SlideShare una empresa de Scribd logo
1 de 45
Ethics in Information
Technology, Second Edition
Chapter 6
Intellectual Property
Ethics in Information Technology, Second Edition 2
Objectives
• What does the term intellectual property encompass,
and why are companies so concerned about
protecting it?
• What are the strengths and limitations of using
copyrights, patents, and trade secret laws to protect
intellectual property?
• What is plagiarism, and what can be done to combat
it?
• What is reverse engineering, and what issues are
associated with applying it to create a look-alike of a
competitor’s software program?
Ethics in Information Technology, Second Edition 3
Objectives (continued)
• What is open source code, and what is the
fundamental premise behind its use?
• What is the essential difference between competitive
intelligence and industrial espionage, and how is
competitive intelligence gathered?
• What is cybersquatting, and what strategy should be
used to protect an organization from it?
Ethics in Information Technology, Second Edition 4
Intellectual Property
• What Is Intellectual Property?
– Have you ever given a CD to a friend that contained a
copy of a computer game or a program?
– Have you ever recorded a televised movie to watch later
in the week?
– Have you downloaded music or a movie from the Web
without paying for it?
– Have you e-mailed a copy of an online newspaper or
magazine article to a dozen friends?
– Have you set up a Web site about your favorite band or
actor, with short videos from performances?
Q: Do you know which of these actions are legal and which are illegal, and why?
Ethics in Information Technology, Second Edition 5
Intellectual Property
• What Is Intellectual Property?
– The value of a painting is higher than the cost of the
canvas and paint used to create it!
– The value of intellectual and artistic works comes from
the creativity, ideas, skills, labor, and other nonmaterial
efforts and attributes provided by their creators.
– Our property rights to the physical property we create or
buy include the rights to use it, to prevent others from
using it, and to set the (asking) price for selling it.
– Would you produce something if anyone else can just
take it away?
Q: How is it important for the individual/society to protect intellectual property?
Ethics in Information Technology, Second Edition 6
Intellectual Property
• Intellectual Property Is:
– Term used to describe works of the mind
Distinct and “owned” or created by a person or
group
– Intangible creative work—not the particular physical
form on which it is stored or delivered.
– Given legal protection in the form of copyright,
patent, trademark, and trade secret laws.
– The owner of a physical book may give away, lend,
or resell the one physical book he or she bought, but
not make copies.
Ethics in Information Technology, Second Edition 7
Intellectual Property
• Intellectual Property Laws:
– Copyright law
• Protects authored works
– Patent laws
• Protect inventions
– Trade secret laws
• Help safeguard information critical to an
organization’s success
Ethics in Information Technology, Second Edition 8
Copyrights
• Copyrights are granted for a limited, but long, time
[Life + 50 yrs in 1976; 1998: Life + 70 years, 95
years for corporate work].
• With some exceptions, copyright owners have the
exclusive right to:
– Make copies of the work,
– Produce derivative works,
– Distribute copies,
– Perform the work in public, and
– Display the work in public.
• Author may grant exclusive right to others
Ethics in Information Technology, Second Edition 9
Copyrights (continued)
• Types of work that can be
– Architecture
– Art
– Audiovisual works
– Choreography
– Drama
– Graphics
– Literature
– Motion pictures
Copyrighted:
– Music
– Pantomimes
– Pictures
– Sculptures
– Sound recordings
– Other intellectual works
• As described in Title
17 of U.S. Code
Ethics in Information Technology, Second Edition 10
Copyrights (continued)
• To get Copyright:
– Work must fall within one of the preceding
categories
– Must be original
• Evaluating originality can cause problems
Ethics in Information Technology, Second Edition 11
Copyright Law
• Fair-Use Doctrine
– Permission to use the work is not required.
– Allows uses of copyrighted material that contribute to
the creation of new work and do not significantly
affect sales of the material, thus depriving copyright
holders of their income.
– Allows some research and educational uses as well
as news reporting and critiquing.
– Guidelines for determining Fair Use are found in law.
Q: How does the Fair-Use Doctrine distinguish between photocopies
made by students and those made by workers in a corporation?
Ethics in Information Technology, Second Edition 12
Four Factors in “Fair Use”(1976)
– Purpose and nature of use, including whether it is for
commercial $$ purposes or nonprofit educational
purposes.
– The nature of the copyrighted work. Creative work such
as a novel, music, art, have more protection than
factual work – after all the facts are the facts.
– The amount and the significance of the portion used.
– The effect of the use on the potential market or value of
the copyrighted work. Uses that reduce sales of the
original work are less likely to be considered fair use.
Ethics in Information Technology, Second Edition 13
Copyrights (continued)
• Copyright infringement
– Copy substantial and material part of another’s
copyrighted work
– Without permission
• Area of copyright infringement
– Worldwide sale of counterfeit consumer supplies
• Copyrights to protect computer software exist
– To prove infringement, copyright holders must show
a striking resemblance between the original software
and the new software that could be explained only
by copying
Ethics in Information Technology, Second Edition 14
Copyrights (continued)
• World Intellectual Property Organization (WIPO)
– Agency of the United Nations
– Advocates for the interests of intellectual property
owners
• Digital Millennium Copyright Act (DMCA)
– Added new provisions to WIPO
– Civil and criminal penalties included
– Governs distribution of tools and software that can
be used for copyright infringement
– Opponents say it restricts the free flow of information
Ethics in Information Technology, Second Edition 15
Patents
• Grant of property rights to inventors
• Patents are granted for a limited time.
– Patents protect new ideas by giving the inventor a monopoly on
the invention for a specified period of time (e.g. 20 years).
• Issued by the U.S. Patent and Trademark Office (USPTO)
• Permits an owner to exclude the public from making, using,
or selling the protected invention
• Allows legal action against violators
• Prevents independent creation
• Extends only to the United States and its territories and
possessions
Ethics in Information Technology, Second Edition 16
Patents (continued)
• Applicant must file with the USPTO
– USPTO searches prior art
– Takes an average of 25 months
• Prior art
– Existing body of knowledge
– Available to a person of ordinary skill in the art
• Patent infringement
– Someone makes unauthorized use of a patent
– No specified limit to the monetary penalty
Ethics in Information Technology, Second Edition 17
Patents (continued)
• An invention must pass four tests
1. Must be in one of the five statutory classes of items
• Processes
• Machines
• Manufactures (Such as objects made by human and machines)
• Composition of matter (such as chemical compounds)
• New uses of any of the previous classes
1. Must be useful
2. Must be novel
3. Must not be obvious to a person having ordinary skill in the same field
• Items cannot be patented if they are
– Abstract ideas
– Laws of nature
– Natural phenomena
Ethics in Information Technology, Second Edition 18
Patents (continued)
• Software patent
– Feature, function, or process embodied in
instructions executed on a computer
• 20,000 software-related patents per year have
been issued since the early 1980s
Ethics in Information Technology, Second Edition 19
Issues For Software Developers
• Copyright or Patent Software?
– There is disagreement about whether copyright is
the appropriate protection mechanism for
software.
– Some argue for patents, some for completely new
rules designed specifically for software.
– There are two aspects to the debate.
– First, what is the nature of a new program? Is it an
invention, a new idea? Or is it a “writing,” an
expression of ideas, algorithms, techniques?
– Second, what are the practical consequences of
each choice in terms of encouraging innovation
and production of new products?
Ethics in Information Technology, Second Edition 20
Practical considerations
• Should You Copyright or Patent Software?
– Copyrights:
• Protect the expression of an idea in a fixed and
tangible form.
• Are cheap, easy to obtain, and last a long time.
• Allow fair-use of the intellectual property.
– Patents:
• Protect new, non-obvious, and useful processes.
• Are expensive, difficult to obtain, and last for short
periods of time.
• Allow licensing to other developers.
Ethics in Information Technology, Second Edition 21
Software Patents (continued)
• Before obtaining a software patent, do a patent
search
• Software Patent Institute is building a database of
information
• Cross-licensing agreements
– Large software companies agree not to sue others
over patent infringements
– Small businesses have no choice but to license
patents
Ethics in Information Technology, Second Edition 22
Patents (continued)
• Defensive publishing
– Alternative to filing for patents
– Company publishes a description of the innovation
– Establishes the idea’s legal existence as prior art
– Costs mere hundreds of dollars
– No lawyers
– Fast
Ethics in Information Technology, Second Edition 23
Patents (continued)
• Standard
– is a definition or format
– Approved by recognized standards organization
(ISO,ANSI)
– Or accepted as a de facto standard by the industry
– Enables hardware and software from different
manufacturers to work together
• Submarine patent
– Hidden within a standard
– Does not surface until the standard is broadly
adopted
Ethics in Information Technology, Second Edition 24
Patents (continued)
• Patent farming involves
– Influencing a standards organization to make use of
a patented item
– Demanding royalties from all parties that use the
standard
Ethics in Information Technology, Second Edition 25
Trade Secret Laws
• Uniform Trade Secrets Act (UTSA) established
uniformity in trade secret law
• Trade secret
– Business information
– Represents something of economic value
– Requires an effort or cost to develop
– Some degree of uniqueness or novelty
– Generally unknown to the public
– Kept confidential
• Computer hardware and software can qualify for
trade secret protection
Ethics in Information Technology, Second Edition 26
Trade Secret Laws (continued)
• Information is only considered a trade secret if the
company takes steps to protect it
• Greatest threat to loss of company trade secrets is
employees
• Nondisclosure clauses in employee’s contract
– Enforcement can be difficult
– Confidentiality issues are reviewed at the exit
interview
Ethics in Information Technology, Second Edition 27
Trade Secret Laws (continued)
• Noncompete agreements
– Protect intellectual property from being used by
competitors when key employees leave
– Require employees not to work for competitors for a
period of time
• Safeguards
– Limit outside access to corporate computers
– Guard use of remote computers by employees
Ethics in Information Technology, Second Edition 28
Trade Secret Laws (continued)
• Trade secret law has a few key advantages over
patents and copyrights
– No time limitations
– No need to file an application
– Patents can be ruled invalid by courts
– No filing or application fees
• Law doesn’t prevent someone from using the same
idea if it is developed independently
• World Trade Organization (WTO)
– TRIPs Agreement provides for a minimum level of
protection for intellectual property
Ethics in Information Technology, Second Edition 29
Summary of the WTO TRIPs Agreement
Ethics in Information Technology, Second Edition 30
Legal Overview: The Battle Over
Customer Lists
• Employees make unauthorized use of an
employer’s customer list
– Customer list not automatically considered a trade
secret
– Educate workers about the confidentiality of such
lists
Ethics in Information Technology, Second Edition 31
Key Intellectual Property Issues
• Issues that apply to intellectual property and
information technology
– Plagiarism
– Reverse engineering
– Open source code
– Competitive intelligence
– Cybersquatting
Ethics in Information Technology, Second Edition 32
1. Plagiarism
• Theft and passing off of someone’s ideas or words
as one’s own
• Many students
– Do not understand what constitutes plagiarism
– Believe that all electronic content is in the public
domain
• Plagiarism detection systems
– Check submitted material against databases of
electronic content
Ethics in Information Technology, Second Edition 33
Plagiarism (continued)
• Steps to combat student plagiarism
– Help students understand what constitutes
plagiarism
– Show students how to document Web pages
– Schedule major writing assignments in portions
– Tell students that you know about Internet paper
mills
– Educate students about plagiarism detection
services
Ethics in Information Technology, Second Edition 34
Partial List of Plagiarism Detection
Services and Software
Ethics in Information Technology, Second Edition 35
2. Reverse Engineering
• Process of taking something apart in order to
– Understand it
– Build a copy of it
– Improve it
• Applied to computer
– Hardware
– Software
• Convert a program code to a higher level design
• Convert an application that ran on one vendor’s
database to run on another’s
Ethics in Information Technology, Second Edition 36
Reverse Engineering (continued)
• Compiler
– Language translator
– Converts computer program statements expressed
in a source language to machine language
• Software manufacturer
– Provides software in machine language form
• Decompiler
– Reads machine language
– Produces source code
Ethics in Information Technology, Second Edition 37
Reverse Engineering (continued)
• Courts have ruled in favor of using reverse
engineering
– To enable interoperability
• Software license agreements forbid reverse
engineering
• Semiconductor Chip Protection Act (SCPA)
– Established a new type of intellectual property
protection for mask works
Ethics in Information Technology, Second Edition 38
3. Open Source Code
• Program source code made available for use or
modification
– As users or other developers see fit
• Basic premise
– Software improves
– Can be adapted to meet new needs
– Bugs rapidly identified and fixed
• High reliability
• GNU General Public License (GPL) was a
precursor to the Open Source Initiative (OSI)
Ethics in Information Technology, Second Edition 39
4. Competitive Intelligence
• Gathering of legally obtainable information
– To help a company gain an advantage over rivals
• Often integrated into a company’s strategic plans
and decision making
• Not industrial espionage
• Nearly 25 colleges and universities offer courses or
programs
• Without proper management safeguards it can
cross over to industrial espionage
Ethics in Information Technology, Second Edition 40
A Manager’s Checklist for Running an
Ethical Competitive Intelligence Operation
Ethics in Information Technology, Second Edition 41
5. Cybersquatting
• Trademark is anything that enables a consumer to
differentiate one company’s products from
another’s
– May be
• Logo
• Package design
• Phrase
• Sound
• Word
Ethics in Information Technology, Second Edition 42
Cybersquatting (continued)
• Trademark law
– Trademark’s owner has the right to prevent others
from using the same mark
• Or confusingly similar mark
• Cybersquatters
– Registered domain names for famous trademarks or
company names
– Hope the trademark’s owner would buy the domain
name
• For a large sum of money
Ethics in Information Technology, Second Edition 43
Cybersquatting (continued)
• To curb cybersquatting
– Register all possible domain names
• .org
• .com
• .info
• Internet Corporation for Assigned Names and
Numbers (ICANN)
– Current trademark holders are given time to assert
their rights in the new top-level domains before
registrations are opened to the general public
Ethics in Information Technology, Second Edition 44
Summary
• Intellectual property is protected by
– Copyrights
– Patents
– Trade secrets
• Plagiarism is stealing and passing off the ideas and
words of another as one’s own
• Reverse engineering
– Process of breaking something down
– In order to understand, build copy, or improve it
Ethics in Information Technology, Second Edition 45
Summary (continued)
• Open source code
– Made available for use or modification as users or
other developers see fit
• Competitive intelligence
– Not industrial espionage
– Uses legal means and public information
• Cybersquatting
– Registration of a domain name by an unaffiliated
party

Más contenido relacionado

La actualidad más candente

ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsMichael Heron
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology Kathirvel Ayyaswamy
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technologyjvonschilling
 
Information Assurance And Security - Chapter 3 - Lesson 1
Information Assurance And Security - Chapter 3 - Lesson 1Information Assurance And Security - Chapter 3 - Lesson 1
Information Assurance And Security - Chapter 3 - Lesson 1MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2MLG College of Learning, Inc
 
Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technologySJBennett228
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsDyuti Islam
 
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Upekha Vandebona
 
computer ethics
computer ethicscomputer ethics
computer ethicsHoney jose
 
Copyright law - STS X3
Copyright law - STS X3Copyright law - STS X3
Copyright law - STS X3djesameatqc
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Intellectual Property Rights ( IPR )
Intellectual Property Rights ( IPR )Intellectual Property Rights ( IPR )
Intellectual Property Rights ( IPR )joems_angel2000
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 

La actualidad más candente (20)

ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
 
Information Assurance And Security - Chapter 3 - Lesson 1
Information Assurance And Security - Chapter 3 - Lesson 1Information Assurance And Security - Chapter 3 - Lesson 1
Information Assurance And Security - Chapter 3 - Lesson 1
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2
 
Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technology
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
 
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
 
Chapter 1_dp-pertemuan 1
 Chapter 1_dp-pertemuan 1 Chapter 1_dp-pertemuan 1
Chapter 1_dp-pertemuan 1
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Software development
Software developmentSoftware development
Software development
 
Copyright law - STS X3
Copyright law - STS X3Copyright law - STS X3
Copyright law - STS X3
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Intellectual Property Rights ( IPR )
Intellectual Property Rights ( IPR )Intellectual Property Rights ( IPR )
Intellectual Property Rights ( IPR )
 
Copyright law
Copyright law Copyright law
Copyright law
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 

Destacado

Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Usersalmario1988
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Intellectual Property, Copyright, and Ethics
Intellectual Property, Copyright, and EthicsIntellectual Property, Copyright, and Ethics
Intellectual Property, Copyright, and Ethicsakia38321
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Legal Issues for the Entrepreneur
Legal Issues for the EntrepreneurLegal Issues for the Entrepreneur
Legal Issues for the Entrepreneuramitgehi83
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
Sci 1010 chapter11
Sci 1010 chapter11Sci 1010 chapter11
Sci 1010 chapter11stanbridge
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacytolshinoda
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
Chapter 6 lecture slides
Chapter 6 lecture slidesChapter 6 lecture slides
Chapter 6 lecture slideslmanor
 
A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...Ukam John Victor
 
Chapter 5 PowerPoint
Chapter 5 PowerPointChapter 5 PowerPoint
Chapter 5 PowerPointpourettejones
 

Destacado (20)

Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Bgs chapter 6
Bgs chapter 6Bgs chapter 6
Bgs chapter 6
 
04 privacy
04 privacy04 privacy
04 privacy
 
Intellectual Property, Copyright, and Ethics
Intellectual Property, Copyright, and EthicsIntellectual Property, Copyright, and Ethics
Intellectual Property, Copyright, and Ethics
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Legal Issues for the Entrepreneur
Legal Issues for the EntrepreneurLegal Issues for the Entrepreneur
Legal Issues for the Entrepreneur
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Ethics
EthicsEthics
Ethics
 
Sci 1010 chapter11
Sci 1010 chapter11Sci 1010 chapter11
Sci 1010 chapter11
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacy
 
Ethics
EthicsEthics
Ethics
 
Quality of life with IT
Quality of life with ITQuality of life with IT
Quality of life with IT
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter 6 lecture slides
Chapter 6 lecture slidesChapter 6 lecture slides
Chapter 6 lecture slides
 
A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...
 
Chapter 5 PowerPoint
Chapter 5 PowerPointChapter 5 PowerPoint
Chapter 5 PowerPoint
 

Similar a Chapter 6

Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)wtidwell
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual propertySalim Hosen
 
20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information TechnologyKathirvel Ayyaswamy
 
Intellectual Property: What is intellectual property, and why is it important?
Intellectual Property: What is intellectual property, and why is it important? Intellectual Property: What is intellectual property, and why is it important?
Intellectual Property: What is intellectual property, and why is it important? Mintz Levin
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual PropertySaqib Raza
 
Introduction to Intellectual Property and Patents
Introduction to Intellectual Property and PatentsIntroduction to Intellectual Property and Patents
Introduction to Intellectual Property and PatentsTT Consultants
 
Chapter 12 Professional Issues (digital media)
Chapter 12 Professional Issues (digital media)Chapter 12 Professional Issues (digital media)
Chapter 12 Professional Issues (digital media)shelly3160
 
Lecture 03 intellectual property
Lecture 03   intellectual propertyLecture 03   intellectual property
Lecture 03 intellectual propertyTawfig Tawill
 
Silicon Halton Meetup 108 - Is Your AI Invention Protectable?
Silicon Halton Meetup 108 - Is Your AI Invention Protectable?Silicon Halton Meetup 108 - Is Your AI Invention Protectable?
Silicon Halton Meetup 108 - Is Your AI Invention Protectable?Silicon Halton
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rightsHimanshu Pathak
 
Copyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsCopyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsMartha Hardy
 
Society_law_and_ethics.pdf
Society_law_and_ethics.pdfSociety_law_and_ethics.pdf
Society_law_and_ethics.pdfManyaThakur12
 
Intellectual Property Strategies
Intellectual Property StrategiesIntellectual Property Strategies
Intellectual Property StrategiesEnvisioning Labs
 
Monetizing Game User Interface Innovations in Enterprise Applications
Monetizing Game User Interface Innovations in Enterprise ApplicationsMonetizing Game User Interface Innovations in Enterprise Applications
Monetizing Game User Interface Innovations in Enterprise ApplicationsFrank Coppersmith
 
Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations121487
 
Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations121487
 
Copyright in digital era
Copyright in digital eraCopyright in digital era
Copyright in digital eraSunil Saini
 

Similar a Chapter 6 (20)

Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 
Copyright and Technology
Copyright and TechnologyCopyright and Technology
Copyright and Technology
 
20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology
 
Intellectual Property: What is intellectual property, and why is it important?
Intellectual Property: What is intellectual property, and why is it important? Intellectual Property: What is intellectual property, and why is it important?
Intellectual Property: What is intellectual property, and why is it important?
 
Patent law
Patent law Patent law
Patent law
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual Property
 
Introduction to Intellectual Property and Patents
Introduction to Intellectual Property and PatentsIntroduction to Intellectual Property and Patents
Introduction to Intellectual Property and Patents
 
Chapter 12 Professional Issues (digital media)
Chapter 12 Professional Issues (digital media)Chapter 12 Professional Issues (digital media)
Chapter 12 Professional Issues (digital media)
 
Lecture 03 intellectual property
Lecture 03   intellectual propertyLecture 03   intellectual property
Lecture 03 intellectual property
 
1587310973-week7.pptx
1587310973-week7.pptx1587310973-week7.pptx
1587310973-week7.pptx
 
Silicon Halton Meetup 108 - Is Your AI Invention Protectable?
Silicon Halton Meetup 108 - Is Your AI Invention Protectable?Silicon Halton Meetup 108 - Is Your AI Invention Protectable?
Silicon Halton Meetup 108 - Is Your AI Invention Protectable?
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
Copyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsCopyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative Commons
 
Society_law_and_ethics.pdf
Society_law_and_ethics.pdfSociety_law_and_ethics.pdf
Society_law_and_ethics.pdf
 
Intellectual Property Strategies
Intellectual Property StrategiesIntellectual Property Strategies
Intellectual Property Strategies
 
Monetizing Game User Interface Innovations in Enterprise Applications
Monetizing Game User Interface Innovations in Enterprise ApplicationsMonetizing Game User Interface Innovations in Enterprise Applications
Monetizing Game User Interface Innovations in Enterprise Applications
 
Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations
 
Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations
 
Copyright in digital era
Copyright in digital eraCopyright in digital era
Copyright in digital era
 

Chapter 6

  • 1. Ethics in Information Technology, Second Edition Chapter 6 Intellectual Property
  • 2. Ethics in Information Technology, Second Edition 2 Objectives • What does the term intellectual property encompass, and why are companies so concerned about protecting it? • What are the strengths and limitations of using copyrights, patents, and trade secret laws to protect intellectual property? • What is plagiarism, and what can be done to combat it? • What is reverse engineering, and what issues are associated with applying it to create a look-alike of a competitor’s software program?
  • 3. Ethics in Information Technology, Second Edition 3 Objectives (continued) • What is open source code, and what is the fundamental premise behind its use? • What is the essential difference between competitive intelligence and industrial espionage, and how is competitive intelligence gathered? • What is cybersquatting, and what strategy should be used to protect an organization from it?
  • 4. Ethics in Information Technology, Second Edition 4 Intellectual Property • What Is Intellectual Property? – Have you ever given a CD to a friend that contained a copy of a computer game or a program? – Have you ever recorded a televised movie to watch later in the week? – Have you downloaded music or a movie from the Web without paying for it? – Have you e-mailed a copy of an online newspaper or magazine article to a dozen friends? – Have you set up a Web site about your favorite band or actor, with short videos from performances? Q: Do you know which of these actions are legal and which are illegal, and why?
  • 5. Ethics in Information Technology, Second Edition 5 Intellectual Property • What Is Intellectual Property? – The value of a painting is higher than the cost of the canvas and paint used to create it! – The value of intellectual and artistic works comes from the creativity, ideas, skills, labor, and other nonmaterial efforts and attributes provided by their creators. – Our property rights to the physical property we create or buy include the rights to use it, to prevent others from using it, and to set the (asking) price for selling it. – Would you produce something if anyone else can just take it away? Q: How is it important for the individual/society to protect intellectual property?
  • 6. Ethics in Information Technology, Second Edition 6 Intellectual Property • Intellectual Property Is: – Term used to describe works of the mind Distinct and “owned” or created by a person or group – Intangible creative work—not the particular physical form on which it is stored or delivered. – Given legal protection in the form of copyright, patent, trademark, and trade secret laws. – The owner of a physical book may give away, lend, or resell the one physical book he or she bought, but not make copies.
  • 7. Ethics in Information Technology, Second Edition 7 Intellectual Property • Intellectual Property Laws: – Copyright law • Protects authored works – Patent laws • Protect inventions – Trade secret laws • Help safeguard information critical to an organization’s success
  • 8. Ethics in Information Technology, Second Edition 8 Copyrights • Copyrights are granted for a limited, but long, time [Life + 50 yrs in 1976; 1998: Life + 70 years, 95 years for corporate work]. • With some exceptions, copyright owners have the exclusive right to: – Make copies of the work, – Produce derivative works, – Distribute copies, – Perform the work in public, and – Display the work in public. • Author may grant exclusive right to others
  • 9. Ethics in Information Technology, Second Edition 9 Copyrights (continued) • Types of work that can be – Architecture – Art – Audiovisual works – Choreography – Drama – Graphics – Literature – Motion pictures Copyrighted: – Music – Pantomimes – Pictures – Sculptures – Sound recordings – Other intellectual works • As described in Title 17 of U.S. Code
  • 10. Ethics in Information Technology, Second Edition 10 Copyrights (continued) • To get Copyright: – Work must fall within one of the preceding categories – Must be original • Evaluating originality can cause problems
  • 11. Ethics in Information Technology, Second Edition 11 Copyright Law • Fair-Use Doctrine – Permission to use the work is not required. – Allows uses of copyrighted material that contribute to the creation of new work and do not significantly affect sales of the material, thus depriving copyright holders of their income. – Allows some research and educational uses as well as news reporting and critiquing. – Guidelines for determining Fair Use are found in law. Q: How does the Fair-Use Doctrine distinguish between photocopies made by students and those made by workers in a corporation?
  • 12. Ethics in Information Technology, Second Edition 12 Four Factors in “Fair Use”(1976) – Purpose and nature of use, including whether it is for commercial $$ purposes or nonprofit educational purposes. – The nature of the copyrighted work. Creative work such as a novel, music, art, have more protection than factual work – after all the facts are the facts. – The amount and the significance of the portion used. – The effect of the use on the potential market or value of the copyrighted work. Uses that reduce sales of the original work are less likely to be considered fair use.
  • 13. Ethics in Information Technology, Second Edition 13 Copyrights (continued) • Copyright infringement – Copy substantial and material part of another’s copyrighted work – Without permission • Area of copyright infringement – Worldwide sale of counterfeit consumer supplies • Copyrights to protect computer software exist – To prove infringement, copyright holders must show a striking resemblance between the original software and the new software that could be explained only by copying
  • 14. Ethics in Information Technology, Second Edition 14 Copyrights (continued) • World Intellectual Property Organization (WIPO) – Agency of the United Nations – Advocates for the interests of intellectual property owners • Digital Millennium Copyright Act (DMCA) – Added new provisions to WIPO – Civil and criminal penalties included – Governs distribution of tools and software that can be used for copyright infringement – Opponents say it restricts the free flow of information
  • 15. Ethics in Information Technology, Second Edition 15 Patents • Grant of property rights to inventors • Patents are granted for a limited time. – Patents protect new ideas by giving the inventor a monopoly on the invention for a specified period of time (e.g. 20 years). • Issued by the U.S. Patent and Trademark Office (USPTO) • Permits an owner to exclude the public from making, using, or selling the protected invention • Allows legal action against violators • Prevents independent creation • Extends only to the United States and its territories and possessions
  • 16. Ethics in Information Technology, Second Edition 16 Patents (continued) • Applicant must file with the USPTO – USPTO searches prior art – Takes an average of 25 months • Prior art – Existing body of knowledge – Available to a person of ordinary skill in the art • Patent infringement – Someone makes unauthorized use of a patent – No specified limit to the monetary penalty
  • 17. Ethics in Information Technology, Second Edition 17 Patents (continued) • An invention must pass four tests 1. Must be in one of the five statutory classes of items • Processes • Machines • Manufactures (Such as objects made by human and machines) • Composition of matter (such as chemical compounds) • New uses of any of the previous classes 1. Must be useful 2. Must be novel 3. Must not be obvious to a person having ordinary skill in the same field • Items cannot be patented if they are – Abstract ideas – Laws of nature – Natural phenomena
  • 18. Ethics in Information Technology, Second Edition 18 Patents (continued) • Software patent – Feature, function, or process embodied in instructions executed on a computer • 20,000 software-related patents per year have been issued since the early 1980s
  • 19. Ethics in Information Technology, Second Edition 19 Issues For Software Developers • Copyright or Patent Software? – There is disagreement about whether copyright is the appropriate protection mechanism for software. – Some argue for patents, some for completely new rules designed specifically for software. – There are two aspects to the debate. – First, what is the nature of a new program? Is it an invention, a new idea? Or is it a “writing,” an expression of ideas, algorithms, techniques? – Second, what are the practical consequences of each choice in terms of encouraging innovation and production of new products?
  • 20. Ethics in Information Technology, Second Edition 20 Practical considerations • Should You Copyright or Patent Software? – Copyrights: • Protect the expression of an idea in a fixed and tangible form. • Are cheap, easy to obtain, and last a long time. • Allow fair-use of the intellectual property. – Patents: • Protect new, non-obvious, and useful processes. • Are expensive, difficult to obtain, and last for short periods of time. • Allow licensing to other developers.
  • 21. Ethics in Information Technology, Second Edition 21 Software Patents (continued) • Before obtaining a software patent, do a patent search • Software Patent Institute is building a database of information • Cross-licensing agreements – Large software companies agree not to sue others over patent infringements – Small businesses have no choice but to license patents
  • 22. Ethics in Information Technology, Second Edition 22 Patents (continued) • Defensive publishing – Alternative to filing for patents – Company publishes a description of the innovation – Establishes the idea’s legal existence as prior art – Costs mere hundreds of dollars – No lawyers – Fast
  • 23. Ethics in Information Technology, Second Edition 23 Patents (continued) • Standard – is a definition or format – Approved by recognized standards organization (ISO,ANSI) – Or accepted as a de facto standard by the industry – Enables hardware and software from different manufacturers to work together • Submarine patent – Hidden within a standard – Does not surface until the standard is broadly adopted
  • 24. Ethics in Information Technology, Second Edition 24 Patents (continued) • Patent farming involves – Influencing a standards organization to make use of a patented item – Demanding royalties from all parties that use the standard
  • 25. Ethics in Information Technology, Second Edition 25 Trade Secret Laws • Uniform Trade Secrets Act (UTSA) established uniformity in trade secret law • Trade secret – Business information – Represents something of economic value – Requires an effort or cost to develop – Some degree of uniqueness or novelty – Generally unknown to the public – Kept confidential • Computer hardware and software can qualify for trade secret protection
  • 26. Ethics in Information Technology, Second Edition 26 Trade Secret Laws (continued) • Information is only considered a trade secret if the company takes steps to protect it • Greatest threat to loss of company trade secrets is employees • Nondisclosure clauses in employee’s contract – Enforcement can be difficult – Confidentiality issues are reviewed at the exit interview
  • 27. Ethics in Information Technology, Second Edition 27 Trade Secret Laws (continued) • Noncompete agreements – Protect intellectual property from being used by competitors when key employees leave – Require employees not to work for competitors for a period of time • Safeguards – Limit outside access to corporate computers – Guard use of remote computers by employees
  • 28. Ethics in Information Technology, Second Edition 28 Trade Secret Laws (continued) • Trade secret law has a few key advantages over patents and copyrights – No time limitations – No need to file an application – Patents can be ruled invalid by courts – No filing or application fees • Law doesn’t prevent someone from using the same idea if it is developed independently • World Trade Organization (WTO) – TRIPs Agreement provides for a minimum level of protection for intellectual property
  • 29. Ethics in Information Technology, Second Edition 29 Summary of the WTO TRIPs Agreement
  • 30. Ethics in Information Technology, Second Edition 30 Legal Overview: The Battle Over Customer Lists • Employees make unauthorized use of an employer’s customer list – Customer list not automatically considered a trade secret – Educate workers about the confidentiality of such lists
  • 31. Ethics in Information Technology, Second Edition 31 Key Intellectual Property Issues • Issues that apply to intellectual property and information technology – Plagiarism – Reverse engineering – Open source code – Competitive intelligence – Cybersquatting
  • 32. Ethics in Information Technology, Second Edition 32 1. Plagiarism • Theft and passing off of someone’s ideas or words as one’s own • Many students – Do not understand what constitutes plagiarism – Believe that all electronic content is in the public domain • Plagiarism detection systems – Check submitted material against databases of electronic content
  • 33. Ethics in Information Technology, Second Edition 33 Plagiarism (continued) • Steps to combat student plagiarism – Help students understand what constitutes plagiarism – Show students how to document Web pages – Schedule major writing assignments in portions – Tell students that you know about Internet paper mills – Educate students about plagiarism detection services
  • 34. Ethics in Information Technology, Second Edition 34 Partial List of Plagiarism Detection Services and Software
  • 35. Ethics in Information Technology, Second Edition 35 2. Reverse Engineering • Process of taking something apart in order to – Understand it – Build a copy of it – Improve it • Applied to computer – Hardware – Software • Convert a program code to a higher level design • Convert an application that ran on one vendor’s database to run on another’s
  • 36. Ethics in Information Technology, Second Edition 36 Reverse Engineering (continued) • Compiler – Language translator – Converts computer program statements expressed in a source language to machine language • Software manufacturer – Provides software in machine language form • Decompiler – Reads machine language – Produces source code
  • 37. Ethics in Information Technology, Second Edition 37 Reverse Engineering (continued) • Courts have ruled in favor of using reverse engineering – To enable interoperability • Software license agreements forbid reverse engineering • Semiconductor Chip Protection Act (SCPA) – Established a new type of intellectual property protection for mask works
  • 38. Ethics in Information Technology, Second Edition 38 3. Open Source Code • Program source code made available for use or modification – As users or other developers see fit • Basic premise – Software improves – Can be adapted to meet new needs – Bugs rapidly identified and fixed • High reliability • GNU General Public License (GPL) was a precursor to the Open Source Initiative (OSI)
  • 39. Ethics in Information Technology, Second Edition 39 4. Competitive Intelligence • Gathering of legally obtainable information – To help a company gain an advantage over rivals • Often integrated into a company’s strategic plans and decision making • Not industrial espionage • Nearly 25 colleges and universities offer courses or programs • Without proper management safeguards it can cross over to industrial espionage
  • 40. Ethics in Information Technology, Second Edition 40 A Manager’s Checklist for Running an Ethical Competitive Intelligence Operation
  • 41. Ethics in Information Technology, Second Edition 41 5. Cybersquatting • Trademark is anything that enables a consumer to differentiate one company’s products from another’s – May be • Logo • Package design • Phrase • Sound • Word
  • 42. Ethics in Information Technology, Second Edition 42 Cybersquatting (continued) • Trademark law – Trademark’s owner has the right to prevent others from using the same mark • Or confusingly similar mark • Cybersquatters – Registered domain names for famous trademarks or company names – Hope the trademark’s owner would buy the domain name • For a large sum of money
  • 43. Ethics in Information Technology, Second Edition 43 Cybersquatting (continued) • To curb cybersquatting – Register all possible domain names • .org • .com • .info • Internet Corporation for Assigned Names and Numbers (ICANN) – Current trademark holders are given time to assert their rights in the new top-level domains before registrations are opened to the general public
  • 44. Ethics in Information Technology, Second Edition 44 Summary • Intellectual property is protected by – Copyrights – Patents – Trade secrets • Plagiarism is stealing and passing off the ideas and words of another as one’s own • Reverse engineering – Process of breaking something down – In order to understand, build copy, or improve it
  • 45. Ethics in Information Technology, Second Edition 45 Summary (continued) • Open source code – Made available for use or modification as users or other developers see fit • Competitive intelligence – Not industrial espionage – Uses legal means and public information • Cybersquatting – Registration of a domain name by an unaffiliated party