IPR and Cyberspace
(Few case Studies)
 Let’s mute our microphones
 Please post your questions on the chat window.
 We will try to answer few of them in the time period…
 .. Rest our team will get back to you later
Some Housekeeping before we start…
 Why IPR and cyberspace linkage is important and why it is needed
now?
 Few Case Studies
 IPR Awareness
- Patents
- Copyrights
- Trade secrets
Learning Outcomes
 Read the link- 5 minutes
https://indiankanoon.org/doc/1741869/
https://www.wipo.int/amc/en/news/2020/cybersquatting_covid19.html
 Discuss
– Trademark Issues In Cyber Space
A domain name dispute arises when more than one individual believe
that they have the right to register a specific domain name. It arises
when a registered trademark is registered by another individual or
organization who is not the owner of trademark that is registered. All
domain name registrars must follow the ICANN's policy .Cybersquatting
is a type of domain name dispute. Cybersquatting is done when domain
names are registered, sold or trafficked-in with the intention to make
profit from the goodwill of someone else. It is a punishable act.
– Passing Off
Yahoo!, Inc. vs Akash Arora & Anr. on 19 February, 1999
 Read the link- 5 minutes
https://www.oppedahl.com/ac/complain.htm
https://www.netlitigation.com/netlitigation/cases/oppedahl.htm
 Discuss
– Meta-tagging Issues In Cyber Space
Meta tagging is a technique in which a word is inserted in the keywords
field of the site to increase the chances of a search engine returning the
site, even though the site may have nothing to do with the word which
was inserted. Infringement of trademark occurs when companies
include their own websites meta tags containing the names or
descriptions of other companies.
Oppedahl & Larson v. Advanced Concepts
 Read the link- 5 minutes
http://www.internetlibrary.com/cases/lib_case60.cfm
https://www.netlitigation.com/netlitigation/cases/shetland.htm
 Discuss
– The Shetland News's deep link to embedded pages of the Shetland
Times's web site, through the use of Times' web site's news headlines,
was held to be an act of copyright infringement under British law and an
injunction was issued for the same.
Shetland Times Ltd. v. Dr. Jonathan Wills and Zetnews Ltd.
 Read the link- 5 minutes
https://onlinelaw.wustl.edu/blog/case-study-am-records-inc-v-napster-inc/
https://www.copyright.gov/fair-use/summaries/a&mrecords-napster-
9thcir2001.pdf
 Discuss
– The infringement of copyright protection online is known as digital piracy, which involves the
uploading, streaming, downloading and sharing of copyrighted works (e.g., books, music, and films)
beyond authorization for access, use and distribution prescribed by law. A case in point was Napster,
an online platform that enabled the illegal distribution of music through peer-to-peer file sharing ( A&M
Records, Inc. v. Napster, Inc., 2001). Copyright infringement also occurred on other peer-to-peer file
sharing and Torrent sites (such as Kazaa, Limewire, and PirateBay), and cryptolockers (i.e., sites that
provide cloud storage and sharing services to clients; e.g., Megaupload) (Drath, 2012). Like other
forms of cyber-enabled intellectual property crime, digital piracy deprives the authors and publishers of
copyrighted works of economic returns on their creations, property and labour. For example, HBO (a
US channel network that requires viewers to pay to view content) experienced millions of dollars in lost
US revenue when episodes of one of its TV series, Game of Thrones, were leaked online for free
viewing (Denham, 2015).Scripts of Game of Thrones' episodes and the unaired episodes of the HBO
TV shows were also leaked online following a data breach that HBO experienced in 2017 (Gibbs,
2017).
digital piracy
Jugaad!!!
www.ipadventure.in
12
www.ipadventure.in
Slides designed by the team. I am distant associate for
this startup. Slides will be made available on slideshare:
IPR and PATENTS Day #...
13
14
https://ipindiaservices.gov.in/PublicSearch?aspxerrorpath=/PatentSearch/PatentSe
arch/ViewApplicationStatus
15
16
17
 Original Ideas, research Results
 A book or a novel protected by copyright
 Copyright need not be registered
 WIPO ( World Intellectual Property Organisation)
 patents, copyrights, trademarks, geographical indications, designs
IP- Intellectual Property
 GI- Darjiling Tea
 Adidas Shoe- Aesthestics plus functionality- No need to register
 Disney Character - register
 Trademarks- Logos
 Patent duration – 20 years from the date of application
IP- Intellectual Property
 Cyberwarfare refers to the use of digital attacks
– like computer viruses and hacking
– by one country to disrupt the vital computer systems of another, with
the aim of creating damage, death and destruction.
 Future wars will see hackers using computer code to attack an enemy's
infrastructure, fighting alongside troops using conventional weapons like
guns and missiles
 Threatmap: https://threatmap.checkpoint.com/
Cyber Warfare
Cyber Attack - Maersk
Cyber Attack - Maersk
Cyber Attack - Maersk
 Ethical Hacking
– Ethical hacking is used by cyber practitioners to find vulnerabilities
before an attacker is able to exploit them.
 Cyber Kill Chain Model
– Describes Phases of Targeted Cyber Attacks
– 7 Steps : Reconnaissance, Weaponization, Delivery, Exploit,
Installation, Command and Control, and Actions on Objectives
Ethical Hacking and Cyber Kill Chain
 Risk Evaluation to enterprise from array of vulnerabilities
 Prevent breaches once Malware is analyzed
 Ransomware
– type of malicious software (malware) used by cybercriminals to extort
money.
 WannaCry (Locker Ransomware)
– takes your data hostage, promising to return it if you pay a ransom.
– Attack took place in May 2017 for Microsoft OS systems
– The WannaCry ransomware attack hit around 230,000 computers
globally.
Malware Analysis and Vulnerability Assessment
Cybersecurity- Wannacry Ransomware
fake news has real consequences.
Social Media
Social Media
Social Media
 Almost all of the pictures or texts that are shared from unknown sources
from friends are created for advertising purposes and harvest of the
likeprofiles. The objective of social farming sites is to bring traffic to their
page and target viewers’ and their friends digital and demographic
profiles
 avoid adding their like, share or comment on a text or picture that comes
from friends who last shared the content and were not the originator
Social Media
 In 1981, he was charged with stealing computer manuals from Pacific
Bell. In 1982, he hacked the North American Defense Command
(NORAD), an achievement that inspired the 1983 film War Games
 In 1989, he hacked Digital Equipment Corporation's (DEC) network and
made copies of their software
 Because DEC was a leading computer manufacturer at the time, this act put
Mitnick on the map. He was later arrested, convicted and sent to prison. During
his conditional release, he hacked Pacific Bell's voicemail systems.
 https://www.linkedin.com/in/kevinmitnick/
Kevin Mitnick
 cybercrime- credit cards etc, cyber industrial espionage and cyber
warfare
 black hat and white hat hackers, darkweb
 Teenage, thrill, validation, adrenalin rush, power, idealism
 heightened sense of social injustice- hacktivist collectives like Anonymous
Hackers Mindset
 Hello there. My handle is 5NIP3R but the gang calls me 5R. I can’t remember when I got
into computers for the first time or when my addiction to the internet started. What I am sure
of is that during high school I found my inner hacker calling. Talking to other hackers in the
deep web, working to impress one another, made me realise the endless doors internet and
data can open. Knowledge is power, and the power is online. Although I started with small
hits, I built my experience through the years and decided to take it a step further.
 I did my studies in Behavioural Psychology. Understanding behaviours and patterns always
fascinated me. All that time, all my effort, paid off. Now, I consider myself a gentle master
hacker. People give hints about their lives all over the web; you just have to be patient,
curious and perseverant. Data that people see as meaningless happens to be gold when
analysed together. I’ll tell you a story about my most recent successful corporate hacking,
and how I pulled it off.
Inside the mind of a hacker
 I am a freelancer. I work here and there and I’m a hacker for amusement.
It makes me feel a bit like a superhero too. When I don’t like a brand or a
person, I hack them, I take revenge.
 The choice of target came by chance last time. I paid a multinational
company for a bundled service, and they ended up not presenting the
final product I was expecting, refusing to return the money I invested. So I
did what any good hacker would do. I returned home and suited up.
Inside the mind of a hacker
Ethical Dimension of cybercrimes
Ethical Dimension of cybercrimes
Ethical Dimension of cybercrimes

Ipr in cyberspace

  • 1.
  • 3.
     Let’s muteour microphones  Please post your questions on the chat window.  We will try to answer few of them in the time period…  .. Rest our team will get back to you later Some Housekeeping before we start…
  • 4.
     Why IPRand cyberspace linkage is important and why it is needed now?  Few Case Studies  IPR Awareness - Patents - Copyrights - Trade secrets Learning Outcomes
  • 5.
     Read thelink- 5 minutes https://indiankanoon.org/doc/1741869/ https://www.wipo.int/amc/en/news/2020/cybersquatting_covid19.html  Discuss – Trademark Issues In Cyber Space A domain name dispute arises when more than one individual believe that they have the right to register a specific domain name. It arises when a registered trademark is registered by another individual or organization who is not the owner of trademark that is registered. All domain name registrars must follow the ICANN's policy .Cybersquatting is a type of domain name dispute. Cybersquatting is done when domain names are registered, sold or trafficked-in with the intention to make profit from the goodwill of someone else. It is a punishable act. – Passing Off Yahoo!, Inc. vs Akash Arora & Anr. on 19 February, 1999
  • 6.
     Read thelink- 5 minutes https://www.oppedahl.com/ac/complain.htm https://www.netlitigation.com/netlitigation/cases/oppedahl.htm  Discuss – Meta-tagging Issues In Cyber Space Meta tagging is a technique in which a word is inserted in the keywords field of the site to increase the chances of a search engine returning the site, even though the site may have nothing to do with the word which was inserted. Infringement of trademark occurs when companies include their own websites meta tags containing the names or descriptions of other companies. Oppedahl & Larson v. Advanced Concepts
  • 7.
     Read thelink- 5 minutes http://www.internetlibrary.com/cases/lib_case60.cfm https://www.netlitigation.com/netlitigation/cases/shetland.htm  Discuss – The Shetland News's deep link to embedded pages of the Shetland Times's web site, through the use of Times' web site's news headlines, was held to be an act of copyright infringement under British law and an injunction was issued for the same. Shetland Times Ltd. v. Dr. Jonathan Wills and Zetnews Ltd.
  • 8.
     Read thelink- 5 minutes https://onlinelaw.wustl.edu/blog/case-study-am-records-inc-v-napster-inc/ https://www.copyright.gov/fair-use/summaries/a&mrecords-napster- 9thcir2001.pdf  Discuss – The infringement of copyright protection online is known as digital piracy, which involves the uploading, streaming, downloading and sharing of copyrighted works (e.g., books, music, and films) beyond authorization for access, use and distribution prescribed by law. A case in point was Napster, an online platform that enabled the illegal distribution of music through peer-to-peer file sharing ( A&M Records, Inc. v. Napster, Inc., 2001). Copyright infringement also occurred on other peer-to-peer file sharing and Torrent sites (such as Kazaa, Limewire, and PirateBay), and cryptolockers (i.e., sites that provide cloud storage and sharing services to clients; e.g., Megaupload) (Drath, 2012). Like other forms of cyber-enabled intellectual property crime, digital piracy deprives the authors and publishers of copyrighted works of economic returns on their creations, property and labour. For example, HBO (a US channel network that requires viewers to pay to view content) experienced millions of dollars in lost US revenue when episodes of one of its TV series, Game of Thrones, were leaked online for free viewing (Denham, 2015).Scripts of Game of Thrones' episodes and the unaired episodes of the HBO TV shows were also leaked online following a data breach that HBO experienced in 2017 (Gibbs, 2017). digital piracy
  • 9.
  • 10.
  • 12.
    12 www.ipadventure.in Slides designed bythe team. I am distant associate for this startup. Slides will be made available on slideshare: IPR and PATENTS Day #...
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 19.
     Original Ideas,research Results  A book or a novel protected by copyright  Copyright need not be registered  WIPO ( World Intellectual Property Organisation)  patents, copyrights, trademarks, geographical indications, designs IP- Intellectual Property
  • 20.
     GI- DarjilingTea  Adidas Shoe- Aesthestics plus functionality- No need to register  Disney Character - register  Trademarks- Logos  Patent duration – 20 years from the date of application IP- Intellectual Property
  • 22.
     Cyberwarfare refersto the use of digital attacks – like computer viruses and hacking – by one country to disrupt the vital computer systems of another, with the aim of creating damage, death and destruction.  Future wars will see hackers using computer code to attack an enemy's infrastructure, fighting alongside troops using conventional weapons like guns and missiles  Threatmap: https://threatmap.checkpoint.com/ Cyber Warfare
  • 24.
  • 25.
  • 26.
  • 27.
     Ethical Hacking –Ethical hacking is used by cyber practitioners to find vulnerabilities before an attacker is able to exploit them.  Cyber Kill Chain Model – Describes Phases of Targeted Cyber Attacks – 7 Steps : Reconnaissance, Weaponization, Delivery, Exploit, Installation, Command and Control, and Actions on Objectives Ethical Hacking and Cyber Kill Chain
  • 28.
     Risk Evaluationto enterprise from array of vulnerabilities  Prevent breaches once Malware is analyzed  Ransomware – type of malicious software (malware) used by cybercriminals to extort money.  WannaCry (Locker Ransomware) – takes your data hostage, promising to return it if you pay a ransom. – Attack took place in May 2017 for Microsoft OS systems – The WannaCry ransomware attack hit around 230,000 computers globally. Malware Analysis and Vulnerability Assessment
  • 29.
  • 31.
    fake news hasreal consequences.
  • 32.
  • 33.
  • 34.
  • 35.
     Almost allof the pictures or texts that are shared from unknown sources from friends are created for advertising purposes and harvest of the likeprofiles. The objective of social farming sites is to bring traffic to their page and target viewers’ and their friends digital and demographic profiles  avoid adding their like, share or comment on a text or picture that comes from friends who last shared the content and were not the originator Social Media
  • 37.
     In 1981,he was charged with stealing computer manuals from Pacific Bell. In 1982, he hacked the North American Defense Command (NORAD), an achievement that inspired the 1983 film War Games  In 1989, he hacked Digital Equipment Corporation's (DEC) network and made copies of their software  Because DEC was a leading computer manufacturer at the time, this act put Mitnick on the map. He was later arrested, convicted and sent to prison. During his conditional release, he hacked Pacific Bell's voicemail systems.  https://www.linkedin.com/in/kevinmitnick/ Kevin Mitnick
  • 38.
     cybercrime- creditcards etc, cyber industrial espionage and cyber warfare  black hat and white hat hackers, darkweb  Teenage, thrill, validation, adrenalin rush, power, idealism  heightened sense of social injustice- hacktivist collectives like Anonymous Hackers Mindset
  • 40.
     Hello there.My handle is 5NIP3R but the gang calls me 5R. I can’t remember when I got into computers for the first time or when my addiction to the internet started. What I am sure of is that during high school I found my inner hacker calling. Talking to other hackers in the deep web, working to impress one another, made me realise the endless doors internet and data can open. Knowledge is power, and the power is online. Although I started with small hits, I built my experience through the years and decided to take it a step further.  I did my studies in Behavioural Psychology. Understanding behaviours and patterns always fascinated me. All that time, all my effort, paid off. Now, I consider myself a gentle master hacker. People give hints about their lives all over the web; you just have to be patient, curious and perseverant. Data that people see as meaningless happens to be gold when analysed together. I’ll tell you a story about my most recent successful corporate hacking, and how I pulled it off. Inside the mind of a hacker
  • 41.
     I ama freelancer. I work here and there and I’m a hacker for amusement. It makes me feel a bit like a superhero too. When I don’t like a brand or a person, I hack them, I take revenge.  The choice of target came by chance last time. I paid a multinational company for a bundled service, and they ended up not presenting the final product I was expecting, refusing to return the money I invested. So I did what any good hacker would do. I returned home and suited up. Inside the mind of a hacker
  • 42.
  • 43.
  • 44.