SlideShare a Scribd company logo
1 of 8
04 – Part II
[SOCIAL, PROFESSIONAL AND ETHICAL ISSUES IN
INFORMATION TECHNOLOGY]
ITec4142 – Creativity: Employer and Employee Rights in Information
Technology Matters Page 15
A. Objectives
1. Understand the principle of intellectual property in the software development.
2. Aware on the limitations of an employee concerning intellectual property.
3. Gain knowledge on the nature of digital reliability and failure.
4. Define software and hardware representation and risk communication.
5. Conceptualize about the advancement of software technology and the complexity in
computer system.
6. Explain the reasons for consistency in the development of a complex system.
7. Explain the purpose of “goofing off”.
B. Development of Software: Who owns the intellectual property (IP)?
 Intellectual property is an umbrella term for various types of rights individuals or
businesses can have in their:
 Names;
 Creative Works; and
 Inventions.
Department of Information Technology
 Software developers need a solid understanding of their rights to
 Develop and protect a brand;
 Ensure exclusive ownership of their creations; and
 Keep their work confidential to create and maintain an advantage in this
competitive market.
04 – Part II
[SOCIAL, PROFESSIONAL AND ETHICAL ISSUES IN
INFORMATION TECHNOLOGY]
ITec4142 – Creativity: Employer and Employee Rights in Information
Technology Matters Page 16
 Patents - Software
 A patent entitles an Inventor to
exclude others from making,
using or selling the claimed
invention for a period of 20
years.
 To obtain a patent, your software
or algorithm must have a very
high level of originality and you
must disclose the “recipe” for your invention to the public.
 A Software Developer can get a patent on software inventions much
like a Mechanical Engineer can get a patent on a new machine or
device.
 Copyrights - Software
 A copyright gives the Owner the
exclusive right to make copies of the
work, distribute copies of the work to
the public, and create derivative works
based on the software.
 Copyright protection also lasts much longer than patent
protection. However, you must keep in mind that to invoke these
protections, your must file for and receive a copyright registration.
 The key difference between a patent and a copyright is that while a
patent can protect you from people who try to imitate your
software.
 Software copyrights have a narrower scope and will only protect
you if someone copies actual executable or source code or graphics
from your software.
04 – Part II
[SOCIAL, PROFESSIONAL AND ETHICAL ISSUES IN
INFORMATION TECHNOLOGY]
ITec4142 – Creativity: Employer and Employee Rights in Information
Technology Matters Page 17
 Trademarking the Software & Company Name
 A trademark is any word, name, symbol, or
device used to indicate the
source of goods or
services.
 Trademarks can be used to
protect your company
name or product name, domain names, images,
symbols, logos, slogans, colors, product designs and product
packaging.
C. Reasonable Limitations On IP Ownership by An Employee
 Patents
 A couple applicable exceptions (limitation) to this general rule under the
common law:
Registering your trademark will help you prevent others from
using your mark in a way that might confuse customers or damage
your business reputation.
04 – Part II
[SOCIAL, PROFESSIONAL AND ETHICAL ISSUES IN
INFORMATION TECHNOLOGY]
ITec4142 – Creativity: Employer and Employee Rights in Information
Technology Matters Page 18
 Employer – Specified Inventions – Inventions made by employees at
the employer’s request and expense, and which are considered the
property of employer.
 Shop Right Rule – An employer is not entitled to ownership of the
invention but retains a nonexclusive right, akin to a license, to make
use of the invention.
 Copyrights
 A form of protection provided by the laws to the Authors of original works
of authorship, including literary, dramatic, musical, artistic, and certain other
intellectual works.
 The Author of a work owns the copyright unless:
 There is a written agreement assigning the copyright to someone else
or the work was “made for hire.” A “work made for hire”.
D. The Nature of Digital Reliability and Failure
 Information and communication technology (ICT) by its nature is to generate
information.
 Normally accrues when the employee made use of employer
resources or property in making or perfecting the invention, and
the scope of the shop right will be a fact-dependent on the extent
of the employer’s resource contribution.
 Employers can avoid these defaults by requiring employees to
sign preinvention assignment agreements require the employee
to assign their patent rights to the employer.
04 – Part II
[SOCIAL, PROFESSIONAL AND ETHICAL ISSUES IN
INFORMATION TECHNOLOGY]
ITec4142 – Creativity: Employer and Employee Rights in Information
Technology Matters Page 19
 Information generated by ICT is either informative or non-informative.
 Anchored with employer and employee’s rights depends on the proper
management of the information.
 Workplace monitoring can be beneficial for an organization to obtain
productivity and efficiency from its employees (Bezek, Britton, 2001).
 While computers are often essential work tools, giving employees open,
unmonitored, computer access causes productivity and efficiency to suffer.
There has to be a balance between protecting the company’s information
assets without going overboard to the point where employees feel alienated.
 Education and communication are the best tools to attain this balance.
Educate workers to let them know what monitoring is, what it will monitor,
and convey the message that this monitoring is not due to lack of trust, but
is being used to protect the company.
04 – Part II
[SOCIAL, PROFESSIONAL AND ETHICAL ISSUES IN
INFORMATION TECHNOLOGY]
ITec4142 – Creativity: Employer and Employee Rights in Information
Technology Matters Page 20
E. Software and Hardware Representation and Risk Communication – Who is
responsible?
 Providing appropriate software
and hardware utilization in the workplace
contribute advantages to both employee and
employer.
 Inappropriate utilization of
software and hardware could compromise
productivity of an employee and employer or
the company as a whole.
 The responsibility lies on both, the employee and the employer. There should be
proper and appropriate communication and usage of its technologies suited to the
workplace and field of expertise in the productivity in the assigned task to its
employees.
F. From Medical Software to “Star Wars” and The Complexity of Computer Systems
 The implementation of software
technology advancement in the field
of medical areas is vital on its
utilization in generating and
providing reliable information to its
patience and the credibility of the
medical institution as a whole.
 Workers in the medical areas are
responsible in providing accurate
and informative information based
on specific findings through complete analysis.
04 – Part II
[SOCIAL, PROFESSIONAL AND ETHICAL ISSUES IN
INFORMATION TECHNOLOGY]
ITec4142 – Creativity: Employer and Employee Rights in Information
Technology Matters Page 21
 Continuous training to both medical workers and owners are encourage for better
implementation, utilization and in providing of informative information anchored
with the complexity of its system technology.
G. Origins of the Computer Professionals for Social Responsibility: What is reasonable
reliability in complex system
 Complicated system’s
developers should have
narrow and complete
knowledge in the
development process.
 Obtaining consistency in
generating accurate
information, designing
centralize information, accessing rapid information and capable in updating new
information is very much vital.
 Address end-users with the proper and complete training for better accessibility
and usability in providing informative information.
H. Goofing Off: Who owns the “Easter eggs”? and Why are they tolerated?
 Company owners provide “goofing
off” in the purpose of strengthening
camaraderie in the workplace and
escaping from exhausted working
environment through excursion
activity.
04 – Part II
[SOCIAL, PROFESSIONAL AND ETHICAL ISSUES IN
INFORMATION TECHNOLOGY]
ITec4142 – Creativity: Employer and Employee Rights in Information
Technology Matters Page 22
 Goofing off has been shown to improve work or study in the right environments,
and can relieve stress.
I. References
1. http://www.cems.uwe.ac.uk/~pchatter/2011/pepi/The_Handbook_of_Information_an
d_Computer_Ethics.pdf
2. http://shop.bcs.org/resources/pdf/9781780171807.pdf

More Related Content

What's hot

Crash course on claim drafting (with exercises)
Crash course on claim drafting (with exercises)Crash course on claim drafting (with exercises)
Crash course on claim drafting (with exercises)Caezar Angelito E Arceo
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsDyuti Islam
 
semiconductor protection act
semiconductor protection actsemiconductor protection act
semiconductor protection actwelcometofacebook
 
Copyright and fair use
Copyright and fair useCopyright and fair use
Copyright and fair useDrJasonBeach
 
Technology in Workplace
Technology in WorkplaceTechnology in Workplace
Technology in WorkplaceHemanthC9
 
Artificial intelligence and ipr
Artificial intelligence  and iprArtificial intelligence  and ipr
Artificial intelligence and iprNibedita Basu
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Usersalmario1988
 
International Telecommunication Laws-PPT
International Telecommunication Laws-PPTInternational Telecommunication Laws-PPT
International Telecommunication Laws-PPTJayakar Bathula Jayakar
 
Copyright Protection for Philippine Publications
Copyright Protection for Philippine PublicationsCopyright Protection for Philippine Publications
Copyright Protection for Philippine PublicationsFe Angela Verzosa
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 
Professional societies
Professional societiesProfessional societies
Professional societiesSulman Ahmed
 
Ai copyright: ownership and liability
Ai copyright: ownership and liabilityAi copyright: ownership and liability
Ai copyright: ownership and liabilityAndres Guadamuz
 
Copyright issues in digital media
Copyright issues in digital mediaCopyright issues in digital media
Copyright issues in digital mediaAltacit Global
 
AN INTRODUCTION TO EMERGING TECHNOLOGY
AN INTRODUCTION TO EMERGING TECHNOLOGYAN INTRODUCTION TO EMERGING TECHNOLOGY
AN INTRODUCTION TO EMERGING TECHNOLOGYVijay R. Joshi
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivismrashidirazali
 

What's hot (20)

Crash course on claim drafting (with exercises)
Crash course on claim drafting (with exercises)Crash course on claim drafting (with exercises)
Crash course on claim drafting (with exercises)
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
 
semiconductor protection act
semiconductor protection actsemiconductor protection act
semiconductor protection act
 
Copyright and fair use
Copyright and fair useCopyright and fair use
Copyright and fair use
 
Copyright Law
Copyright LawCopyright Law
Copyright Law
 
Technology in Workplace
Technology in WorkplaceTechnology in Workplace
Technology in Workplace
 
Artificial intelligence and ipr
Artificial intelligence  and iprArtificial intelligence  and ipr
Artificial intelligence and ipr
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
 
International Telecommunication Laws-PPT
International Telecommunication Laws-PPTInternational Telecommunication Laws-PPT
International Telecommunication Laws-PPT
 
Copyright Protection for Philippine Publications
Copyright Protection for Philippine PublicationsCopyright Protection for Philippine Publications
Copyright Protection for Philippine Publications
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Professional societies
Professional societiesProfessional societies
Professional societies
 
Ai copyright: ownership and liability
Ai copyright: ownership and liabilityAi copyright: ownership and liability
Ai copyright: ownership and liability
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Copyright issues in digital media
Copyright issues in digital mediaCopyright issues in digital media
Copyright issues in digital media
 
AN INTRODUCTION TO EMERGING TECHNOLOGY
AN INTRODUCTION TO EMERGING TECHNOLOGYAN INTRODUCTION TO EMERGING TECHNOLOGY
AN INTRODUCTION TO EMERGING TECHNOLOGY
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 

Similar to IP Rights and Responsibilities in IT

Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentationMihreteab F
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics pptWulax37
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docxBestMan28
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPRNeil Witt
 
Protecting Innovation
Protecting InnovationProtecting Innovation
Protecting InnovationTafa Ulfayza
 
Design and Engineering-Module-6: Internet of Things, IPR, Product Liability
Design and Engineering-Module-6: Internet of Things, IPR, Product LiabilityDesign and Engineering-Module-6: Internet of Things, IPR, Product Liability
Design and Engineering-Module-6: Internet of Things, IPR, Product LiabilityNaseel Ibnu Azeez
 
Certificado de conclusao mbe
Certificado de conclusao mbeCertificado de conclusao mbe
Certificado de conclusao mbeMurillo Silveira
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
Software Piracy Protection
Software Piracy ProtectionSoftware Piracy Protection
Software Piracy Protectionijtsrd
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxjameshagwen
 
ANALYTICAL-TOOLS-AND-COMPUTER-ETHICS.pptx
ANALYTICAL-TOOLS-AND-COMPUTER-ETHICS.pptxANALYTICAL-TOOLS-AND-COMPUTER-ETHICS.pptx
ANALYTICAL-TOOLS-AND-COMPUTER-ETHICS.pptxjustineguadayo1104
 
The Crucial Role of Intellectual Property for Startups.pdf
The Crucial Role of Intellectual Property for Startups.pdfThe Crucial Role of Intellectual Property for Startups.pdf
The Crucial Role of Intellectual Property for Startups.pdfMr. Business Magazine
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_finalnykobap01
 

Similar to IP Rights and Responsibilities in IT (20)

Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentation
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics ppt
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docx
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPR
 
Protecting Innovation
Protecting InnovationProtecting Innovation
Protecting Innovation
 
Design and Engineering-Module-6: Internet of Things, IPR, Product Liability
Design and Engineering-Module-6: Internet of Things, IPR, Product LiabilityDesign and Engineering-Module-6: Internet of Things, IPR, Product Liability
Design and Engineering-Module-6: Internet of Things, IPR, Product Liability
 
Certificado de conclusao mbe
Certificado de conclusao mbeCertificado de conclusao mbe
Certificado de conclusao mbe
 
MIS chap # 4.......
MIS chap # 4.......MIS chap # 4.......
MIS chap # 4.......
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
needforsecurity
needforsecurityneedforsecurity
needforsecurity
 
Software Piracy Protection
Software Piracy ProtectionSoftware Piracy Protection
Software Piracy Protection
 
MIS.pptx
MIS.pptxMIS.pptx
MIS.pptx
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptx
 
ANALYTICAL-TOOLS-AND-COMPUTER-ETHICS.pptx
ANALYTICAL-TOOLS-AND-COMPUTER-ETHICS.pptxANALYTICAL-TOOLS-AND-COMPUTER-ETHICS.pptx
ANALYTICAL-TOOLS-AND-COMPUTER-ETHICS.pptx
 
The Crucial Role of Intellectual Property for Startups.pdf
The Crucial Role of Intellectual Property for Startups.pdfThe Crucial Role of Intellectual Property for Startups.pdf
The Crucial Role of Intellectual Property for Startups.pdf
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
ME_Zagare.pptx
ME_Zagare.pptxME_Zagare.pptx
ME_Zagare.pptx
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
 

Recently uploaded

Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 

Recently uploaded (20)

Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 

IP Rights and Responsibilities in IT

  • 1. 04 – Part II [SOCIAL, PROFESSIONAL AND ETHICAL ISSUES IN INFORMATION TECHNOLOGY] ITec4142 – Creativity: Employer and Employee Rights in Information Technology Matters Page 15 A. Objectives 1. Understand the principle of intellectual property in the software development. 2. Aware on the limitations of an employee concerning intellectual property. 3. Gain knowledge on the nature of digital reliability and failure. 4. Define software and hardware representation and risk communication. 5. Conceptualize about the advancement of software technology and the complexity in computer system. 6. Explain the reasons for consistency in the development of a complex system. 7. Explain the purpose of “goofing off”. B. Development of Software: Who owns the intellectual property (IP)?  Intellectual property is an umbrella term for various types of rights individuals or businesses can have in their:  Names;  Creative Works; and  Inventions. Department of Information Technology  Software developers need a solid understanding of their rights to  Develop and protect a brand;  Ensure exclusive ownership of their creations; and  Keep their work confidential to create and maintain an advantage in this competitive market.
  • 2. 04 – Part II [SOCIAL, PROFESSIONAL AND ETHICAL ISSUES IN INFORMATION TECHNOLOGY] ITec4142 – Creativity: Employer and Employee Rights in Information Technology Matters Page 16  Patents - Software  A patent entitles an Inventor to exclude others from making, using or selling the claimed invention for a period of 20 years.  To obtain a patent, your software or algorithm must have a very high level of originality and you must disclose the “recipe” for your invention to the public.  A Software Developer can get a patent on software inventions much like a Mechanical Engineer can get a patent on a new machine or device.  Copyrights - Software  A copyright gives the Owner the exclusive right to make copies of the work, distribute copies of the work to the public, and create derivative works based on the software.  Copyright protection also lasts much longer than patent protection. However, you must keep in mind that to invoke these protections, your must file for and receive a copyright registration.  The key difference between a patent and a copyright is that while a patent can protect you from people who try to imitate your software.  Software copyrights have a narrower scope and will only protect you if someone copies actual executable or source code or graphics from your software.
  • 3. 04 – Part II [SOCIAL, PROFESSIONAL AND ETHICAL ISSUES IN INFORMATION TECHNOLOGY] ITec4142 – Creativity: Employer and Employee Rights in Information Technology Matters Page 17  Trademarking the Software & Company Name  A trademark is any word, name, symbol, or device used to indicate the source of goods or services.  Trademarks can be used to protect your company name or product name, domain names, images, symbols, logos, slogans, colors, product designs and product packaging. C. Reasonable Limitations On IP Ownership by An Employee  Patents  A couple applicable exceptions (limitation) to this general rule under the common law: Registering your trademark will help you prevent others from using your mark in a way that might confuse customers or damage your business reputation.
  • 4. 04 – Part II [SOCIAL, PROFESSIONAL AND ETHICAL ISSUES IN INFORMATION TECHNOLOGY] ITec4142 – Creativity: Employer and Employee Rights in Information Technology Matters Page 18  Employer – Specified Inventions – Inventions made by employees at the employer’s request and expense, and which are considered the property of employer.  Shop Right Rule – An employer is not entitled to ownership of the invention but retains a nonexclusive right, akin to a license, to make use of the invention.  Copyrights  A form of protection provided by the laws to the Authors of original works of authorship, including literary, dramatic, musical, artistic, and certain other intellectual works.  The Author of a work owns the copyright unless:  There is a written agreement assigning the copyright to someone else or the work was “made for hire.” A “work made for hire”. D. The Nature of Digital Reliability and Failure  Information and communication technology (ICT) by its nature is to generate information.  Normally accrues when the employee made use of employer resources or property in making or perfecting the invention, and the scope of the shop right will be a fact-dependent on the extent of the employer’s resource contribution.  Employers can avoid these defaults by requiring employees to sign preinvention assignment agreements require the employee to assign their patent rights to the employer.
  • 5. 04 – Part II [SOCIAL, PROFESSIONAL AND ETHICAL ISSUES IN INFORMATION TECHNOLOGY] ITec4142 – Creativity: Employer and Employee Rights in Information Technology Matters Page 19  Information generated by ICT is either informative or non-informative.  Anchored with employer and employee’s rights depends on the proper management of the information.  Workplace monitoring can be beneficial for an organization to obtain productivity and efficiency from its employees (Bezek, Britton, 2001).  While computers are often essential work tools, giving employees open, unmonitored, computer access causes productivity and efficiency to suffer. There has to be a balance between protecting the company’s information assets without going overboard to the point where employees feel alienated.  Education and communication are the best tools to attain this balance. Educate workers to let them know what monitoring is, what it will monitor, and convey the message that this monitoring is not due to lack of trust, but is being used to protect the company.
  • 6. 04 – Part II [SOCIAL, PROFESSIONAL AND ETHICAL ISSUES IN INFORMATION TECHNOLOGY] ITec4142 – Creativity: Employer and Employee Rights in Information Technology Matters Page 20 E. Software and Hardware Representation and Risk Communication – Who is responsible?  Providing appropriate software and hardware utilization in the workplace contribute advantages to both employee and employer.  Inappropriate utilization of software and hardware could compromise productivity of an employee and employer or the company as a whole.  The responsibility lies on both, the employee and the employer. There should be proper and appropriate communication and usage of its technologies suited to the workplace and field of expertise in the productivity in the assigned task to its employees. F. From Medical Software to “Star Wars” and The Complexity of Computer Systems  The implementation of software technology advancement in the field of medical areas is vital on its utilization in generating and providing reliable information to its patience and the credibility of the medical institution as a whole.  Workers in the medical areas are responsible in providing accurate and informative information based on specific findings through complete analysis.
  • 7. 04 – Part II [SOCIAL, PROFESSIONAL AND ETHICAL ISSUES IN INFORMATION TECHNOLOGY] ITec4142 – Creativity: Employer and Employee Rights in Information Technology Matters Page 21  Continuous training to both medical workers and owners are encourage for better implementation, utilization and in providing of informative information anchored with the complexity of its system technology. G. Origins of the Computer Professionals for Social Responsibility: What is reasonable reliability in complex system  Complicated system’s developers should have narrow and complete knowledge in the development process.  Obtaining consistency in generating accurate information, designing centralize information, accessing rapid information and capable in updating new information is very much vital.  Address end-users with the proper and complete training for better accessibility and usability in providing informative information. H. Goofing Off: Who owns the “Easter eggs”? and Why are they tolerated?  Company owners provide “goofing off” in the purpose of strengthening camaraderie in the workplace and escaping from exhausted working environment through excursion activity.
  • 8. 04 – Part II [SOCIAL, PROFESSIONAL AND ETHICAL ISSUES IN INFORMATION TECHNOLOGY] ITec4142 – Creativity: Employer and Employee Rights in Information Technology Matters Page 22  Goofing off has been shown to improve work or study in the right environments, and can relieve stress. I. References 1. http://www.cems.uwe.ac.uk/~pchatter/2011/pepi/The_Handbook_of_Information_an d_Computer_Ethics.pdf 2. http://shop.bcs.org/resources/pdf/9781780171807.pdf