SlideShare a Scribd company logo
1 of 15
BS Computer Science 5th
Professional Practice
Intellectual Property Rights
Introduction
Intellectual property rights are often the most
valuable assets owned, used and developed
by a software house. The Intellectual property
rights include:
 Confidential information
 Patents
 trade marks
 Designs
 Copyrights protecting computer programs
They protect information stored by electronic means
and all of the paperwork which accompanies a
program, such as the user manual, plus any
multimedia packages and most items on the Web.
 Great care should be taken to protect, exploit and
enforce intellectual property
 The name under which a product is sold may be
registered as a trade mark
 the hardware or a process used in its manufacture
may be protected by a patent
 the look of the product may be registered in the
Designs Registry
 software can be protected by copyright
 the know-how which goes into the development of
the product may be protected as confidential
information
 Unauthorized use of intellectual property can be
stopped by injunction and damages may be sought
for infringement of these rights
 The law is constantly changing with technological
advance
 General Agreement on Tariffs and Trade (GATT)
concerned the protection of intellectual property
rights in the face of widespread piracy of software
products
Confidential Information
The Information “which is not public property and public
knowledge”, Any category of information, from
personal confidences, to trade secrets and sensitive
government information, any or all of which a
computer scientist might handle in the course of his or
her work, or all or any of which a firm may want to
protect against unauthorized use or disclosure by
others
 Information will be protected only if it is confidential.
Non-confidential information, unless protected, e.g. by
copyright or a patent is deemed to be in the public
domain and can be used by anyone.
Three conditions must be satisfied before an
action for breach of confidence can succeed:
 the information must be confidential
 the information must have been disclosed in
circumstances which give rise to an obligation
of confidence
 there must be an actual or anticipated
unauthorized use or disclosure of the
information
Patents
A government authority conferring a right or title
for a set period, especially the sole right to
exclude others from making, using, or selling an
invention
 A patent gives to an inventor a monopoly in an
invention. This means that the inventor is given
the exclusive right to use or exploit the invention
for a defined period
 The monopoly granted by patent law is so
strong, that the owner of a patent may even
exclude independent inventors from the market
 The better the patent and the more
commercially desirable the breakthrough, the
more likely it is to be challenged. For example, if
competitors can produce a similar product or
process, which is not covered by the patent, they
will be free to market it and to erode the
commercial advantage of the patentee. If they
can prove that the subject matter of the patent
has been used or disclosed before, they can
invalidate the patent
 Patent Act merely sets out a number of criteria
which must be satisfied before an invention can
be patented
 a patent may only be granted if:
 the invention is new
 it involves an inventive step
 it is capable of industrial application
 the subject matter of the invention does not
fall within an excluded class
 It is possible to patent something which is
more than just a program—something which
can be called, for simplicity, a “program plus”
A computer program is not excluded from
patentability if it produced, or is capable
of producing, a further technical effect
beyond the normal physical interaction
between software and hardware, i.e. it is
potentially patentable if it makes
something else do something.
Copyright
The exclusive legal right, given to an originator or an
assignee to print, publish, perform material, and
to authorize others to do the same
 Copyright protects more items generated by
businesses or by individuals than any other
aspect of intellectual property law
 It can protect business letters, manuals,
diagrams, computer programs
 Copyright owners face the specter of unlimited
piracy through uncontrolled copying with the
advent of internet
 What we will probably see over the next few
years are stronger laws, more rights for
copyright owners, widespread licensing
schemes and greater use of technical anti-
piracy or copy-monitoring devices and
electronic rights management systems
 Copyright law gives six exclusive rights to the
owner of copyright:
 copy the work
issue copies to the public
 rent or lend the work to the public
 perform, play or show the work in public
 broadcast the work or include it in a cable
programmed service
 make an adaptation of the work or to do any
of the above with an adaptation
The rights apply equally to published and to
unpublished works
Plagiarism:
The practice of taking someone else's work or
ideas and passing them off as one's own.
 All of the following are considered plagiarism:
 turning in someone else's work as your own
 copying words or ideas from someone else
without giving credit
 failing to put a quotation in quotation marks
 giving incorrect information about the source
of a quotation
 changing words but copying the
sentence structure of a source without
giving credit
 for a computer program changing
variable names only, or not changing the
structure or flow of a program

More Related Content

Similar to BS CS5 Lecture 5.pptx

Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesChantial
 
Copy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IPCopy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IPmuhammadshahid2047
 
Protecting innovation
Protecting innovation Protecting innovation
Protecting innovation wahyu0916
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraintsmrcox
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxKRITARTHBANSAL1
 
Copyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsCopyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsMartha Hardy
 
PROPERTY PROTECTION ISSUESThe ability to link computers through th.docx
PROPERTY PROTECTION ISSUESThe ability to link computers through th.docxPROPERTY PROTECTION ISSUESThe ability to link computers through th.docx
PROPERTY PROTECTION ISSUESThe ability to link computers through th.docxamrit47
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacysalehnia
 
Intellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationIntellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationAshesh R
 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptssuseraaf866
 
Lecture-8- IP rights.pptx
Lecture-8- IP rights.pptxLecture-8- IP rights.pptx
Lecture-8- IP rights.pptxSibghat4
 
Information-Control.pptx
Information-Control.pptxInformation-Control.pptx
Information-Control.pptxJeydeeeYhudieee
 
Provisional rights to patents and industrial designs in Vietnam – What you ne...
Provisional rights to patents and industrial designs in Vietnam – What you ne...Provisional rights to patents and industrial designs in Vietnam – What you ne...
Provisional rights to patents and industrial designs in Vietnam – What you ne...KenfoxLaw
 
Full Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfFull Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfNeelHope
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPRNeil Witt
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industryjamiehaworth1
 

Similar to BS CS5 Lecture 5.pptx (20)

Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
 
Copy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IPCopy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IP
 
Protecting innovation
Protecting innovation Protecting innovation
Protecting innovation
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraints
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptx
 
Copyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsCopyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative Commons
 
Law: Bill Loginov
Law: Bill LoginovLaw: Bill Loginov
Law: Bill Loginov
 
PROPERTY PROTECTION ISSUESThe ability to link computers through th.docx
PROPERTY PROTECTION ISSUESThe ability to link computers through th.docxPROPERTY PROTECTION ISSUESThe ability to link computers through th.docx
PROPERTY PROTECTION ISSUESThe ability to link computers through th.docx
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
 
Intellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationIntellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian Legislation
 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.ppt
 
Lecture-8- IP rights.pptx
Lecture-8- IP rights.pptxLecture-8- IP rights.pptx
Lecture-8- IP rights.pptx
 
Information-Control.pptx
Information-Control.pptxInformation-Control.pptx
Information-Control.pptx
 
Provisional rights to patents and industrial designs in Vietnam – What you ne...
Provisional rights to patents and industrial designs in Vietnam – What you ne...Provisional rights to patents and industrial designs in Vietnam – What you ne...
Provisional rights to patents and industrial designs in Vietnam – What you ne...
 
Meisya - Thursday Talk Revised
Meisya - Thursday Talk RevisedMeisya - Thursday Talk Revised
Meisya - Thursday Talk Revised
 
Full Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfFull Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdf
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPR
 
Moral And Ethics
Moral And EthicsMoral And Ethics
Moral And Ethics
 
Legal aspect of IT contracts
Legal aspect of IT contractsLegal aspect of IT contracts
Legal aspect of IT contracts
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 

BS CS5 Lecture 5.pptx

  • 1. BS Computer Science 5th Professional Practice Intellectual Property Rights
  • 2. Introduction Intellectual property rights are often the most valuable assets owned, used and developed by a software house. The Intellectual property rights include:  Confidential information  Patents  trade marks  Designs  Copyrights protecting computer programs
  • 3. They protect information stored by electronic means and all of the paperwork which accompanies a program, such as the user manual, plus any multimedia packages and most items on the Web.  Great care should be taken to protect, exploit and enforce intellectual property  The name under which a product is sold may be registered as a trade mark  the hardware or a process used in its manufacture may be protected by a patent  the look of the product may be registered in the Designs Registry  software can be protected by copyright
  • 4.  the know-how which goes into the development of the product may be protected as confidential information  Unauthorized use of intellectual property can be stopped by injunction and damages may be sought for infringement of these rights  The law is constantly changing with technological advance  General Agreement on Tariffs and Trade (GATT) concerned the protection of intellectual property rights in the face of widespread piracy of software products
  • 5. Confidential Information The Information “which is not public property and public knowledge”, Any category of information, from personal confidences, to trade secrets and sensitive government information, any or all of which a computer scientist might handle in the course of his or her work, or all or any of which a firm may want to protect against unauthorized use or disclosure by others  Information will be protected only if it is confidential. Non-confidential information, unless protected, e.g. by copyright or a patent is deemed to be in the public domain and can be used by anyone.
  • 6. Three conditions must be satisfied before an action for breach of confidence can succeed:  the information must be confidential  the information must have been disclosed in circumstances which give rise to an obligation of confidence  there must be an actual or anticipated unauthorized use or disclosure of the information
  • 7. Patents A government authority conferring a right or title for a set period, especially the sole right to exclude others from making, using, or selling an invention  A patent gives to an inventor a monopoly in an invention. This means that the inventor is given the exclusive right to use or exploit the invention for a defined period  The monopoly granted by patent law is so strong, that the owner of a patent may even exclude independent inventors from the market
  • 8.  The better the patent and the more commercially desirable the breakthrough, the more likely it is to be challenged. For example, if competitors can produce a similar product or process, which is not covered by the patent, they will be free to market it and to erode the commercial advantage of the patentee. If they can prove that the subject matter of the patent has been used or disclosed before, they can invalidate the patent  Patent Act merely sets out a number of criteria which must be satisfied before an invention can be patented
  • 9.  a patent may only be granted if:  the invention is new  it involves an inventive step  it is capable of industrial application  the subject matter of the invention does not fall within an excluded class  It is possible to patent something which is more than just a program—something which can be called, for simplicity, a “program plus”
  • 10. A computer program is not excluded from patentability if it produced, or is capable of producing, a further technical effect beyond the normal physical interaction between software and hardware, i.e. it is potentially patentable if it makes something else do something.
  • 11. Copyright The exclusive legal right, given to an originator or an assignee to print, publish, perform material, and to authorize others to do the same  Copyright protects more items generated by businesses or by individuals than any other aspect of intellectual property law  It can protect business letters, manuals, diagrams, computer programs  Copyright owners face the specter of unlimited piracy through uncontrolled copying with the advent of internet
  • 12.  What we will probably see over the next few years are stronger laws, more rights for copyright owners, widespread licensing schemes and greater use of technical anti- piracy or copy-monitoring devices and electronic rights management systems  Copyright law gives six exclusive rights to the owner of copyright:  copy the work
  • 13. issue copies to the public  rent or lend the work to the public  perform, play or show the work in public  broadcast the work or include it in a cable programmed service  make an adaptation of the work or to do any of the above with an adaptation The rights apply equally to published and to unpublished works
  • 14. Plagiarism: The practice of taking someone else's work or ideas and passing them off as one's own.  All of the following are considered plagiarism:  turning in someone else's work as your own  copying words or ideas from someone else without giving credit  failing to put a quotation in quotation marks  giving incorrect information about the source of a quotation
  • 15.  changing words but copying the sentence structure of a source without giving credit  for a computer program changing variable names only, or not changing the structure or flow of a program