SlideShare a Scribd company logo
1 of 21
Professional Practices
SS-301
Ehtesham Raza,
Assistant Professor,
Govt. Murray College,
Sialkot.
Topic: Intellectual Property Rights
• Introduction
• Confidential Information
• Patents
• Copyright
• Acts permitted in relation to copyright
• Remedies for breach of Copyright
• Plagiarism
Introduction
• Intellectual property rights are often the
most valuable assets owned, used and
developed by a software house.
• Intellectual property rights include:
– Confidential information
– Patents
– trade marks
– Designs
– Copyrights protecting computer programs
Introduction (continued)
• They protect information stored by
electronic means and all of the paperwork
which accompanies a program, such as
the user manual, plus any multimedia
packages and most items on the Web.
• Great care should be taken to protect,
exploit and enforce intellectual property
Introduction (continued)
• The name under which a product is sold
may be registered as a trade mark
• the hardware or a process used in its
manufacture may be protected by a patent
• the look of the product may be registered in
the Designs Registry
• software can be protected by copyright
• the know-how which goes into the
development of the product may be
protected as confidential information
Introduction (continued)
• Unauthorized use of intellectual property
can be stopped by injunction and
damages may be sought for infringement
of these rights
• The law is constantly changing with
technological advance
• General Agreement on Tariffs and Trade
(GATT) concerned the protection of
intellectual property rights in the face of
widespread piracy of software products.
Confidential Information
• Information “which is not public property and public
knowledge”
• Any category of information, from personal confidences,
to trade secrets and sensitive government information,
any or all of which a computer scientist might handle in
the course of his or her work, or all or any of which a firm
may want to protect against unauthorized use or
disclosure by others
• Information will be protected only if it is confidential. Non-
confidential information, unless protected, e.g. by
copyright or a patent is deemed to be in the public
domain and can be used by anyone.
Confidential Information
• Three conditions must be satisfied before
an action for breach of confidence can
succeed:
– the information must be confidential
– the information must have been disclosed in
circumstances which give rise to an obligation
of confidence
– there must be an actual or anticipated
unauthorized use or disclosure of the
information
Patents
• A government authority conferring a right
or title for a set period, especially the sole
right to exclude others from making, using,
or selling an invention
• A patent gives to an inventor a monopoly
in an invention. This means that the
inventor is given the exclusive right to use
or exploit the invention for a defined period
Patents
• The monopoly granted by patent law is so strong, that
the owner of a patent may even exclude independent
inventors from the market
• The better the patent and the more commercially
desirable the breakthrough, the more likely it is to be
challenged. For example, if competitors can produce a
similar product or process, which is not covered by the
patent, they will be free to market it and to erode the
commercial advantage of the patentee. If they can prove
that the subject matter of the patent has been used or
disclosed before, they can invalidate the patent.
Patents
• Patent Act merely sets out a number of
criteria which must be satisfied before an
invention can be patented
• a patent may only be granted if:
– the invention is new
– it involves an inventive step
– it is capable of industrial application
– the subject matter of the invention does not
fall within an excluded class.
Patents
• It is possible to patent something which is
more than just a program—something which
can be called, for simplicity, a “program plus”
• A computer program is not excluded from
patentability if it produced, or is capable of
producing, a further technical effect beyond
the normal physical interaction between
software and hardware, i.e. it is potentially
patentable if it makes something else do
something.
Copyright
• The exclusive legal right, given to an originator
or an assignee to print, publish, perform
material, and to authorize others to do the same
• Copyright protects more items generated by
businesses or by individuals than any other
aspect of intellectual property law
• It can protect business letters, manuals,
diagrams, computer programs
• Copyright owners face the specter of unlimited
piracy through
uncontrolled copying with the advent of internet
Copyright
• What we will probably see over the next few
years are stronger
laws, more rights for copyright owners,
widespread licensing schemes and greater use of
technical anti-piracy or copy-monitoring devices
and electronic rights management systems
• Copyright law gives six exclusive rights to the
owner of copyright:
– copy the work
– issue copies to the public
Copyright
– rent or lend the work to the public
– perform, play or show the work in public
– broadcast the work or include it in a cable
programmed service
– make an adaptation of the work or to do any
of the above with an adaptation
The rights apply equally to published and to
unpublished works
Acts permitted in relation to copyright
• Some acts are permitted under the 1988
Act, even though they would otherwise
amount to breach of copyright.
– Fair dealing
– Making back-up copies of computer programs
– Transfers of works in electronic form
– De-compilation for the purpose of
interoperability
– Error correction
– Databases
Remedies for breach of copyright
• A copyright owner has all the usual civil
remedies of search, injunction, damages
and an action for an account of profits
made in breach of copyright
• If it is shown that at the time of the
infringement of copyright the defendant did
not know and had no reason to believe that
copyright subsisted in the work, then the
plaintiff is not entitled to damages against
the defendant
Remedies for breach of
copyright
• A copyright owner is also given an
important power to enter premises without
using force in order to seize infringing
copies, or articles specifically designed or
adapted for making copies
Plagiarism
• the practice of taking someone else's work
or ideas and passing them off as one's
own.
• All of the following are considered
plagiarism:
– turning in someone else's work as your own
– copying words or ideas from someone else
without giving credit
– failing to put a quotation in quotation marks
Plagiarism (continued)
– giving incorrect information about the source of
a quotation
– changing words but copying the sentence
structure of a source without giving credit
– for a computer program changing variable
names only, or not changing the structure or flow
of a program
Thank you!

More Related Content

What's hot

Software Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEESoftware Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEESamsuddoha Sams
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual PropertySaqib Raza
 
computer contracts.pdf
computer contracts.pdfcomputer contracts.pdf
computer contracts.pdfSanaKhan319883
 
Frame Work of Employee Relation Law , Lahore Garrison University
Frame Work of Employee Relation Law , Lahore Garrison UniversityFrame Work of Employee Relation Law , Lahore Garrison University
Frame Work of Employee Relation Law , Lahore Garrison Universitytouseefaq3
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Software Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional PracticeSoftware Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional Practice Saqib Raza
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
PROFESSIONAL PRACTICES IMPORTANT QUESTION
PROFESSIONAL PRACTICES IMPORTANT QUESTIONPROFESSIONAL PRACTICES IMPORTANT QUESTION
PROFESSIONAL PRACTICES IMPORTANT QUESTIONFAREED UR RAHMAN .
 
Intellectual Property, Copyright, and Ethics
Intellectual Property, Copyright, and EthicsIntellectual Property, Copyright, and Ethics
Intellectual Property, Copyright, and Ethicsakia38321
 
computing profession and core skills
computing profession and core skillscomputing profession and core skills
computing profession and core skillsHamza Cheema
 
05 professional practice
05 professional practice05 professional practice
05 professional practiceSulman Ahmed
 
Intellectual Property in Professional Practices
Intellectual Property in Professional PracticesIntellectual Property in Professional Practices
Intellectual Property in Professional PracticesSaji909
 
Accountability And Auditing In Professional Practice
Accountability And Auditing In Professional PracticeAccountability And Auditing In Professional Practice
Accountability And Auditing In Professional PracticeSyed Hassan Ali
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law sohaildanish
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyrightVehitaltinci
 

What's hot (20)

Software Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEESoftware Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEE
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual Property
 
Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering  Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering
 
computer contracts.pdf
computer contracts.pdfcomputer contracts.pdf
computer contracts.pdf
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Frame Work of Employee Relation Law , Lahore Garrison University
Frame Work of Employee Relation Law , Lahore Garrison UniversityFrame Work of Employee Relation Law , Lahore Garrison University
Frame Work of Employee Relation Law , Lahore Garrison University
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Software Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional PracticeSoftware Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional Practice
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
PROFESSIONAL PRACTICES IMPORTANT QUESTION
PROFESSIONAL PRACTICES IMPORTANT QUESTIONPROFESSIONAL PRACTICES IMPORTANT QUESTION
PROFESSIONAL PRACTICES IMPORTANT QUESTION
 
Intellectual Property, Copyright, and Ethics
Intellectual Property, Copyright, and EthicsIntellectual Property, Copyright, and Ethics
Intellectual Property, Copyright, and Ethics
 
computing profession and core skills
computing profession and core skillscomputing profession and core skills
computing profession and core skills
 
05 professional practice
05 professional practice05 professional practice
05 professional practice
 
Intellectual Property in Professional Practices
Intellectual Property in Professional PracticesIntellectual Property in Professional Practices
Intellectual Property in Professional Practices
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Accountability And Auditing In Professional Practice
Accountability And Auditing In Professional PracticeAccountability And Auditing In Professional Practice
Accountability And Auditing In Professional Practice
 
Software copyright
Software copyrightSoftware copyright
Software copyright
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 

Similar to intellectual property rights

Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.pptKISHOYIANKISH
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual propertySalim Hosen
 
BS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxBS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxwhoiam36
 
Society_law_and_ethics.pdf
Society_law_and_ethics.pdfSociety_law_and_ethics.pdf
Society_law_and_ethics.pdfManyaThakur12
 
Legal protection of computer software
Legal protection of computer softwareLegal protection of computer software
Legal protection of computer softwareOlli Pitkänen
 
Technology and Law
Technology and LawTechnology and Law
Technology and Lawcs404ta
 
Patent 101: Protecting Innovations
Patent 101: Protecting InnovationsPatent 101: Protecting Innovations
Patent 101: Protecting InnovationsMintz Levin
 
LECTURE 12: Technology Protection
LECTURE 12: Technology ProtectionLECTURE 12: Technology Protection
LECTURE 12: Technology ProtectionBC Chew
 
Top 5 patent Tips. Cerian Jones, UDL
Top 5 patent Tips. Cerian Jones, UDLTop 5 patent Tips. Cerian Jones, UDL
Top 5 patent Tips. Cerian Jones, UDLSarah Toomey
 
vdocument.in_introduction-to-intellectual-property-rights-ipr.ppt
vdocument.in_introduction-to-intellectual-property-rights-ipr.pptvdocument.in_introduction-to-intellectual-property-rights-ipr.ppt
vdocument.in_introduction-to-intellectual-property-rights-ipr.pptBhawna173140
 
Chapter16 intellectual-property
Chapter16 intellectual-propertyChapter16 intellectual-property
Chapter16 intellectual-propertyVin Voro
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rightsHimanshu Pathak
 
IMPORTANCE OF INTELECTUAL PROPERTY.pdf
IMPORTANCE OF INTELECTUAL PROPERTY.pdfIMPORTANCE OF INTELECTUAL PROPERTY.pdf
IMPORTANCE OF INTELECTUAL PROPERTY.pdfJahidulIslam758305
 
OneStart 2015 London Bootcamp: Charlotte Teall, Forresters - Introducing IP
OneStart 2015 London Bootcamp: Charlotte Teall, Forresters - Introducing IPOneStart 2015 London Bootcamp: Charlotte Teall, Forresters - Introducing IP
OneStart 2015 London Bootcamp: Charlotte Teall, Forresters - Introducing IPOxbridge Biotech Roundtable
 

Similar to intellectual property rights (20)

Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.ppt
 
Info 442 chapt 5
Info 442 chapt 5Info 442 chapt 5
Info 442 chapt 5
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 
IP Compliance.ppt
IP Compliance.pptIP Compliance.ppt
IP Compliance.ppt
 
BS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxBS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptx
 
Society_law_and_ethics.pdf
Society_law_and_ethics.pdfSociety_law_and_ethics.pdf
Society_law_and_ethics.pdf
 
Technology-protection
Technology-protectionTechnology-protection
Technology-protection
 
Ip 101 for Startups
Ip 101 for StartupsIp 101 for Startups
Ip 101 for Startups
 
Legal protection of computer software
Legal protection of computer softwareLegal protection of computer software
Legal protection of computer software
 
Technology and Law
Technology and LawTechnology and Law
Technology and Law
 
Patent 101: Protecting Innovations
Patent 101: Protecting InnovationsPatent 101: Protecting Innovations
Patent 101: Protecting Innovations
 
LECTURE 12: Technology Protection
LECTURE 12: Technology ProtectionLECTURE 12: Technology Protection
LECTURE 12: Technology Protection
 
Top 5 patent Tips. Cerian Jones, UDL
Top 5 patent Tips. Cerian Jones, UDLTop 5 patent Tips. Cerian Jones, UDL
Top 5 patent Tips. Cerian Jones, UDL
 
vdocument.in_introduction-to-intellectual-property-rights-ipr.ppt
vdocument.in_introduction-to-intellectual-property-rights-ipr.pptvdocument.in_introduction-to-intellectual-property-rights-ipr.ppt
vdocument.in_introduction-to-intellectual-property-rights-ipr.ppt
 
Chapter16 intellectual-property
Chapter16 intellectual-propertyChapter16 intellectual-property
Chapter16 intellectual-property
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
IMPORTANCE OF INTELECTUAL PROPERTY.pdf
IMPORTANCE OF INTELECTUAL PROPERTY.pdfIMPORTANCE OF INTELECTUAL PROPERTY.pdf
IMPORTANCE OF INTELECTUAL PROPERTY.pdf
 
OneStart 2015 London Bootcamp: Charlotte Teall, Forresters - Introducing IP
OneStart 2015 London Bootcamp: Charlotte Teall, Forresters - Introducing IPOneStart 2015 London Bootcamp: Charlotte Teall, Forresters - Introducing IP
OneStart 2015 London Bootcamp: Charlotte Teall, Forresters - Introducing IP
 
PLS 780 Week 8
PLS 780 Week 8PLS 780 Week 8
PLS 780 Week 8
 
Pls 780 week 8
Pls 780 week 8Pls 780 week 8
Pls 780 week 8
 

More from Hamza Cheema

professional ethics
professional ethicsprofessional ethics
professional ethicsHamza Cheema
 
managing teams and their conflicts
managing teams and their conflictsmanaging teams and their conflicts
managing teams and their conflictsHamza Cheema
 
professional ethics in_computing
professional ethics in_computingprofessional ethics in_computing
professional ethics in_computingHamza Cheema
 
ethics and professionalism
ethics and professionalismethics and professionalism
ethics and professionalismHamza Cheema
 
effective time-management-important-vs-urgent
effective time-management-important-vs-urgenteffective time-management-important-vs-urgent
effective time-management-important-vs-urgentHamza Cheema
 
time management islamic way
time management islamic waytime management islamic way
time management islamic wayHamza Cheema
 
habbits of highly effective people
habbits of highly effective peoplehabbits of highly effective people
habbits of highly effective peopleHamza Cheema
 
be the tranformer (overall characteristics)
 be the tranformer (overall characteristics) be the tranformer (overall characteristics)
be the tranformer (overall characteristics)Hamza Cheema
 
characteristics of a professional organization
characteristics of a professional organizationcharacteristics of a professional organization
characteristics of a professional organizationHamza Cheema
 
finance and accounting
finance and accountingfinance and accounting
finance and accountingHamza Cheema
 
anatomy of a sw house
anatomy of a sw houseanatomy of a sw house
anatomy of a sw houseHamza Cheema
 

More from Hamza Cheema (20)

seven habits
seven habitsseven habits
seven habits
 
leadership
leadershipleadership
leadership
 
time management
time managementtime management
time management
 
professional ethics
professional ethicsprofessional ethics
professional ethics
 
the profession
 the profession the profession
the profession
 
managing teams and their conflicts
managing teams and their conflictsmanaging teams and their conflicts
managing teams and their conflicts
 
swot-analysis
swot-analysisswot-analysis
swot-analysis
 
professional ethics in_computing
professional ethics in_computingprofessional ethics in_computing
professional ethics in_computing
 
ethics and professionalism
ethics and professionalismethics and professionalism
ethics and professionalism
 
effective time-management-important-vs-urgent
effective time-management-important-vs-urgenteffective time-management-important-vs-urgent
effective time-management-important-vs-urgent
 
time management islamic way
time management islamic waytime management islamic way
time management islamic way
 
time management
time managementtime management
time management
 
professionalism
professionalismprofessionalism
professionalism
 
habbits of highly effective people
habbits of highly effective peoplehabbits of highly effective people
habbits of highly effective people
 
leardeship
leardeshipleardeship
leardeship
 
be the tranformer (overall characteristics)
 be the tranformer (overall characteristics) be the tranformer (overall characteristics)
be the tranformer (overall characteristics)
 
characteristics of a professional organization
characteristics of a professional organizationcharacteristics of a professional organization
characteristics of a professional organization
 
hackivism
hackivismhackivism
hackivism
 
finance and accounting
finance and accountingfinance and accounting
finance and accounting
 
anatomy of a sw house
anatomy of a sw houseanatomy of a sw house
anatomy of a sw house
 

Recently uploaded

Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 

Recently uploaded (20)

Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

intellectual property rights

  • 1. Professional Practices SS-301 Ehtesham Raza, Assistant Professor, Govt. Murray College, Sialkot.
  • 2. Topic: Intellectual Property Rights • Introduction • Confidential Information • Patents • Copyright • Acts permitted in relation to copyright • Remedies for breach of Copyright • Plagiarism
  • 3. Introduction • Intellectual property rights are often the most valuable assets owned, used and developed by a software house. • Intellectual property rights include: – Confidential information – Patents – trade marks – Designs – Copyrights protecting computer programs
  • 4. Introduction (continued) • They protect information stored by electronic means and all of the paperwork which accompanies a program, such as the user manual, plus any multimedia packages and most items on the Web. • Great care should be taken to protect, exploit and enforce intellectual property
  • 5. Introduction (continued) • The name under which a product is sold may be registered as a trade mark • the hardware or a process used in its manufacture may be protected by a patent • the look of the product may be registered in the Designs Registry • software can be protected by copyright • the know-how which goes into the development of the product may be protected as confidential information
  • 6. Introduction (continued) • Unauthorized use of intellectual property can be stopped by injunction and damages may be sought for infringement of these rights • The law is constantly changing with technological advance • General Agreement on Tariffs and Trade (GATT) concerned the protection of intellectual property rights in the face of widespread piracy of software products.
  • 7. Confidential Information • Information “which is not public property and public knowledge” • Any category of information, from personal confidences, to trade secrets and sensitive government information, any or all of which a computer scientist might handle in the course of his or her work, or all or any of which a firm may want to protect against unauthorized use or disclosure by others • Information will be protected only if it is confidential. Non- confidential information, unless protected, e.g. by copyright or a patent is deemed to be in the public domain and can be used by anyone.
  • 8. Confidential Information • Three conditions must be satisfied before an action for breach of confidence can succeed: – the information must be confidential – the information must have been disclosed in circumstances which give rise to an obligation of confidence – there must be an actual or anticipated unauthorized use or disclosure of the information
  • 9. Patents • A government authority conferring a right or title for a set period, especially the sole right to exclude others from making, using, or selling an invention • A patent gives to an inventor a monopoly in an invention. This means that the inventor is given the exclusive right to use or exploit the invention for a defined period
  • 10. Patents • The monopoly granted by patent law is so strong, that the owner of a patent may even exclude independent inventors from the market • The better the patent and the more commercially desirable the breakthrough, the more likely it is to be challenged. For example, if competitors can produce a similar product or process, which is not covered by the patent, they will be free to market it and to erode the commercial advantage of the patentee. If they can prove that the subject matter of the patent has been used or disclosed before, they can invalidate the patent.
  • 11. Patents • Patent Act merely sets out a number of criteria which must be satisfied before an invention can be patented • a patent may only be granted if: – the invention is new – it involves an inventive step – it is capable of industrial application – the subject matter of the invention does not fall within an excluded class.
  • 12. Patents • It is possible to patent something which is more than just a program—something which can be called, for simplicity, a “program plus” • A computer program is not excluded from patentability if it produced, or is capable of producing, a further technical effect beyond the normal physical interaction between software and hardware, i.e. it is potentially patentable if it makes something else do something.
  • 13. Copyright • The exclusive legal right, given to an originator or an assignee to print, publish, perform material, and to authorize others to do the same • Copyright protects more items generated by businesses or by individuals than any other aspect of intellectual property law • It can protect business letters, manuals, diagrams, computer programs • Copyright owners face the specter of unlimited piracy through uncontrolled copying with the advent of internet
  • 14. Copyright • What we will probably see over the next few years are stronger laws, more rights for copyright owners, widespread licensing schemes and greater use of technical anti-piracy or copy-monitoring devices and electronic rights management systems • Copyright law gives six exclusive rights to the owner of copyright: – copy the work – issue copies to the public
  • 15. Copyright – rent or lend the work to the public – perform, play or show the work in public – broadcast the work or include it in a cable programmed service – make an adaptation of the work or to do any of the above with an adaptation The rights apply equally to published and to unpublished works
  • 16. Acts permitted in relation to copyright • Some acts are permitted under the 1988 Act, even though they would otherwise amount to breach of copyright. – Fair dealing – Making back-up copies of computer programs – Transfers of works in electronic form – De-compilation for the purpose of interoperability – Error correction – Databases
  • 17. Remedies for breach of copyright • A copyright owner has all the usual civil remedies of search, injunction, damages and an action for an account of profits made in breach of copyright • If it is shown that at the time of the infringement of copyright the defendant did not know and had no reason to believe that copyright subsisted in the work, then the plaintiff is not entitled to damages against the defendant
  • 18. Remedies for breach of copyright • A copyright owner is also given an important power to enter premises without using force in order to seize infringing copies, or articles specifically designed or adapted for making copies
  • 19. Plagiarism • the practice of taking someone else's work or ideas and passing them off as one's own. • All of the following are considered plagiarism: – turning in someone else's work as your own – copying words or ideas from someone else without giving credit – failing to put a quotation in quotation marks
  • 20. Plagiarism (continued) – giving incorrect information about the source of a quotation – changing words but copying the sentence structure of a source without giving credit – for a computer program changing variable names only, or not changing the structure or flow of a program