SlideShare a Scribd company logo
1 of 15
BS Computer Science 5th
Professional Practice
Intellectual Property Rights
Introduction
Intellectual property rights are often the most
valuable assets owned, used and developed
by a software house. The Intellectual property
rights include:
 Confidential information
 Patents
 trade marks
 Designs
 Copyrights protecting computer programs
They protect information stored by electronic means
and all of the paperwork which accompanies a
program, such as the user manual, plus any
multimedia packages and most items on the Web.
 Great care should be taken to protect, exploit and
enforce intellectual property
 The name under which a product is sold may be
registered as a trade mark
 the hardware or a process used in its manufacture
may be protected by a patent
 the look of the product may be registered in the
Designs Registry
 software can be protected by copyright
 the know-how which goes into the development of
the product may be protected as confidential
information
 Unauthorized use of intellectual property can be
stopped by injunction and damages may be sought
for infringement of these rights
 The law is constantly changing with technological
advance
 General Agreement on Tariffs and Trade (GATT)
concerned the protection of intellectual property
rights in the face of widespread piracy of software
products
Confidential Information
The Information “which is not public property and public
knowledge”, Any category of information, from
personal confidences, to trade secrets and sensitive
government information, any or all of which a
computer scientist might handle in the course of his or
her work, or all or any of which a firm may want to
protect against unauthorized use or disclosure by
others
 Information will be protected only if it is confidential.
Non-confidential information, unless protected, e.g. by
copyright or a patent is deemed to be in the public
domain and can be used by anyone.
Three conditions must be satisfied before an
action for breach of confidence can succeed:
 the information must be confidential
 the information must have been disclosed in
circumstances which give rise to an obligation
of confidence
 there must be an actual or anticipated
unauthorized use or disclosure of the
information
Patents
A government authority conferring a right or title
for a set period, especially the sole right to
exclude others from making, using, or selling an
invention
 A patent gives to an inventor a monopoly in an
invention. This means that the inventor is given
the exclusive right to use or exploit the invention
for a defined period
 The monopoly granted by patent law is so
strong, that the owner of a patent may even
exclude independent inventors from the market
 The better the patent and the more
commercially desirable the breakthrough, the
more likely it is to be challenged. For example, if
competitors can produce a similar product or
process, which is not covered by the patent, they
will be free to market it and to erode the
commercial advantage of the patentee. If they
can prove that the subject matter of the patent
has been used or disclosed before, they can
invalidate the patent
 Patent Act merely sets out a number of criteria
which must be satisfied before an invention can
be patented
 a patent may only be granted if:
 the invention is new
 it involves an inventive step
 it is capable of industrial application
 the subject matter of the invention does not
fall within an excluded class
 It is possible to patent something which is
more than just a program—something which
can be called, for simplicity, a “program plus”
A computer program is not excluded from
patentability if it produced, or is capable
of producing, a further technical effect
beyond the normal physical interaction
between software and hardware, i.e. it is
potentially patentable if it makes
something else do something.
Copyright
The exclusive legal right, given to an originator or an
assignee to print, publish, perform material, and
to authorize others to do the same
 Copyright protects more items generated by
businesses or by individuals than any other
aspect of intellectual property law
 It can protect business letters, manuals,
diagrams, computer programs
 Copyright owners face the specter of unlimited
piracy through uncontrolled copying with the
advent of internet
 What we will probably see over the next few
years are stronger laws, more rights for
copyright owners, widespread licensing
schemes and greater use of technical anti-
piracy or copy-monitoring devices and
electronic rights management systems
 Copyright law gives six exclusive rights to the
owner of copyright:
 copy the work
issue copies to the public
 rent or lend the work to the public
 perform, play or show the work in public
 broadcast the work or include it in a cable
programmed service
 make an adaptation of the work or to do any
of the above with an adaptation
The rights apply equally to published and to
unpublished works
Plagiarism:
The practice of taking someone else's work or
ideas and passing them off as one's own.
 All of the following are considered plagiarism:
 turning in someone else's work as your own
 copying words or ideas from someone else
without giving credit
 failing to put a quotation in quotation marks
 giving incorrect information about the source
of a quotation
 changing words but copying the
sentence structure of a source without
giving credit
 for a computer program changing
variable names only, or not changing the
structure or flow of a program

More Related Content

Similar to BS CS5 Lecture 5.pptx

Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesChantial
 
Copy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IPCopy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IPmuhammadshahid2047
 
Protecting innovation
Protecting innovation Protecting innovation
Protecting innovation wahyu0916
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraintsmrcox
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxKRITARTHBANSAL1
 
Copyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsCopyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsMartha Hardy
 
PROPERTY PROTECTION ISSUESThe ability to link computers through th.docx
PROPERTY PROTECTION ISSUESThe ability to link computers through th.docxPROPERTY PROTECTION ISSUESThe ability to link computers through th.docx
PROPERTY PROTECTION ISSUESThe ability to link computers through th.docxamrit47
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacysalehnia
 
Intellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationIntellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationAshesh R
 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptssuseraaf866
 
Lecture-8- IP rights.pptx
Lecture-8- IP rights.pptxLecture-8- IP rights.pptx
Lecture-8- IP rights.pptxSibghat4
 
Information-Control.pptx
Information-Control.pptxInformation-Control.pptx
Information-Control.pptxJeydeeeYhudieee
 
Provisional rights to patents and industrial designs in Vietnam – What you ne...
Provisional rights to patents and industrial designs in Vietnam – What you ne...Provisional rights to patents and industrial designs in Vietnam – What you ne...
Provisional rights to patents and industrial designs in Vietnam – What you ne...KenfoxLaw
 
Full Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfFull Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfNeelHope
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPRNeil Witt
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industryjamiehaworth1
 

Similar to BS CS5 Lecture 5.pptx (20)

Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
 
Copy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IPCopy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IP
 
Protecting innovation
Protecting innovation Protecting innovation
Protecting innovation
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraints
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptx
 
Copyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsCopyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative Commons
 
Law: Bill Loginov
Law: Bill LoginovLaw: Bill Loginov
Law: Bill Loginov
 
PROPERTY PROTECTION ISSUESThe ability to link computers through th.docx
PROPERTY PROTECTION ISSUESThe ability to link computers through th.docxPROPERTY PROTECTION ISSUESThe ability to link computers through th.docx
PROPERTY PROTECTION ISSUESThe ability to link computers through th.docx
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
 
Intellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationIntellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian Legislation
 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.ppt
 
Lecture-8- IP rights.pptx
Lecture-8- IP rights.pptxLecture-8- IP rights.pptx
Lecture-8- IP rights.pptx
 
Information-Control.pptx
Information-Control.pptxInformation-Control.pptx
Information-Control.pptx
 
Provisional rights to patents and industrial designs in Vietnam – What you ne...
Provisional rights to patents and industrial designs in Vietnam – What you ne...Provisional rights to patents and industrial designs in Vietnam – What you ne...
Provisional rights to patents and industrial designs in Vietnam – What you ne...
 
Meisya - Thursday Talk Revised
Meisya - Thursday Talk RevisedMeisya - Thursday Talk Revised
Meisya - Thursday Talk Revised
 
Full Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfFull Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdf
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPR
 
Moral And Ethics
Moral And EthicsMoral And Ethics
Moral And Ethics
 
Legal aspect of IT contracts
Legal aspect of IT contractsLegal aspect of IT contracts
Legal aspect of IT contracts
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 

Recently uploaded

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

BS CS5 Lecture 5.pptx

  • 1. BS Computer Science 5th Professional Practice Intellectual Property Rights
  • 2. Introduction Intellectual property rights are often the most valuable assets owned, used and developed by a software house. The Intellectual property rights include:  Confidential information  Patents  trade marks  Designs  Copyrights protecting computer programs
  • 3. They protect information stored by electronic means and all of the paperwork which accompanies a program, such as the user manual, plus any multimedia packages and most items on the Web.  Great care should be taken to protect, exploit and enforce intellectual property  The name under which a product is sold may be registered as a trade mark  the hardware or a process used in its manufacture may be protected by a patent  the look of the product may be registered in the Designs Registry  software can be protected by copyright
  • 4.  the know-how which goes into the development of the product may be protected as confidential information  Unauthorized use of intellectual property can be stopped by injunction and damages may be sought for infringement of these rights  The law is constantly changing with technological advance  General Agreement on Tariffs and Trade (GATT) concerned the protection of intellectual property rights in the face of widespread piracy of software products
  • 5. Confidential Information The Information “which is not public property and public knowledge”, Any category of information, from personal confidences, to trade secrets and sensitive government information, any or all of which a computer scientist might handle in the course of his or her work, or all or any of which a firm may want to protect against unauthorized use or disclosure by others  Information will be protected only if it is confidential. Non-confidential information, unless protected, e.g. by copyright or a patent is deemed to be in the public domain and can be used by anyone.
  • 6. Three conditions must be satisfied before an action for breach of confidence can succeed:  the information must be confidential  the information must have been disclosed in circumstances which give rise to an obligation of confidence  there must be an actual or anticipated unauthorized use or disclosure of the information
  • 7. Patents A government authority conferring a right or title for a set period, especially the sole right to exclude others from making, using, or selling an invention  A patent gives to an inventor a monopoly in an invention. This means that the inventor is given the exclusive right to use or exploit the invention for a defined period  The monopoly granted by patent law is so strong, that the owner of a patent may even exclude independent inventors from the market
  • 8.  The better the patent and the more commercially desirable the breakthrough, the more likely it is to be challenged. For example, if competitors can produce a similar product or process, which is not covered by the patent, they will be free to market it and to erode the commercial advantage of the patentee. If they can prove that the subject matter of the patent has been used or disclosed before, they can invalidate the patent  Patent Act merely sets out a number of criteria which must be satisfied before an invention can be patented
  • 9.  a patent may only be granted if:  the invention is new  it involves an inventive step  it is capable of industrial application  the subject matter of the invention does not fall within an excluded class  It is possible to patent something which is more than just a program—something which can be called, for simplicity, a “program plus”
  • 10. A computer program is not excluded from patentability if it produced, or is capable of producing, a further technical effect beyond the normal physical interaction between software and hardware, i.e. it is potentially patentable if it makes something else do something.
  • 11. Copyright The exclusive legal right, given to an originator or an assignee to print, publish, perform material, and to authorize others to do the same  Copyright protects more items generated by businesses or by individuals than any other aspect of intellectual property law  It can protect business letters, manuals, diagrams, computer programs  Copyright owners face the specter of unlimited piracy through uncontrolled copying with the advent of internet
  • 12.  What we will probably see over the next few years are stronger laws, more rights for copyright owners, widespread licensing schemes and greater use of technical anti- piracy or copy-monitoring devices and electronic rights management systems  Copyright law gives six exclusive rights to the owner of copyright:  copy the work
  • 13. issue copies to the public  rent or lend the work to the public  perform, play or show the work in public  broadcast the work or include it in a cable programmed service  make an adaptation of the work or to do any of the above with an adaptation The rights apply equally to published and to unpublished works
  • 14. Plagiarism: The practice of taking someone else's work or ideas and passing them off as one's own.  All of the following are considered plagiarism:  turning in someone else's work as your own  copying words or ideas from someone else without giving credit  failing to put a quotation in quotation marks  giving incorrect information about the source of a quotation
  • 15.  changing words but copying the sentence structure of a source without giving credit  for a computer program changing variable names only, or not changing the structure or flow of a program