SlideShare a Scribd company logo
1 of 23
LEGAL PROTECTION OF INNOVATIVE USES OF
COMPUTERS IN R&D
PREPARED BY :
PRUTHIL TEJANI
202204100410009
1
M.PHARM SEM 2
COMPUTER AIDED DRUD DELIVERY SYSTEM
MALIBA PHARMACY COLLEGE
UKA TARSADIA UNIVERSITY
INDEX
• Intellectual Property Rights
- Patent
- Copyright
- Protection of Databases
- Trade Secrets
• Enforcement of Rights
2
INTELLECTUAL PROPERTY RIGHTS
• The term “intellectual property rights” is used to describe the legal instruments
for protecting innovation.
3
4
INTELLECTUAL PROPERTY RIGHTS
• Although there are often differences in the laws governing these rights in different countries,
almost all countries recognize the basic types of intellectual property that are summarized in
Table.
• Member states of the World Trade Organisation have all committed to introducing these rights
• Of these rights, the most important in the application of computers to pharmaceutical research
and development are
 Patents
 Copyrights
 Database rights
5
6
PATENTS
• Patents are the most important and strongest type of intellectual property.
• Patents protect inventions or technical innovations.
• Patents do not protect new designs (these are protected by copyright or registered designs), nor
do they protect new brand names (trademark protection).
• Patents are granted for inventions that are novel (i.e., not known in the prior art) and have an
inventive step .
• In the application of computers to pharmaceutical applications, both hardware inventions and
software inventions can be protected by patents.
7
PATENTS
• The software would consist of the set of instructions processed in the processor for processing
data obtained from the microarray and stored in the memory.
• Hardware inventions are clearly patentable.
• In the United States, the decision of the Court of Appeal in the so called “State Street” case
opened the way for much more far-reaching patent protection for computer-implemented
inventions than had been previously granted.
• In that decision the Court stated that the sole test for determining whether an innovation is
patentable is whether a “useful, concrete, or tangible” result was obtained .
8
PATENTS ON ALGORITHMS
• Analysis of data in pharmaceutical research and development was carried out essentially by
manual processes, the volume of data that is currently being generated means that increasingly
sophisticated algorithms are being used to order, sort, and analyze the data .
• The European Patent Convention clearly states that scientific theories and mathematical methods
are not to be regarded as being inventions. if a new technical aspect is involved then it grants
Patent.
• USPTO (Washington, DC) and the US courts are looking for a concrete, useful, and tangible result
to justify the grant of a patent.
9
PATENTS ON ALGORITHMS
• Any algorithm used in the analysis of data, such as DNA sequence or protein data, should be
patentable as long as it is not couched in purely mathematical terms but is applied to
achievement of a useful, concrete, and tangible result.
• Example, an algorithm to mine data for potentially useful properties of a drug or for monitoring
side effects of a drug is also protectable .
10
PATENTS ON HUMAN INTERFACES
• Given the amount of data that can be potentially provided to the researcher, efficient means are
needed to present the data in a readily understood manner.
• In Europe such methods of presenting information are excluded from patent protection.
• However, several decisions from the European Patent Office indicate that patents might be
granted if the information presented is more than just “mere” data.
• In the United States the Patent Office is likely to be less restrictive in issuing patents because the
methods of presenting information are not excluded per se from patents.
11
PATENTS ON MACHINE-MACHINE
INTERFACES
• Unlike patents on machine-human interfaces, patents are regularly granted in both the United
States and in Europe on the interfaces to a computer program.
• Such patents can be extremely valuable as they can allow the creator of the computer program
to limit the access to the computer program only to others to whom a license to use the
interface has been granted.
• The use of patents on machine-machine interfaces can be illustrated by considering the example
of a microarray. The data obtained by the microarray can be processed by any computer system
running a suitable program.
• The data are transferred from the microarray to the computer system through an interface, and
use of a patented interface can be restricted only to the patent holder and its licensees.
12
PATENTS ON MACHINE-MACHINE
INTERFACES
• For example, genomic screening carried out with microarrays in which target
oligonucleotides are placed at a number of sites on a chip.
• The material to be analyzed is washed over the chip. At some sites, some of the
genetic material will become bound to the oligonucleotides.
• The position of the sites is detected by fluorescence.
• The sheer number of sites on a chip means that it is impossible for a human
being to record all of the sites at which the genetic material is bound to the
target.
• Instead the detection is carried out automatically, and the results are fed into a
computer.
• The computer program processes the data and produce them in a form that can
be understood and interpreted by a human. 13
PATENTS ON DATA STRUCTURES
• The application of computer programs to pharmaceutical research and development was focused
on the construction of databases to record data generated by drug testing, high-throughput
screening, or gene sequencing experiments.
• The experimental data in such early databases were often stored in a simple flat file structure.
• The structure of these databases can be protected by patents.
• On the other hand, the cognitive information relates to the picture that could be retrieved and
displayed is not patented where as, The data generated in the use of microarrays would suggest
that a data structure is patentable.
14
COPYRIGHT
• Copyright is traditionally used to protect literary works or works of art from copying or from the
making of so called derivative works.
• More recently, protection under the copyright laws has been extended to software.
• In the United States, software is protected as a literary work and registration of the copyright is
carried out at the US Copyright Office.
• The situation in Europe was more complicated as protection was granted under national laws
rather than on EU-wide basis.
15
COPYRIGHT
• In 2002 the World Intellectual Property Organisation (WIPO) Copyright Treaty of 1996 entered
into force for a number of countries, including Japan and United States. Signatories to this treaty
must ensure that computer programs are protected as literary works.
• Copyright only protects the so-called “expression” of the innovation, that is the computer code,
and protection does not extend to the innovation itself.
• In other words, the idea behind the program can be copied, as long as the code itself is not copied
or adapted.
16
PROTECTION OF DATABASES
• A database can be protected either by copyright protection or by so-called database rights.
• The extent to which information in the database can be protected by copyright varies widely
depending on the country involved.
• In many countries, copyright protection is not available for information contained in databases.
• The European Union adopted the European Database Rights Directive to harmonize protection of
the information contained within databases.
17
PROTECTION OF DATABASES
• The directive protects a collection of independent works, data or other materials arranged in a
systematic or methodical way.
• A developer of a database can prevent the extraction and/or reuse of all or a substantial part of
the contents of the database accessible by electronic or other means.
• For example, a database comprising genome sequence data or protein structure data can stop
others from using these data without permission.
• Unfortunately, protection under the European Database Rights Directive is limited only to
persons or legal entities residing in the European Economic Area.
18
TRADE SECRETS
• Trade secret protection is probably the weakest of all intellectual property rights.
• The US Uniform Trade Secret Act defines a trade secret as information, including a formula,
pattern, compilation, program device, method, technique, or process.
• Trade secret protection is available only for information that is known to a smallish group of
persons and that is considered by that group to be confidential and economically valuable.
• Once the information becomes more widely known, it no longer qualifies for trade secret
protection because its value has been lost.
19
TRADE SECRETS
• As a result, once the information has become generally known, it can be freely used by other
companies for their own purposes.
• Trade secrets (or “undisclosed information”) are also protected under the TRIPS (Trade related
aspects of Intellectual Property Rights ) Agreement.
• Trade secret protection can play a significant role in the protection of computer software.
• Data on the efficacy of new drugs, as long as their origination requires considerable effort, are
also protected under the TRIPS Agreement .
• The regulatory authorities are required to keep the information supplied confidential.
20
ENFORCEMENT OF RIGHTS
• The intellectual property rights obtained are only useful if they can be exploited and ultimately
unauthorized users of the rights can be stopped from exploiting them.
• This presents a fairly unique problem in the computer science field. IP rights are essentially
national rights. They are only valid in the country in which they are granted or registered.
• A valid US patent is only valid in the United States, a Canadian copyright only valid in Canada.
Even a so-called European patent is, in effect, a bundle of national patents valid in various
European countries.
• This raises a problem in a situation in which, for example, the user of a computer program is in
one country and the server is in another country.
21
REFERENCE
• Computer Applications in Pharmaceutical Research and Development,
Edited by Sean Ekins, Chapter 29, page no.703-714, ISBN 0-471-73779-8
Copyright © 2006 John Wiley & Sons, Inc.
22
THANK YOU
23

More Related Content

What's hot

Drug Distribution ,Drug Excretion, Active Transport; P–gp, BCRP, Nucleoside T...
Drug Distribution ,Drug Excretion, Active Transport; P–gp, BCRP, Nucleoside T...Drug Distribution ,Drug Excretion, Active Transport; P–gp, BCRP, Nucleoside T...
Drug Distribution ,Drug Excretion, Active Transport; P–gp, BCRP, Nucleoside T...RushikeshPalkar1
 
Biological process involved in drug targetting
Biological process involved  in drug targettingBiological process involved  in drug targetting
Biological process involved in drug targettingSayeda Salma S.A.
 
Seminar (advance biopharmaceutics)
Seminar (advance biopharmaceutics)Seminar (advance biopharmaceutics)
Seminar (advance biopharmaceutics)Drx Shubham Badhe
 
Tumour targeting and Brain specific drug delivery
Tumour targeting and Brain specific drug deliveryTumour targeting and Brain specific drug delivery
Tumour targeting and Brain specific drug deliverySHUBHAMGWAGH
 
Computer simulations in pharmacokinetics and pharmacodynamics
Computer simulations in pharmacokinetics and pharmacodynamicsComputer simulations in pharmacokinetics and pharmacodynamics
Computer simulations in pharmacokinetics and pharmacodynamicsGOKULAKRISHNAN S
 
Computer aided formulation development
Computer aided formulation developmentComputer aided formulation development
Computer aided formulation developmentSiddu K M
 
computers in clinical development
 computers in clinical development computers in clinical development
computers in clinical developmentSUJITHA MARY
 
Gastric absorption simulation
Gastric absorption simulation Gastric absorption simulation
Gastric absorption simulation SagarBhor5
 
Computational modelling of drug disposition
Computational modelling of drug disposition Computational modelling of drug disposition
Computational modelling of drug disposition lalitajoshi9
 
Targeting methods introduction preparation and evaluation: NanoParticles & Li...
Targeting methods introduction preparation and evaluation: NanoParticles & Li...Targeting methods introduction preparation and evaluation: NanoParticles & Li...
Targeting methods introduction preparation and evaluation: NanoParticles & Li...SURYAKANTVERMA2
 
GIT Absorption Simulation
GIT Absorption SimulationGIT Absorption Simulation
GIT Absorption SimulationJaskiranKaur72
 
MEETING DISSOLUTION REQUIREMENTS PROBLEMS OF VARIABLE CONTROL IN DISSOLUTION ...
MEETING DISSOLUTION REQUIREMENTS PROBLEMS OF VARIABLE CONTROL IN DISSOLUTION ...MEETING DISSOLUTION REQUIREMENTS PROBLEMS OF VARIABLE CONTROL IN DISSOLUTION ...
MEETING DISSOLUTION REQUIREMENTS PROBLEMS OF VARIABLE CONTROL IN DISSOLUTION ...MukeshKumarBhagat
 
COMPUTER SIMULATIONS IN PHARMACOKINETICS & PHARMACODYNAMICS
COMPUTER SIMULATIONS  IN  PHARMACOKINETICS & PHARMACODYNAMICSCOMPUTER SIMULATIONS  IN  PHARMACOKINETICS & PHARMACODYNAMICS
COMPUTER SIMULATIONS IN PHARMACOKINETICS & PHARMACODYNAMICSsagartrivedi14
 
Computational modeling of drug disposition
Computational modeling of drug dispositionComputational modeling of drug disposition
Computational modeling of drug dispositionPV. Viji
 
Computer aided formulation development
Computer aided formulation developmentComputer aided formulation development
Computer aided formulation developmentNikitaGidde
 
Dr. A. SUMATHI - Transdermal Delivery of Vaccines
Dr. A. SUMATHI - Transdermal Delivery of VaccinesDr. A. SUMATHI - Transdermal Delivery of Vaccines
Dr. A. SUMATHI - Transdermal Delivery of VaccinesSumathi Arumugam
 
model construction of GI simulation
model construction of GI simulationmodel construction of GI simulation
model construction of GI simulationKarthikSwamybm
 
computer aided formulation development
 computer aided formulation development computer aided formulation development
computer aided formulation developmentSUJITHA MARY
 
COMPUTERS IN PHARMACEUTICAL DEVELOPMENT
COMPUTERS IN PHARMACEUTICAL DEVELOPMENTCOMPUTERS IN PHARMACEUTICAL DEVELOPMENT
COMPUTERS IN PHARMACEUTICAL DEVELOPMENTArunpandiyan59
 
Emulsions and microemulsions- computer in pharmaceutical formulatation
Emulsions and microemulsions- computer in pharmaceutical formulatationEmulsions and microemulsions- computer in pharmaceutical formulatation
Emulsions and microemulsions- computer in pharmaceutical formulatationSUJITHA MARY
 

What's hot (20)

Drug Distribution ,Drug Excretion, Active Transport; P–gp, BCRP, Nucleoside T...
Drug Distribution ,Drug Excretion, Active Transport; P–gp, BCRP, Nucleoside T...Drug Distribution ,Drug Excretion, Active Transport; P–gp, BCRP, Nucleoside T...
Drug Distribution ,Drug Excretion, Active Transport; P–gp, BCRP, Nucleoside T...
 
Biological process involved in drug targetting
Biological process involved  in drug targettingBiological process involved  in drug targetting
Biological process involved in drug targetting
 
Seminar (advance biopharmaceutics)
Seminar (advance biopharmaceutics)Seminar (advance biopharmaceutics)
Seminar (advance biopharmaceutics)
 
Tumour targeting and Brain specific drug delivery
Tumour targeting and Brain specific drug deliveryTumour targeting and Brain specific drug delivery
Tumour targeting and Brain specific drug delivery
 
Computer simulations in pharmacokinetics and pharmacodynamics
Computer simulations in pharmacokinetics and pharmacodynamicsComputer simulations in pharmacokinetics and pharmacodynamics
Computer simulations in pharmacokinetics and pharmacodynamics
 
Computer aided formulation development
Computer aided formulation developmentComputer aided formulation development
Computer aided formulation development
 
computers in clinical development
 computers in clinical development computers in clinical development
computers in clinical development
 
Gastric absorption simulation
Gastric absorption simulation Gastric absorption simulation
Gastric absorption simulation
 
Computational modelling of drug disposition
Computational modelling of drug disposition Computational modelling of drug disposition
Computational modelling of drug disposition
 
Targeting methods introduction preparation and evaluation: NanoParticles & Li...
Targeting methods introduction preparation and evaluation: NanoParticles & Li...Targeting methods introduction preparation and evaluation: NanoParticles & Li...
Targeting methods introduction preparation and evaluation: NanoParticles & Li...
 
GIT Absorption Simulation
GIT Absorption SimulationGIT Absorption Simulation
GIT Absorption Simulation
 
MEETING DISSOLUTION REQUIREMENTS PROBLEMS OF VARIABLE CONTROL IN DISSOLUTION ...
MEETING DISSOLUTION REQUIREMENTS PROBLEMS OF VARIABLE CONTROL IN DISSOLUTION ...MEETING DISSOLUTION REQUIREMENTS PROBLEMS OF VARIABLE CONTROL IN DISSOLUTION ...
MEETING DISSOLUTION REQUIREMENTS PROBLEMS OF VARIABLE CONTROL IN DISSOLUTION ...
 
COMPUTER SIMULATIONS IN PHARMACOKINETICS & PHARMACODYNAMICS
COMPUTER SIMULATIONS  IN  PHARMACOKINETICS & PHARMACODYNAMICSCOMPUTER SIMULATIONS  IN  PHARMACOKINETICS & PHARMACODYNAMICS
COMPUTER SIMULATIONS IN PHARMACOKINETICS & PHARMACODYNAMICS
 
Computational modeling of drug disposition
Computational modeling of drug dispositionComputational modeling of drug disposition
Computational modeling of drug disposition
 
Computer aided formulation development
Computer aided formulation developmentComputer aided formulation development
Computer aided formulation development
 
Dr. A. SUMATHI - Transdermal Delivery of Vaccines
Dr. A. SUMATHI - Transdermal Delivery of VaccinesDr. A. SUMATHI - Transdermal Delivery of Vaccines
Dr. A. SUMATHI - Transdermal Delivery of Vaccines
 
model construction of GI simulation
model construction of GI simulationmodel construction of GI simulation
model construction of GI simulation
 
computer aided formulation development
 computer aided formulation development computer aided formulation development
computer aided formulation development
 
COMPUTERS IN PHARMACEUTICAL DEVELOPMENT
COMPUTERS IN PHARMACEUTICAL DEVELOPMENTCOMPUTERS IN PHARMACEUTICAL DEVELOPMENT
COMPUTERS IN PHARMACEUTICAL DEVELOPMENT
 
Emulsions and microemulsions- computer in pharmaceutical formulatation
Emulsions and microemulsions- computer in pharmaceutical formulatationEmulsions and microemulsions- computer in pharmaceutical formulatation
Emulsions and microemulsions- computer in pharmaceutical formulatation
 

Similar to LEGAL PROTECTION OF IN[1] CADD pharmaceutics

patent in pharmaceutical and healthcare computing
patent in pharmaceutical and healthcare  computingpatent in pharmaceutical and healthcare  computing
patent in pharmaceutical and healthcare computingSumant Saini
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraintsmrcox
 
intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rightsHamza Cheema
 
Copy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IPCopy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IPmuhammadshahid2047
 
How To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life SciencesHow To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life SciencesSecureDocs
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 
Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to dataRobin Rice
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensicsLalit Garg
 
Global & U.S. Patents for Digital Health Startups
Global & U.S. Patents for Digital Health StartupsGlobal & U.S. Patents for Digital Health Startups
Global & U.S. Patents for Digital Health StartupsAurora Consulting
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxSATYAJIT58
 
Pharma data analytics
Pharma data analyticsPharma data analytics
Pharma data analyticsAxon Lawyers
 
On Software Patenting
On Software PatentingOn Software Patenting
On Software PatentingDong Calmada
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningUlf Mattsson
 

Similar to LEGAL PROTECTION OF IN[1] CADD pharmaceutics (20)

patent in pharmaceutical and healthcare computing
patent in pharmaceutical and healthcare  computingpatent in pharmaceutical and healthcare  computing
patent in pharmaceutical and healthcare computing
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraints
 
intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rights
 
Info 442 chapt 5
Info 442 chapt 5Info 442 chapt 5
Info 442 chapt 5
 
Copy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IPCopy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IP
 
How To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life SciencesHow To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life Sciences
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
Querying Patent Data for Empirical Scholarship : Tools and Strategies
Querying Patent Data for Empirical Scholarship : Tools and StrategiesQuerying Patent Data for Empirical Scholarship : Tools and Strategies
Querying Patent Data for Empirical Scholarship : Tools and Strategies
 
Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to data
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Global & U.S. Patents for Digital Health Startups
Global & U.S. Patents for Digital Health StartupsGlobal & U.S. Patents for Digital Health Startups
Global & U.S. Patents for Digital Health Startups
 
Computer application
Computer application   Computer application
Computer application
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
 
Pharma data analytics
Pharma data analyticsPharma data analytics
Pharma data analytics
 
File000166
File000166File000166
File000166
 
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
 
On Software Patenting
On Software PatentingOn Software Patenting
On Software Patenting
 
Patents and covid innovations
Patents  and covid innovationsPatents  and covid innovations
Patents and covid innovations
 
IoT PPT Deck
IoT PPT DeckIoT PPT Deck
IoT PPT Deck
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
 

More from MittalGandhi

GASTROINTESTINAL ABSORPTION SIMULATION CADD.pptx
GASTROINTESTINAL ABSORPTION SIMULATION CADD.pptxGASTROINTESTINAL ABSORPTION SIMULATION CADD.pptx
GASTROINTESTINAL ABSORPTION SIMULATION CADD.pptxMittalGandhi
 
Gene Therapy 07-08-2023 Molecular pharmaceutics
Gene Therapy 07-08-2023 Molecular pharmaceuticsGene Therapy 07-08-2023 Molecular pharmaceutics
Gene Therapy 07-08-2023 Molecular pharmaceuticsMittalGandhi
 
Rheology modifiers n Preservatives.Pharmaceutics
Rheology modifiers n Preservatives.PharmaceuticsRheology modifiers n Preservatives.Pharmaceutics
Rheology modifiers n Preservatives.PharmaceuticsMittalGandhi
 
Cosmetic presentation.pharmaceutics(Loan license)
Cosmetic presentation.pharmaceutics(Loan license)Cosmetic presentation.pharmaceutics(Loan license)
Cosmetic presentation.pharmaceutics(Loan license)MittalGandhi
 
kinetics of stability Molecular pharmaceutics
kinetics of stability Molecular pharmaceuticskinetics of stability Molecular pharmaceutics
kinetics of stability Molecular pharmaceuticsMittalGandhi
 
aerosol nasal drug delivery system pharmaceutics
aerosol nasal drug delivery system pharmaceuticsaerosol nasal drug delivery system pharmaceutics
aerosol nasal drug delivery system pharmaceuticsMittalGandhi
 
Review of literature final research methodology
Review of literature final research methodologyReview of literature final research methodology
Review of literature final research methodologyMittalGandhi
 
2-Gas-cylinder-Sample-port-Columns (1).pptx
2-Gas-cylinder-Sample-port-Columns (1).pptx2-Gas-cylinder-Sample-port-Columns (1).pptx
2-Gas-cylinder-Sample-port-Columns (1).pptxMittalGandhi
 
Drug excipient interaction modern pharmaceutics
Drug excipient interaction modern pharmaceuticsDrug excipient interaction modern pharmaceutics
Drug excipient interaction modern pharmaceuticsMittalGandhi
 
Computers in Pharmaceutical Formulations - Final.pptx
Computers in Pharmaceutical Formulations - Final.pptxComputers in Pharmaceutical Formulations - Final.pptx
Computers in Pharmaceutical Formulations - Final.pptxMittalGandhi
 
Validation Master Plan Modern Pharmaceutics
Validation Master Plan Modern PharmaceuticsValidation Master Plan Modern Pharmaceutics
Validation Master Plan Modern PharmaceuticsMittalGandhi
 

More from MittalGandhi (11)

GASTROINTESTINAL ABSORPTION SIMULATION CADD.pptx
GASTROINTESTINAL ABSORPTION SIMULATION CADD.pptxGASTROINTESTINAL ABSORPTION SIMULATION CADD.pptx
GASTROINTESTINAL ABSORPTION SIMULATION CADD.pptx
 
Gene Therapy 07-08-2023 Molecular pharmaceutics
Gene Therapy 07-08-2023 Molecular pharmaceuticsGene Therapy 07-08-2023 Molecular pharmaceutics
Gene Therapy 07-08-2023 Molecular pharmaceutics
 
Rheology modifiers n Preservatives.Pharmaceutics
Rheology modifiers n Preservatives.PharmaceuticsRheology modifiers n Preservatives.Pharmaceutics
Rheology modifiers n Preservatives.Pharmaceutics
 
Cosmetic presentation.pharmaceutics(Loan license)
Cosmetic presentation.pharmaceutics(Loan license)Cosmetic presentation.pharmaceutics(Loan license)
Cosmetic presentation.pharmaceutics(Loan license)
 
kinetics of stability Molecular pharmaceutics
kinetics of stability Molecular pharmaceuticskinetics of stability Molecular pharmaceutics
kinetics of stability Molecular pharmaceutics
 
aerosol nasal drug delivery system pharmaceutics
aerosol nasal drug delivery system pharmaceuticsaerosol nasal drug delivery system pharmaceutics
aerosol nasal drug delivery system pharmaceutics
 
Review of literature final research methodology
Review of literature final research methodologyReview of literature final research methodology
Review of literature final research methodology
 
2-Gas-cylinder-Sample-port-Columns (1).pptx
2-Gas-cylinder-Sample-port-Columns (1).pptx2-Gas-cylinder-Sample-port-Columns (1).pptx
2-Gas-cylinder-Sample-port-Columns (1).pptx
 
Drug excipient interaction modern pharmaceutics
Drug excipient interaction modern pharmaceuticsDrug excipient interaction modern pharmaceutics
Drug excipient interaction modern pharmaceutics
 
Computers in Pharmaceutical Formulations - Final.pptx
Computers in Pharmaceutical Formulations - Final.pptxComputers in Pharmaceutical Formulations - Final.pptx
Computers in Pharmaceutical Formulations - Final.pptx
 
Validation Master Plan Modern Pharmaceutics
Validation Master Plan Modern PharmaceuticsValidation Master Plan Modern Pharmaceutics
Validation Master Plan Modern Pharmaceutics
 

Recently uploaded

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

LEGAL PROTECTION OF IN[1] CADD pharmaceutics

  • 1. LEGAL PROTECTION OF INNOVATIVE USES OF COMPUTERS IN R&D PREPARED BY : PRUTHIL TEJANI 202204100410009 1 M.PHARM SEM 2 COMPUTER AIDED DRUD DELIVERY SYSTEM MALIBA PHARMACY COLLEGE UKA TARSADIA UNIVERSITY
  • 2. INDEX • Intellectual Property Rights - Patent - Copyright - Protection of Databases - Trade Secrets • Enforcement of Rights 2
  • 3. INTELLECTUAL PROPERTY RIGHTS • The term “intellectual property rights” is used to describe the legal instruments for protecting innovation. 3
  • 4. 4
  • 5. INTELLECTUAL PROPERTY RIGHTS • Although there are often differences in the laws governing these rights in different countries, almost all countries recognize the basic types of intellectual property that are summarized in Table. • Member states of the World Trade Organisation have all committed to introducing these rights • Of these rights, the most important in the application of computers to pharmaceutical research and development are  Patents  Copyrights  Database rights 5
  • 6. 6
  • 7. PATENTS • Patents are the most important and strongest type of intellectual property. • Patents protect inventions or technical innovations. • Patents do not protect new designs (these are protected by copyright or registered designs), nor do they protect new brand names (trademark protection). • Patents are granted for inventions that are novel (i.e., not known in the prior art) and have an inventive step . • In the application of computers to pharmaceutical applications, both hardware inventions and software inventions can be protected by patents. 7
  • 8. PATENTS • The software would consist of the set of instructions processed in the processor for processing data obtained from the microarray and stored in the memory. • Hardware inventions are clearly patentable. • In the United States, the decision of the Court of Appeal in the so called “State Street” case opened the way for much more far-reaching patent protection for computer-implemented inventions than had been previously granted. • In that decision the Court stated that the sole test for determining whether an innovation is patentable is whether a “useful, concrete, or tangible” result was obtained . 8
  • 9. PATENTS ON ALGORITHMS • Analysis of data in pharmaceutical research and development was carried out essentially by manual processes, the volume of data that is currently being generated means that increasingly sophisticated algorithms are being used to order, sort, and analyze the data . • The European Patent Convention clearly states that scientific theories and mathematical methods are not to be regarded as being inventions. if a new technical aspect is involved then it grants Patent. • USPTO (Washington, DC) and the US courts are looking for a concrete, useful, and tangible result to justify the grant of a patent. 9
  • 10. PATENTS ON ALGORITHMS • Any algorithm used in the analysis of data, such as DNA sequence or protein data, should be patentable as long as it is not couched in purely mathematical terms but is applied to achievement of a useful, concrete, and tangible result. • Example, an algorithm to mine data for potentially useful properties of a drug or for monitoring side effects of a drug is also protectable . 10
  • 11. PATENTS ON HUMAN INTERFACES • Given the amount of data that can be potentially provided to the researcher, efficient means are needed to present the data in a readily understood manner. • In Europe such methods of presenting information are excluded from patent protection. • However, several decisions from the European Patent Office indicate that patents might be granted if the information presented is more than just “mere” data. • In the United States the Patent Office is likely to be less restrictive in issuing patents because the methods of presenting information are not excluded per se from patents. 11
  • 12. PATENTS ON MACHINE-MACHINE INTERFACES • Unlike patents on machine-human interfaces, patents are regularly granted in both the United States and in Europe on the interfaces to a computer program. • Such patents can be extremely valuable as they can allow the creator of the computer program to limit the access to the computer program only to others to whom a license to use the interface has been granted. • The use of patents on machine-machine interfaces can be illustrated by considering the example of a microarray. The data obtained by the microarray can be processed by any computer system running a suitable program. • The data are transferred from the microarray to the computer system through an interface, and use of a patented interface can be restricted only to the patent holder and its licensees. 12
  • 13. PATENTS ON MACHINE-MACHINE INTERFACES • For example, genomic screening carried out with microarrays in which target oligonucleotides are placed at a number of sites on a chip. • The material to be analyzed is washed over the chip. At some sites, some of the genetic material will become bound to the oligonucleotides. • The position of the sites is detected by fluorescence. • The sheer number of sites on a chip means that it is impossible for a human being to record all of the sites at which the genetic material is bound to the target. • Instead the detection is carried out automatically, and the results are fed into a computer. • The computer program processes the data and produce them in a form that can be understood and interpreted by a human. 13
  • 14. PATENTS ON DATA STRUCTURES • The application of computer programs to pharmaceutical research and development was focused on the construction of databases to record data generated by drug testing, high-throughput screening, or gene sequencing experiments. • The experimental data in such early databases were often stored in a simple flat file structure. • The structure of these databases can be protected by patents. • On the other hand, the cognitive information relates to the picture that could be retrieved and displayed is not patented where as, The data generated in the use of microarrays would suggest that a data structure is patentable. 14
  • 15. COPYRIGHT • Copyright is traditionally used to protect literary works or works of art from copying or from the making of so called derivative works. • More recently, protection under the copyright laws has been extended to software. • In the United States, software is protected as a literary work and registration of the copyright is carried out at the US Copyright Office. • The situation in Europe was more complicated as protection was granted under national laws rather than on EU-wide basis. 15
  • 16. COPYRIGHT • In 2002 the World Intellectual Property Organisation (WIPO) Copyright Treaty of 1996 entered into force for a number of countries, including Japan and United States. Signatories to this treaty must ensure that computer programs are protected as literary works. • Copyright only protects the so-called “expression” of the innovation, that is the computer code, and protection does not extend to the innovation itself. • In other words, the idea behind the program can be copied, as long as the code itself is not copied or adapted. 16
  • 17. PROTECTION OF DATABASES • A database can be protected either by copyright protection or by so-called database rights. • The extent to which information in the database can be protected by copyright varies widely depending on the country involved. • In many countries, copyright protection is not available for information contained in databases. • The European Union adopted the European Database Rights Directive to harmonize protection of the information contained within databases. 17
  • 18. PROTECTION OF DATABASES • The directive protects a collection of independent works, data or other materials arranged in a systematic or methodical way. • A developer of a database can prevent the extraction and/or reuse of all or a substantial part of the contents of the database accessible by electronic or other means. • For example, a database comprising genome sequence data or protein structure data can stop others from using these data without permission. • Unfortunately, protection under the European Database Rights Directive is limited only to persons or legal entities residing in the European Economic Area. 18
  • 19. TRADE SECRETS • Trade secret protection is probably the weakest of all intellectual property rights. • The US Uniform Trade Secret Act defines a trade secret as information, including a formula, pattern, compilation, program device, method, technique, or process. • Trade secret protection is available only for information that is known to a smallish group of persons and that is considered by that group to be confidential and economically valuable. • Once the information becomes more widely known, it no longer qualifies for trade secret protection because its value has been lost. 19
  • 20. TRADE SECRETS • As a result, once the information has become generally known, it can be freely used by other companies for their own purposes. • Trade secrets (or “undisclosed information”) are also protected under the TRIPS (Trade related aspects of Intellectual Property Rights ) Agreement. • Trade secret protection can play a significant role in the protection of computer software. • Data on the efficacy of new drugs, as long as their origination requires considerable effort, are also protected under the TRIPS Agreement . • The regulatory authorities are required to keep the information supplied confidential. 20
  • 21. ENFORCEMENT OF RIGHTS • The intellectual property rights obtained are only useful if they can be exploited and ultimately unauthorized users of the rights can be stopped from exploiting them. • This presents a fairly unique problem in the computer science field. IP rights are essentially national rights. They are only valid in the country in which they are granted or registered. • A valid US patent is only valid in the United States, a Canadian copyright only valid in Canada. Even a so-called European patent is, in effect, a bundle of national patents valid in various European countries. • This raises a problem in a situation in which, for example, the user of a computer program is in one country and the server is in another country. 21
  • 22. REFERENCE • Computer Applications in Pharmaceutical Research and Development, Edited by Sean Ekins, Chapter 29, page no.703-714, ISBN 0-471-73779-8 Copyright © 2006 John Wiley & Sons, Inc. 22