SlideShare une entreprise Scribd logo
1  sur  41
Ethics in Information
Technology, Second Edition
Chapter 6
Intellectual Property
Objectives
• What does the term intellectual property encompass,
and why are companies so concerned about
protecting it?
• What are the strengths and limitations of using
copyrights, patents, and trade secret laws to protect
intellectual property?
• What is plagiarism, and what can be done to combat
it?
Ethics in Information Technology, Second Edition

2
Objectives (continued)
• What is reverse engineering, and what issues are
associated with applying it to create a look-alike of a
competitor’s software program?
• What is open source code, and what is the
fundamental premise behind its use?
• What is the essential difference between competitive
intelligence and industrial espionage, and how is
competitive intelligence gathered?
Ethics in Information Technology, Second Edition

3
Objectives (continued)
• What is cybersquatting, and what strategy should be
used to protect an organization from it?

Ethics in Information Technology, Second Edition

4
What is Intellectual Property?
• Term used to describe works of the mind
– Distinct and “owned” or created by a person or group

• Copyright law
– Protects authored works

• Patent laws
– Protect inventions

• Trade secret laws
– Help safeguard information critical to an
organization’s success
Ethics in Information Technology, Second Edition

5
Copyrights
• Established in the U.S. Constitution
– Article I, section 8, clause 8

• Grants creators of original works the right to
–
–
–
–
–
–

Distribute
Display
Perform
Reproduce work
Prepare derivative works based upon the work
Author may grant exclusive right to others

Ethics in Information Technology, Second Edition

6
Copyrights (continued)
• Types of work that can be copyrighted
–
–
–
–
–
–
–
–

Architecture
Art
Audiovisual works
Choreography
Drama
Graphics
Literature
Motion pictures

Ethics in Information Technology, Second Edition

7
Copyrights (continued)
• Types of work that can be copyrighted
–
–
–
–
–
–

Music
Pantomimes
Pictures
Sculptures
Sound recordings
Other intellectual works
• As described in Title 17 of U.S. Code

Ethics in Information Technology, Second Edition

8
Copyrights (continued)
• Work must fall within one of the preceding
categories
• Must be original
– Evaluating originality can cause problems

• Fair use doctrine
– Factors to consider when evaluating the use of
copyrighted material

Ethics in Information Technology, Second Edition

9
Copyrights (continued)
• Fair use doctrine factors include:
–
–
–
–

Purpose and character of the use
Nature of the copyrighted work
Portion of the copyrighted work used
Effect of the use upon the value of the copyrighted
work

• Copyright infringement
– Copy substantial and material part of another’s
copyrighted work
– Without permission
Ethics in Information Technology, Second Edition

10
Copyrights (continued)
• Area of copyright infringement
– Worldwide sale of counterfeit consumer supplies

• Copyrights to protect computer software exist
– To prove infringement, copyright holders must show
a striking resemblance between the original software
and the new software that could be explained only
by copying

• World Intellectual Property Organization (WIPO)
– Agency of the United Nations
– Advocates for the interests of intellectual property
owners
Ethics in Information Technology, Second Edition

11
Copyrights (continued)
• Digital Millennium Copyright Act (DMCA)
– Added new provisions to WIPO
– Civil and criminal penalties included
– Governs distribution of tools and software that can
be used for copyright infringement
– Opponents say it restricts the free flow of information

Ethics in Information Technology, Second Edition

12
Patents
• Grant of property rights to inventors
• Issued by the U.S. Patent and Trademark Office
(USPTO)
• Permits an owner to exclude the public from
making, using, or selling the protected invention
• Allows legal action against violators
• Prevents independent creation
• Extends only to the United States and its territories
and possessions
Ethics in Information Technology, Second Edition

13
Patents (continued)
• Applicant must file with the USPTO
– USPTO searches prior art
– Takes an average of 25 months

• Prior art
– Existing body of knowledge
– Available to a person of ordinary skill in the art

Ethics in Information Technology, Second Edition

14
Patents (continued)
• An invention must pass four tests
–
–
–
–

Must be in one of the five statutory classes of items
Must be useful
Must be novel
Must not be obvious to a person having ordinary skill
in the same field

• Items cannot be patented if they are
– Abstract ideas
– Laws of nature
– Natural phenomena
Ethics in Information Technology, Second Edition

15
Patents (continued)
• Patent infringement
– Someone makes unauthorized use of a patent
– No specified limit to the monetary penalty

• Software patent
– Feature, function, or process embodied in
instructions executed on a computer

• 20,000 software-related patents per year have
been issued since the early 1980s

Ethics in Information Technology, Second Edition

16
Patents (continued)
• Before obtaining a software patent, do a patent
search
• Software Patent Institute is building a database of
information
• Cross-licensing agreements
– Large software companies agree not to sue others
over patent infringements
– Small businesses have no choice but to license
patents

Ethics in Information Technology, Second Edition

17
Patents (continued)
• Defensive publishing
–
–
–
–
–
–

Alternative to filing for patents
Company publishes a description of the innovation
Establishes the idea’s legal existence as prior art
Costs mere hundreds of dollars
No lawyers
Fast

Ethics in Information Technology, Second Edition

18
Patents (continued)
• Standard is a definition or format
– Approved by recognized standards organization
– Or accepted as a de facto standard by the industry
– Enables hardware and software from different
manufacturers to work together

• Submarine patent
– Hidden within a standard
– Does not surface until the standard is broadly
adopted

Ethics in Information Technology, Second Edition

19
Patents (continued)
• Patent farming involves
– Influencing a standards organization to make use of
a patented item
– Demanding royalties from all parties that use the
standard

Ethics in Information Technology, Second Edition

20
Trade Secret Laws
• Uniform Trade Secrets Act (UTSA) established
uniformity in trade secret law
• Trade secret
–
–
–
–
–
–

Business information
Represents something of economic value
Requires an effort or cost to develop
Some degree of uniqueness or novelty
Generally unknown to the public
Kept confidential

• Computer hardware and software can qualify for
trade secret protection
Ethics in Information Technology, Second Edition

21
Trade Secret Laws (continued)
• Information is only considered a trade secret if the
company takes steps to protect it
• Greatest threat to loss of company trade secrets is
employees
• Nondisclosure clauses in employee’s contract
– Enforcement can be difficult
– Confidentiality issues are reviewed at the exit
interview

Ethics in Information Technology, Second Edition

22
Trade Secret Laws (continued)
• Noncompete agreements
– Protect intellectual property from being used by
competitors when key employees leave
– Require employees not to work for competitors for a
period of time

• Safeguards
– Limit outside access to corporate computers
– Guard use of remote computers by employees

Ethics in Information Technology, Second Edition

23
Trade Secret Laws (continued)
• Trade secret law has a few key advantages over
patents and copyrights
–
–
–
–

No time limitations
No need to file an application
Patents can be ruled invalid by courts
No filing or application fees

• Law doesn’t prevent someone from using the same
idea if it is developed independently
• World Trade Organization (WTO)
– TRIPs Agreement provides for a minimum level of
protection for intellectual property
Ethics in Information Technology, Second Edition

24
Summary of the WTO TRIPs
Agreement

Ethics in Information Technology, Second Edition

25
Legal Overview: The Battle Over
Customer Lists
• Employees make unauthorized use of an
employer’s customer list
– Customer list not automatically considered a trade
secret
– Educate workers about the confidentiality of such
lists

Ethics in Information Technology, Second Edition

26
Key Intellectual Property Issues
• Issues that apply to intellectual property and
information technology
–
–
–
–
–

Plagiarism
Reverse engineering
Open source code
Competitive intelligence
Cybersquatting

Ethics in Information Technology, Second Edition

27
Plagiarism
• Theft and passing off of someone’s ideas or words
as one’s own
• Many students
– Do not understand what constitutes plagiarism
– Believe that all electronic content is in the public
domain

• Plagiarism detection systems
– Check submitted material against databases of
electronic content

Ethics in Information Technology, Second Edition

28
Plagiarism (continued)
• Steps to combat student plagiarism
– Help students understand what constitutes
plagiarism
– Show students how to document Web pages
– Schedule major writing assignments in portions
– Tell students that you know about Internet paper
mills
– Educate students about plagiarism detection
services

Ethics in Information Technology, Second Edition

29
Partial List of Plagiarism Detection
Services and Software

Ethics in Information Technology, Second Edition

30
Reverse Engineering
• Process of taking something apart in order to
– Understand it
– Build a copy of it
– Improve it

• Applied to computer
– Hardware
– Software

• Convert a program code to a higher level design
• Convert an application that ran on one vendor’s
database to run on another’s
Ethics in Information Technology, Second Edition

31
Reverse Engineering (continued)
• Compiler
– Language translator
– Converts computer program statements expressed
in a source language to machine language

• Software manufacturer
– Provides software in machine language form

• Decompiler
– Reads machine language
– Produces source code
Ethics in Information Technology, Second Edition

32
Reverse Engineering (continued)
• Courts have ruled in favor of using reverse
engineering
– To enable interoperability

• Software license agreements forbid reverse
engineering
• Semiconductor Chip Protection Act (SCPA)
– Established a new type of intellectual property
protection for mask works

Ethics in Information Technology, Second Edition

33
Open Source Code
• Program source code made available for use or
modification
– As users or other developers see fit

• Basic premise
– Software improves
– Can be adapted to meet new needs
– Bugs rapidly identified and fixed

• High reliability
• GNU General Public License (GPL) was a
precursor to the Open Source Initiative (OSI)
Ethics in Information Technology, Second Edition

34
Competitive Intelligence
• Gathering of legally obtainable information
– To help a company gain an advantage over rivals

• Often integrated into a company’s strategic plans
and decision making
• Not industrial espionage
• Nearly 25 colleges and universities offer courses or
programs
• Without proper management safeguards it can
cross over to industrial espionage
Ethics in Information Technology, Second Edition

35
A Manager’s Checklist for Running an
Ethical Competitive Intelligence Operation

Ethics in Information Technology, Second Edition

36
Cybersquatting
• Trademark is anything that enables a consumer to
differentiate one company’s products from
another’s
– May be
•
•
•
•
•

Logo
Package design
Phrase
Sound
Word

Ethics in Information Technology, Second Edition

37
Cybersquatting (continued)
• Trademark law
– Trademark’s owner has the right to prevent others
from using the same mark
• Or confusingly similar mark

• Cybersquatters
– Registered domain names for famous trademarks or
company names
– Hope the trademark’s owner would buy the domain
name
• For a large sum of money
Ethics in Information Technology, Second Edition

38
Cybersquatting (continued)
• To curb cybersquatting
– Register all possible domain names
• .org
• .com
• .info

• Internet Corporation for Assigned Names and
Numbers (ICANN)
– Current trademark holders are given time to assert
their rights in the new top-level domains before
registrations are opened to the general public
Ethics in Information Technology, Second Edition

39
Summary
• Intellectual property is protected by
– Copyrights
– Patents
– Trade secrets

• Plagiarism is stealing and passing off the ideas and
words of another as one’s own
• Reverse engineering
– Process of breaking something down
– In order to understand, build copy, or improve it
Ethics in Information Technology, Second Edition

40
Summary (continued)
• Open source code
– Made available for use or modification as users or
other developers see fit

• Competitive intelligence
– Not industrial espionage
– Uses legal means and public information

• Cybersquatting
– Registration of a domain name by an unaffiliated
party

Ethics in Information Technology, Second Edition

41

Contenu connexe

Tendances

Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
jvonschilling
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 

Tendances (20)

Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
 
What is Differential Privacy?
What is Differential Privacy?What is Differential Privacy?
What is Differential Privacy?
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Artificial Intelligence As a Service
Artificial Intelligence As a ServiceArtificial Intelligence As a Service
Artificial Intelligence As a Service
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
 
Copyright Laws In India
Copyright Laws In IndiaCopyright Laws In India
Copyright Laws In India
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

En vedette

Ethos, Pathos, and Logos
Ethos, Pathos, and LogosEthos, Pathos, and Logos
Ethos, Pathos, and Logos
wtidwell
 
Small Group Communication Theory
Small Group Communication TheorySmall Group Communication Theory
Small Group Communication Theory
wtidwell
 
Ethical Research
Ethical ResearchEthical Research
Ethical Research
wtidwell
 
COMMUNICATION WITHIN GROUPS
COMMUNICATION WITHIN GROUPS COMMUNICATION WITHIN GROUPS
COMMUNICATION WITHIN GROUPS
wtidwell
 
Between the wars
Between the warsBetween the wars
Between the wars
wtidwell
 
Social movements
Social movementsSocial movements
Social movements
wtidwell
 
Need for critical thinking in research
Need for critical thinking in researchNeed for critical thinking in research
Need for critical thinking in research
wtidwell
 
Time mangement
Time mangementTime mangement
Time mangement
wtidwell
 
Introducing Group and Team Principles and Practices
Introducing Group and Team Principles and PracticesIntroducing Group and Team Principles and Practices
Introducing Group and Team Principles and Practices
wtidwell
 
civil liberties & civil rights
civil liberties & civil rights civil liberties & civil rights
civil liberties & civil rights
wtidwell
 
Subject Verb Agreement
Subject Verb AgreementSubject Verb Agreement
Subject Verb Agreement
wtidwell
 
Bus ethics and tech
Bus ethics and techBus ethics and tech
Bus ethics and tech
wtidwell
 

En vedette (20)

The new deal
The new dealThe new deal
The new deal
 
Ethos, Pathos, and Logos
Ethos, Pathos, and LogosEthos, Pathos, and Logos
Ethos, Pathos, and Logos
 
Small Group Communication Theory
Small Group Communication TheorySmall Group Communication Theory
Small Group Communication Theory
 
Ethical Research
Ethical ResearchEthical Research
Ethical Research
 
COMMUNICATION WITHIN GROUPS
COMMUNICATION WITHIN GROUPS COMMUNICATION WITHIN GROUPS
COMMUNICATION WITHIN GROUPS
 
The Great Depression
The Great DepressionThe Great Depression
The Great Depression
 
Between the wars
Between the warsBetween the wars
Between the wars
 
Social movements
Social movementsSocial movements
Social movements
 
Torill bull NHPRC 2013
Torill bull NHPRC  2013Torill bull NHPRC  2013
Torill bull NHPRC 2013
 
Leadership within business systems thinking ethical 10-18-12
Leadership within business systems thinking  ethical  10-18-12Leadership within business systems thinking  ethical  10-18-12
Leadership within business systems thinking ethical 10-18-12
 
Overview of privacy and data protection considerations - DEVELOP.
Overview of privacy and data protection considerations - DEVELOP.Overview of privacy and data protection considerations - DEVELOP.
Overview of privacy and data protection considerations - DEVELOP.
 
Make People Think Ethically in an Organization!
Make People Think Ethically in an Organization!Make People Think Ethically in an Organization!
Make People Think Ethically in an Organization!
 
Need for critical thinking in research
Need for critical thinking in researchNeed for critical thinking in research
Need for critical thinking in research
 
Time mangement
Time mangementTime mangement
Time mangement
 
Introducing Group and Team Principles and Practices
Introducing Group and Team Principles and PracticesIntroducing Group and Team Principles and Practices
Introducing Group and Team Principles and Practices
 
Citizenship internment wwii
Citizenship internment wwiiCitizenship internment wwii
Citizenship internment wwii
 
civil liberties & civil rights
civil liberties & civil rights civil liberties & civil rights
civil liberties & civil rights
 
The Federal Courts and Economic Policymaking
The Federal Courts and Economic PolicymakingThe Federal Courts and Economic Policymaking
The Federal Courts and Economic Policymaking
 
Subject Verb Agreement
Subject Verb AgreementSubject Verb Agreement
Subject Verb Agreement
 
Bus ethics and tech
Bus ethics and techBus ethics and tech
Bus ethics and tech
 

Similaire à Ethical perspectives (it focus)

Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...
WhitmeyerTuffin
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
stanbridge
 
How IP Litigation Will Be Impacted By New Technologies: AI, Smart Devices, an...
How IP Litigation Will Be Impacted By New Technologies: AI, Smart Devices, an...How IP Litigation Will Be Impacted By New Technologies: AI, Smart Devices, an...
How IP Litigation Will Be Impacted By New Technologies: AI, Smart Devices, an...
Jeremy Elman
 

Similaire à Ethical perspectives (it focus) (20)

Intellectual Property: What is intellectual property, and why is it important?
Intellectual Property: What is intellectual property, and why is it important? Intellectual Property: What is intellectual property, and why is it important?
Intellectual Property: What is intellectual property, and why is it important?
 
IP Compliance.ppt
IP Compliance.pptIP Compliance.ppt
IP Compliance.ppt
 
Chapter 6_dp-pertemuan_9
 Chapter 6_dp-pertemuan_9 Chapter 6_dp-pertemuan_9
Chapter 6_dp-pertemuan_9
 
Ch14
Ch14Ch14
Ch14
 
Ch14 091120101906-phpapp01
Ch14 091120101906-phpapp01Ch14 091120101906-phpapp01
Ch14 091120101906-phpapp01
 
ethcpp02.ppt
ethcpp02.pptethcpp02.ppt
ethcpp02.ppt
 
Silicon Halton Meetup 108 - Is Your AI Invention Protectable?
Silicon Halton Meetup 108 - Is Your AI Invention Protectable?Silicon Halton Meetup 108 - Is Your AI Invention Protectable?
Silicon Halton Meetup 108 - Is Your AI Invention Protectable?
 
Introduction to ip rights
Introduction to ip rightsIntroduction to ip rights
Introduction to ip rights
 
Monetizing Game User Interface Innovations in Enterprise Applications
Monetizing Game User Interface Innovations in Enterprise ApplicationsMonetizing Game User Interface Innovations in Enterprise Applications
Monetizing Game User Interface Innovations in Enterprise Applications
 
Intellectual Property: Presentation on IP in IT : Global Strategy - BananaIP
Intellectual Property: Presentation on IP in IT : Global Strategy - BananaIPIntellectual Property: Presentation on IP in IT : Global Strategy - BananaIP
Intellectual Property: Presentation on IP in IT : Global Strategy - BananaIP
 
Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 
Copy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IPCopy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IP
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
The Role of Intellectual Property Rights for the Growth of ICT Industry in Be...
The Role of Intellectual Property Rights for the Growth of ICT Industry in Be...The Role of Intellectual Property Rights for the Growth of ICT Industry in Be...
The Role of Intellectual Property Rights for the Growth of ICT Industry in Be...
 
How IP Litigation Will Be Impacted By New Technologies: AI, Smart Devices, an...
How IP Litigation Will Be Impacted By New Technologies: AI, Smart Devices, an...How IP Litigation Will Be Impacted By New Technologies: AI, Smart Devices, an...
How IP Litigation Will Be Impacted By New Technologies: AI, Smart Devices, an...
 
Protecting Your Intellectual Property: Cost-Saving Techniques, Legal Updates ...
Protecting Your Intellectual Property: Cost-Saving Techniques, Legal Updates ...Protecting Your Intellectual Property: Cost-Saving Techniques, Legal Updates ...
Protecting Your Intellectual Property: Cost-Saving Techniques, Legal Updates ...
 

Plus de wtidwell

The Cold War Kennedy & Johnson Years
The Cold War Kennedy & Johnson YearsThe Cold War Kennedy & Johnson Years
The Cold War Kennedy & Johnson Years
wtidwell
 
Power point rules
Power point rulesPower point rules
Power point rules
wtidwell
 
Unconscious prejudice
Unconscious  prejudiceUnconscious  prejudice
Unconscious prejudice
wtidwell
 
Annotated bibliogrphy
Annotated bibliogrphyAnnotated bibliogrphy
Annotated bibliogrphy
wtidwell
 
The Jackson Era
The Jackson EraThe Jackson Era
The Jackson Era
wtidwell
 
Plagiarism handout
Plagiarism handoutPlagiarism handout
Plagiarism handout
wtidwell
 
What does it mean to work in groups?
What does it mean to work in groups?What does it mean to work in groups?
What does it mean to work in groups?
wtidwell
 
Evaluating deductive reasoning and fallacies
Evaluating deductive reasoning and fallaciesEvaluating deductive reasoning and fallacies
Evaluating deductive reasoning and fallacies
wtidwell
 
Chapter 3 (problem solving)
Chapter 3 (problem solving)Chapter 3 (problem solving)
Chapter 3 (problem solving)
wtidwell
 
Critical thinking
Critical thinkingCritical thinking
Critical thinking
wtidwell
 
Quantitative method
Quantitative methodQuantitative method
Quantitative method
wtidwell
 
Research methodologies
Research methodologiesResearch methodologies
Research methodologies
wtidwell
 
Paragraphs 101
Paragraphs 101Paragraphs 101
Paragraphs 101
wtidwell
 
Avoiding runons
Avoiding runonsAvoiding runons
Avoiding runons
wtidwell
 
Punctuation
PunctuationPunctuation
Punctuation
wtidwell
 
The cold war
The cold warThe cold war
The cold war
wtidwell
 

Plus de wtidwell (19)

20th and 21st centry
20th and 21st centry20th and 21st centry
20th and 21st centry
 
Vietnam -> Bakke
Vietnam -> BakkeVietnam -> Bakke
Vietnam -> Bakke
 
The Cold War Kennedy & Johnson Years
The Cold War Kennedy & Johnson YearsThe Cold War Kennedy & Johnson Years
The Cold War Kennedy & Johnson Years
 
Power point rules
Power point rulesPower point rules
Power point rules
 
Unconscious prejudice
Unconscious  prejudiceUnconscious  prejudice
Unconscious prejudice
 
Annotated bibliogrphy
Annotated bibliogrphyAnnotated bibliogrphy
Annotated bibliogrphy
 
The Jackson Era
The Jackson EraThe Jackson Era
The Jackson Era
 
Plagiarism handout
Plagiarism handoutPlagiarism handout
Plagiarism handout
 
What does it mean to work in groups?
What does it mean to work in groups?What does it mean to work in groups?
What does it mean to work in groups?
 
Evaluating deductive reasoning and fallacies
Evaluating deductive reasoning and fallaciesEvaluating deductive reasoning and fallacies
Evaluating deductive reasoning and fallacies
 
Chapter 3 (problem solving)
Chapter 3 (problem solving)Chapter 3 (problem solving)
Chapter 3 (problem solving)
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Critical thinking
Critical thinkingCritical thinking
Critical thinking
 
Quantitative method
Quantitative methodQuantitative method
Quantitative method
 
Research methodologies
Research methodologiesResearch methodologies
Research methodologies
 
Paragraphs 101
Paragraphs 101Paragraphs 101
Paragraphs 101
 
Avoiding runons
Avoiding runonsAvoiding runons
Avoiding runons
 
Punctuation
PunctuationPunctuation
Punctuation
 
The cold war
The cold warThe cold war
The cold war
 

Dernier

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Dernier (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 

Ethical perspectives (it focus)

  • 1. Ethics in Information Technology, Second Edition Chapter 6 Intellectual Property
  • 2. Objectives • What does the term intellectual property encompass, and why are companies so concerned about protecting it? • What are the strengths and limitations of using copyrights, patents, and trade secret laws to protect intellectual property? • What is plagiarism, and what can be done to combat it? Ethics in Information Technology, Second Edition 2
  • 3. Objectives (continued) • What is reverse engineering, and what issues are associated with applying it to create a look-alike of a competitor’s software program? • What is open source code, and what is the fundamental premise behind its use? • What is the essential difference between competitive intelligence and industrial espionage, and how is competitive intelligence gathered? Ethics in Information Technology, Second Edition 3
  • 4. Objectives (continued) • What is cybersquatting, and what strategy should be used to protect an organization from it? Ethics in Information Technology, Second Edition 4
  • 5. What is Intellectual Property? • Term used to describe works of the mind – Distinct and “owned” or created by a person or group • Copyright law – Protects authored works • Patent laws – Protect inventions • Trade secret laws – Help safeguard information critical to an organization’s success Ethics in Information Technology, Second Edition 5
  • 6. Copyrights • Established in the U.S. Constitution – Article I, section 8, clause 8 • Grants creators of original works the right to – – – – – – Distribute Display Perform Reproduce work Prepare derivative works based upon the work Author may grant exclusive right to others Ethics in Information Technology, Second Edition 6
  • 7. Copyrights (continued) • Types of work that can be copyrighted – – – – – – – – Architecture Art Audiovisual works Choreography Drama Graphics Literature Motion pictures Ethics in Information Technology, Second Edition 7
  • 8. Copyrights (continued) • Types of work that can be copyrighted – – – – – – Music Pantomimes Pictures Sculptures Sound recordings Other intellectual works • As described in Title 17 of U.S. Code Ethics in Information Technology, Second Edition 8
  • 9. Copyrights (continued) • Work must fall within one of the preceding categories • Must be original – Evaluating originality can cause problems • Fair use doctrine – Factors to consider when evaluating the use of copyrighted material Ethics in Information Technology, Second Edition 9
  • 10. Copyrights (continued) • Fair use doctrine factors include: – – – – Purpose and character of the use Nature of the copyrighted work Portion of the copyrighted work used Effect of the use upon the value of the copyrighted work • Copyright infringement – Copy substantial and material part of another’s copyrighted work – Without permission Ethics in Information Technology, Second Edition 10
  • 11. Copyrights (continued) • Area of copyright infringement – Worldwide sale of counterfeit consumer supplies • Copyrights to protect computer software exist – To prove infringement, copyright holders must show a striking resemblance between the original software and the new software that could be explained only by copying • World Intellectual Property Organization (WIPO) – Agency of the United Nations – Advocates for the interests of intellectual property owners Ethics in Information Technology, Second Edition 11
  • 12. Copyrights (continued) • Digital Millennium Copyright Act (DMCA) – Added new provisions to WIPO – Civil and criminal penalties included – Governs distribution of tools and software that can be used for copyright infringement – Opponents say it restricts the free flow of information Ethics in Information Technology, Second Edition 12
  • 13. Patents • Grant of property rights to inventors • Issued by the U.S. Patent and Trademark Office (USPTO) • Permits an owner to exclude the public from making, using, or selling the protected invention • Allows legal action against violators • Prevents independent creation • Extends only to the United States and its territories and possessions Ethics in Information Technology, Second Edition 13
  • 14. Patents (continued) • Applicant must file with the USPTO – USPTO searches prior art – Takes an average of 25 months • Prior art – Existing body of knowledge – Available to a person of ordinary skill in the art Ethics in Information Technology, Second Edition 14
  • 15. Patents (continued) • An invention must pass four tests – – – – Must be in one of the five statutory classes of items Must be useful Must be novel Must not be obvious to a person having ordinary skill in the same field • Items cannot be patented if they are – Abstract ideas – Laws of nature – Natural phenomena Ethics in Information Technology, Second Edition 15
  • 16. Patents (continued) • Patent infringement – Someone makes unauthorized use of a patent – No specified limit to the monetary penalty • Software patent – Feature, function, or process embodied in instructions executed on a computer • 20,000 software-related patents per year have been issued since the early 1980s Ethics in Information Technology, Second Edition 16
  • 17. Patents (continued) • Before obtaining a software patent, do a patent search • Software Patent Institute is building a database of information • Cross-licensing agreements – Large software companies agree not to sue others over patent infringements – Small businesses have no choice but to license patents Ethics in Information Technology, Second Edition 17
  • 18. Patents (continued) • Defensive publishing – – – – – – Alternative to filing for patents Company publishes a description of the innovation Establishes the idea’s legal existence as prior art Costs mere hundreds of dollars No lawyers Fast Ethics in Information Technology, Second Edition 18
  • 19. Patents (continued) • Standard is a definition or format – Approved by recognized standards organization – Or accepted as a de facto standard by the industry – Enables hardware and software from different manufacturers to work together • Submarine patent – Hidden within a standard – Does not surface until the standard is broadly adopted Ethics in Information Technology, Second Edition 19
  • 20. Patents (continued) • Patent farming involves – Influencing a standards organization to make use of a patented item – Demanding royalties from all parties that use the standard Ethics in Information Technology, Second Edition 20
  • 21. Trade Secret Laws • Uniform Trade Secrets Act (UTSA) established uniformity in trade secret law • Trade secret – – – – – – Business information Represents something of economic value Requires an effort or cost to develop Some degree of uniqueness or novelty Generally unknown to the public Kept confidential • Computer hardware and software can qualify for trade secret protection Ethics in Information Technology, Second Edition 21
  • 22. Trade Secret Laws (continued) • Information is only considered a trade secret if the company takes steps to protect it • Greatest threat to loss of company trade secrets is employees • Nondisclosure clauses in employee’s contract – Enforcement can be difficult – Confidentiality issues are reviewed at the exit interview Ethics in Information Technology, Second Edition 22
  • 23. Trade Secret Laws (continued) • Noncompete agreements – Protect intellectual property from being used by competitors when key employees leave – Require employees not to work for competitors for a period of time • Safeguards – Limit outside access to corporate computers – Guard use of remote computers by employees Ethics in Information Technology, Second Edition 23
  • 24. Trade Secret Laws (continued) • Trade secret law has a few key advantages over patents and copyrights – – – – No time limitations No need to file an application Patents can be ruled invalid by courts No filing or application fees • Law doesn’t prevent someone from using the same idea if it is developed independently • World Trade Organization (WTO) – TRIPs Agreement provides for a minimum level of protection for intellectual property Ethics in Information Technology, Second Edition 24
  • 25. Summary of the WTO TRIPs Agreement Ethics in Information Technology, Second Edition 25
  • 26. Legal Overview: The Battle Over Customer Lists • Employees make unauthorized use of an employer’s customer list – Customer list not automatically considered a trade secret – Educate workers about the confidentiality of such lists Ethics in Information Technology, Second Edition 26
  • 27. Key Intellectual Property Issues • Issues that apply to intellectual property and information technology – – – – – Plagiarism Reverse engineering Open source code Competitive intelligence Cybersquatting Ethics in Information Technology, Second Edition 27
  • 28. Plagiarism • Theft and passing off of someone’s ideas or words as one’s own • Many students – Do not understand what constitutes plagiarism – Believe that all electronic content is in the public domain • Plagiarism detection systems – Check submitted material against databases of electronic content Ethics in Information Technology, Second Edition 28
  • 29. Plagiarism (continued) • Steps to combat student plagiarism – Help students understand what constitutes plagiarism – Show students how to document Web pages – Schedule major writing assignments in portions – Tell students that you know about Internet paper mills – Educate students about plagiarism detection services Ethics in Information Technology, Second Edition 29
  • 30. Partial List of Plagiarism Detection Services and Software Ethics in Information Technology, Second Edition 30
  • 31. Reverse Engineering • Process of taking something apart in order to – Understand it – Build a copy of it – Improve it • Applied to computer – Hardware – Software • Convert a program code to a higher level design • Convert an application that ran on one vendor’s database to run on another’s Ethics in Information Technology, Second Edition 31
  • 32. Reverse Engineering (continued) • Compiler – Language translator – Converts computer program statements expressed in a source language to machine language • Software manufacturer – Provides software in machine language form • Decompiler – Reads machine language – Produces source code Ethics in Information Technology, Second Edition 32
  • 33. Reverse Engineering (continued) • Courts have ruled in favor of using reverse engineering – To enable interoperability • Software license agreements forbid reverse engineering • Semiconductor Chip Protection Act (SCPA) – Established a new type of intellectual property protection for mask works Ethics in Information Technology, Second Edition 33
  • 34. Open Source Code • Program source code made available for use or modification – As users or other developers see fit • Basic premise – Software improves – Can be adapted to meet new needs – Bugs rapidly identified and fixed • High reliability • GNU General Public License (GPL) was a precursor to the Open Source Initiative (OSI) Ethics in Information Technology, Second Edition 34
  • 35. Competitive Intelligence • Gathering of legally obtainable information – To help a company gain an advantage over rivals • Often integrated into a company’s strategic plans and decision making • Not industrial espionage • Nearly 25 colleges and universities offer courses or programs • Without proper management safeguards it can cross over to industrial espionage Ethics in Information Technology, Second Edition 35
  • 36. A Manager’s Checklist for Running an Ethical Competitive Intelligence Operation Ethics in Information Technology, Second Edition 36
  • 37. Cybersquatting • Trademark is anything that enables a consumer to differentiate one company’s products from another’s – May be • • • • • Logo Package design Phrase Sound Word Ethics in Information Technology, Second Edition 37
  • 38. Cybersquatting (continued) • Trademark law – Trademark’s owner has the right to prevent others from using the same mark • Or confusingly similar mark • Cybersquatters – Registered domain names for famous trademarks or company names – Hope the trademark’s owner would buy the domain name • For a large sum of money Ethics in Information Technology, Second Edition 38
  • 39. Cybersquatting (continued) • To curb cybersquatting – Register all possible domain names • .org • .com • .info • Internet Corporation for Assigned Names and Numbers (ICANN) – Current trademark holders are given time to assert their rights in the new top-level domains before registrations are opened to the general public Ethics in Information Technology, Second Edition 39
  • 40. Summary • Intellectual property is protected by – Copyrights – Patents – Trade secrets • Plagiarism is stealing and passing off the ideas and words of another as one’s own • Reverse engineering – Process of breaking something down – In order to understand, build copy, or improve it Ethics in Information Technology, Second Edition 40
  • 41. Summary (continued) • Open source code – Made available for use or modification as users or other developers see fit • Competitive intelligence – Not industrial espionage – Uses legal means and public information • Cybersquatting – Registration of a domain name by an unaffiliated party Ethics in Information Technology, Second Edition 41