Week 7 8 9
Week 7 8 9
Property
Book: Ethics in Information Technology
Chapter 6
What Is Intellectual Property?
Term used to describe works of the mind
rotects inventions
Trade secret law
istribute
isplay
erform
eproduce work
Examples
Copyright Document
ttp://www.ipo.gov.pk/uploads/CMS/
Copyright_Ordinance_1962.pdf
Eligible Works
Types of work that can be copyrighted
rchitecture
rt
udiovisual works
horeography
rama
raphics
iterature
rganization searches prior art, existing patents and published material in the same
area.
Prior art
ust be useful
ust be novel
ust not be obvious to a person having ordinary skill in the same field
Items cannot be patented if they are:
bstract ideas
aws of nature
atural phenomena
Patent infringement
aking unauthorized use of another’s patent
o lawyers
ast
Submarine patent
Standard is a definition or format
Submarine Patent
usiness information
ept confidential
Information is only considered a trade secret if the company takes steps to protect it
Trade Secrets (cont’d.)
Trade secret law has a few key advantages over patents and
copyrights
o time limitations
Cou
rt must consider:
did the firm expend money or effort to develop the customer list?
Nondisclosure clauses
Example:
The employee agrees as a condition of employment that in the
event of termination for any reason, he or she will not engage
in a similar or competitive business for a period of two years,
nor will he or she contact or solicit any customer with whom
Employer conducted business during his or her employment.
This restrictive covenant shall be for a term of two years from
termination, and shall encompass the geographic area within a
100-mile radius of Employer’s place of business.
Can a Product or Service Have
Multiple Forms of IP?
Yes. For example, a mobile phone might use technology (data
encryption) and include features (a camera) that have been
patented. The phone may be marketed under a brand name that
has a registered trademark. The look and feel of the phone’s
home screen design may be the subject of a copyright
registration. If the phone’s manufacturer hasn’t created all of
the phone’s IP by itself, it may have licensed some of the IP
from others.
Key Intellectual Property Issues
Issues that apply to intellectual property and information technology
lagiarism
everse engineering
ompetitive intelligence
rademark infringement
ybersquatting
Plagiarism
Stealing someone’s ideas or words and passing them off as one’s own
Many students:
elp students understand what constitutes plagiarism and why they need to cite
sources
chedule major writing assignments in portions due over the course of the term
ell students that instructors are aware of Internet paper mills and plagiarism
detection services
http://hec.gov.pk/english/services/faculty/Documents/Plagiaris
m/Plagiarism%20Policy.pdf
Reverse Engineering
Process of taking something apart in order to:
nderstand it
uild a copy of it
mprove it
Applied to computer:
ardware
oftware
Convert a program code
o a higher-level design
o create a new representation
Begins by extracting design stage details
Reverse Engineering (cont’d.)
Convert an application that ran on one vendor’s database to run on another’s
Compiler
anguage translator
onverts computer program statements expressed in a source language to machine
language
Software manufacturer
rovides software in machine language form
Decompiler
eads machine language
roduces source code
Reverse Engineering (cont’d.)
Courts have ruled in favor of reverse engineering:
o enable interoperability
Software license agreements forbid reverse engineering
Ethics of using reverse engineering are debated
igh reliability
Reasons to Create Open Source
To earn respect for solving a common problem
Feel the need to pay back
To attract potential clients
Reluctant to license and market it
Why license is needed for open
source software ?
Competitive Intelligence
Gathering of legally obtainable information
ope the trademark’s owner will buy the domain name for a
large sum of money
To curb cybersquatting, register all possible domain names
everal top-level domains (.com, .edu, edu., .gov, .int, .mil, .net, .org,
aero, .biz, .coop, .info, .museum, .name, .pro, .asis, .cat, .mobi, .tel,
and .travel)
urrent trademark holders are given time to assert their rights in the new
top-level domains before registrations are opened to the general public
opyrights
atents
rademarks
rade secrets
Plagiarism is stealing and passing off the ideas and words of another as one’s
own
Reverse engineering
ade available for use or modification as users or other developers see fit
Competitive intelligence