SlideShare a Scribd company logo
1 of 44
IPR and Cyberspace
(Few case Studies)
 Let’s mute our microphones
 Please post your questions on the chat window.
 We will try to answer few of them in the time period…
 .. Rest our team will get back to you later
Some Housekeeping before we start…
 Why IPR and cyberspace linkage is important and why it is needed
now?
 Few Case Studies
 IPR Awareness
- Patents
- Copyrights
- Trade secrets
Learning Outcomes
 Read the link- 5 minutes
https://indiankanoon.org/doc/1741869/
https://www.wipo.int/amc/en/news/2020/cybersquatting_covid19.html
 Discuss
– Trademark Issues In Cyber Space
A domain name dispute arises when more than one individual believe
that they have the right to register a specific domain name. It arises
when a registered trademark is registered by another individual or
organization who is not the owner of trademark that is registered. All
domain name registrars must follow the ICANN's policy .Cybersquatting
is a type of domain name dispute. Cybersquatting is done when domain
names are registered, sold or trafficked-in with the intention to make
profit from the goodwill of someone else. It is a punishable act.
– Passing Off
Yahoo!, Inc. vs Akash Arora & Anr. on 19 February, 1999
 Read the link- 5 minutes
https://www.oppedahl.com/ac/complain.htm
https://www.netlitigation.com/netlitigation/cases/oppedahl.htm
 Discuss
– Meta-tagging Issues In Cyber Space
Meta tagging is a technique in which a word is inserted in the keywords
field of the site to increase the chances of a search engine returning the
site, even though the site may have nothing to do with the word which
was inserted. Infringement of trademark occurs when companies
include their own websites meta tags containing the names or
descriptions of other companies.
Oppedahl & Larson v. Advanced Concepts
 Read the link- 5 minutes
http://www.internetlibrary.com/cases/lib_case60.cfm
https://www.netlitigation.com/netlitigation/cases/shetland.htm
 Discuss
– The Shetland News's deep link to embedded pages of the Shetland
Times's web site, through the use of Times' web site's news headlines,
was held to be an act of copyright infringement under British law and an
injunction was issued for the same.
Shetland Times Ltd. v. Dr. Jonathan Wills and Zetnews Ltd.
 Read the link- 5 minutes
https://onlinelaw.wustl.edu/blog/case-study-am-records-inc-v-napster-inc/
https://www.copyright.gov/fair-use/summaries/a&mrecords-napster-
9thcir2001.pdf
 Discuss
– The infringement of copyright protection online is known as digital piracy, which involves the
uploading, streaming, downloading and sharing of copyrighted works (e.g., books, music, and films)
beyond authorization for access, use and distribution prescribed by law. A case in point was Napster,
an online platform that enabled the illegal distribution of music through peer-to-peer file sharing ( A&M
Records, Inc. v. Napster, Inc., 2001). Copyright infringement also occurred on other peer-to-peer file
sharing and Torrent sites (such as Kazaa, Limewire, and PirateBay), and cryptolockers (i.e., sites that
provide cloud storage and sharing services to clients; e.g., Megaupload) (Drath, 2012). Like other
forms of cyber-enabled intellectual property crime, digital piracy deprives the authors and publishers of
copyrighted works of economic returns on their creations, property and labour. For example, HBO (a
US channel network that requires viewers to pay to view content) experienced millions of dollars in lost
US revenue when episodes of one of its TV series, Game of Thrones, were leaked online for free
viewing (Denham, 2015).Scripts of Game of Thrones' episodes and the unaired episodes of the HBO
TV shows were also leaked online following a data breach that HBO experienced in 2017 (Gibbs,
2017).
digital piracy
Jugaad!!!
www.ipadventure.in
12
www.ipadventure.in
Slides designed by the team. I am distant associate for
this startup. Slides will be made available on slideshare:
IPR and PATENTS Day #...
13
14
https://ipindiaservices.gov.in/PublicSearch?aspxerrorpath=/PatentSearch/PatentSe
arch/ViewApplicationStatus
15
16
17
 Original Ideas, research Results
 A book or a novel protected by copyright
 Copyright need not be registered
 WIPO ( World Intellectual Property Organisation)
 patents, copyrights, trademarks, geographical indications, designs
IP- Intellectual Property
 GI- Darjiling Tea
 Adidas Shoe- Aesthestics plus functionality- No need to register
 Disney Character - register
 Trademarks- Logos
 Patent duration – 20 years from the date of application
IP- Intellectual Property
 Cyberwarfare refers to the use of digital attacks
– like computer viruses and hacking
– by one country to disrupt the vital computer systems of another, with
the aim of creating damage, death and destruction.
 Future wars will see hackers using computer code to attack an enemy's
infrastructure, fighting alongside troops using conventional weapons like
guns and missiles
 Threatmap: https://threatmap.checkpoint.com/
Cyber Warfare
Cyber Attack - Maersk
Cyber Attack - Maersk
Cyber Attack - Maersk
 Ethical Hacking
– Ethical hacking is used by cyber practitioners to find vulnerabilities
before an attacker is able to exploit them.
 Cyber Kill Chain Model
– Describes Phases of Targeted Cyber Attacks
– 7 Steps : Reconnaissance, Weaponization, Delivery, Exploit,
Installation, Command and Control, and Actions on Objectives
Ethical Hacking and Cyber Kill Chain
 Risk Evaluation to enterprise from array of vulnerabilities
 Prevent breaches once Malware is analyzed
 Ransomware
– type of malicious software (malware) used by cybercriminals to extort
money.
 WannaCry (Locker Ransomware)
– takes your data hostage, promising to return it if you pay a ransom.
– Attack took place in May 2017 for Microsoft OS systems
– The WannaCry ransomware attack hit around 230,000 computers
globally.
Malware Analysis and Vulnerability Assessment
Cybersecurity- Wannacry Ransomware
fake news has real consequences.
Social Media
Social Media
Social Media
 Almost all of the pictures or texts that are shared from unknown sources
from friends are created for advertising purposes and harvest of the
likeprofiles. The objective of social farming sites is to bring traffic to their
page and target viewers’ and their friends digital and demographic
profiles
 avoid adding their like, share or comment on a text or picture that comes
from friends who last shared the content and were not the originator
Social Media
 In 1981, he was charged with stealing computer manuals from Pacific
Bell. In 1982, he hacked the North American Defense Command
(NORAD), an achievement that inspired the 1983 film War Games
 In 1989, he hacked Digital Equipment Corporation's (DEC) network and
made copies of their software
 Because DEC was a leading computer manufacturer at the time, this act put
Mitnick on the map. He was later arrested, convicted and sent to prison. During
his conditional release, he hacked Pacific Bell's voicemail systems.
 https://www.linkedin.com/in/kevinmitnick/
Kevin Mitnick
 cybercrime- credit cards etc, cyber industrial espionage and cyber
warfare
 black hat and white hat hackers, darkweb
 Teenage, thrill, validation, adrenalin rush, power, idealism
 heightened sense of social injustice- hacktivist collectives like Anonymous
Hackers Mindset
 Hello there. My handle is 5NIP3R but the gang calls me 5R. I can’t remember when I got
into computers for the first time or when my addiction to the internet started. What I am sure
of is that during high school I found my inner hacker calling. Talking to other hackers in the
deep web, working to impress one another, made me realise the endless doors internet and
data can open. Knowledge is power, and the power is online. Although I started with small
hits, I built my experience through the years and decided to take it a step further.
 I did my studies in Behavioural Psychology. Understanding behaviours and patterns always
fascinated me. All that time, all my effort, paid off. Now, I consider myself a gentle master
hacker. People give hints about their lives all over the web; you just have to be patient,
curious and perseverant. Data that people see as meaningless happens to be gold when
analysed together. I’ll tell you a story about my most recent successful corporate hacking,
and how I pulled it off.
Inside the mind of a hacker
 I am a freelancer. I work here and there and I’m a hacker for amusement.
It makes me feel a bit like a superhero too. When I don’t like a brand or a
person, I hack them, I take revenge.
 The choice of target came by chance last time. I paid a multinational
company for a bundled service, and they ended up not presenting the
final product I was expecting, refusing to return the money I invested. So I
did what any good hacker would do. I returned home and suited up.
Inside the mind of a hacker
Ethical Dimension of cybercrimes
Ethical Dimension of cybercrimes
Ethical Dimension of cybercrimes

More Related Content

What's hot

Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright InfringementWCU_Becca
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual propertiesWendy Lile
 
Intellectual Property 101 - A Basic Guide to Understanding IP.
Intellectual Property 101 - A Basic Guide to Understanding IP.Intellectual Property 101 - A Basic Guide to Understanding IP.
Intellectual Property 101 - A Basic Guide to Understanding IP.Ashley Long
 
Cyberlaw overview presentation v2
Cyberlaw overview presentation v2Cyberlaw overview presentation v2
Cyberlaw overview presentation v2Mark Coatney
 
International legislation and uae legislation
International legislation and uae legislationInternational legislation and uae legislation
International legislation and uae legislationwritingessayz
 
Copyright
CopyrightCopyright
Copyrightesam123
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspacePanjab University
 
Societal impacts PART 1
Societal impacts PART 1Societal impacts PART 1
Societal impacts PART 1AVISHITYAGI
 
Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)ElaineLee
 
Intellectual Property in 2017
Intellectual Property in 2017Intellectual Property in 2017
Intellectual Property in 2017Robert Rankin
 
Moral rights infringement on online book publicity
Moral rights infringement on online book publicityMoral rights infringement on online book publicity
Moral rights infringement on online book publicityAlexander Decker
 
ETHICS05 - Intellectual Property
ETHICS05 - Intellectual PropertyETHICS05 - Intellectual Property
ETHICS05 - Intellectual PropertyMichael Heron
 
LWB486 Week 4 Copyright
LWB486 Week 4 CopyrightLWB486 Week 4 Copyright
LWB486 Week 4 CopyrightPeter Black
 
IPR protection to computer softwares
IPR protection to computer softwaresIPR protection to computer softwares
IPR protection to computer softwaresShivani Sharma
 

What's hot (20)

Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright Infringement
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
 
Intellectual Property 101 - A Basic Guide to Understanding IP.
Intellectual Property 101 - A Basic Guide to Understanding IP.Intellectual Property 101 - A Basic Guide to Understanding IP.
Intellectual Property 101 - A Basic Guide to Understanding IP.
 
Music Piracy
Music PiracyMusic Piracy
Music Piracy
 
Cyberlaw overview presentation v2
Cyberlaw overview presentation v2Cyberlaw overview presentation v2
Cyberlaw overview presentation v2
 
International legislation and uae legislation
International legislation and uae legislationInternational legislation and uae legislation
International legislation and uae legislation
 
Copyright
CopyrightCopyright
Copyright
 
Software copyright
Software copyrightSoftware copyright
Software copyright
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspace
 
Societal impacts PART 1
Societal impacts PART 1Societal impacts PART 1
Societal impacts PART 1
 
Copyright FAQ
Copyright FAQCopyright FAQ
Copyright FAQ
 
Intellectual Property 101
Intellectual Property 101Intellectual Property 101
Intellectual Property 101
 
Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)
 
Intellectual Property in 2017
Intellectual Property in 2017Intellectual Property in 2017
Intellectual Property in 2017
 
Etika profesi
Etika profesiEtika profesi
Etika profesi
 
Moral rights infringement on online book publicity
Moral rights infringement on online book publicityMoral rights infringement on online book publicity
Moral rights infringement on online book publicity
 
Copyright 2012
Copyright 2012Copyright 2012
Copyright 2012
 
ETHICS05 - Intellectual Property
ETHICS05 - Intellectual PropertyETHICS05 - Intellectual Property
ETHICS05 - Intellectual Property
 
LWB486 Week 4 Copyright
LWB486 Week 4 CopyrightLWB486 Week 4 Copyright
LWB486 Week 4 Copyright
 
IPR protection to computer softwares
IPR protection to computer softwaresIPR protection to computer softwares
IPR protection to computer softwares
 

Similar to Ipr in cyberspace

Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
CyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarCyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarElyssa Durant
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative mediaAnies Syahieda
 
Pirates are not confined to the caribbean.pdf
Pirates are not confined to the caribbean.pdfPirates are not confined to the caribbean.pdf
Pirates are not confined to the caribbean.pdfGurudev Basavaraj Goud
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
Software piracy
Software piracySoftware piracy
Software piracyTi-Sun
 

Similar to Ipr in cyberspace (15)

Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
CyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarCyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels Cyberwar
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative media
 
Pirates are not confined to the caribbean.pdf
Pirates are not confined to the caribbean.pdfPirates are not confined to the caribbean.pdf
Pirates are not confined to the caribbean.pdf
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
IPR & CYBER SECURITY.pptx
IPR & CYBER SECURITY.pptxIPR & CYBER SECURITY.pptx
IPR & CYBER SECURITY.pptx
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Internet(2)
Internet(2)Internet(2)
Internet(2)
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Software piracy
Software piracySoftware piracy
Software piracy
 

More from rkpv2002

ipr and patents
ipr and patentsipr and patents
ipr and patentsrkpv2002
 
IPR and Patent Prosecution
IPR and Patent ProsecutionIPR and Patent Prosecution
IPR and Patent Prosecutionrkpv2002
 
Design Thinking
Design ThinkingDesign Thinking
Design Thinkingrkpv2002
 
Entrepreneurship and Startup
Entrepreneurship and StartupEntrepreneurship and Startup
Entrepreneurship and Startuprkpv2002
 
Blockchain In Business
Blockchain In BusinessBlockchain In Business
Blockchain In Businessrkpv2002
 
Emerging Tech webinar
Emerging Tech webinarEmerging Tech webinar
Emerging Tech webinarrkpv2002
 
Predictive Analytics
Predictive AnalyticsPredictive Analytics
Predictive Analyticsrkpv2002
 
Predictive Analytics
Predictive AnalyticsPredictive Analytics
Predictive Analyticsrkpv2002
 
Decision trees
Decision treesDecision trees
Decision treesrkpv2002
 
Entrepreneurship and startups (Post Covid19 world)
Entrepreneurship and startups (Post Covid19 world)Entrepreneurship and startups (Post Covid19 world)
Entrepreneurship and startups (Post Covid19 world)rkpv2002
 
IPR and Patenting
IPR and PatentingIPR and Patenting
IPR and Patentingrkpv2002
 
IPR Awareness and patent Prosecution Day 5
IPR Awareness and patent Prosecution Day 5IPR Awareness and patent Prosecution Day 5
IPR Awareness and patent Prosecution Day 5rkpv2002
 
IPR Awareness and patent Prosecution Day 4
IPR Awareness and patent Prosecution Day 4IPR Awareness and patent Prosecution Day 4
IPR Awareness and patent Prosecution Day 4rkpv2002
 
IPR Awareness and patent Prosecution Day 3
IPR Awareness and patent Prosecution Day 3IPR Awareness and patent Prosecution Day 3
IPR Awareness and patent Prosecution Day 3rkpv2002
 
IPR Awareness and patent Prosecution Day 2
IPR Awareness and patent Prosecution Day 2IPR Awareness and patent Prosecution Day 2
IPR Awareness and patent Prosecution Day 2rkpv2002
 
IPR Awareness and patent Prosecution
IPR Awareness and patent ProsecutionIPR Awareness and patent Prosecution
IPR Awareness and patent Prosecutionrkpv2002
 
IPR and Patents
IPR and PatentsIPR and Patents
IPR and Patentsrkpv2002
 
startup ecosystem
startup ecosystemstartup ecosystem
startup ecosystemrkpv2002
 
Higher Education Opportunities in Foreign Universities
Higher Education Opportunities in Foreign UniversitiesHigher Education Opportunities in Foreign Universities
Higher Education Opportunities in Foreign Universitiesrkpv2002
 

More from rkpv2002 (20)

ipr and patents
ipr and patentsipr and patents
ipr and patents
 
IPR and Patent Prosecution
IPR and Patent ProsecutionIPR and Patent Prosecution
IPR and Patent Prosecution
 
Design Thinking
Design ThinkingDesign Thinking
Design Thinking
 
Entrepreneurship and Startup
Entrepreneurship and StartupEntrepreneurship and Startup
Entrepreneurship and Startup
 
Blockchain In Business
Blockchain In BusinessBlockchain In Business
Blockchain In Business
 
Emerging Tech webinar
Emerging Tech webinarEmerging Tech webinar
Emerging Tech webinar
 
Predictive Analytics
Predictive AnalyticsPredictive Analytics
Predictive Analytics
 
Predictive Analytics
Predictive AnalyticsPredictive Analytics
Predictive Analytics
 
Decision trees
Decision treesDecision trees
Decision trees
 
Entrepreneurship and startups (Post Covid19 world)
Entrepreneurship and startups (Post Covid19 world)Entrepreneurship and startups (Post Covid19 world)
Entrepreneurship and startups (Post Covid19 world)
 
IPR and Patenting
IPR and PatentingIPR and Patenting
IPR and Patenting
 
IPR Awareness and patent Prosecution Day 5
IPR Awareness and patent Prosecution Day 5IPR Awareness and patent Prosecution Day 5
IPR Awareness and patent Prosecution Day 5
 
IPR Awareness and patent Prosecution Day 4
IPR Awareness and patent Prosecution Day 4IPR Awareness and patent Prosecution Day 4
IPR Awareness and patent Prosecution Day 4
 
IPR Awareness and patent Prosecution Day 3
IPR Awareness and patent Prosecution Day 3IPR Awareness and patent Prosecution Day 3
IPR Awareness and patent Prosecution Day 3
 
IPR Awareness and patent Prosecution Day 2
IPR Awareness and patent Prosecution Day 2IPR Awareness and patent Prosecution Day 2
IPR Awareness and patent Prosecution Day 2
 
IPR Awareness and patent Prosecution
IPR Awareness and patent ProsecutionIPR Awareness and patent Prosecution
IPR Awareness and patent Prosecution
 
IPR and Patents
IPR and PatentsIPR and Patents
IPR and Patents
 
startup ecosystem
startup ecosystemstartup ecosystem
startup ecosystem
 
Higher Education Opportunities in Foreign Universities
Higher Education Opportunities in Foreign UniversitiesHigher Education Opportunities in Foreign Universities
Higher Education Opportunities in Foreign Universities
 
Grammar
GrammarGrammar
Grammar
 

Recently uploaded

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 

Recently uploaded (20)

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 

Ipr in cyberspace

  • 1. IPR and Cyberspace (Few case Studies)
  • 2.
  • 3.  Let’s mute our microphones  Please post your questions on the chat window.  We will try to answer few of them in the time period…  .. Rest our team will get back to you later Some Housekeeping before we start…
  • 4.  Why IPR and cyberspace linkage is important and why it is needed now?  Few Case Studies  IPR Awareness - Patents - Copyrights - Trade secrets Learning Outcomes
  • 5.  Read the link- 5 minutes https://indiankanoon.org/doc/1741869/ https://www.wipo.int/amc/en/news/2020/cybersquatting_covid19.html  Discuss – Trademark Issues In Cyber Space A domain name dispute arises when more than one individual believe that they have the right to register a specific domain name. It arises when a registered trademark is registered by another individual or organization who is not the owner of trademark that is registered. All domain name registrars must follow the ICANN's policy .Cybersquatting is a type of domain name dispute. Cybersquatting is done when domain names are registered, sold or trafficked-in with the intention to make profit from the goodwill of someone else. It is a punishable act. – Passing Off Yahoo!, Inc. vs Akash Arora & Anr. on 19 February, 1999
  • 6.  Read the link- 5 minutes https://www.oppedahl.com/ac/complain.htm https://www.netlitigation.com/netlitigation/cases/oppedahl.htm  Discuss – Meta-tagging Issues In Cyber Space Meta tagging is a technique in which a word is inserted in the keywords field of the site to increase the chances of a search engine returning the site, even though the site may have nothing to do with the word which was inserted. Infringement of trademark occurs when companies include their own websites meta tags containing the names or descriptions of other companies. Oppedahl & Larson v. Advanced Concepts
  • 7.  Read the link- 5 minutes http://www.internetlibrary.com/cases/lib_case60.cfm https://www.netlitigation.com/netlitigation/cases/shetland.htm  Discuss – The Shetland News's deep link to embedded pages of the Shetland Times's web site, through the use of Times' web site's news headlines, was held to be an act of copyright infringement under British law and an injunction was issued for the same. Shetland Times Ltd. v. Dr. Jonathan Wills and Zetnews Ltd.
  • 8.  Read the link- 5 minutes https://onlinelaw.wustl.edu/blog/case-study-am-records-inc-v-napster-inc/ https://www.copyright.gov/fair-use/summaries/a&mrecords-napster- 9thcir2001.pdf  Discuss – The infringement of copyright protection online is known as digital piracy, which involves the uploading, streaming, downloading and sharing of copyrighted works (e.g., books, music, and films) beyond authorization for access, use and distribution prescribed by law. A case in point was Napster, an online platform that enabled the illegal distribution of music through peer-to-peer file sharing ( A&M Records, Inc. v. Napster, Inc., 2001). Copyright infringement also occurred on other peer-to-peer file sharing and Torrent sites (such as Kazaa, Limewire, and PirateBay), and cryptolockers (i.e., sites that provide cloud storage and sharing services to clients; e.g., Megaupload) (Drath, 2012). Like other forms of cyber-enabled intellectual property crime, digital piracy deprives the authors and publishers of copyrighted works of economic returns on their creations, property and labour. For example, HBO (a US channel network that requires viewers to pay to view content) experienced millions of dollars in lost US revenue when episodes of one of its TV series, Game of Thrones, were leaked online for free viewing (Denham, 2015).Scripts of Game of Thrones' episodes and the unaired episodes of the HBO TV shows were also leaked online following a data breach that HBO experienced in 2017 (Gibbs, 2017). digital piracy
  • 11.
  • 12. 12 www.ipadventure.in Slides designed by the team. I am distant associate for this startup. Slides will be made available on slideshare: IPR and PATENTS Day #...
  • 13. 13
  • 15. 15
  • 16. 16
  • 17. 17
  • 18.
  • 19.  Original Ideas, research Results  A book or a novel protected by copyright  Copyright need not be registered  WIPO ( World Intellectual Property Organisation)  patents, copyrights, trademarks, geographical indications, designs IP- Intellectual Property
  • 20.  GI- Darjiling Tea  Adidas Shoe- Aesthestics plus functionality- No need to register  Disney Character - register  Trademarks- Logos  Patent duration – 20 years from the date of application IP- Intellectual Property
  • 21.
  • 22.  Cyberwarfare refers to the use of digital attacks – like computer viruses and hacking – by one country to disrupt the vital computer systems of another, with the aim of creating damage, death and destruction.  Future wars will see hackers using computer code to attack an enemy's infrastructure, fighting alongside troops using conventional weapons like guns and missiles  Threatmap: https://threatmap.checkpoint.com/ Cyber Warfare
  • 23.
  • 24. Cyber Attack - Maersk
  • 25. Cyber Attack - Maersk
  • 26. Cyber Attack - Maersk
  • 27.  Ethical Hacking – Ethical hacking is used by cyber practitioners to find vulnerabilities before an attacker is able to exploit them.  Cyber Kill Chain Model – Describes Phases of Targeted Cyber Attacks – 7 Steps : Reconnaissance, Weaponization, Delivery, Exploit, Installation, Command and Control, and Actions on Objectives Ethical Hacking and Cyber Kill Chain
  • 28.  Risk Evaluation to enterprise from array of vulnerabilities  Prevent breaches once Malware is analyzed  Ransomware – type of malicious software (malware) used by cybercriminals to extort money.  WannaCry (Locker Ransomware) – takes your data hostage, promising to return it if you pay a ransom. – Attack took place in May 2017 for Microsoft OS systems – The WannaCry ransomware attack hit around 230,000 computers globally. Malware Analysis and Vulnerability Assessment
  • 30.
  • 31. fake news has real consequences.
  • 35.  Almost all of the pictures or texts that are shared from unknown sources from friends are created for advertising purposes and harvest of the likeprofiles. The objective of social farming sites is to bring traffic to their page and target viewers’ and their friends digital and demographic profiles  avoid adding their like, share or comment on a text or picture that comes from friends who last shared the content and were not the originator Social Media
  • 36.
  • 37.  In 1981, he was charged with stealing computer manuals from Pacific Bell. In 1982, he hacked the North American Defense Command (NORAD), an achievement that inspired the 1983 film War Games  In 1989, he hacked Digital Equipment Corporation's (DEC) network and made copies of their software  Because DEC was a leading computer manufacturer at the time, this act put Mitnick on the map. He was later arrested, convicted and sent to prison. During his conditional release, he hacked Pacific Bell's voicemail systems.  https://www.linkedin.com/in/kevinmitnick/ Kevin Mitnick
  • 38.  cybercrime- credit cards etc, cyber industrial espionage and cyber warfare  black hat and white hat hackers, darkweb  Teenage, thrill, validation, adrenalin rush, power, idealism  heightened sense of social injustice- hacktivist collectives like Anonymous Hackers Mindset
  • 39.
  • 40.  Hello there. My handle is 5NIP3R but the gang calls me 5R. I can’t remember when I got into computers for the first time or when my addiction to the internet started. What I am sure of is that during high school I found my inner hacker calling. Talking to other hackers in the deep web, working to impress one another, made me realise the endless doors internet and data can open. Knowledge is power, and the power is online. Although I started with small hits, I built my experience through the years and decided to take it a step further.  I did my studies in Behavioural Psychology. Understanding behaviours and patterns always fascinated me. All that time, all my effort, paid off. Now, I consider myself a gentle master hacker. People give hints about their lives all over the web; you just have to be patient, curious and perseverant. Data that people see as meaningless happens to be gold when analysed together. I’ll tell you a story about my most recent successful corporate hacking, and how I pulled it off. Inside the mind of a hacker
  • 41.  I am a freelancer. I work here and there and I’m a hacker for amusement. It makes me feel a bit like a superhero too. When I don’t like a brand or a person, I hack them, I take revenge.  The choice of target came by chance last time. I paid a multinational company for a bundled service, and they ended up not presenting the final product I was expecting, refusing to return the money I invested. So I did what any good hacker would do. I returned home and suited up. Inside the mind of a hacker
  • 42. Ethical Dimension of cybercrimes
  • 43. Ethical Dimension of cybercrimes
  • 44. Ethical Dimension of cybercrimes