SlideShare a Scribd company logo
1 of 21
Professional Practices
SS-301
Ehtesham Raza,
Assistant Professor,
Govt. Murray College,
Sialkot.
Topic: Intellectual Property Rights
• Introduction
• Confidential Information
• Patents
• Copyright
• Acts permitted in relation to copyright
• Remedies for breach of Copyright
• Plagiarism
Introduction
• Intellectual property rights are often the
most valuable assets owned, used and
developed by a software house.
• Intellectual property rights include:
– Confidential information
– Patents
– trade marks
– Designs
– Copyrights protecting computer programs
Introduction (continued)
• They protect information stored by
electronic means and all of the paperwork
which accompanies a program, such as
the user manual, plus any multimedia
packages and most items on the Web.
• Great care should be taken to protect,
exploit and enforce intellectual property
Introduction (continued)
• The name under which a product is sold
may be registered as a trade mark
• the hardware or a process used in its
manufacture may be protected by a patent
• the look of the product may be registered in
the Designs Registry
• software can be protected by copyright
• the know-how which goes into the
development of the product may be
protected as confidential information
Introduction (continued)
• Unauthorized use of intellectual property
can be stopped by injunction and
damages may be sought for infringement
of these rights
• The law is constantly changing with
technological advance
• General Agreement on Tariffs and Trade
(GATT) concerned the protection of
intellectual property rights in the face of
widespread piracy of software products.
Confidential Information
• Information “which is not public property and public
knowledge”
• Any category of information, from personal confidences,
to trade secrets and sensitive government information,
any or all of which a computer scientist might handle in
the course of his or her work, or all or any of which a firm
may want to protect against unauthorized use or
disclosure by others
• Information will be protected only if it is confidential. Non-
confidential information, unless protected, e.g. by
copyright or a patent is deemed to be in the public
domain and can be used by anyone.
Confidential Information
• Three conditions must be satisfied before
an action for breach of confidence can
succeed:
– the information must be confidential
– the information must have been disclosed in
circumstances which give rise to an obligation
of confidence
– there must be an actual or anticipated
unauthorized use or disclosure of the
information
Patents
• A government authority conferring a right
or title for a set period, especially the sole
right to exclude others from making, using,
or selling an invention
• A patent gives to an inventor a monopoly
in an invention. This means that the
inventor is given the exclusive right to use
or exploit the invention for a defined period
Patents
• The monopoly granted by patent law is so strong, that
the owner of a patent may even exclude independent
inventors from the market
• The better the patent and the more commercially
desirable the breakthrough, the more likely it is to be
challenged. For example, if competitors can produce a
similar product or process, which is not covered by the
patent, they will be free to market it and to erode the
commercial advantage of the patentee. If they can prove
that the subject matter of the patent has been used or
disclosed before, they can invalidate the patent.
Patents
• Patent Act merely sets out a number of
criteria which must be satisfied before an
invention can be patented
• a patent may only be granted if:
– the invention is new
– it involves an inventive step
– it is capable of industrial application
– the subject matter of the invention does not
fall within an excluded class.
Patents
• It is possible to patent something which is
more than just a program—something which
can be called, for simplicity, a “program plus”
• A computer program is not excluded from
patentability if it produced, or is capable of
producing, a further technical effect beyond
the normal physical interaction between
software and hardware, i.e. it is potentially
patentable if it makes something else do
something.
Copyright
• The exclusive legal right, given to an originator
or an assignee to print, publish, perform
material, and to authorize others to do the same
• Copyright protects more items generated by
businesses or by individuals than any other
aspect of intellectual property law
• It can protect business letters, manuals,
diagrams, computer programs
• Copyright owners face the specter of unlimited
piracy through
uncontrolled copying with the advent of internet
Copyright
• What we will probably see over the next few
years are stronger
laws, more rights for copyright owners,
widespread licensing schemes and greater use of
technical anti-piracy or copy-monitoring devices
and electronic rights management systems
• Copyright law gives six exclusive rights to the
owner of copyright:
– copy the work
– issue copies to the public
Copyright
– rent or lend the work to the public
– perform, play or show the work in public
– broadcast the work or include it in a cable
programmed service
– make an adaptation of the work or to do any
of the above with an adaptation
The rights apply equally to published and to
unpublished works
Acts permitted in relation to copyright
• Some acts are permitted under the 1988
Act, even though they would otherwise
amount to breach of copyright.
– Fair dealing
– Making back-up copies of computer programs
– Transfers of works in electronic form
– De-compilation for the purpose of
interoperability
– Error correction
– Databases
Remedies for breach of copyright
• A copyright owner has all the usual civil
remedies of search, injunction, damages
and an action for an account of profits
made in breach of copyright
• If it is shown that at the time of the
infringement of copyright the defendant did
not know and had no reason to believe that
copyright subsisted in the work, then the
plaintiff is not entitled to damages against
the defendant
Remedies for breach of
copyright
• A copyright owner is also given an
important power to enter premises without
using force in order to seize infringing
copies, or articles specifically designed or
adapted for making copies
Plagiarism
• the practice of taking someone else's work
or ideas and passing them off as one's
own.
• All of the following are considered
plagiarism:
– turning in someone else's work as your own
– copying words or ideas from someone else
without giving credit
– failing to put a quotation in quotation marks
Plagiarism (continued)
– giving incorrect information about the source of
a quotation
– changing words but copying the sentence
structure of a source without giving credit
– for a computer program changing variable
names only, or not changing the structure or flow
of a program
Thank you!

More Related Content

What's hot

computer contracts.pdf
computer contracts.pdfcomputer contracts.pdf
computer contracts.pdfSanaKhan319883
 
Software Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional PracticeSoftware Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional Practice Saqib Raza
 
Ieee code of ethics
Ieee code of ethicsIeee code of ethics
Ieee code of ethicsWaqar Ahmad
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computingUc Man
 
05 professional practice
05 professional practice05 professional practice
05 professional practiceSulman Ahmed
 
Problems of cooperative system
Problems of cooperative systemProblems of cooperative system
Problems of cooperative systemfazli khaliq
 
Software Engineering Ethics
Software Engineering EthicsSoftware Engineering Ethics
Software Engineering EthicsKapil Rajpurohit
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course OutlineSaqib Raza
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual PropertySaqib Raza
 
Software Engineering Code of Ethics
Software Engineering Code of EthicsSoftware Engineering Code of Ethics
Software Engineering Code of EthicsAbdel Salam Sayyad
 
Engineers as experts and advisors
Engineers as experts and advisorsEngineers as experts and advisors
Engineers as experts and advisorsSKS
 
Historical social & economic context of computing
Historical social & economic context of computingHistorical social & economic context of computing
Historical social & economic context of computingBurhan Ahmed
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-conceptsMuhammad Ahad
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law sohaildanish
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing professionshahmansoor109
 

What's hot (20)

computer contracts.pdf
computer contracts.pdfcomputer contracts.pdf
computer contracts.pdf
 
Software Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional PracticeSoftware Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional Practice
 
Ieee code of ethics
Ieee code of ethicsIeee code of ethics
Ieee code of ethics
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computing
 
05 professional practice
05 professional practice05 professional practice
05 professional practice
 
Problems of cooperative system
Problems of cooperative systemProblems of cooperative system
Problems of cooperative system
 
Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering  Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering
 
software engineering ethics
software engineering ethicssoftware engineering ethics
software engineering ethics
 
Software Engineering Ethics
Software Engineering EthicsSoftware Engineering Ethics
Software Engineering Ethics
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course Outline
 
IEEE Code Of Conduct/Ethics
IEEE Code Of Conduct/EthicsIEEE Code Of Conduct/Ethics
IEEE Code Of Conduct/Ethics
 
ACM code of ethics
ACM code of ethicsACM code of ethics
ACM code of ethics
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual Property
 
Software Engineering Code of Ethics
Software Engineering Code of EthicsSoftware Engineering Code of Ethics
Software Engineering Code of Ethics
 
Engineers as experts and advisors
Engineers as experts and advisorsEngineers as experts and advisors
Engineers as experts and advisors
 
Historical social & economic context of computing
Historical social & economic context of computingHistorical social & economic context of computing
Historical social & economic context of computing
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-concepts
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 

Similar to intellectual property rights

Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.pptKISHOYIANKISH
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual propertySalim Hosen
 
BS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxBS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxwhoiam36
 
Society_law_and_ethics.pdf
Society_law_and_ethics.pdfSociety_law_and_ethics.pdf
Society_law_and_ethics.pdfManyaThakur12
 
Legal protection of computer software
Legal protection of computer softwareLegal protection of computer software
Legal protection of computer softwareOlli Pitkänen
 
Technology and Law
Technology and LawTechnology and Law
Technology and Lawcs404ta
 
Patent 101: Protecting Innovations
Patent 101: Protecting InnovationsPatent 101: Protecting Innovations
Patent 101: Protecting InnovationsMintz Levin
 
LECTURE 12: Technology Protection
LECTURE 12: Technology ProtectionLECTURE 12: Technology Protection
LECTURE 12: Technology ProtectionBC Chew
 
Top 5 patent Tips. Cerian Jones, UDL
Top 5 patent Tips. Cerian Jones, UDLTop 5 patent Tips. Cerian Jones, UDL
Top 5 patent Tips. Cerian Jones, UDLSarah Toomey
 
vdocument.in_introduction-to-intellectual-property-rights-ipr.ppt
vdocument.in_introduction-to-intellectual-property-rights-ipr.pptvdocument.in_introduction-to-intellectual-property-rights-ipr.ppt
vdocument.in_introduction-to-intellectual-property-rights-ipr.pptBhawna173140
 
Chapter16 intellectual-property
Chapter16 intellectual-propertyChapter16 intellectual-property
Chapter16 intellectual-propertyVin Voro
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rightsHimanshu Pathak
 
IMPORTANCE OF INTELECTUAL PROPERTY.pdf
IMPORTANCE OF INTELECTUAL PROPERTY.pdfIMPORTANCE OF INTELECTUAL PROPERTY.pdf
IMPORTANCE OF INTELECTUAL PROPERTY.pdfJahidulIslam758305
 
OneStart 2015 London Bootcamp: Charlotte Teall, Forresters - Introducing IP
OneStart 2015 London Bootcamp: Charlotte Teall, Forresters - Introducing IPOneStart 2015 London Bootcamp: Charlotte Teall, Forresters - Introducing IP
OneStart 2015 London Bootcamp: Charlotte Teall, Forresters - Introducing IPOxbridge Biotech Roundtable
 

Similar to intellectual property rights (20)

Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.ppt
 
Info 442 chapt 5
Info 442 chapt 5Info 442 chapt 5
Info 442 chapt 5
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 
IP Compliance.ppt
IP Compliance.pptIP Compliance.ppt
IP Compliance.ppt
 
BS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxBS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptx
 
Society_law_and_ethics.pdf
Society_law_and_ethics.pdfSociety_law_and_ethics.pdf
Society_law_and_ethics.pdf
 
Technology-protection
Technology-protectionTechnology-protection
Technology-protection
 
Ip 101 for Startups
Ip 101 for StartupsIp 101 for Startups
Ip 101 for Startups
 
Legal protection of computer software
Legal protection of computer softwareLegal protection of computer software
Legal protection of computer software
 
Technology and Law
Technology and LawTechnology and Law
Technology and Law
 
Patent 101: Protecting Innovations
Patent 101: Protecting InnovationsPatent 101: Protecting Innovations
Patent 101: Protecting Innovations
 
LECTURE 12: Technology Protection
LECTURE 12: Technology ProtectionLECTURE 12: Technology Protection
LECTURE 12: Technology Protection
 
Top 5 patent Tips. Cerian Jones, UDL
Top 5 patent Tips. Cerian Jones, UDLTop 5 patent Tips. Cerian Jones, UDL
Top 5 patent Tips. Cerian Jones, UDL
 
vdocument.in_introduction-to-intellectual-property-rights-ipr.ppt
vdocument.in_introduction-to-intellectual-property-rights-ipr.pptvdocument.in_introduction-to-intellectual-property-rights-ipr.ppt
vdocument.in_introduction-to-intellectual-property-rights-ipr.ppt
 
Chapter16 intellectual-property
Chapter16 intellectual-propertyChapter16 intellectual-property
Chapter16 intellectual-property
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
IMPORTANCE OF INTELECTUAL PROPERTY.pdf
IMPORTANCE OF INTELECTUAL PROPERTY.pdfIMPORTANCE OF INTELECTUAL PROPERTY.pdf
IMPORTANCE OF INTELECTUAL PROPERTY.pdf
 
OneStart 2015 London Bootcamp: Charlotte Teall, Forresters - Introducing IP
OneStart 2015 London Bootcamp: Charlotte Teall, Forresters - Introducing IPOneStart 2015 London Bootcamp: Charlotte Teall, Forresters - Introducing IP
OneStart 2015 London Bootcamp: Charlotte Teall, Forresters - Introducing IP
 
PLS 780 Week 8
PLS 780 Week 8PLS 780 Week 8
PLS 780 Week 8
 
Pls 780 week 8
Pls 780 week 8Pls 780 week 8
Pls 780 week 8
 

More from Hamza Cheema

professional ethics
professional ethicsprofessional ethics
professional ethicsHamza Cheema
 
managing teams and their conflicts
managing teams and their conflictsmanaging teams and their conflicts
managing teams and their conflictsHamza Cheema
 
professional ethics in_computing
professional ethics in_computingprofessional ethics in_computing
professional ethics in_computingHamza Cheema
 
ethics and professionalism
ethics and professionalismethics and professionalism
ethics and professionalismHamza Cheema
 
effective time-management-important-vs-urgent
effective time-management-important-vs-urgenteffective time-management-important-vs-urgent
effective time-management-important-vs-urgentHamza Cheema
 
time management islamic way
time management islamic waytime management islamic way
time management islamic wayHamza Cheema
 
habbits of highly effective people
habbits of highly effective peoplehabbits of highly effective people
habbits of highly effective peopleHamza Cheema
 
be the tranformer (overall characteristics)
 be the tranformer (overall characteristics) be the tranformer (overall characteristics)
be the tranformer (overall characteristics)Hamza Cheema
 
characteristics of a professional organization
characteristics of a professional organizationcharacteristics of a professional organization
characteristics of a professional organizationHamza Cheema
 
finance and accounting
finance and accountingfinance and accounting
finance and accountingHamza Cheema
 
structure of an organisation
 structure of an organisation structure of an organisation
structure of an organisationHamza Cheema
 

More from Hamza Cheema (20)

seven habits
seven habitsseven habits
seven habits
 
leadership
leadershipleadership
leadership
 
time management
time managementtime management
time management
 
professional ethics
professional ethicsprofessional ethics
professional ethics
 
the profession
 the profession the profession
the profession
 
managing teams and their conflicts
managing teams and their conflictsmanaging teams and their conflicts
managing teams and their conflicts
 
swot-analysis
swot-analysisswot-analysis
swot-analysis
 
professional ethics in_computing
professional ethics in_computingprofessional ethics in_computing
professional ethics in_computing
 
ethics and professionalism
ethics and professionalismethics and professionalism
ethics and professionalism
 
effective time-management-important-vs-urgent
effective time-management-important-vs-urgenteffective time-management-important-vs-urgent
effective time-management-important-vs-urgent
 
time management islamic way
time management islamic waytime management islamic way
time management islamic way
 
time management
time managementtime management
time management
 
professionalism
professionalismprofessionalism
professionalism
 
habbits of highly effective people
habbits of highly effective peoplehabbits of highly effective people
habbits of highly effective people
 
leardeship
leardeshipleardeship
leardeship
 
be the tranformer (overall characteristics)
 be the tranformer (overall characteristics) be the tranformer (overall characteristics)
be the tranformer (overall characteristics)
 
characteristics of a professional organization
characteristics of a professional organizationcharacteristics of a professional organization
characteristics of a professional organization
 
hackivism
hackivismhackivism
hackivism
 
finance and accounting
finance and accountingfinance and accounting
finance and accounting
 
structure of an organisation
 structure of an organisation structure of an organisation
structure of an organisation
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

intellectual property rights

  • 1. Professional Practices SS-301 Ehtesham Raza, Assistant Professor, Govt. Murray College, Sialkot.
  • 2. Topic: Intellectual Property Rights • Introduction • Confidential Information • Patents • Copyright • Acts permitted in relation to copyright • Remedies for breach of Copyright • Plagiarism
  • 3. Introduction • Intellectual property rights are often the most valuable assets owned, used and developed by a software house. • Intellectual property rights include: – Confidential information – Patents – trade marks – Designs – Copyrights protecting computer programs
  • 4. Introduction (continued) • They protect information stored by electronic means and all of the paperwork which accompanies a program, such as the user manual, plus any multimedia packages and most items on the Web. • Great care should be taken to protect, exploit and enforce intellectual property
  • 5. Introduction (continued) • The name under which a product is sold may be registered as a trade mark • the hardware or a process used in its manufacture may be protected by a patent • the look of the product may be registered in the Designs Registry • software can be protected by copyright • the know-how which goes into the development of the product may be protected as confidential information
  • 6. Introduction (continued) • Unauthorized use of intellectual property can be stopped by injunction and damages may be sought for infringement of these rights • The law is constantly changing with technological advance • General Agreement on Tariffs and Trade (GATT) concerned the protection of intellectual property rights in the face of widespread piracy of software products.
  • 7. Confidential Information • Information “which is not public property and public knowledge” • Any category of information, from personal confidences, to trade secrets and sensitive government information, any or all of which a computer scientist might handle in the course of his or her work, or all or any of which a firm may want to protect against unauthorized use or disclosure by others • Information will be protected only if it is confidential. Non- confidential information, unless protected, e.g. by copyright or a patent is deemed to be in the public domain and can be used by anyone.
  • 8. Confidential Information • Three conditions must be satisfied before an action for breach of confidence can succeed: – the information must be confidential – the information must have been disclosed in circumstances which give rise to an obligation of confidence – there must be an actual or anticipated unauthorized use or disclosure of the information
  • 9. Patents • A government authority conferring a right or title for a set period, especially the sole right to exclude others from making, using, or selling an invention • A patent gives to an inventor a monopoly in an invention. This means that the inventor is given the exclusive right to use or exploit the invention for a defined period
  • 10. Patents • The monopoly granted by patent law is so strong, that the owner of a patent may even exclude independent inventors from the market • The better the patent and the more commercially desirable the breakthrough, the more likely it is to be challenged. For example, if competitors can produce a similar product or process, which is not covered by the patent, they will be free to market it and to erode the commercial advantage of the patentee. If they can prove that the subject matter of the patent has been used or disclosed before, they can invalidate the patent.
  • 11. Patents • Patent Act merely sets out a number of criteria which must be satisfied before an invention can be patented • a patent may only be granted if: – the invention is new – it involves an inventive step – it is capable of industrial application – the subject matter of the invention does not fall within an excluded class.
  • 12. Patents • It is possible to patent something which is more than just a program—something which can be called, for simplicity, a “program plus” • A computer program is not excluded from patentability if it produced, or is capable of producing, a further technical effect beyond the normal physical interaction between software and hardware, i.e. it is potentially patentable if it makes something else do something.
  • 13. Copyright • The exclusive legal right, given to an originator or an assignee to print, publish, perform material, and to authorize others to do the same • Copyright protects more items generated by businesses or by individuals than any other aspect of intellectual property law • It can protect business letters, manuals, diagrams, computer programs • Copyright owners face the specter of unlimited piracy through uncontrolled copying with the advent of internet
  • 14. Copyright • What we will probably see over the next few years are stronger laws, more rights for copyright owners, widespread licensing schemes and greater use of technical anti-piracy or copy-monitoring devices and electronic rights management systems • Copyright law gives six exclusive rights to the owner of copyright: – copy the work – issue copies to the public
  • 15. Copyright – rent or lend the work to the public – perform, play or show the work in public – broadcast the work or include it in a cable programmed service – make an adaptation of the work or to do any of the above with an adaptation The rights apply equally to published and to unpublished works
  • 16. Acts permitted in relation to copyright • Some acts are permitted under the 1988 Act, even though they would otherwise amount to breach of copyright. – Fair dealing – Making back-up copies of computer programs – Transfers of works in electronic form – De-compilation for the purpose of interoperability – Error correction – Databases
  • 17. Remedies for breach of copyright • A copyright owner has all the usual civil remedies of search, injunction, damages and an action for an account of profits made in breach of copyright • If it is shown that at the time of the infringement of copyright the defendant did not know and had no reason to believe that copyright subsisted in the work, then the plaintiff is not entitled to damages against the defendant
  • 18. Remedies for breach of copyright • A copyright owner is also given an important power to enter premises without using force in order to seize infringing copies, or articles specifically designed or adapted for making copies
  • 19. Plagiarism • the practice of taking someone else's work or ideas and passing them off as one's own. • All of the following are considered plagiarism: – turning in someone else's work as your own – copying words or ideas from someone else without giving credit – failing to put a quotation in quotation marks
  • 20. Plagiarism (continued) – giving incorrect information about the source of a quotation – changing words but copying the sentence structure of a source without giving credit – for a computer program changing variable names only, or not changing the structure or flow of a program