SlideShare a Scribd company logo
1 of 47
PROGRAM STUDI PENDIDIKAN ILMU KOMPUTER
FAKULTAS PENDIDIKAN MATEMATIKA DAN ILMU PENGETAHUAN ALAM
UNIVERSITAS PENDIDIKAN INDONESIA
2014
KELOMPOK 5
Asep Zaenuri
Bunga Pujawari
Dipa Dwinanda Djamal
Muhammad Bukhori
INTELECTUAL PROPERTY
Design background by| Imagination of little fairy | @2014
The intellectual property is an asset for any production
intelligence thinking like technology, science, art, literature, song
composition, writing, caricature, and others that are useful to
humans.
Design background by| Imagination of little fairy | @2014
INTELECTUAL PROPERTY
What is This
?
01
The recording industry Assocation of America (RIAA) on the
trade group that represents the U.S. recording industry. Its
members create, manufacture, and distribute 85 percent of
legitimate sound recordings produced and sold in the United
States.
Here it is said that the Organization RIAA has been offered an
opportunity for the musical industry, to provide the opportunity
for online music production to be successful.
In addition, claims that every year the recording industry lost
about $ 5 billion and retailers lost about $ 1 billion worldwide
music of privacy.
Design background by| Imagination of little fairy | @2014
INTELECTUAL PROPERTY
02
laws on copyright, and patent
Software is sometimes treated as an expression of an idea,
which may be protected by copyright law, but also has been
treated as a process to change the internal structure of the
computer, making it eligible for protection under patent law.
Design background by| Imagination of little fairy | @2014
INTELECTUAL PROPERTY
03
Copyright is a legal term describing rights given to creators for
their literary and artistic works.
Copyright and paten protection was issued by the U.S.
Constitution, article I, section 8, clause 8, which determines that
cogress would have the power "to promote the progress of
science and useful arts, by securing for a limited time to authors
and inventors exlusive rights The above article and their
discovery. “
The court has a wide range of discretion in awarding damages of
$ 200 to $ 100,000 for violations of guilt deliberate infringement.
Design background by| Imagination of little fairy | @2014
INTELECTUAL PROPERTY
04
Copyright term
Since 1960, the term of copyright has been extended 11 times
the original limit of 28 years
To work created after January 1, 1978, copyright protection for
survival of the author plus 70 years.
Design background by| Imagination of little fairy | @2014
INTELECTUAL PROPERTY
05
The presence of Copyright Law
There are four factors that courts should consider when deciding
whether a particular use of the property and copyright fair can
be allowed without penalty:
• The purpose and character of the use,
• The nature of the copyrighted work
• The portion of the copyrighted work used in relation to the
work as a whole
• The effect of the use on the value of
the copyrighted work
Design background by| Imagination of little fairy | @2014
INTELECTUAL PROPERTY
06
Design background by| Imagination of little fairy | @2014
INTELECTUAL PROPERTY
Software Copyright protection
The use of copyright to protect computer software raises many
complex issues.
Among them:
For example, a manufacturer can observe the operation of the
program softwaare copyright competitors and then make the
program complete the same result and perform the same way.
In 2002, Lexmark filed suit against Static Control Components
(SCC),
07
Design background by| Imagination of little fairy | @2014
INTELECTUAL PROPERTY
Prioritizing Resources and Organization of
Intellectual Property (PRO - IP) Act of 2008
Prioritizing Resources and Organization of
Intellectual Property (PRO - IP) Act of 2008 says:
General Agreement on Tariffs and Trade (GATT)
08
Design background by| Imagination of little fairy | @2014
INTELECTUAL PROPERTY
Forms of
intellectual
property
Key terms of agreement
copyright Computer programs are protected as literary works . Authors of computer programs
and producers of sound recordings have the right to prohibit the commercial rental
to the public of their works .
Patent Patent protection is available for any inventions whether products or processes in all
fileds of technology without discrimination , subject to the normal tests of novelty ,
inventiveness and industrial applicability . It is also necessary that the patent is
available and patent rights enjoyable without discrimination to place the invention
and whether products are imported or locally produced
Trade
secret
Trade secrets and other types of confidential information that has commercial value
must be protected against breach of confidence and other acts contrary to
commercial practices honest . However , reasonable steps must be taken to keep the
information Secret .
09
The World Intellectual Property Orgainzation
(WIPO) Copyright Treaty (1996)
The World Intellectual Property Organization (WIPO),
headquartered in Geneva, Switzerland,
The WIPO Copyright Treatly is implemented in U.S. law through
the Digital Millennium Copyright Act (DCMA),
Design background by| Imagination of little fairy | @2014
INTELECTUAL PROPERTY
10
THE DIGITAL MILLENIUM Copyright act(1998)
The digital milennium copyright act(DMCA)was signed into law in
November 1998;it was writen to bring U.S. law into compliance
with the global copyright protection treaty from WIPO(World
Intellectual Property Organization)
Design background by| Imagination of little fairy | @2014
INTELECTUAL PROPERTY
11
The DMCA added new provisions,making it an offense to do the
following:
• Circumvent a technical protection.
• Develop and provide tools that allow others to access a
tecnologically protected work.
• Manufacture,import,provide,or traffic in tools that enable
others to circumvent protection and copy a protected work.
Design background by| Imagination of little fairy | @2014
12
INTELECTUAL PROPERTY
Violations of these provisions carry both civil and criminal
penalties,including up to five years in prison,a fine of up to
$500.000 for each offense,or both.
unlike traditional copyright law,the statute does not govern
copying.
although the DMCA explicitly outlaws tecnologies that can
defeat copyright protection devices,it does permit reverse
engineering for encryption,interoperability,and compture
security research.
Design background by| Imagination of little fairy | @2014
13
INTELECTUAL PROPERTY
Several cases brought under the DMCA have dealt with the use
of software to enable the copying of DVD movies.
for example,motion picture companies supported the
development and worldwide licensing of the content scramble
system,which enables a DVD player or a computer drive to
decrypt,unscramble,and play back motion pictures on DVDs,but
not copy them.
Design background by| Imagination of little fairy | @2014
14
INTELECTUAL PROPERTY
However,a software program called DeCSS can break the
encryption code and enable users to copy DVDs.
Opponents of DMCA say that it gives holders of intellectual
property so much power that it actually restricts the free flow of
information.
under DMCA,internet service providers(ISPs) are required to
remove access to WEB sites that allegedly break copyright law-
even before infringement has been proven
Design background by| Imagination of little fairy | @2014
15
INTELECTUAL PROPERTY
Pattents
a patens is grant of property right issued by the united states
patent and trademark office to an inventor.a patent permits its
owner to exclude the public from making,using,or selling a
protected invention,and it allows for legal action against
violators.unlike a copyright,a patent prevents independent
creation as well as copying
Design background by| Imagination of little fairy | @2014
16
INTELECTUAL PROPERTY
The main body of law that governs patents is contained in title
35 of the U.S.code,which states that an invention must pass the
following four tests to be eligible for a patent :
1. it must fall into one of five statutory classses of items that can
be patented:
(1)processes
(2)machines
(3)manufactures(such as objects made by human or machines),
(4)compositions of matter(such as chemical compounds),and
(5)new uses in any of the previous four classes).
Design background by| Imagination of little fairy | @2014
17
INTELECTUAL PROPERTY
2.it must be useful
3.it must be novel.
4.it must not be obvious to a person having ordinary skill in the
same field..
Patent infringement,or the violation of the rights secured by the
owner of patent,occurs when someone makes unauthorized use
of another’s patent.
Design background by| Imagination of little fairy | @2014
18
INTELECTUAL PROPERTY
SOFTWARE PATENTS
A software patent claims as its invention some feature or
process embodied in instructions executed by a
computer.
Since the early 1980s,the USPTO has granted as many as
2000 software-related patents per year.
Applications software,business software,expert
systems,and system sotfware have been patented,as well
as such software processes as complation routines editing
and control function,and operating system
techniques.Even electronic font types and icons have
been patented.
Design background by| Imagination of little fairy | @2014
19
INTELECTUAL PROPERTY
SOFTWARE CROSS-LICENSING AGREEMENTS
Many large software companies have cross-licensing agreements
in which each party agrees not to sue the other over patent
infringement
DEFENSIVE PUBLISHING AND PATENT TROLLS
inventors sometimes employ a tratic called defensive publishing
asan alternative to filing for patents.
A patent troll is a firm that acquires patents with no intention of
manufacturing anything,instead licensing the patents to others
Design background by| Imagination of little fairy | @2014
20
INTELECTUAL PROPERTY
PATENTS AND PATEN FARMING
A standard is a definition that has been approved by a
recognised standards organization or accepted as a de facto
standard within a particular industry.
Design background by| Imagination of little fairy | @2014
21
INTELECTUAL PROPERTY
TRADE SECRETS
a trade secret was defined as business information that
represent something of economic value,has required effort or
cost to develop,has some degree of uniqueness or novely,is
generally unknown to the public,and is kept confidential.
Design background by| Imagination of little fairy | @2014
22
INTELECTUAL PROPERTY
TRADE SECRET LAWS
• Uniform Trade secrets Act(UTSA)
The uniform trade secrets Act(UTSA)was drafted in the
1970s to bring niformity to all states in the ares of trade
secret law.The first state to enact the USTA was
Minnesota in 1981,followed by 39 more states and the
district of Columbia.The UTSA defines a trade secret as
“information,including a
formula,pattern,compilation,program,device,method,tec
hnique,or process,that:
Design background by| Imagination of little fairy | @2014
23
INTELECTUAL PROPERTY
• The Economic Espionage Act(EEA)(1996)
The economic espionage act(EEA)of 1996 imposes
penalties of up to $10 million and 15 years in prison
for theft of tade secrets.
Design background by| Imagination of little fairy | @2014
24
INTELECTUAL PROPERTY
KEY INTELLECTUAL PROPERTY ISSUES
• Plagiarism
• Reverse Engineering
• Open source code
• Competitive intelligence
• Cybersquatting
Design background by| Imagination of little fairy | @2014
25
INTELECTUAL PROPERTY
PLAGIARISM
Design background by| Imagination of little fairy | @2014
26
INTELECTUAL PROPERTY
Plagiarism
• Plagiarism is the act of stealing someone's ideas or words
and passing them off as one's own.
• The growth of electronic content and the growth of the Web
have made it easy to cut, copy and paste paragraphs into
term papers and other documents without proper citation or
quotation marks.
Design background by| Imagination of little fairy | @2014
27
INTELECTUAL PROPERTY
Plagiarism is also common outside
academia.......
Reporter Jayson Blair resigned from the New York Times after he
was accused of plagiarism and fabricating quotes and other
information in news stories. Executive Editor Howell Raines and
Managing Editor Gerald Boyd also resigned in the fallout from
the scandal.
Design background by| Imagination of little fairy | @2014
28
INTELECTUAL PROPERTY
Partial list of plagiarism detection services and
software:
Design background by| Imagination of little fairy | @2014
29
INTELECTUAL PROPERTY
Name of service Web site Provider
•iThenticate •Www.ithenticate.com •iParadigms
•Turnitin •Www.turnitin.com •iParadigms
•SafeAssign •Www.SafeAssign.com •Blackboard
•Glatt Plagiarism
Services
•Www.plagiarism.com •Glatt Plagiarism Services
•EVE Plagiarism
Detection
•Www.canexus.com/eve •caNexus
Relationship
Activities of plagiarism and relationship with the professional
ethics of human performance itself is not to imitate the work of
others in their work.
Design background by| Imagination of little fairy | @2014
30
INTELECTUAL PROPERTY
Design background by| Imagination of little fairy | @2014
31
INTELECTUAL PROPERTY
????
Reverse engineering is the process of taking something
apart in order to understand it, build a copy of it, or improve
it.
Design background by| Imagination of little fairy | @2014
32
INTELECTUAL PROPERTY
Reverse engineering was originally applied to computer
hardware but is now commonly applied to software as well.
Reverse engineering of software involves analyzing it to
create a new representation of the system in a different
form or at a higher level of abstraction.
Design background by| Imagination of little fairy | @2014
33
INTELECTUAL PROPERTY
Process reverse engineering
Design background by| Imagination of little fairy | @2014
34
INTELECTUAL PROPERTY
Relationship
In a professional ethics, issues related to reverse engineering
should be in line with the ethics of the profession. As the use of
reverse engineering with the goal of creating new products by
improving existing ideas, it's the same thing with crime
intellectual.
Design background by| Imagination of little fairy | @2014
35
INTELECTUAL PROPERTY
Open Source Code
Open source code is any program whose source code is
made available for use or modification, as users or other
developers see fit.
Design background by| Imagination of little fairy | @2014
36
INTELECTUAL PROPERTY
Commonly used open source software's
Open Source
Software
Purpose
7-Zip File compression
Ares Galaxy Peer-to-peer file sharing
Audacity Sound editing and special effects
Azureus Peer-to-peer file sharing
Blender 3D 3D modeling and animation
eMule Peer-to-peer file sharing
Eraser Erase data completely
Firefox Internet browser
OpenOffice Word processing, spreadsheets, presentations, graphics,
and databases
Video Dub Video editing
Design background by| Imagination of little fairy | @2014
37
INTELECTUAL PROPERTY
Competitive Intelligence
• Competitive intelligence is legally obtained information that is
gathered to help a company gain an advantage over its rival.
• Competitive intelligence is not the same as industrial
espionage,which employs illegal means to obtain business
information that is not readily available to the genera public
Design background by| Imagination of little fairy | @2014
38
INTELECTUAL PROPERTY
Data needed for competitive intellegence can
be colected from
• 10-K or annual reports
• An SG 13D acquisition
• 10-Q or quarterly reports
• Press releases
• Promotional materials
• Web sites
• Dun & Bradstreet credit reports
• Articles in the trade press
• Patents
39
INTELECTUAL PROPERTY
Design background by| Imagination of little fairy | @2014
By coupling this data with analytical tools and industry
expertise,an experienced analyst can make deduction that leda
to significant information.
Competitive intelligence gathering has become enough of a
sciencethat over two dozen colleges and universities offer
courses or entire program in this subject.
40
INTELECTUAL PROPERTY
Design background by| Imagination of little fairy | @2014
Competiive intellegence analysts must avoid
unethical or illegal actions
• Lying misrepresentation
• Theft
• Bribery
• Eavesdropping with legal device
41
INTELECTUAL PROPERTY
Design background by| Imagination of little fairy | @2014
Failure to act competitive intelegence can get
analysts and companies into serious trouble
Example:
Procter & Gamble (P&G) admitted publicly in 2001 that it
unethically gained information about Uniliver,its competitor in
the multibillion-dollar hair-care business.
42
INTELECTUAL PROPERTY
Design background by| Imagination of little fairy | @2014
Cybersquatters
• Cybersquatters register domain for famous trademarks or
company names to which they have no connection.
• The main tactic organizations use to circuvment
cybersquatting is to protect a trademark by registering
numerous domain names and variations as soon as they know
they want to develop a Web presence.
43
INTELECTUAL PROPERTY
Design background by| Imagination of little fairy | @2014
Design background by| Imagination of little fairy | @2014
INTELECTUAL PROPERTY
44

More Related Content

What's hot

IPR protection to computer softwares
IPR protection to computer softwaresIPR protection to computer softwares
IPR protection to computer softwaresShivani Sharma
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issuesatuljaybhaye
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual propertiesWendy Lile
 
Lesson4
Lesson4Lesson4
Lesson4Lyle
 
Ipr in cyberspace
Ipr in  cyberspaceIpr in  cyberspace
Ipr in cyberspacerkpv2002
 
Copyright in digital era
Copyright in digital eraCopyright in digital era
Copyright in digital eraSunil Saini
 
Intellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsIntellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsUpekha Vandebona
 
Overview of intellectual property rights
Overview of intellectual property rightsOverview of intellectual property rights
Overview of intellectual property rightsMathu Shan
 
Intellectual Property 101 - A Basic Guide to Understanding IP.
Intellectual Property 101 - A Basic Guide to Understanding IP.Intellectual Property 101 - A Basic Guide to Understanding IP.
Intellectual Property 101 - A Basic Guide to Understanding IP.Ashley Long
 
Copyright Registration in India
Copyright Registration in IndiaCopyright Registration in India
Copyright Registration in IndiaIntepat IP
 
presentation on trademark and copyright
presentation on trademark and copyrightpresentation on trademark and copyright
presentation on trademark and copyrightAjay Langeh
 
Understanding Intellectual Property Rights
Understanding Intellectual Property RightsUnderstanding Intellectual Property Rights
Understanding Intellectual Property Rights726anne
 
Copyright disclaimer
Copyright disclaimerCopyright disclaimer
Copyright disclaimerVakilsearch
 
Intellectual property Rights
Intellectual property RightsIntellectual property Rights
Intellectual property RightsManojKumar6080
 
intellectual property rights
intellectual property rightsintellectual property rights
intellectual property rightsmam141931
 
Societal impacts PART 1
Societal impacts PART 1Societal impacts PART 1
Societal impacts PART 1AVISHITYAGI
 

What's hot (19)

IPR protection to computer softwares
IPR protection to computer softwaresIPR protection to computer softwares
IPR protection to computer softwares
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
 
Lesson4
Lesson4Lesson4
Lesson4
 
Ipr in cyberspace
Ipr in  cyberspaceIpr in  cyberspace
Ipr in cyberspace
 
Copyright in digital era
Copyright in digital eraCopyright in digital era
Copyright in digital era
 
Intellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsIntellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and Copyrights
 
Overview of intellectual property rights
Overview of intellectual property rightsOverview of intellectual property rights
Overview of intellectual property rights
 
Copyright law
Copyright law Copyright law
Copyright law
 
Intellectual Property 101 - A Basic Guide to Understanding IP.
Intellectual Property 101 - A Basic Guide to Understanding IP.Intellectual Property 101 - A Basic Guide to Understanding IP.
Intellectual Property 101 - A Basic Guide to Understanding IP.
 
Copyright Registration in India
Copyright Registration in IndiaCopyright Registration in India
Copyright Registration in India
 
presentation on trademark and copyright
presentation on trademark and copyrightpresentation on trademark and copyright
presentation on trademark and copyright
 
Understanding Intellectual Property Rights
Understanding Intellectual Property RightsUnderstanding Intellectual Property Rights
Understanding Intellectual Property Rights
 
Copyright
CopyrightCopyright
Copyright
 
Copyright disclaimer
Copyright disclaimerCopyright disclaimer
Copyright disclaimer
 
Intellectual property Rights
Intellectual property RightsIntellectual property Rights
Intellectual property Rights
 
intellectual property rights
intellectual property rightsintellectual property rights
intellectual property rights
 
Societal impacts PART 1
Societal impacts PART 1Societal impacts PART 1
Societal impacts PART 1
 

Similar to Etika profesi

Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual PropertySaqib Raza
 
Lecture-8- IP rights.pptx
Lecture-8- IP rights.pptxLecture-8- IP rights.pptx
Lecture-8- IP rights.pptxSibghat4
 
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)Toshi Mahto
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rightsKomal Sahu
 
Copyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsCopyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsMartha Hardy
 
Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations121487
 
Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations121487
 
On Software Patenting
On Software PatentingOn Software Patenting
On Software PatentingDong Calmada
 
Conclusion
ConclusionConclusion
ConclusionHitmanD
 
Overview
OverviewOverview
OverviewHitmanD
 
Copyright Protection
Copyright ProtectionCopyright Protection
Copyright ProtectionGrittyCC
 
2008 07 30 Legal Issues In Open Source
2008 07 30 Legal Issues In Open Source2008 07 30 Legal Issues In Open Source
2008 07 30 Legal Issues In Open SourceReb Thomas
 
Society_law_and_ethics.pdf
Society_law_and_ethics.pdfSociety_law_and_ethics.pdf
Society_law_and_ethics.pdfManyaThakur12
 
Intellectaul property right
Intellectaul property rightIntellectaul property right
Intellectaul property rightkoach1787
 
Full Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfFull Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfNeelHope
 
Copyright in video
Copyright in videoCopyright in video
Copyright in videoBob182003
 

Similar to Etika profesi (20)

Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual Property
 
Lecture-8- IP rights.pptx
Lecture-8- IP rights.pptxLecture-8- IP rights.pptx
Lecture-8- IP rights.pptx
 
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
Copyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsCopyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative Commons
 
Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations
 
Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations
 
On Software Patenting
On Software PatentingOn Software Patenting
On Software Patenting
 
Conclusion
ConclusionConclusion
Conclusion
 
Overview
OverviewOverview
Overview
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Copyright Protection
Copyright ProtectionCopyright Protection
Copyright Protection
 
2008 07 30 Legal Issues In Open Source
2008 07 30 Legal Issues In Open Source2008 07 30 Legal Issues In Open Source
2008 07 30 Legal Issues In Open Source
 
Society_law_and_ethics.pdf
Society_law_and_ethics.pdfSociety_law_and_ethics.pdf
Society_law_and_ethics.pdf
 
P 1
P 1P 1
P 1
 
Chapter 6_dp-pertemuan_9
 Chapter 6_dp-pertemuan_9 Chapter 6_dp-pertemuan_9
Chapter 6_dp-pertemuan_9
 
Intellectaul property right
Intellectaul property rightIntellectaul property right
Intellectaul property right
 
IP Protection in the USA
IP Protection in the USAIP Protection in the USA
IP Protection in the USA
 
Full Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfFull Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdf
 
Copyright in video
Copyright in videoCopyright in video
Copyright in video
 

Recently uploaded

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

Etika profesi

  • 1. PROGRAM STUDI PENDIDIKAN ILMU KOMPUTER FAKULTAS PENDIDIKAN MATEMATIKA DAN ILMU PENGETAHUAN ALAM UNIVERSITAS PENDIDIKAN INDONESIA 2014
  • 2. KELOMPOK 5 Asep Zaenuri Bunga Pujawari Dipa Dwinanda Djamal Muhammad Bukhori
  • 3. INTELECTUAL PROPERTY Design background by| Imagination of little fairy | @2014
  • 4. The intellectual property is an asset for any production intelligence thinking like technology, science, art, literature, song composition, writing, caricature, and others that are useful to humans. Design background by| Imagination of little fairy | @2014 INTELECTUAL PROPERTY What is This ? 01
  • 5. The recording industry Assocation of America (RIAA) on the trade group that represents the U.S. recording industry. Its members create, manufacture, and distribute 85 percent of legitimate sound recordings produced and sold in the United States. Here it is said that the Organization RIAA has been offered an opportunity for the musical industry, to provide the opportunity for online music production to be successful. In addition, claims that every year the recording industry lost about $ 5 billion and retailers lost about $ 1 billion worldwide music of privacy. Design background by| Imagination of little fairy | @2014 INTELECTUAL PROPERTY 02
  • 6. laws on copyright, and patent Software is sometimes treated as an expression of an idea, which may be protected by copyright law, but also has been treated as a process to change the internal structure of the computer, making it eligible for protection under patent law. Design background by| Imagination of little fairy | @2014 INTELECTUAL PROPERTY 03
  • 7. Copyright is a legal term describing rights given to creators for their literary and artistic works. Copyright and paten protection was issued by the U.S. Constitution, article I, section 8, clause 8, which determines that cogress would have the power "to promote the progress of science and useful arts, by securing for a limited time to authors and inventors exlusive rights The above article and their discovery. “ The court has a wide range of discretion in awarding damages of $ 200 to $ 100,000 for violations of guilt deliberate infringement. Design background by| Imagination of little fairy | @2014 INTELECTUAL PROPERTY 04
  • 8. Copyright term Since 1960, the term of copyright has been extended 11 times the original limit of 28 years To work created after January 1, 1978, copyright protection for survival of the author plus 70 years. Design background by| Imagination of little fairy | @2014 INTELECTUAL PROPERTY 05
  • 9. The presence of Copyright Law There are four factors that courts should consider when deciding whether a particular use of the property and copyright fair can be allowed without penalty: • The purpose and character of the use, • The nature of the copyrighted work • The portion of the copyrighted work used in relation to the work as a whole • The effect of the use on the value of the copyrighted work Design background by| Imagination of little fairy | @2014 INTELECTUAL PROPERTY 06
  • 10. Design background by| Imagination of little fairy | @2014 INTELECTUAL PROPERTY Software Copyright protection The use of copyright to protect computer software raises many complex issues. Among them: For example, a manufacturer can observe the operation of the program softwaare copyright competitors and then make the program complete the same result and perform the same way. In 2002, Lexmark filed suit against Static Control Components (SCC), 07
  • 11. Design background by| Imagination of little fairy | @2014 INTELECTUAL PROPERTY Prioritizing Resources and Organization of Intellectual Property (PRO - IP) Act of 2008 Prioritizing Resources and Organization of Intellectual Property (PRO - IP) Act of 2008 says: General Agreement on Tariffs and Trade (GATT) 08
  • 12. Design background by| Imagination of little fairy | @2014 INTELECTUAL PROPERTY Forms of intellectual property Key terms of agreement copyright Computer programs are protected as literary works . Authors of computer programs and producers of sound recordings have the right to prohibit the commercial rental to the public of their works . Patent Patent protection is available for any inventions whether products or processes in all fileds of technology without discrimination , subject to the normal tests of novelty , inventiveness and industrial applicability . It is also necessary that the patent is available and patent rights enjoyable without discrimination to place the invention and whether products are imported or locally produced Trade secret Trade secrets and other types of confidential information that has commercial value must be protected against breach of confidence and other acts contrary to commercial practices honest . However , reasonable steps must be taken to keep the information Secret . 09
  • 13. The World Intellectual Property Orgainzation (WIPO) Copyright Treaty (1996) The World Intellectual Property Organization (WIPO), headquartered in Geneva, Switzerland, The WIPO Copyright Treatly is implemented in U.S. law through the Digital Millennium Copyright Act (DCMA), Design background by| Imagination of little fairy | @2014 INTELECTUAL PROPERTY 10
  • 14. THE DIGITAL MILLENIUM Copyright act(1998) The digital milennium copyright act(DMCA)was signed into law in November 1998;it was writen to bring U.S. law into compliance with the global copyright protection treaty from WIPO(World Intellectual Property Organization) Design background by| Imagination of little fairy | @2014 INTELECTUAL PROPERTY 11
  • 15. The DMCA added new provisions,making it an offense to do the following: • Circumvent a technical protection. • Develop and provide tools that allow others to access a tecnologically protected work. • Manufacture,import,provide,or traffic in tools that enable others to circumvent protection and copy a protected work. Design background by| Imagination of little fairy | @2014 12 INTELECTUAL PROPERTY
  • 16. Violations of these provisions carry both civil and criminal penalties,including up to five years in prison,a fine of up to $500.000 for each offense,or both. unlike traditional copyright law,the statute does not govern copying. although the DMCA explicitly outlaws tecnologies that can defeat copyright protection devices,it does permit reverse engineering for encryption,interoperability,and compture security research. Design background by| Imagination of little fairy | @2014 13 INTELECTUAL PROPERTY
  • 17. Several cases brought under the DMCA have dealt with the use of software to enable the copying of DVD movies. for example,motion picture companies supported the development and worldwide licensing of the content scramble system,which enables a DVD player or a computer drive to decrypt,unscramble,and play back motion pictures on DVDs,but not copy them. Design background by| Imagination of little fairy | @2014 14 INTELECTUAL PROPERTY
  • 18. However,a software program called DeCSS can break the encryption code and enable users to copy DVDs. Opponents of DMCA say that it gives holders of intellectual property so much power that it actually restricts the free flow of information. under DMCA,internet service providers(ISPs) are required to remove access to WEB sites that allegedly break copyright law- even before infringement has been proven Design background by| Imagination of little fairy | @2014 15 INTELECTUAL PROPERTY
  • 19. Pattents a patens is grant of property right issued by the united states patent and trademark office to an inventor.a patent permits its owner to exclude the public from making,using,or selling a protected invention,and it allows for legal action against violators.unlike a copyright,a patent prevents independent creation as well as copying Design background by| Imagination of little fairy | @2014 16 INTELECTUAL PROPERTY
  • 20. The main body of law that governs patents is contained in title 35 of the U.S.code,which states that an invention must pass the following four tests to be eligible for a patent : 1. it must fall into one of five statutory classses of items that can be patented: (1)processes (2)machines (3)manufactures(such as objects made by human or machines), (4)compositions of matter(such as chemical compounds),and (5)new uses in any of the previous four classes). Design background by| Imagination of little fairy | @2014 17 INTELECTUAL PROPERTY
  • 21. 2.it must be useful 3.it must be novel. 4.it must not be obvious to a person having ordinary skill in the same field.. Patent infringement,or the violation of the rights secured by the owner of patent,occurs when someone makes unauthorized use of another’s patent. Design background by| Imagination of little fairy | @2014 18 INTELECTUAL PROPERTY
  • 22. SOFTWARE PATENTS A software patent claims as its invention some feature or process embodied in instructions executed by a computer. Since the early 1980s,the USPTO has granted as many as 2000 software-related patents per year. Applications software,business software,expert systems,and system sotfware have been patented,as well as such software processes as complation routines editing and control function,and operating system techniques.Even electronic font types and icons have been patented. Design background by| Imagination of little fairy | @2014 19 INTELECTUAL PROPERTY
  • 23. SOFTWARE CROSS-LICENSING AGREEMENTS Many large software companies have cross-licensing agreements in which each party agrees not to sue the other over patent infringement DEFENSIVE PUBLISHING AND PATENT TROLLS inventors sometimes employ a tratic called defensive publishing asan alternative to filing for patents. A patent troll is a firm that acquires patents with no intention of manufacturing anything,instead licensing the patents to others Design background by| Imagination of little fairy | @2014 20 INTELECTUAL PROPERTY
  • 24. PATENTS AND PATEN FARMING A standard is a definition that has been approved by a recognised standards organization or accepted as a de facto standard within a particular industry. Design background by| Imagination of little fairy | @2014 21 INTELECTUAL PROPERTY
  • 25. TRADE SECRETS a trade secret was defined as business information that represent something of economic value,has required effort or cost to develop,has some degree of uniqueness or novely,is generally unknown to the public,and is kept confidential. Design background by| Imagination of little fairy | @2014 22 INTELECTUAL PROPERTY
  • 26. TRADE SECRET LAWS • Uniform Trade secrets Act(UTSA) The uniform trade secrets Act(UTSA)was drafted in the 1970s to bring niformity to all states in the ares of trade secret law.The first state to enact the USTA was Minnesota in 1981,followed by 39 more states and the district of Columbia.The UTSA defines a trade secret as “information,including a formula,pattern,compilation,program,device,method,tec hnique,or process,that: Design background by| Imagination of little fairy | @2014 23 INTELECTUAL PROPERTY
  • 27. • The Economic Espionage Act(EEA)(1996) The economic espionage act(EEA)of 1996 imposes penalties of up to $10 million and 15 years in prison for theft of tade secrets. Design background by| Imagination of little fairy | @2014 24 INTELECTUAL PROPERTY
  • 28. KEY INTELLECTUAL PROPERTY ISSUES • Plagiarism • Reverse Engineering • Open source code • Competitive intelligence • Cybersquatting Design background by| Imagination of little fairy | @2014 25 INTELECTUAL PROPERTY
  • 29. PLAGIARISM Design background by| Imagination of little fairy | @2014 26 INTELECTUAL PROPERTY
  • 30. Plagiarism • Plagiarism is the act of stealing someone's ideas or words and passing them off as one's own. • The growth of electronic content and the growth of the Web have made it easy to cut, copy and paste paragraphs into term papers and other documents without proper citation or quotation marks. Design background by| Imagination of little fairy | @2014 27 INTELECTUAL PROPERTY
  • 31. Plagiarism is also common outside academia....... Reporter Jayson Blair resigned from the New York Times after he was accused of plagiarism and fabricating quotes and other information in news stories. Executive Editor Howell Raines and Managing Editor Gerald Boyd also resigned in the fallout from the scandal. Design background by| Imagination of little fairy | @2014 28 INTELECTUAL PROPERTY
  • 32. Partial list of plagiarism detection services and software: Design background by| Imagination of little fairy | @2014 29 INTELECTUAL PROPERTY Name of service Web site Provider •iThenticate •Www.ithenticate.com •iParadigms •Turnitin •Www.turnitin.com •iParadigms •SafeAssign •Www.SafeAssign.com •Blackboard •Glatt Plagiarism Services •Www.plagiarism.com •Glatt Plagiarism Services •EVE Plagiarism Detection •Www.canexus.com/eve •caNexus
  • 33. Relationship Activities of plagiarism and relationship with the professional ethics of human performance itself is not to imitate the work of others in their work. Design background by| Imagination of little fairy | @2014 30 INTELECTUAL PROPERTY
  • 34. Design background by| Imagination of little fairy | @2014 31 INTELECTUAL PROPERTY ????
  • 35. Reverse engineering is the process of taking something apart in order to understand it, build a copy of it, or improve it. Design background by| Imagination of little fairy | @2014 32 INTELECTUAL PROPERTY
  • 36. Reverse engineering was originally applied to computer hardware but is now commonly applied to software as well. Reverse engineering of software involves analyzing it to create a new representation of the system in a different form or at a higher level of abstraction. Design background by| Imagination of little fairy | @2014 33 INTELECTUAL PROPERTY
  • 37. Process reverse engineering Design background by| Imagination of little fairy | @2014 34 INTELECTUAL PROPERTY
  • 38. Relationship In a professional ethics, issues related to reverse engineering should be in line with the ethics of the profession. As the use of reverse engineering with the goal of creating new products by improving existing ideas, it's the same thing with crime intellectual. Design background by| Imagination of little fairy | @2014 35 INTELECTUAL PROPERTY
  • 39. Open Source Code Open source code is any program whose source code is made available for use or modification, as users or other developers see fit. Design background by| Imagination of little fairy | @2014 36 INTELECTUAL PROPERTY
  • 40. Commonly used open source software's Open Source Software Purpose 7-Zip File compression Ares Galaxy Peer-to-peer file sharing Audacity Sound editing and special effects Azureus Peer-to-peer file sharing Blender 3D 3D modeling and animation eMule Peer-to-peer file sharing Eraser Erase data completely Firefox Internet browser OpenOffice Word processing, spreadsheets, presentations, graphics, and databases Video Dub Video editing Design background by| Imagination of little fairy | @2014 37 INTELECTUAL PROPERTY
  • 41. Competitive Intelligence • Competitive intelligence is legally obtained information that is gathered to help a company gain an advantage over its rival. • Competitive intelligence is not the same as industrial espionage,which employs illegal means to obtain business information that is not readily available to the genera public Design background by| Imagination of little fairy | @2014 38 INTELECTUAL PROPERTY
  • 42. Data needed for competitive intellegence can be colected from • 10-K or annual reports • An SG 13D acquisition • 10-Q or quarterly reports • Press releases • Promotional materials • Web sites • Dun & Bradstreet credit reports • Articles in the trade press • Patents 39 INTELECTUAL PROPERTY Design background by| Imagination of little fairy | @2014
  • 43. By coupling this data with analytical tools and industry expertise,an experienced analyst can make deduction that leda to significant information. Competitive intelligence gathering has become enough of a sciencethat over two dozen colleges and universities offer courses or entire program in this subject. 40 INTELECTUAL PROPERTY Design background by| Imagination of little fairy | @2014
  • 44. Competiive intellegence analysts must avoid unethical or illegal actions • Lying misrepresentation • Theft • Bribery • Eavesdropping with legal device 41 INTELECTUAL PROPERTY Design background by| Imagination of little fairy | @2014
  • 45. Failure to act competitive intelegence can get analysts and companies into serious trouble Example: Procter & Gamble (P&G) admitted publicly in 2001 that it unethically gained information about Uniliver,its competitor in the multibillion-dollar hair-care business. 42 INTELECTUAL PROPERTY Design background by| Imagination of little fairy | @2014
  • 46. Cybersquatters • Cybersquatters register domain for famous trademarks or company names to which they have no connection. • The main tactic organizations use to circuvment cybersquatting is to protect a trademark by registering numerous domain names and variations as soon as they know they want to develop a Web presence. 43 INTELECTUAL PROPERTY Design background by| Imagination of little fairy | @2014
  • 47. Design background by| Imagination of little fairy | @2014 INTELECTUAL PROPERTY 44