectual Property for StartupsSenator Ihenyen
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual PropertySaqib Raza
 
rights related to copyrights
rights related to copyrightsrights related to copyrights
rights related to copyrightsfariansari
 

Tendances (20)

Copyright Slide Show
Copyright Slide ShowCopyright Slide Show
Copyright Slide Show
 
intellectual property rights
intellectual property rightsintellectual property rights
intellectual property rights
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 
Copyright Protection for Philippine Publications
Copyright Protection for Philippine PublicationsCopyright Protection for Philippine Publications
Copyright Protection for Philippine Publications
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Copyright in india
Copyright in indiaCopyright in india
Copyright in india
 
Copyright Law in the Digital Age
Copyright Law in the Digital AgeCopyright Law in the Digital Age
Copyright Law in the Digital Age
 
Cyber law
Cyber lawCyber law
Cyber law
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Law relating to intellectual property
Law relating to intellectual property Law relating to intellectual property
Law relating to intellectual property
 
Copyright and its infringement
Copyright and its infringement Copyright and its infringement
Copyright and its infringement
 
Intellectual property right
Intellectual property rightIntellectual property right
Intellectual property right
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Intellectual Property for Startups
Intellectual Property for StartupsIntellectual Property for Startups
Intellectual Property for Startups
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual Property
 
rights related to copyrights
rights related to copyrightsrights related to copyrights
rights related to copyrights
 

En vedette

Windows Vista and Trust Worthy Computing
Windows Vista and Trust Worthy ComputingWindows Vista and Trust Worthy Computing
Windows Vista and Trust Worthy Computingsamavedam_vijay
 
Introduction to ethics (Term 30/11/2012 to 7/4/2013)
Introduction to ethics (Term 30/11/2012 to 7/4/2013)Introduction to ethics (Term 30/11/2012 to 7/4/2013)
Introduction to ethics (Term 30/11/2012 to 7/4/2013)MonyNeath Srun
 
Need for Software Engineering
Need for Software EngineeringNeed for Software Engineering
Need for Software EngineeringUpekha Vandebona
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 

En vedette (6)

Windows Vista and Trust Worthy Computing
Windows Vista and Trust Worthy ComputingWindows Vista and Trust Worthy Computing
Windows Vista and Trust Worthy Computing
 
Introduction to ethics (Term 30/11/2012 to 7/4/2013)
Introduction to ethics (Term 30/11/2012 to 7/4/2013)Introduction to ethics (Term 30/11/2012 to 7/4/2013)
Introduction to ethics (Term 30/11/2012 to 7/4/2013)
 
Need for Software Engineering
Need for Software EngineeringNeed for Software Engineering
Need for Software Engineering
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 

Similaire à Intellectual Property

Why Property Laws are Important Property Laws play a fund.docx
Why Property Laws are Important Property Laws play a fund.docxWhy Property Laws are Important Property Laws play a fund.docx
Why Property Laws are Important Property Laws play a fund.docxalanfhall8953
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual propertiesWendy Lile
 
Lecture-8- IP rights.pptx
Lecture-8- IP rights.pptxLecture-8- IP rights.pptx
Lecture-8- IP rights.pptxSibghat4
 
Information-Control.pptx
Information-Control.pptxInformation-Control.pptx
Information-Control.pptxJeydeeeYhudieee
 
Copyright Protection
Copyright ProtectionCopyright Protection
Copyright ProtectionGrittyCC
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Chapter 5
Chapter 5Chapter 5
Chapter 5gbrand
 
Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)ElaineLee
 
Intellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationIntellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationAshesh R
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringementAbby-Gaye Gordon
 
Full Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfFull Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfNeelHope
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Copyright in video
Copyright in videoCopyright in video
Copyright in videoBob182003
 
Intellectual Rights & Information Exchanges
Intellectual Rights & Information ExchangesIntellectual Rights & Information Exchanges
Intellectual Rights & Information Exchangeshcassell
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014dixieyeager
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010dixieyeager
 
Copyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsCopyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsMartha Hardy
 

Similaire à Intellectual Property (18)

Why Property Laws are Important Property Laws play a fund.docx
Why Property Laws are Important Property Laws play a fund.docxWhy Property Laws are Important Property Laws play a fund.docx
Why Property Laws are Important Property Laws play a fund.docx
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
 
Lecture-8- IP rights.pptx
Lecture-8- IP rights.pptxLecture-8- IP rights.pptx
Lecture-8- IP rights.pptx
 
Information-Control.pptx
Information-Control.pptxInformation-Control.pptx
Information-Control.pptx
 
Copyright Protection
Copyright ProtectionCopyright Protection
Copyright Protection
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)
 
Intellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationIntellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian Legislation
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringement
 
Full Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfFull Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdf
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Copyright in video
Copyright in videoCopyright in video
Copyright in video
 
Intellectual Rights & Information Exchanges
Intellectual Rights & Information ExchangesIntellectual Rights & Information Exchanges
Intellectual Rights & Information Exchanges
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010
 
Copyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsCopyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative Commons
 

Plus de Upekha Vandebona

Software Engineering Ethics
Software Engineering EthicsSoftware Engineering Ethics
Software Engineering EthicsUpekha Vandebona
 
Characteristics of Software
Characteristics of SoftwareCharacteristics of Software
Characteristics of SoftwareUpekha Vandebona
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software EngineeringUpekha Vandebona
 
Porter Forces and eBusiness Models
Porter Forces and  eBusiness ModelsPorter Forces and  eBusiness Models
Porter Forces and eBusiness ModelsUpekha Vandebona
 
Porter Forces and eBusiness Strategies
Porter Forces and  eBusiness StrategiesPorter Forces and  eBusiness Strategies
Porter Forces and eBusiness StrategiesUpekha Vandebona
 
Revenue Models for e-Business on The Web
Revenue Models for e-Business on The WebRevenue Models for e-Business on The Web
Revenue Models for e-Business on The WebUpekha Vandebona
 
Michael Porter’s Five Forces
Michael Porter’s Five ForcesMichael Porter’s Five Forces
Michael Porter’s Five ForcesUpekha Vandebona
 
eCommerce Business Strategies
eCommerce Business StrategieseCommerce Business Strategies
eCommerce Business StrategiesUpekha Vandebona
 
Supply Chain Management, Customer Relationship Management and Knowledge Manag...
Supply Chain Management, Customer Relationship Management and Knowledge Manag...Supply Chain Management, Customer Relationship Management and Knowledge Manag...
Supply Chain Management, Customer Relationship Management and Knowledge Manag...Upekha Vandebona
 
Direct to Customer Interaction through eBusiness
Direct to Customer Interaction through eBusinessDirect to Customer Interaction through eBusiness
Direct to Customer Interaction through eBusinessUpekha Vandebona
 
eBusiness Benefits and Issues
eBusiness Benefits and IssueseBusiness Benefits and Issues
eBusiness Benefits and IssuesUpekha Vandebona
 
Orientation of eBusiness Applications
Orientation of eBusiness ApplicationsOrientation of eBusiness Applications
Orientation of eBusiness ApplicationsUpekha Vandebona
 
Professional and Ethical, Issues and Responsibilities
Professional and Ethical, Issues and ResponsibilitiesProfessional and Ethical, Issues and Responsibilities
Professional and Ethical, Issues and ResponsibilitiesUpekha Vandebona
 
Privacy and Civil Liberties
Privacy and Civil LibertiesPrivacy and Civil Liberties
Privacy and Civil LibertiesUpekha Vandebona
 
Organizational Context - Processes
Organizational Context - ProcessesOrganizational Context - Processes
Organizational Context - ProcessesUpekha Vandebona
 
Professional Communication in Computing - Writing
Professional Communication in Computing - WritingProfessional Communication in Computing - Writing
Professional Communication in Computing - WritingUpekha Vandebona
 
Professional Communication in Computing
Professional Communication in ComputingProfessional Communication in Computing
Professional Communication in ComputingUpekha Vandebona
 
Virtual Valipilla - Air Gesture Based Tool for Practicing Writing
Virtual Valipilla - Air Gesture Based Tool for Practicing WritingVirtual Valipilla - Air Gesture Based Tool for Practicing Writing
Virtual Valipilla - Air Gesture Based Tool for Practicing WritingUpekha Vandebona
 

Plus de Upekha Vandebona (20)

Software Engineering Ethics
Software Engineering EthicsSoftware Engineering Ethics
Software Engineering Ethics
 
Characteristics of Software
Characteristics of SoftwareCharacteristics of Software
Characteristics of Software
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
Porter Forces and eBusiness Models
Porter Forces and  eBusiness ModelsPorter Forces and  eBusiness Models
Porter Forces and eBusiness Models
 
Porter Forces and eBusiness Strategies
Porter Forces and  eBusiness StrategiesPorter Forces and  eBusiness Strategies
Porter Forces and eBusiness Strategies
 
Revenue Models for e-Business on The Web
Revenue Models for e-Business on The WebRevenue Models for e-Business on The Web
Revenue Models for e-Business on The Web
 
Michael Porter’s Five Forces
Michael Porter’s Five ForcesMichael Porter’s Five Forces
Michael Porter’s Five Forces
 
eCommerce Business Strategies
eCommerce Business StrategieseCommerce Business Strategies
eCommerce Business Strategies
 
Supply Chain Management, Customer Relationship Management and Knowledge Manag...
Supply Chain Management, Customer Relationship Management and Knowledge Manag...Supply Chain Management, Customer Relationship Management and Knowledge Manag...
Supply Chain Management, Customer Relationship Management and Knowledge Manag...
 
eBusiness Roadmap
eBusiness RoadmapeBusiness Roadmap
eBusiness Roadmap
 
eBusiness Environment
eBusiness EnvironmenteBusiness Environment
eBusiness Environment
 
Direct to Customer Interaction through eBusiness
Direct to Customer Interaction through eBusinessDirect to Customer Interaction through eBusiness
Direct to Customer Interaction through eBusiness
 
eBusiness Benefits and Issues
eBusiness Benefits and IssueseBusiness Benefits and Issues
eBusiness Benefits and Issues
 
Orientation of eBusiness Applications
Orientation of eBusiness ApplicationsOrientation of eBusiness Applications
Orientation of eBusiness Applications
 
Professional and Ethical, Issues and Responsibilities
Professional and Ethical, Issues and ResponsibilitiesProfessional and Ethical, Issues and Responsibilities
Professional and Ethical, Issues and Responsibilities
 
Privacy and Civil Liberties
Privacy and Civil LibertiesPrivacy and Civil Liberties
Privacy and Civil Liberties
 
Organizational Context - Processes
Organizational Context - ProcessesOrganizational Context - Processes
Organizational Context - Processes
 
Professional Communication in Computing - Writing
Professional Communication in Computing - WritingProfessional Communication in Computing - Writing
Professional Communication in Computing - Writing
 
Professional Communication in Computing
Professional Communication in ComputingProfessional Communication in Computing
Professional Communication in Computing
 
Virtual Valipilla - Air Gesture Based Tool for Practicing Writing
Virtual Valipilla - Air Gesture Based Tool for Practicing WritingVirtual Valipilla - Air Gesture Based Tool for Practicing Writing
Virtual Valipilla - Air Gesture Based Tool for Practicing Writing
 

Dernier

ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 

Dernier (20)

Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 

Intellectual Property

  • 1. Chapter 4 - Intellectual Property IT 5105 – Professional Issues in IT OpenArc Campus - BIT UCSC - Sem V 2016 Upekha Vandebona upe.vand@gmail.com Ref : Tavani, Herman T., “Ethics and technology: controversies, questions, and strategies for ethical computing” , 4th Edition.
  • 2. Instructional Objectives  Distinguish among copyrights, patents, trademarks and trade secrets.  Discuss the ramifications of non-disclosure agreements (NDAs).  Discuss the implications of plagiarism, both in education and the profession.  Discuss the consequences of software piracy on information technology and the role of relevant enforcement organizations.  Discuss how intellectual property laws vary internationally.  Describe consequences of the Digital Millennium Copyright Act. INTELLECTUAL PROPERTY ACT, No. 36 OF 2003:
  • 3. What is Intellectual Property (IP)? Boralugoda (බ ොරලුබ ොඩ) owns a Dell laptop computer. He can control who has access to his computer and how it is used; For example Boralugoda has the right to exclude Galpaatha ( ල්පාත) from using the laptop computer, or, as its owner, he can grant him unlimited access to it. Consider once again, Boralugoda’s laptop computer, is a physical tangible object. So when Galpaatha have it, then Boralugoda cannot have it, and vice versa. Therefore Boralugoda’s laptop is an exclusionary object.
  • 4. What is Intellectual Property (IP)? Consider a word processing program which is intangible that resides in Boralugoda’s computer. If Boralugoda makes a copy of that program, then both the Galpaatha and Boralugoda have copies of it. Therefore word processing program is non-exclusionary.
  • 5. Intellectual Objects vs Other Objects  Unlike physical property, intellectual property consists of objects that are not tangible.  These non-tangible(intangible), or intellectual, objects represent literary/ creative works and inventions, which are the manifestations or expressions of ideas.  Unlike tangible objects, which are exclusionary in nature, intellectual objects (e.g., software programs) are non-exclusionary:
  • 6. Intellectual Objects vs Other Objects  Quantitative Limitations of Ownership/Production  Countless digital copies of a software program can be produced and each at a relatively low cost.  But a land cannot be produce/own that much.  Way of protection or legal claim  Physical objects have clear visibility of boundary.  For intellectual objects difficult to define the boundary.
  • 7. Protection of IP  For a literary or artistic idea to be protected it must be expressed in some medium such as a book or a sheet of paper containing a musical score.  If the idea is functional in nature, such as an invention, it must be expressed as a machine or a documented design.  Whereas authors are granted copyright protections for expressions of their literary ideas, inventors are given an incentive, in the form of a patent protection, for expressions of their functional ideas.
  • 8. Why Protect?  Social constructs designed to encourage creators and inventors to better serve society in general by bringing forth their creative works and practical inventions into the market-place.  To encourage authors and inventors, it is believed that it is necessary to grant them property rights in the form of limited monopolies that can result in financial advantages for them.
  • 9. SW & HW as IPs  Introduction of computer software has created questions regarding intellectual property laws for which there are no easy answers.  Innovations in computer hardware, on the contrary, have clearly qualified for patent protection, and in this sense, computer hardware inventions are no different than other kinds of inventions involving physical objects.  But questions about whether and how software, as a kind of intellectual object, should be protected have been strongly debated in the courts.
  • 10. Theft  The legal definition of theft involves taking away a piece of someone’s property with the intention permanently to deprive them of it.  Duplicating software is not identical to stealing physical property, but we can show that it may cause harm.
  • 11. Theft If Shaggy steals Boralugoda’s laptop, he deprives Boralugoda of Boralugoda’s right to use a device that Boralugoda own; When Fred makes an unauthorized copy of a proprietary program that Boralugoda own (as the copyright holder), he deprives Boralugoda of income to which Boralugoda entitled.
  • 12. Theft  If someone steals your bicycle, you no longer have it. If someone takes away a computer belonging to a company, the company no longer has it.  If you invent a drug that will cure known illnesses and leave the formula on your desk, someone can come along, read the formula, remember it, and go away and make a fortune out of manufacturing the drug.  But you still have the formula even though the other person now has it as well. This shows that the formula is not a property in the same way that the bicycle is.
  • 13. Theft  Unauthorized copying is harmful because it is a misuse, misappropriation, or “unfair taking” of another person’s property against the property owner’s will.  Many nations have enacted specific laws and statutes to protect the rights and interests of “owners” of computer software programs and applications (as forms of intellectual property).  We examine four different types of schemes for protecting intellectual property rights: copyright law, patents, trademarks, and trade secrets
  • 14. DMCA  Digital Millennium Copyright Act (US copyright law) Search to download a movie At the bottom of the search results, you’ll see… HomeWork 1 : Go to the links provided and read.
  • 15. Fair Use and First Sale  To balance the exclusive controls given to copyright holders against the broader interests of society, these two provisions have been developed.
  • 16. • First-sale provision, applies once the original work has been sold for the first time. • At this point, the original owner loses rights over the previously protected work. • For example, once you purchase a copy of a (physical) book, you are free to give away, resell, or even destroy your copy. • It is not clear, however, that one can give away media in digital format that is licensed for use but not, strictly speaking, owned by a user. First-sale • According to the fair-use principle, every author or publisher may make limited use of another person’s copyrighted work for purposes such as criticism, comment, news, reporting, teaching, and research. Fair use
  • 17. First Sale Vs Technology  Technology could also be seen as threatening the principle of first sale. Consider that in the case of a physical book, one can do whatever one wishes after purchasing it.  For example, one can give the book to a friend. Also, one can resell that book, in compliance with the first-sale provision of copyright law.  The same is not true, however, of e-books, because the digitized information contained in those books cannot be subsequently exchanged without permission of the copyright holder.
  • 18. Software Piracy as Copyright Infringement  Software manufacturers claim to have lost millions of dollars of potential revenue because of software piracy by individuals and organizations, both nationally and globally.  There are some debatable arguments regard to American software manufacturers about their loss of revenue due to the use of pirated software in developing countries.  Many people and organizations in those countries could not afford to pay the prices set by American software companies for their products, so the companies have not lost any (real) revenues, because their (expensive, by American standards) software would not sell on the open market in most developing countries.
  • 19. Sharing Digital Music & Movies  Popular Case : Napster (P2P 1st Generation)  Napster provided a distribution center for proprietary digital information. Napster’s users were able to exchanged copyrighted music files, in MP3 format, with one another.  In December 1999, the Recording Industry Association of America (RIAA) sued the Napster Web site for illegally distributing copyrighted music on the Internet.
  • 20. P2P Effect  P2P systems comprise three categories:  a centralized indexing system (such as in the original Napster site),  a decentralized indexing system,  a supernode system (where a group of computers can act as indexing servers).  Another P2P protocol is Bit Torrent, which enables large files, such entire music CDs, to be exchanged more efficiently through a system of networked computers designated as “peers” and “seeds.” (Pirate Bay)
  • 21. Prohibiting  The entertainment industry, in its effort to crack down on illicit file sharing, has not been deterred by the fact that later P2P systems were able to avoid the legal pitfalls surrounding the centralized indexing method used by Napster.  Prohibiting through ISPs for their customers, through policies in workers/students in organizations.
  • 22. The Guilty  Technology ?  Is it legal to prohibit the use of technology merely because it could result in copyright infringement?  Popular Case : Sony v. Universal Studios  Universal sued to ban the sale of video cassette recorder (VCR) technology, claiming that Sony, who manufactured it (Betamax) was liable for copyright infringement, either directly or indirectly, because the new technology could be used to make illegal copies of movies.
  • 23. “Sony Safe Harbor” Precedent  The Court ruled that simply because VCR technology could be used to do something illegal is not sufficient grounds for banning that technology.  In essence, it concluded that as long as the technology was capable of “substantial non-infringing uses”(SNIU), it could not be barred from sale and distribution.  So, in effect, the Court also determined that VCRs did not violate copyright law merely because they were capable of substantial copyright infringement.
  • 24. IP Laws (Globally & Locally)  Intellectual property laws have been very difficult to enforce globally, in large part because of jurisdictional issues.  In recent years, however, there has been considerable international cooperation in prosecuting digital piracy cases across jurisdictional lines.  For example, in 2009, the owners and operators of the internationally controversial (Sweden-based) PirateBay site, who were found guilty of “unlawful transfer” of copyrighted material, received both fines and jail sentences.
  • 25. IP Laws (Globally & Locally)  In countries such as the United States, some laws affecting intellectual property apply at the state level. These laws apply to the sale of goods, as well as to contracts involved in those sales, and they often vary from state to state.
  • 26. Moral Rights  The personality account of property is sometimes referred to as the “moral rights”(droits morals) theory of property.  The personality theory provides an interesting interpretation of why an author should have control over the ways in which his or her work can be displayed and distributed.  To ensure this control, authors given protection for their artistic work even if they have no legal claim to any monetary reward associated with it.
  • 27.
  • 28. FOSS Movement  Collaboration of people who views software ownership as a form that disregards the general welfare of society and against it.  As an alternative to this they proposes that programmers work together to make software freely available for humankind rather than supporting efforts to restrict its use.  GNU’s goal was to develop an entire Unix-like operating system, complete with system utilities, that was “open” and freely accessible.
  • 29. Free Software  Four “freedoms” are essential for free software.  These include freedom to: 1. run the program, for any purpose; 2. study how the program works, and adapt it for your needs; 3. redistribute copies so you can help your neighbor; 4. improve the program, and release your improvements to the public so that the whole community benefits. http://www.fsf.org : Visit web page of Free Software Foundation and meet Richard M. Stallman, the man behind the mindset.
  • 30. GPL  Free softwares typically accompanied by a licensing agreement that is designed to keep it freely available to other users “downstream,” who can continue to modify the source code.  The best known of these is the GNU Public License (GPL). The kind of protection granted by this license is also known as copyleft.
  • 31. Copyleft  Copyright law restrict the right to make and redistribute copies of a particular work.  Copyleft license included in GPL, uses an alternative scheme that challenge the traditional copyright mechanism in order to ensure that every person who receives a copy, or derived version of a work, can use, modify, and also redistribute both the work and the derived version of the work.  All derivative works of GPL software must also be licensed under GPL.  In this way, the four freedoms are propagated in future software developments under this agreement.
  • 32. Open Source Software  The ability of a software user to look at, understand, modify, and redistribute the source code for that software.  Requires that its source code be freely available.  Concentrated its efforts more on promoting the open source model as an alternative methodology to “closed-source” development for software.  Significant threat to companies that produce proprietary software, such as Microsoft.
  • 33. Free Software (FS) Requires that all derivative pieces of software be subject to the original requirements and thus remain “free” and nonproprietary. Requires that users must strictly adhere to its GPL license in all derivative uses of its software. Less anti-commercial Open Source Software (OSS) More flexible with respect to its derivative software. Supports less restrictive licenses Ex: Berkeley’s Software Distribution (BSD) and Netscape’s Mozilla Public License (MPL) [These licenses are considered more “light” than GPL because they permit programmers to alter the open source software and to release it as a proprietary product.] FOSS = Free Software + Open Source Software
  • 34. Plagiarism  “Stealing and publication" of another author's "language, thoughts, ideas, or expressions" and the representation of them as one's own original work.  Plagiarism is considered academic dishonesty and a breach of journalistic ethics.  It is subject to sanctions like penalties, suspension, and even expulsion.  Plagiarism is not a crime as such, but in academia and industry, it is a serious ethical offense and cases of plagiarism can constitute copyright infringement.
  • 35. Plagiarism  Tools are becoming available to help identify plagiarism.  There are a range of approaches that attempt to limit online copying(Content scraping), such as disabling right clicking.  Visit http://www.plagiarism.org
  • 36. Common forms of student plagiarism  Submitting someone’s work as their own.  Taking passages from their own previous work without adding citations.  Re-writing someone’s work without properly citing sources.  Using quotations, but not citing the source.  Interweaving various sources together in the work without citing.  Citing some, but not all passages that should be cited.  Melding together cited and uncited sections of the piece.  Providing proper citations, but fails to change the structure and wording of the borrowed ideas enough.  Inaccurately citing the source.  Relying too heavily on other people’s work. Fails to bring original thought into the text.
  • 37. Sharing and Caring Vs Intellectual Rights  Consider the traditional practice of borrowing books from public libraries. Physical books had always been available in libraries and there is no limit on how many times a book could circulate.  In terms of the digital media content, does the same practice suitable?  Copyright laws, originally intended to cover print media.  For digital media it inhibit the distribution of electronic information.  The distribution of digitized information is now being discouraged in some sectors.
  • 38. Sharing and Caring Vs Intellectual Rights  Copyright laws were originally designed to encourage the flow of information in print media with a protection, via their fair-use provisions.  Yet, for digital media it have been discourages the flow, and thus the sharing, of electronic information.  Consider that the ability to share information contributed to the development of the World Wide Web.  Also consider what might have happened if the inventors of the Internet and the Web had been more entrepreneurial-minded and less concerned with sharing information.
  • 39. e.g.: Tim Berners-Lee  Tim Berners-Lee, who invented HTTP (the protocol used on the Web), never bothered to apply for a patent for his invention or for a copyright for his programming code.  As a physicist working at CERN (a physics laboratory on the Franco-Swiss border), he desired to develop a common protocol for Internet communication so that scientists could share information more easily with each other.  Berners-Lee’s goal in developing the Web was to provide a forum where information could be shared.
  • 40. Sharing and Caring Vs Intellectual Rights  A person whose interests were more entrepreneurial could have sought intellectual property protection for his or her contributions, thereby reducing the amount of information that could be shared.  Consider also how the sharing of information has benefited many of those entrepreneurs who now seek to control the flow of information in cyberspace.
  • 41. e.g.: GUI (https://en.wikipedia.org/wiki/Apple_Computer,_Inc._v._Microsoft_Corp.)  It has been argued that Microsoft benefited significantly from the work done by Apple Corporation on its graphical user interface (the system of icons that users can point to and click on to accomplish a task).  And it is well known that when Steve Jobs was at Apple, he visited Xerox PARC (Palo Alto Research Center), where he discovered that a graphical interface had already been invented by researchers there.  So it is reasonably accurate to say that current user interfaces have benefited from the sharing of information along the way.
  • 42. Sharing and Caring Vs Intellectual Rights  Would it be fair to credit any one company or person with exclusive rights to a graphical user interface?  Would doing so not also eliminate, or certainly impede, the possibility of incremental development and innovation?  And more importantly, would it not also prevent us from sharing that important information?
  • 43. Building up Commons  It is very easy to underestimate the importance of the commons.  We often take for granted the public parks, public beaches, and public gathering places that have been set aside for general use.  Imagine the quality of our lives without them, and consider that without proper foresight, planning, and management, our parks could easily have been turned over to entrepreneurs for private development.
  • 44. So How?  If we defend the principle that information wants to be shared (but not totally free), then perhaps it will be possible to frame reasonable intellectual property policies that would both encourage the flow of information in digital form and reward fairly the creators of intellectual objects, including software manufacturers.
  • 45. CC (http://creativecommons.org)  One promising scheme for accomplishing these objectives can be found in the kind of licensing agreements currently issued in the Creative Commons (CC) initiative.  One of CC’s goals is to expand the range of creative work available to others legally to build upon and share.  To accomplish this objective, CC provides a set of licensing options that help artists and authors give others the freedom and creativity to build upon their creativity.
  • 46. CC  Such a “creative” scheme for licensing is needed because many people now realize that the current intellectual property rights regime does not make sense in the digital world.  Note that CC does not aim to undermine the principle of copyright.  CC provides a “middle ground” with respect to copyright protection because it makes possible a “some rights reserved” approach vs. an “all rights reserved” policy.

Notes de l'éditeur

  1. To complicate matters, a program’s code takes many forms: source code, object code, and the final executable code.
  2. Penal Code
  3. This principle is important to the computer industry in particular, and to engineering in general, because it supports the practice of “reverse engineering,” which allows someone to buy a product for the purpose of taking it apart to see how it works
  4. From a financial point of view, it would seem to make perfectly good sense for Microsoft to allow some illicit copying of its software by individuals rather than spend money to pursue their arrest and prosecution.
  5. Peer 2 Peer Networks
  6. The courts have since been reluctant to ban or limit the use of technological advances because of this precedent. And since P2P networks are considered a “technological advance” that is capable of SNIU, they would seem to fall under the Sony precedent
  7. A clickwrap agreement (also known as a "clickthrough" agreement or clickwrap license) is a common type of agreement often used in connection withsoftware licenses. Such forms of agreement are mostly found on the Internet, as part of the installation process of many software packages, or in other circumstances where agreement is sought using electronic media. The name "clickwrap" came from the use of "shrink wrap contracts" commonly used in boxed software purchases, which "contain a notice that by tearing open the shrinkwrap, the user assents to the software terms enclosed within“ The content and form of clickwrap agreements vary widely. Most clickwrap agreements require the end-user to manifest his or her assent by clicking an "ok" or "agree" button on a dialog box or pop-up window. A user indicates rejection by clicking cancel or closing the window. Upon rejection, the user cannot use or purchase the product or service. Classically, such a take-it-or-leave-it contract was described as a "contract of adhesion, which is a contract that lacks bargaining power, forcing one party to be favored over the other".
  8. Do people only produce creative works because of financial rewards they might receive? On the one hand, it would seem that financial incentives could motivate some individuals, such as Sam, to produce a creative work that benefits society in general. However, it is not clear that all great musical composers have written works of music solely because of the prospects of becoming wealthy. It is possible, for example, that some gifted composer wrote music for the sheer enjoyment it brought him or her as a creator of artistic works. So there may be factors other than financial incentives that influence creators to bring forth their works.
  9. Interweaving - එකට සම්මිශ්‍ර කරනවා
  10. copyrights protect important values and are essential to creativity, even in a digital age. He also believes that if the essence of copyright law is to allow creators to have control, then there should be a way to maintain ownership of copyrighted works and still make it possible for the average person to license the use of those works. Lessig notes that, unfortunately, the current version of copyright, which was not written for a world of digital creativity,“restricts more than it inspires.”Traditional copyright regimes tend to promote an“all or nothing”kind of protection scheme with their“exclusive rights” clauses.