Intellectual Property -- Introduction

Intellectual Property -- Introduction



What is Intellectual Property?
Should creators be assured control of their
Intellectual Property?
How is Intellectual Property Protected?
Copyright © 2008 by Helene G. Kershner
Adapted from David G Kay -- SIGCSE 2003
Intellectual Property

How would you define Intellectual Property?
Copyright © 2008 by Helene G. Kershner
Intellectual Property
– An intangible asset, considered to have value
in a market, based on unique or original
human knowledge and intellect.
– Intellectual property may or may not be
associated with a patent or copyright or other
form of protection.
www.bridgefieldgroup.com/glos4.htm
Copyright © 2008 by Helene G. Kershner
Adapted from David G Kay -- SIGCSE 2003
Intellectual Property
According to the World Intellectual Property
Organization:
– Intellectual property refers to creations of the mind:
inventions, literary and artistic works, and symbols,
names, images, and designs used in commerce.
Unfortunately, there is no world standard for
protecting intellectual property.
Copyright © 2008 by Helene G. Kershner
Categories of Intellectual Property in
the United States
U.S. Constitution: The Congress shall have power
“to promote the progress of science and the useful
arts, by securing for limited times to authors and
inventors the exclusive right to their respective
writings and discoveries.” (Art.1, sec.8 cl.8)
 Patent (Federal Law)
 Copyright (Federal Law)
 Trademark (Mostly Federal)
 Trade Secret (Mostly State Law)
Copyright © 2008 by Helene G. Kershner
Adapted from David G Kay -- SIGCSE 2003
US Patent Requirements

Statutory Criteria
 Any new and useful process, machine [article of]
manufacture, or composition of matter
 Not phenomena of nature, scientific principles,
abstract ideas, or pure mathematical formulas
 Novelty – does not exist in the “prior art”
 What about software?

Non-obviousness
– At the time the invention was made
– To a person “having ordinary skill in the art”
Copyright © 2008 by Helene G. Kershner
Adapted from David G Kay -- SIGCSE 2003
US Copyright Requirements


Automatic once work is tangible
Copyright notice helpful, but NOT required!
Copyright © 2001 by Peter Programmer. All rights reserved

Registration optional: It is easy, inexpensive and
extremely useful.
Why would registration be useful, important, or
even necessary?
Copyright © 2008 by Helene G. Kershner
Adapted from David G Kay -- SIGCSE 2003
US Copyright Requirements

Author exclusively may
–
–
–
–



Reproduce
Distribute
Create derivative works
Perform or display publicly
Infringement is unauthorized use with
Substantial similarity
Access to copyrighted work
Adapted from David G Kay -- SIGCSE 2003
Copyright © 2008 by Helene G. Kershner
US Copyright Does Not Protect …




Independent Creation
Underlying ideas
Portions in the public domain
Aspects dictated by external constraints
(e.g. Standards, compatibility, efficiency, common
practice)

“Fair Use”
Use outside the United States
– expect where protected by other treaties and
agreements.
Copyright © 2008 by Helene G. Kershner
Adapted from David G Kay -- SIGCSE 2003
Cyberethics
Ethics and the Computer
“New technology creates challenges in the areas of
privacy, property, security and individual identity and
radically reshapes life styles around the globe.”
http://cyberethics.cbi.msstate.edu/
– This is an interdisciplinary problem. It is not limited to
Computer Science, or Engineering, or Business or
even Philosophy.
– This is a problem for every one, every day.
Copyright © 2008 by Helene G. Kershner
Cyberethics
Ethics and the Computer
Like it or not -- We are an Information Society.
– More people employed in “collecting, handling and
distributing information than any other occupation.”
http://www.misq.org/archivist/vol/no10/issue1/vol10no1mason.html
– Millions of computers and computer-like devices on
the planet
– More information is posted daily on the Web than any
one, or any organization or government



Can access
Can process
Can read and understand
Copyright © 2008 by Helene G. Kershner
Cyberethics – Intellectual Capital
What kind of society are we becoming?





“Information is the means through which the mind expands
and increases its capacity to achieve its goals.”
“Intellectual Capital” is how people build their lives, careers,
sense of self.
But, “intellectual capital” is more at risk than physical capital
(money) or things we create.
“Intellectual capital” is damaged or lost whenever we “lose”
information about ourselves, especially when we are not paid
in someway for this loss.
“Intellectual capital” is subject to error and misuse.
– It can be stolen and used against our will.
– We can be lied about, Ex. JuicyCampus.com
– We can be threatened
http://www.misq.org/archivist/vol/no10/issue1/vol10no1mason.html
Copyright © 2008 by Helene G. Kershner
Cyberethics – We are what we Post
Video
 http://www.cnn.com/2008/CRIME/03/17/sunny.j
uicy/#cnnSTCVideo
Article
 http://arstechnica.com/news.ars/post/20080313threat-on-juicy-campus-gossip-site-land-studentin-jail.html
Article & Video
 http://abcnews.go.com/OnCampus/Story?id=591
9608&page=1
=
Copyright © 2008 by Helene G. Kershner
Cyberethics
Four Ethical Questions to think about for the Information
Society:
1.
2.
3.
4.
Privacy – What information are we obligated to reveal to
others about ourselves or our associations, and under what
conditions and with what safeguards?
Accuracy – Who is responsible for making sure the
information “out there” about us is accurate and authentic?
And, if it’s not, how does it get fixed?
Property – “Who owns information? What are the just and fair
price’s for its exchange?”
–
Who owns the ways information is transmitted?
Accessibility – What information do individuals, organizations,
companies, and the government have the right “or privilege to
obtain, under what conditions and with what safeguards?”
http://www.misq.org/archivist/vol/no10/issue1/vol10no1mason.html
Copyright © 2008 by Helene G. Kershner
Cyberethics
Privacy: Forces that threaten our privacy are:
– Incredible capacity to gather information without out obvious
control (Internet)
– Results of 9/11, increased surveillance
Who is watching the watchers? No One.
Accuracy: Misinformation can make a mess of our lives.
– What if this misinformation is held and used by people with power
over our lives: IRAQ
– Credit bureaus, bank errors,
– Real information that has been edited
– Identity theft
Copyright © 2008 by Helene G. Kershner
Cyberethics
Property – How do we really protect intellectual property?
– There is the Law
– But, there are people who ignore the law


Terribly easy to steal intellectual property
Should ease of theft determine our ethics?
Access – One way to protect information is to improve
access to the information stored about us.
– Through education we gain access to information
– Universal access to technology?



One laptop per child – is this enough
Wireless computers, telephones, etc.
Access to the Internet
Through Access it may be possible for each of us to
look out for ourselves and each other.
http://www.misq.org/archivist/vol/no10/issue1/vol10no1mason.html
Copyright © 2008 by Helene G. Kershner