Unit 4 Intellectual Property
Unit 4 Intellectual Property
Syllabus:
=================================================================
Intellectual Property
Intellectual property is a term used to describe works of the mind—such as art, books, films,
formulas, inventions, music, and processes—that are distinct and owned or created by a single
person or group. It is protected through copyright, patent, and trade secret laws.
Copyright law protects authored works, such as art, books, film, and music; patent law
protects inventions; and trade secret law helps safeguard information that is critical to an
organization’s success. Together, copyright, patent, and trade secret laws form a complex body of
law that addresses the ownership of intellectual property. Such laws can also present potential
ethical problems for IT companies and users—for example, some innovators believe that
copyrights, patents, and trade secrets stifle creativity by making it harder to build on the ideas of
others. Meanwhile, the owners of intellectual property want to control and receive compensation
for the use of their intellectual property. Should the need for ongoing innovation or the rights of
property owners govern how intellectual property is used?
Defining and controlling the appropriate level of access to intellectual property are complex
tasks. For example, protecting computer software has proven to be difficult because it has not been
well categorized under the law. Software has sometimes been treated as the expression of an idea,
which can be protected under copyright law. In other cases, software has been treated as a process
for changing a computer’s internal structure, making it eligible for protection under patent law. At
one time, software was even judged to be a series of mental steps, making it inappropriate for
ownership and ineligible for any form of protection.
Copyright
Copyright and patent protection was established through the U.S. Constitution, Article I,
section 8, clause 8, which specifies that Congress shall have the power “to promote the Progress
of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive
Rights to their respective Writings and Discoveries.”
The Copyright Term Extension Act, also known as the Sonny Bono Copyright Term
Extension Act (after the legislator, and former singer/entertainer, who was one of the cosponsors
of the bill in the House of Representatives), signed into law in 1998, and established the following
time limits:
• For works created after January 1, 1978, copyright protection endures for the life of the
author plus 70 years.
• For works created but not published or registered before January 1, 1978, the term
endures for the life of the author plus 70 years, but in no case expires earlier than
December 31, 2004.
• For works created before 1978 that are still in their original or renewable term of
copyright, the total term was extended to 95 years from the date the copyright was
originally secured.
These extensions were primarily championed by movie studios concerned about retaining
rights to their early films. Opponents argued that extending the copyright period made it more
difficult for artists to build on the work of others, thus stifling creativity and innovation. The Sonny
Bono Copyright Term Extension Act was legally challenged by Eric Eldred, a bibliophile who
wanted to put digitized editions of old books online. The Eldred v. Ashcroft case went all the way
to the Supreme Court, which ruled the act constitutional in 2003.8
Eligible Works
The types of work that can be copyrighted include architecture, art, audio-visual works,
choreography, drama, graphics, literature, motion pictures, music, pantomimes, pictures,
sculptures, sound recordings, and other intellectual works, as described in Title 17 of the U.S.
Code.
To be eligible for a copyright, a work must fall within one of the preceding categories, and it
must be original. Copyright law has proven to be extremely flexible in covering new technologies;
thus, software, video games, multimedia works, and web pages can all be protected.
1. The purpose and character of the use (such as commercial use or non-profit, educational
purposes)
2. The nature of the copyrighted work
3. The portion of the copyrighted work used in relation to the work as a whole
4. The effect of the use on the value of the copyrighted work.
The concept that an idea cannot be copyrighted but the expression of an idea can be key to
understanding copyright protection. For example, an author cannot copy the exact words that
someone else used to describe his feelings during a skirmish with terrorists, but he can convey the
sense of horror that the other person expressed. Also, there is no copyright infringement if two
parties independently develop a similar or even identical work. For example, if two writers
happened to use the same phrase to describe a key historical figure, neither would be guilty of
infringement. Of course, independent creation can be extremely difficult to prove or disprove.
Since 2004, Google has scanned and converted into machine readable form over 20 million
books as part of a project to create an electronic searchable database of books. Users of the Google
Books service can enter search queries and view full pages from books in which the search terms
appear, provided that either the book is out of copyright or the copyright owner has given
permission for the work to be included in the database. If the book is still under copyright, a user
sees “snippets” of text around the queried search terms. The Authors Guild, a professional
organization that advocates for authors on issues of copyright, fair contracts, and free speech, sued
Google saying that serving up search results from scanned books infringes on publishers’
copyrights. In April 2016, the Supreme Court let stand a lower court decision that rejected the
writers’ claims on the basis that such usage represented no infringing fair use. The ruling allows
Google to continue with its scanning project and may encourage other digitization projects.
To prove infringement, the copyright holder must show a striking resemblance between its
software and the new software that could be explained only by copying. However, if the new
software’s manufacturer can establish that it developed the program on its own, without any
knowledge of the existing program, there is no infringement. For example, two software
manufacturers could conceivably develop separate but nearly identical programs for a simple game
such as tic-tac-toe without infringing the other’s copyright.
The Prioritizing Resources and Organization for Intellectual Property Act of 2008
The Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of
2008 created the position of Intellectual Property Enforcement Coordinator within the Executive
Office of the President. It also increased trademark and copyright enforcement and substantially
increased penalties for infringement. One of its programs, called Computer Hacking and
Intellectual Property (CHIP), is a network of over 150 experienced and specially trained federal
prosecutors who focus on computer and intellectual property crimes.
GATT includes a section covering copyrights called the Agreement on Trade-Related Aspects
of Intellectual Property Rights (TRIPS). The U.S. intellectual property law was amended to be
essentially consistent with GATT through both the Uruguay Round Agreements Act of 1994 and
the Sonny Bono Copyright Term Extension Act of 1998. Despite GATT, however, copyright
protection varies greatly from country to country, and an expert should be consulted when
considering international usage of any intellectual property.
There are six types of patents, with the two of main concern to information technology firms being
the utility patent and the design patent.
A utility patent is “issued for the invention of a new and useful process, machine, manufacture, or
composition of matter, or a new and useful improvement thereof, it generally permits its owner to
exclude others from making, using, or selling the invention for a period of up to twenty years from
the date of patent application filing, subject to the payment of maintenance fees.” According to the
USPTO, approximately 90 percent of the patent documents issued in recent years have been utility
patents.
A design patent, which is “issued for a new, original, and ornamental design embodied in or
applied to an article of manufacture,” permits its owner to exclude others from making, using, or
selling the design in question.
Design patents issued from applications filed on or after May 13, 2015, are granted for a term of
15 years from the date of grant. Design patents issued from applications filed before May 13, 2015,
were granted for a term of 14 years from the date of grant.
In the 1981 Diamond v. Diehr case, the Supreme Court granted a patent to Diehr, who had
developed a process control computer and sensors to monitor the temperature inside a rubber mold.
The USPTO interpreted the court’s reasoning to mean that just because an invention used software
did not mean that the invention could not be patented. Based on this ruling, courts have slowly
broadened the scope of protection for software-related inventions.
As a result, during the 1980s and 1990s, the USPTO granted thousands of software-related
patents per year. Application software, business software, expert systems, and system software
were patented, along with such software processes as compilation routines, editing and control
functions, and operating system techniques. Many patents were granted for business methods
implemented in software.
Cross-Licensing Agreements
Many large software companies have cross-licensing agreements in which each party agrees
not to sue the other over patent infringements. For example, Apple and HTC battled for several
years over various mobile phone-related patents, eventually leading the U.S. International Trade
Committee (ITC) to ban imports of two models of the HTC mobile phone. Following that ruling
by the ITC, the two companies agreed to a 10-year cross-licensing agreement that permits each
party to license the other’s current and future patents.
In 2016, IBM entered into cross-licensing arrangements with Western Digital covering
some 100 patents in the area of distributed storage systems and nonvolatile memory devices. In
2014, Twitter acquired 900 IBM patents, and in 2011, Google acquired more than 2,000 IBM
patents in cross-licensing deals.
TRADE SECRETS
A trade secret is defined as business information that represents something of economic
value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally
unknown to the public, and is kept confidential.
Trade secret protection begins by identifying all the information that must be protected—from
undisclosed patent applications to market research and business plans— and developing a
comprehensive strategy for keeping the information secure.
Trade secret law protects only against the misappropriation of trade secrets. If competitors come
up with the same idea on their own, it is not misappropriation; in other words, the law doesn’t
prevent someone from using the same idea if it was developed independently.
Many Asian countries require foreign corporations operating there to transfer rights to their
technology to locally controlled enterprises. (Coca-Cola reopened its operations in India in 1993
after halting sales for 16 years to protect the “secret formula” for its soft drink, even though India’s
vast population represented a huge potential market.)
Under these terms, computer hardware and software can qualify for trade secret protection by the
UTSA.
Aleynikov—a Goldman Sachs programmer who left the firm in 2007 to take a job paying
$1.2 million annually with Teza Technologies, a group of widely recognized experts in quantitative
trading—admitted copying Goldman’s high frequency trading code before he resigned but claimed
the files were intended only as research for his new job.
His initial convictions under the EEA were reversed after Aleynikov spent a year in federal
prison; however, new charges brought in New York state court resulted in Aleynikov being found
guilty of the unlawful use of secret scientific material under New York’s penal code . Aleynikov
could be sentenced to up to four years in prison. Although Aleynikov was found guilty under New
York state law, the wide variety in state statues governing trade secret misappropriation prior to
the passage of DTSA created great uncertainty in the application of trade secret law across the
United States.
DTSA broadly defines misappropriation to include disclosure or use of a trade secret without
express or implied consent or acquisition of a trade secret by anyone with reason to know the trade
secret was acquired by theft, bribery, misrepresentation, breach or inducement of a breach of duty
to maintain secrecy, or espionage through electronic or other means. However, reverse engineering
and independent derivation are not considered improper. The act also allows for seizure of property
under certain conditions to prevent dissemination of the misappropriated trade secret.
Because organizations can risk losing trade secrets when key employees leave, they often
try to prohibit employees from revealing secrets by adding nondisclosure clauses to employment
contracts. Thus, departing employees cannot take copies of computer programs or reveal the details
of software owned by the firm.
Defining reasonable nondisclosure agreements can be difficult, as seen in the following example
involving Apple. In addition to filing hundreds of patents on iPhone technology, the firm put into
place a restrictive nondisclosure agreement to provide an extra layer of protection. Many iPhone
Employers can also use noncompete agreements to protect intellectual property from being used
by competitors when key employees leave. A noncompete agreement prohibits an employee from
working for any competitors for a period of time, often one to two years. When courts are asked
to settle disputes over noncompete agreements, they must weigh several factors. First, they must
consider the reasonableness of the restriction and how it protects confidential and trade secret
information of the former employer. Second, they must weigh the employee’s right to work and
seek employment in the area where the employee has gained skill, experience, and business
contacts. The courts also consider geographic area and the length of time of the restriction in
relation to the pace of change in the industry.
Most states only enforce such noncompete agreements to the extent required to shelter the
employer’s legitimate confidential business interests. However, there is a wide range of treatment
on noncompete agreements among the various states. For example, Ohio is highly supportive of
former employers enforcing noncompete agreements while noncompete agreements are not as
strictly enforced in California.
Plagiarism
Plagiarism is the act of stealing someone’s ideas or words and passing them off as one’s
own. The explosion of electronic content and the growth of the web have made it easy to cut and
paste paragraphs into term papers and other documents without proper citation or quotation marks.
To compound the problem, hundreds of online “paper mills” enable users to download entire term
papers. Although some sites post warnings that their services should be used for research purposes
only, many users pay scant heed. As a result, plagiarism has become an issue from elementary
schools to the highest levels of academia. Plagiarism also occurs outside academia. Popular literary
authors, playwrights, musicians, journalists, and even software developers have been accused of
it.
The following list shows some of the actions that schools can take to combat student plagiarism:
• Help students understand what constitutes plagiarism and why they need to cite sources
properly.
• Show students how to document web pages and materials from online databases.
• Schedule major writing assignments so that portions are due over the course of the term,
thus reducing the likelihood that students will get into a time crunch and be tempted to
plagiarize to meet the deadline.
• Make clear to students that instructors are aware of Internet paper mills.
• Ensure that instructors both educate students about plagiarism detection services and make
them aware that they know how to use these services.
• Incorporate detection software and services into a comprehensive antiplagiarism program.
Plagiarism can also be an issue in the field of software development. Measure of Software
Similarity (MOSS) is software used to measure the similarities among computer programs written
in languages such as Ada, C, C++, Java, Lisp, and Paschal. MOSS is used to detect plagiarism in
computer programming classes and commercial software.
Reverse Engineering
Reverse engineering is the process of taking something apart in order to understand it,
build a copy of it, or improve it. It was originally applied to computer hardware but is now
commonly applied to software as well. Reverse engineering of software involves analysing it to
create a new representation of the system in a different form or at a higher level of abstraction.
Often, reverse engineering begins by extracting design-stage details from program code. Design-
stage details about an information system are more conceptual and less defined than the program
code of the same system. Microsoft has been accused repeatedly of reverse engineering products—
ranging from the Apple Macintosh user interface to many Apple operating system utility features
that were incorporated into DOS (and later Windows), to early word-processing and spreadsheet
programs that set the design for Word and Excel, to Google’s methods for improving search results
for its Bing search engine.
Using reverse engineering, a developer can use the code of the current database programming
language to recover the design of the information system application. Next, code-generation tools
can be used to take the design and produce code (forward engineer) in the new database
programming language. This reverse-engineering and codegenerating process greatly reduces the
time and cost needed to migrate the organization’s applications to the new database management
system. No one challenges the right to use this process to convert applications developed in-house.
After all, those applications were developed and are owned by the companies using them. It is
quite another matter, however, to use this process on a purchased software application developed
and licensed by outside parties. Most IT managers would consider this action unethical because
the software user does not actually own the right to the software. In addition, a number of
intellectual property issues would be raised, depending on whether the software was licensed,
copyrighted, or patented.
The courts have ruled in favor of using reverse engineering to enable interoperability. In the early
1990s, video game maker Sega developed a computerized lock so that only Sega video cartridges
would work on its entertainment systems. This essentially shut out competitors from making
software for the Sega systems. Sega Enterprises Ltd. v. Accolade, Inc. dealt with rival game maker
Accolade’s use of a decompiler to read the Sega software source code. With the code, Accolade
could create new software that circumvented the lock and ran on Sega machines. An appeals court
ultimately ruled that if someone lacks access to the unprotected elements of an original work and
has a “legitimate reason” for gaining access to those elements, disassembly of a copyrighted work
Software license agreements increasingly forbid reverse engineering. As a result of the increased
legislation affecting reverse engineering, some software developers are moving their reverse-
engineering projects offshore to avoid U.S. rules.
The ethics of using reverse engineering are debated. Some argue that its use is fair if it enables a
company to create software that interoperates with another company’s software or hardware and
provides a useful function. This is especially true if the software’s creator refuses to cooperate by
providing documentation to help create interoperable software. From the consumer’s standpoint,
such stifling of competition increases costs and reduces business options. Reverse engineering can
also be a useful tool in detecting software bugs and security holes.
Others argue strongly against the use of reverse engineering, saying it can uncover software
designs that someone else has developed at great cost and taken care to protect. Opponents of
reverse engineering contend it unfairly robs the creator of future earnings and significantly reduces
the business incentive for software development.
There are various definitions of what constitutes open-source code, each with its own
idiosyncrasies. The GNU General Public License (GPL) was a precursor to the open-source code
defined by the Open-Source Initiative (OSI). GNU is a computer operating system comprised
entirely of free software; its name is a recursive acronym for GNUs Not Unix. The GPL is intended
to protect GNU software from being made proprietary, and it lists terms and conditions for
copying, modifying, and distributing free software. The OSI is a non-profit organization that
advocates for open source and certifies open source licenses. Its certification mark, “OSI
Certified,” may be applied only to software distributed under an open source license that meets
OSI criteria, as described at its website, www .opensource.org.
A software developer could attempt to make a program open source simply by putting it into
the public domain with no copyright. This would allow people to share the program and their
improvements, but it would also allow others to revise the original code and then distribute the
Competitive Intelligence
Competitive intelligence is legally obtained information that is gathered to help a
company gain an advantage over its rivals. For example, some companies have employees who
monitor the public announcements of property transfers to detect any plant or store expansions of
competitors. An effective competitive intelligence program requires the continual gathering,
analysis, and evaluation of data with controlled dissemination of useful information to decision
makers.
Competitive intelligence is often integrated into a company’s strategic plan and executive decision
making. Competitive intelligence is not the same as industrial espionage, which is the use of illegal
means to obtain business information not available to the general public. In the United States,
industrial espionage is a serious crime that carries heavy penalties.
Almost all the data needed for competitive intelligence can be collected from examining
published information or interviews, as outlined in the following list:
• 10-K or annual reports
• An SC 13D acquisition—a filing by shareholders who report owning more than five
percent of common stock in a public company
• 10-Q or quarterly reports
• Press releases
• Promotional materials
• Websites
• Analyses by the investment community, such as a Standard & Poor’s stock report
• Interviews with suppliers, customers, and former employees
• Calls to competitors’ customer service groups
• Articles in the trade press
• Environmental impact statements and other filings associated with a plant expansion or
construction
• Patents
The United States has a federal system that stores trademark information; merchants can consult
this information to avoid adopting marks that have already been taken. Merchants seeking
trademark protection apply to the USPTO if they are using the mark in interstate commerce or if
they can demonstrate a true intent to do so. Trademarks can be renewed forever—as long as a mark
is in use.
It is not uncommon for an organization that owns a trademark to sue another organization over
the use of that trademark in a website or a domain name. The court rulings in such cases are not
always consistent and are quite difficult to judge in advance.
Nominative fair use is a defense often employed by the defendant in trademark infringement
cases in which a defendant has used a plaintiff’s mark to identify the plaintiff’s products or services
in conjunction with its own product or services. To successfully employ this defence, the defendant
must show three things:
• that the plaintiff’s product or service cannot be readily identifiable without using the
plaintiff’s mark,
• that it uses only as much of the plaintiff’s mark as necessary to identify the defendant’s
product or service, and
• that the defendant does nothing with the plaintiff’s mark that suggests endorsement or
sponsorship by the plaintiff.
This defence was first applied to websites in Playboy Enterprises, Inc. v. Terri Welles. Welles was
the Playboy™ Playmate of the Year™ in 1981. In 1997, she created a website to offer free photos
of herself, advertise the sale of additional photos, solicit memberships in her photo club, and
promote her spokeswoman services. Welles used the trademarked terms and Playmate of the Year
to describe herself on her website. The Ninth Circuit Court of Appeals determined that the former
Playboy model’s use of trademarked terms was permissible, nominative use. By using the
nominative fair use defense, Welles avoided a motion for preliminary injunction, which would
have restrained her from continuing to use the trademarked terms on her website.
Other tactics can also help curb cybersquatting. For example, the Internet Corporation for
Assigned Names and Numbers (ICANN) is a non-profit corporation responsible for managing
the Internet’s domain name system. Prior to 2000, eight generic top-level domain names were in
existence: .com, .edu, .gov, .int, .mil, .net, .org, and .arpa.
In 2000, ICANN introduced seven more: .aero, .biz, .coop, .info, .museum, .name, and .pro.
In 2004, ICANN introduced .asia, .cat, .mobi, .tel, and .travel. The generic top-level domain .xxx
was approved in 2011. With each new round of generic top-level domains, current trademark
holders are given time to assert rights to their trademarks in the new top-level domains before
registrations are opened up to the general public. As of March 2016, there were 882 top-level
domain names, which can be found at http://blog.europeandomaincentre .com/list-of-domain-
extensions/#.
ICANN also has a Uniform Domain-Name Dispute-Resolution Policy, under which most types of
trademark-based domain name disputes must be resolved by agreement, court action, or arbitration
before a registrar will cancel, suspend, or transfer a domain name.
The ICANN policy is designed to provide for the fast, relatively inexpensive arbitration of a
trademark owner’s complaint that a domain name was registered or used in bad faith.
The Anticyber squatting Consumer Protection Act (ACPA), enacted in 1999, allows
trademark owners to challenge foreign cyber squatters who might otherwise be beyond the
jurisdiction of U.S. courts. Also under this act, trademark holders can seek civil damages of up to
$100,000 from cybersquatters that register their trade names or similar-sounding names as domain
names. The act also helps trademark owners challenge the registration of their trademark as a
domain name even if the trademark owner has not created an actual website.