This document discusses various legal, privacy, and ethical issues related to computer security. It begins by explaining the differences between legal and ethical issues, noting that legal issues have definitive answers determined by others, while ethical issues require determining your own course of action. The document then provides overviews of intellectual property rights like copyrights, patents, and trademarks. It explains what types of works copyright protects, how long copyright lasts, and what constitutes infringement. It also discusses how patents protect inventions and processes, not ideas. Finally, the document compares key aspects of copyright, patent, and trade secret protection.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Presented by Paul Wilson, Director General of APNIC and Chair of APrIGF Multistakeholder Steering Group at the Asia Pacific Internet Leadership Program as part of 2016 APrIGF Taipei
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Presented by Paul Wilson, Director General of APNIC and Chair of APrIGF Multistakeholder Steering Group at the Asia Pacific Internet Leadership Program as part of 2016 APrIGF Taipei
This slides will provide viewers a complete understanding of all the different virtualization techniques.
The main reference for the presentation is taken from Mastering cloud computing By Rajkumar Buyya.
To Support Digital India, We are trying to enforce the security on the web and digital Information. This Slides provide you basic as well as advance knowledge of security model. Model covered in this slides are Chinese Wall, Clark-Wilson, Biba, Harrison-Ruzzo-Ullman Model, Bell-LaPadula Model etc.
Types of Access Control.
+ Background & Basics of Web App Security, The HTTP Protocol, Web.
+ Application Insecurities, OWASP Top 10 Vulnerabilities (XSS, SQL Injection, CSRF, etc.)
+ Web App Security Tools (Scanners, Fuzzers, etc), Remediation of Web App
+ Vulnerabilities, Web Application Audits and Risk Assessment.
Web Application Security 101 was conducted by:
Vaibhav Gupta, Vishal Ashtana, Sandeep Singh from Null.
Slides for my lecture "Software security: vulnerabilities, exploits and
possible countermeasures" I had been giving for Samsung Electronics in Suwon, Korea (South).
This slides will provide viewers a complete understanding of all the different virtualization techniques.
The main reference for the presentation is taken from Mastering cloud computing By Rajkumar Buyya.
To Support Digital India, We are trying to enforce the security on the web and digital Information. This Slides provide you basic as well as advance knowledge of security model. Model covered in this slides are Chinese Wall, Clark-Wilson, Biba, Harrison-Ruzzo-Ullman Model, Bell-LaPadula Model etc.
Types of Access Control.
+ Background & Basics of Web App Security, The HTTP Protocol, Web.
+ Application Insecurities, OWASP Top 10 Vulnerabilities (XSS, SQL Injection, CSRF, etc.)
+ Web App Security Tools (Scanners, Fuzzers, etc), Remediation of Web App
+ Vulnerabilities, Web Application Audits and Risk Assessment.
Web Application Security 101 was conducted by:
Vaibhav Gupta, Vishal Ashtana, Sandeep Singh from Null.
Slides for my lecture "Software security: vulnerabilities, exploits and
possible countermeasures" I had been giving for Samsung Electronics in Suwon, Korea (South).
01Introduction to Information Security.pptit160320737038
A distributed system is a collection of computer programs that utilize computational resources across multiple, separate computation nodes to achieve a common, shared goal. Distributed systems aim to remove bottlenecks or central points of failure from a system.
My Presentation on Career Opportunities in Cyber Security presented at the North Cap University during the course inauguration ceremony, where I talked about different career paths to get into the cyber security domain.
Presented by Dr Sam De Silva, partner at Nabarro to over 100 CEOs and Executives in London.
Explains what leaders should do immediately after becoming aware of a cyber attack, from a legal perspective.
When GDPR becomes law in a few months, it will be the most wide-ranging and stringent data protection initiative in history. To prepare for this sea change, most organizations have streamlined and detailed their information security policies; however, many are unaware that immature application security programs arguably pose the biggest threat of a data breach. This oft-forgotten piece of data protection puts organizations at risk of GDPR fines.
Attend this joint webinar with Security Innovation and Smarttech247 to learn practical tips on incorporating application security best practices into an InfoSec program to achieve GDPR compliance.
Topics include:
* Summary of GDPR key concepts
* Security of data processing in software and the CIA triad
* The people and process problem of GDPR: Governance
* Using Data Protection by Design for secure design and business logic
* Assessments to verify the security of processing
Presenters:
Roman Garber, Security Innovation
Edward Skraba, Smarttech247
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
2. Index
• Risk analysis
• Legal, Privacy & Ethical issues
• Computer Security: Protecting Programs and
Data
3. Security in System Development
• Risk Analysis & Management needs to be a
part of system development, not tacked on
afterwards
• Baskerville's three generations of methods
1st Generation: Checklists
Example: BS 7799 Part 1
2nd Generation: Mechanistic engineering methods
Example: this risk analysis method
3rd Generation: Integrated design
Not yet achieved
5. Definitions 1
The meanings of terms in this area is not universally
agreed. We will use the following
• Threat: Harm that can happen to an asset
• Impact: A measure of the seriousness of a threat
• Attack: A threatening event
• Attacker: The agent causing an attack (not
necessarily human)
• Vulnerability: a weakness in the system that
makes an attack more likely to succeed
• Risk: a quantified measure of the likelihood of a
threat being realised
6. Definitions 2
• Risk Analysis involves the identification and
assessment of the levels of risk, calculated from
the
– Values of assets
– Threats to the assets
– Their vulnerabilities and likelihood of exploitation
• Risk Management involves the identification,
selection and adoption of security measures
justified by
– The identified risks to assets
– The reduction of these risks to acceptable levels
7. Goals of Risk Analysis
• All assets have been identified
• All threats have been identified
– Their impact on assets has been valued
• All vulnerabilities have been identified and
assessed
8. Problems of Measuring Risk
Businesses normally wish to measure in money, but
• Many of the entities do not allow this
– Valuation of assets
• Value of data and in-house software - no market value
• Value of goodwill and customer confidence
– Likelihood of threats
• How relevant is past data to the calculation of future
probabilities?
– The nature of future attacks is unpredictable
– The actions of future attackers are unpredictable
– Measurement of benefit from security measures
• Problems with the difference of two approximate quantities
– How does an extra security measure affect a ~10-5 probability of
attack?
9. Risk Levels
• Precise monetary values give a false precision
• Better to use levels, e.g.
– High, Medium, Low
• High: major impact on the organisation
• Medium: noticeable impact (“material” in auditing terms)
• Low: can be absorbed without difficulty
– 1 - 10
• Express money values in levels, e.g.
– For a large University Department a possibility is
• High
• Medium
• Low
10. Risk Analysis Steps
• Decide on scope of analysis
– Set the system boundary
• Identification of assets & business processes
• Identification of threats and valuation of their
impact on assets (impact valuation)
• Identification and assessment of vulnerabilities
to threats
• Risk assessment
11. Risk Analysis – Defining the Scope
• Draw a context diagram
• Decide on the boundary
– It will rarely be the computer!
• Make explicit assumptions about the security
of neighbouring domains
– Verify them!
12. Risk Analysis - Identification of
Assets
• Types of asset
– Hardware
– Software: purchased or developed programs
– Data
– People: who run the system
– Documentation: manuals, administrative procedures, etc
– Supplies: paper forms, magnetic media, printer liquid, etc
– Money
– Intangibles
• Goodwill
• Organisation confidence
• Organisation image
13. Risk Analysis – Impact Valuation
Identification and valuation of threats - for each group
of assets
• Identify threats, e.g. for stored data
– Loss of confidentiality
– Loss of integrity
– Loss of completeness
– Loss of availability (Denial of Service)
• For many asset types the only threat is loss of
availability
• Assess impact of threat
– Assess in levels, e.g H-M-L or 1 - 10
– This gives the valuation of the asset in the face of the threat
14. Risk Analysis – Process Analysis
• Every company or organisation has some
processes that are critical to its operation
• The criticality of a process may increase the
impact valuation of one or more assets identified
So
• Identify critical processes
• Review assets needed for critical processes
• Revise impact valuation of these assets
15. Risk Analysis – Vulnerabilities 1
• Identify vulnerabilities against a baseline
system
– For risk analysis of an existing system
• Existing system with its known security measures and
weaknesses
– For development of a new system
• Security facilities of the envisaged software, e.g.
Windows NT
• Standard good practice, e.g. BS 7799 recommendations
of good practice
16. Risk Analysis – Vulnerabilities 2
For each threat
• Identify vulnerabilities
– How to exploit a threat successfully;
• Assess levels of likelihood - High, Medium, Low
– Of attempt
• Expensive attacks are less likely (e.g. brute-force attacks on encryption keys)
– Successful exploitation of vulnerability;
• Combine them
Likelihood of Attempt
Likelihood
of Success
Low
Low
Low
Med Med
Low
Med High
HighHigh
High
Med
Med
Low
Low
17. Responses to Risk
Responses to risk
• Avoid it completely by withdrawing from an
activity
• Accept it and do nothing
• Reduce it with security measures
18. Security Measures
Possible security measures
• Transfer the risk, e.g. insurance
• Reduce vulnerability
– Reduce likelihood of attempt
• e.g. publicise security measures in order to deter attackers
• e.g. competitive approach - the lion-hunter’s approach to security
– Reduce likelihood of success by preventive measures
• e.g. access control, encryption, firewall
• Reduce impact, e.g. use fire extinguisher / firewall
• Recovery measures, e.g. restoration from backup
19. Problems of Risk Analysis and Management
• Lack of precision
• Volume of work and volume of output
• Integrating them into a ”normal” development
process
20. Legal, Privacy, and Ethical Issues in
Computer Security
• Program and data protection by patents,
copyrights, and trademarks
• Computer Crime
• Privacy
• Ethical Analysis of computer security
situations
• Codes of professional ethics
21. Motivation for studying legal issues
• Know what protection the law provides for
computers and data
• Appreciate laws that protect the rights of
others with respect to computers, programs,
and data
• Understand existing laws as a basis for
recommending new laws to protect
compuuters, programs, and data
22. Aspects of Protection of the security of
computers
• Protecting computing systems against
criminals
• Protecting code and data (copyright...)
• Protecting programmers’ and employers’ rights
• Protecting private data about individuals
• Protecting users of programs
23. 23
Ethical vs. Legal Issues
• Q: What’s the difference between a legal issue and an ethical issue?
• How do you determine which it is?
• Should you care which it is?
• What percentage of your time would you guess that you will spend dealing
with ethical or legal issues?
24. 24
Ethical vs. Legal Issues
• Legal issues:
– Sometimes have a definitive answer
– Determination is made by others (not you)
• Ethical issues:
– Sometimes have a definitive answer
– You determine your course of action
• The law doesn’t make it “right”
• Being “right” doesn’t make it legal
25. Basic Legal Issues
a) Protecting Programs and Data
b) Information and the Law
c) Ownership Rights of Employees and Employers
d) Software Failures (and Customers)
26. Protecting Programs and Data
Copyrights — designed to protect expression of ideas (creative
works of the mind)
Ideas themselves are free
Different people can have the same idea
The way of expressing ideas is copyrighted
Copyrights are exclusive rights to making copies of
expression
Copyright protects intellectual property (IP)
IP must be:
Original work
In some tangible medium of expression
27. INTELLECTUAL PROPERTY
RIGHT
• Intellectual property rights are the legal rights that
cover the privileges given to individuals who are
the owners and inventors of a work, and have
created something with their intellectual
creativity. Individuals related to areas such as
literature, music, invention, etc., can be granted
such rights, which can then be used in the
business practices by them.
• The creator/inventor gets exclusive rights against
any misuse or use of work without his/her prior
information
29. Copyrights
• Public domain- work owned by the public, (e.g.
government)
• Work must be original to the author
• “fair use of a copyrighted work, including such use
by reproduction I copies…for purposes such as
criticism, comment, news reporting, teaching
(including multiple copies for classroom use),
scholarship or research.”
• New owner can give away or sell object
31. Copyrights
• In India, the law on copyright protection is
contained in the Indian Copyright Act, 1957 –
• which came into effect in January 1958.
• This Act has been amended 5 times since then
i.e.. In 1983, 1984,1992, 1994, 1999 & 2012.
• The Copyright ( Amendment ) Act 2012 is the
most substantial, bringing the digital
environment into its purview.
32. Subject Matter of Copyright
• Copyright law protects "original works of
authorship.“
• The work does not have to be the first of its kind,
or novel
• it just has to be the independent product of the
author, not copied from another source.
• Copyright is held by an author upon a work's
creation and "fixation“ in tangible form, so that it
can be perceived directly or with the aid of a
machine or other device
33. Contd..
• Works of authorship include the following categories
(1)literary works;
(2)musical works, including any accompanying words;
(3)dramatic works, including any accompanying music;
(4) choreographic works;
(5)pictorial, graphic, and sculptural works;
(6)motion pictures and other audiovisual works;
(7)sound recordings; and
(8)architectural works.
34. What Copyright Protects
• Original Literary, Dramatic, Musical and
Artistic Works
• Cinematograph Films
• Sound Recordings
35. Literary Works
• Novels, poems, short stories
• Books on any subject
• Computer programmes,
tables, computer
databases
• Song lyrics
37. Who owns the copyright?
• Ordinarily, the creator does. However, if he or
she creates the work in the course of employment
or is retained under an appropriate contract to
make the work, then the work is a "work made for
hire," and the employer or the contracting party
owns the copyright. Co-creators jointly own the
copyright in the work they create together.
• In some situations, when a work is created by a
member of the University, Harvard policies vary
the ownership that would otherwise result under
copyright law.
38. Can a copyright be transferred to
someone else?
• Like any other property, a copyright can be sold
or given to someone else, who then becomes the
owner of the copyright. A copyright is a bundle
of exclusive rights, which can be transferred
separately or all together.
• A copyright owner can also retain the copyright
but permit (or non-exclusively license) others to
exercise some of the owner's rights. For example,
a photographer might permit the use of one of her
photographs on a book jacket.
39. Permission to reproduce or disseminate
someone else's copyrighted work?
• Find the copyright owner and ask. There are no special
forms that must be used, and permission can be oral or
written, though it is good practice to obtain permission in
writing.
• The copyright owner is free to charge whatever fee he or
she wishes, though the user is likewise free to try to
negotiate a lower fee.
• Most major publishers and periodicals have a "permissions
desk" or a "rights editor," and a written request addressed
in this way will usually find its way to the right person.
• You should specify the publication you wish to take from;
the precise pages, chapters, photographs or the like you
want to use; how many copies you want to make; and the
purpose of your use Many permissions desks accept
requests by e-mail or through the publisher's website.
40. Infringement
• A copyright is infringed when one of the exclusive
rights of the copyright holder is violated.
• These include the right to reproduce a
– copyrighted work, prepare derivative works based upon it,
distribute copies by sale or other transfer of ownership, to
perform and display it publicly, and to authorize others to
do so
– Three types of infringement
– Direct infringement
– Indirect infringement
– Vicarious liabilities
41. Direct Infringement
• Direct infringement occurs when a person
without authorizaton reproduces, distributes,
displays, or performs a copyrighted work, or
prepares a derivative work based on a
copyrighted work.
• direct copyright infringement, it does not
matter. whether a direct profit is derived from
the infringing works.
42. Contributory Infringement
• Liability for copyright infringement may be imposed on
persons who have not themselves engaged in the infringing
activity, but where it may be seen as "just to hold one
individual accountable for the actions of another.“
• Contributory infringement occurs, for example, where a
person "with knowledge of the infringing activity, induces,
causes or materially contributes to the infringing conduct of
another.“
• An Internet provider may be liable for contributory
infringement, says the court, if it knows or should have
known of the infringement and fails to do anything about it.
43. Exclusive Rights
• Copyright provides an author with a tool to
protect a work from being taken, used, and
exploited by others without permission.
• The owner of a copyrighted work has the
exclusive right
– to reproduce it,
– prepare derivative works based upon it,
– distribute copies by sale or other transfer of ownership,
– to perform and display it publicly, and
– to authorize others to do so.
44. Patents
• Protect inventions, tangible objects, or ways to make
them, not works of the mind.
• Patent designed to protect the device or process for
carrying out an idea, not the idea itself.
• Patent goes to person who invented the object first
• Algorithms are inventions and can be patented
45. Patent
• Patents give inventors the exclusive right to
duplicate their invention’s design. Patents cover
devices, formulas, tools, and anything that has
utility. To get a patent, you must apply to the
Patent Office and submit the invention’s design.
You must show that the design is unique. A patent
examiner will determine if you are entitled to a
patent. If so, a patent is granted that prohibits
anyone else from making, using, offering for sale,
selling, or importing the invention. A patent lasts
20 years.
46. Trademark
• A trademark is a word, phrase, or logo that
identifies a product, a service, or the person or
company that offers a product or service to the
public. You must apply to Trademark Office to
register a federal trademark. If your trademark
is registered, you can generally prevent anyone
else from using a mark that may confuse the
public about who offers the product or service.
47. Trade Secrets
• Information that gives one company a
competitive edge over others
• Reverse engineering – study finished object
to determine how it is manufactured or how it
works
• Trade secret protection can apply to software
48. Copyright v/s Patent v/s Trade mark
• Copyright protects original works of
authorship,
• while a patent protects inventions or
discoveries.
• A trademark protects words, phrases, symbols,
or designs identifying the source of the goods
or services of one party and distinguishing
them from those of others.
49. Comparison table Copyright, Patent and Trade Secret Protection
Copyright Patent Trade Secret
Protects Expression of idea,
not idea itself
Invention—way
something works
Secret, competitive
advantage
Protected Object
Made Public
Yes; intention is to
promote publication
Design filed at
Patent Office
No
Must Distribute Yes No No
Ease of filing Very easy, do-it-
yourself
Very complicated;
specialist lawyer
suggested
No filing
Duration Originator’s life + 70
yrs; 95 y. For
company
19 years Indefinite
Legal Protection Sue if unauthorized
copy sold
Sue if invention
copied/reinvented
Sue if secret
improperly obtained