Unit 3 EIT
Unit 3 EIT
Unit 3 EIT
UNIT 3
Intellectual Property
Intellectual property (IP) refers to creations of the mind, such as inventions, literary and
artistic works, designs, symbols, names, and images used in commerce. IP laws protect these
creations, allowing creators to control the use of their work and benefit financially from it.
There are several main types of intellectual property:
1. Copyright: Protects original works of authorship, like books, music, and art.
2. Patents: Protect inventions and processes for a limited time, granting the inventor
exclusive rights to their use and distribution.
3.Trademarks: Protect symbols, names, and slogans used to identify goods or services,
ensuring brand recognition.
4. Trade secrets: Protect confidential business information that gives a competitive edge,
such as formulas or processes.
These protections encourage innovation and creativity by giving creators the right to
control their work and its commercial use.
COPYRIGHT
Copyright is a legal right that grants creators exclusive control over the use of their original
works. This includes literary works, music, films, art, software, and more. Copyright
protection allows creators to control how their works are reproduced, distributed, performed,
and displayed, enabling them to benefit financially from their creations.
Features of Copyright:
Exclusive Rights: Copyright holders have the exclusive right to reproduce, distribute,
perform, and display their work, as well as to create derivative works.
Limitations: There are exceptions, such as fair use or fair dealing, which allow limited use of
copyrighted material without permission under specific circumstances.
The Copyright Act refers to the specific legislation that establishes the laws surrounding
copyright protection in a particular country. For example:
United States: The Copyright Act of 1976 governs copyright law, outlining the rights of
authors and the duration of copyright protection.
United Kingdom: The Copyright, Designs and Patents Act 1988 provides a framework for
copyright protection in the UK.
India: The Copyright Act, 1957 and its amendments govern copyright law in India.
These acts define what constitutes copyrightable material, the rights of copyright holders,
exceptions to those rights, and the enforcement mechanisms available to protect those rights.
The Digital Millennium Copyright Act (DMCA) was signed into law in 1998 and
implements two 1996 WIPO treaties: the WIPO Copyright Treaty and the WIPO Performances
and Phonograms Treaty. The act is divided into the following five sections:
• Title I (WIPO Copyright and Performances and Phonograms Treaties Implementation Act of
1998)—This section implements the WIPO treaties by making certain technical amendments
to U.S. law in order to provide appropriate references and links to the treaties. It also creates
two new prohibitions in the Copyright Act (Title 17 of the U.S. Code) one on circumvention
of technological measures used by copyright owners to protect their works and one on
tampering with copyright management information. Title I also adds civil remedies and
criminal penalties for violating the prohibitions.
• Title II (Online Copyright Infringement Liability Limitation Act) this section enables Web
site operators that allow users to post content on their Web site (e.g., music, video, and pictures)
to avoid copyright infringement liability if certain “safe harbour” provisions are followed.
• Title III (Computer Maintenance Competition Assurance Act) this section permits the owner
or lessee of a computer to make or authorize the making of a copy of a computer program in
the course of maintaining or repairing that computer. The new copy cannot be used in any other
manner and must be destroyed immediately after the maintenance or repair is completed.
• Title IV (Miscellaneous provisions) This section adds language to the Copyright Act
confirming the Copyright Office’s authority to continue to perform the policy and international
functions that it has carried out for decades under its existing general authority.
• Title V (Vessel Hull Design Protection Act) This section creates a new form of protection for
the original design of vessel hulls.
PATENTS
T R A D E S E C R E T S:
Trade secret protection laws vary greatly from country to country. For example, the
Philippines provide no legal protection for trade secrets.
• In some European countries, pharmaceuticals, methods of medical diagnosis and
treatment, and information technology cannot be patented.
• Many Asian countries require foreign corporations operating there to transfer rights to
their technology to locally controlled enterprises. (Coca-Cola reopened its operations
in India in 1993 after halting sales for 16 years to protect the “secret formula” for its
soft drink, even though India’s vast population represented a huge potential market.)
• American businesses that seek to operate in foreign jurisdictions or enter international
markets must take these differences into account.
This section discusses several issues that apply to intellectual property and information
technology, including plagiarism, reverse engineering, open source code, competitive
intelligence, trademark infringement, and cyber squatting.
PLAGIARISM
Plagiarism is the act of stealing someone’s ideas or words and passing them off as one’s
own. The explosion of electronic content and the growth of the Web have made it easy to cut
Notes by Kalyani Bawangarh
and paste paragraphs into term papers and other documents without proper citation or quotation
marks. To compound the problem, hundreds of online “paper mills” enable users to download
entire term papers. Although some sites post warnings that their services should be used for
research purposes only, many users pay scant heed. As a result, plagiarism has become an issue
from elementary schools to the highest levels of academia.
The following list shows some of the actions that schools can take to combat student
Plagiarism:
• Help students understand what constitutes plagiarism and why they need to cite sources
properly.
• Show students how to document Web pages and materials from online databases.
• Schedule major writing assignments so that portions are due over the course of the term, thus
reducing the likelihood that students will get into a time crunch and be tempted to plagiarize to
meet the deadline.
• Make clear to students that instructors are aware of Internet paper mills.
• Ensure that instructors both educate students about plagiarism detection services and make
students aware that they know how to use these services.
• Incorporate detection software and services into a comprehensive anti plagiarism program.
Reverse Engineering:
Reverse engineering is the process of taking something apart in order to understand it,
build a copy of it, or improve it.
• Reverse engineering was originally applied to computer hardware but is now
commonly applied to software as well.
• Reverse engineering of software involves analyzing it to create a new representation of
the system in a different form or at a higher level of abstraction. Often, reverse
engineering begins by extracting design stage details from program code.
• Design-stage details about an information system are more conceptual and less defined
than the program code of the same system. Microsoft has been accused repeatedly of
reverse engineering products—ranging from the Apple
• Macintosh user interface, too many Apple operating system utility features that were
incorporated into DOS (and later Windows), to early word-processing and spreadsheet
programs that set the design for Word and Excel, to Google’s methods for improving
search results for its Bing search engine.
Competitive Intelligence:
Competitive intelligence is legally obtained information that is gathered to help a
company gain an advantage over its rivals. For example, some companies have employees who
Trademark Infringement:
A trademark is a logo, package design, phrase, sound, or word that enables a consumer
to differentiate one company’s products from another’s. Consumers often cannot examine
goods or services to determine their quality or source, so instead they rely on the labels attached
to the products.
The law gives the trademark’s owner the right to prevent others from using the same
mark or a confusingly similar mark on a product’s label. The United States has a federal system
that stores trademark information; merchants can consult this information to avoid adopting
marks that have already been taken. Merchants seeking trademark protection apply to the
USPTO if they are using the mark in interstate commerce or if they can demonstrate a true
intent to do so.
Trademarks can be renewed forever—as long as a mark is in use. It is not uncommon
for an organization that owns a trademark to sue another organization over the use of that
trademark in a Web site or a domain name. The court rulings in such cases are not always
consistent and are quite difficult to judge in advance. Nominative fair use is a defence often
employed by the defendant in trademark infringement cases where a defendant uses a plaintiff’s
mark to identify the plaintiff’s products or services in conjunction with its own product or
services. To successfully employ this defence, the defendant must show three things:
• The plaintiff’s product or service cannot be readily identifiable without using the plaintiff’s
mark.
• It uses only as much of the plaintiff’s mark as necessary to identify the defendant’s product
or service.
• The defendant does nothing with the plaintiff’s mark that suggests endorsement or
sponsorship by the plaintiff.
Cyber squatting:
Companies that want to establish an online presence know that the best way to
capitalize on the strengths of their brand names and trademarks is to make the names part of
the domain names for their Web sites. When Web sites were first established, there was no
procedure for validating the legitimacy of requests for Web site names, which were given out
on a first-come, first-served basis. And in the early days of the Web, many cyber squatters
registered domain names for famous trademarks or company names to which they had no
connection, with the hope that the trademark’s owner would eventually buy the domain name
for a large sum of money.
What is a Software?
Types of Software
It is a collection of data that is given to the computer to complete a particular task. The
chart below describes the types of software:
Above is the diagram of types of software. Now we will briefly describe each type and
its subtypes:
1. System Software
• Operating System
• Language Processor
• Device Driver
2. Application Software
• General Purpose Software
• Customize Software
• Utility Software
In this stage, all the requirements for the target software are specified. These requirements get
approval from customers, market analysts, and stakeholders.
This is fulfilled by utilizing SRS (Software Requirement Specification). This is a sort of
document that specifies all those things that need to be defined and created during the entire
project cycle.
Stage 3: Design
At this stage, the fundamental development of the product starts. For this, developers use
a specific programming code as per the design in the DDS. Hence, it is important for the coders
to follow the protocols set by the association. Conventional programming tools like compilers,
interpreters, debuggers, etc. are also put into use at this stage. Some popular languages like
C/C++, Python, Java, etc. are put into use as per the software regulations.
Stage 4: Development
\After the development of the product, testing of the software is necessary to ensure its smooth
execution. Although, minimal testing is conducted at every stage of SDLC. Therefore, at this
stage, all the probable flaws are tracked, fixed, and retested. This ensures that the product
confronts the quality requirements of SRS.
Documentation, Training, and Support: Software documentation is an essential part of the
software development life cycle. A well-written document acts as a tool and means to
Notes by Kalyani Bawangarh
information repository necessary to know about software processes, functions, and
maintenance. Documentation also provides information about how to use the product. Training
in an attempt to improve the current or future employee performance by increasing an
employee’s ability to work through learning, usually by changing his attitude and developing
his skills and understanding.
Stage 5: Testing
After detailed testing, the conclusive product is released in phases as per the
organization’s strategy. Then it is tested in a real industrial environment. It is important to
ensure its smooth performance. If it performs well, the organization sends out the product as a
whole. After retrieving beneficial feedback, the company releases it as it is or with auxiliary
improvements to make it further helpful for the customers. However, this alone is not enough.
Therefore, along with the deployment, the product’s supervision.
High-quality software systems are systems that are easy to learn and use because they
perform quickly and efficiently; they meet their users’ needs; and they operate safely and