Lecture: IP and privacy, legal context

advertisement
Intellectual Property and
Privacy Basics
What Is Intellectual Property?
Tangible property: a cup of coffee, a chair to sit in…
Intellectual property: music to listen to, stories to
read while drinking the coffee…
Physical property involves individual items (my car).
Intellectual property involves classes of items (the
same poem can be printed in many books).
Differences Between Physical
and Intellectual Property
Intellectual property is non-rivalrous: we can both
read the same book, but we can’t both drink the
same cup of coffee.
Legal Systems to Protect
Intellectual Property
Protections for IP include:
• Copyright.
• Patent.
• Trade secret.
• Trademark.
Copyright
Copyright:
– Protects the expression of ideas fixed in a tangible
medium for a limited duration, currently the life of the
author plus 70 years.
– Does not protect ideas, processes, discoveries, facts.
Copyrighted material must be original.
Rights of Copyright Holders
Copyright holders can:
–
–
–
–
Reproduce their work.
Adapt or derive works from their work.
Distribute copies of the work.
Display or perform the work.
Limitations on Copyright
Copyright limitations include:
–
–
–
–
Fair use doctrine.
Limitation to expressions of ideas (merger doctrine).
Limited terms of copyright.
First sale rule.
Author Rights in Europe
The Berne Convention states:
Independently of the author’s economic rights, and even
after the transfer of the said rights, the author shall have
the right to claim authorship of the work and to object to
any distortion, mutilation or other modification of, or
other derogatory action in relation to, the said work,
which would be prejudicial to his honor or reputation.
Patent
Patents:
– Protect useful, novel, and non-obvious processes,
machines, means of manufacturing.
– Are of more limited duration than copyright (20 years).
– Grant a monopoly over implementation of the patented
idea.
Trade Secret
A trade secret is, er, a secret that can give you an
advantage in the marketplace. The secret Coke
formula, for example.
Trade secrets:
– Last as long as the secret is maintained.
– Can be any type of information.
– Cannot be readily discerned (reverse engineered) or
obvious to others in the industry.
Trademark
Trademarks:
– Protect product or brand names, phrases, logos, so that
customers aren’t misled or confused about where products
are coming from. (Is it real or a knockoff?)
– Are meant to ensure “good will”: association of a
mark/product with its actual manufacturer.
– Last as long as the good will does.
Typically, you want your trademark to be used as an
adjective, not as a generic noun or process.
– Good: I need some Kleenex facial tissue. Where is the Xerox
photocopier?
– Bad: Got a kleenex? Can you xerox this for me?
Why are we talking about IP?
The concept of property structures information in defiite ways.
Legal and ethical implications associated with ownership to
expressions of information may affect:
• If a work can be disseminated or preserved.
• How that work can be disseminated or preserved.
• How that work is described.
• Who can access it.
There may also be legal and ethical implications assocated with
information that cannot be owned: e.g., most personal information.
Thus the relationship with privacy.
Types of Privacy
Law professor Jerry Kang (and others) discuss three
types of privacy:
– Spatial. Controlling access to one’s person and private
space.
– Decisional. Making personal decisions without
interference.
– Informational. Limiting access to information about
oneself.
Privacy in the U.S. Legal System
Privacy laws include:
• Privacy torts (for civil cases).
• Court cases that set precedents for interpretations
of constitutional privacy.
• Hodgepodge of individual statutes (HIPAA,
COPPA, etc) for specific kinds of information.
Prosser’s Four Privacy Torts
• Private facts. Physically or otherwise disrupting the
solitude of another.
• False light. Publicly creating an offensive and false
impression of another.
• Intrusion. Distributing offensive private
information that is not in the legitimate public
interest.
• Misappropriation. Using another’s name or
likeness for personal gain without consent.
Dilution of Privacy Torts
The torts of private facts and intrusion often fail
because of the difficulty of distinguishing public and
private information.
Example: Florida Star vs. BJF, 1989. A rape
survivor sues a newspaper for publishing her name.
She wins, but the decision is reversed on appeal,
because the name was available in police reports.
Constitutional Privacy
The U.S. Constitution does not mention privacy.
Privacy is first accepted in constitutional law in the decision
for Griswold v. Connecticut, 1965.
The court’s decision held that although the Constitution does
not explicitly protect a general right to privacy, guarantees to
privacy may be found in the “penumbras,” or shadows, of
various provisions in the Bill of Rights.
“Privacy” in the Bill of Rights
• The First Amendment guarantees the right of association (in
particular anonymous association).
• The Third Amendment prohibits the quartering of soldiers “in any
house” in times of peace without consent of the owner.
• The Fourth Amendment protects against unreasonable searches
and seizures.
• The Fifth Amendment protects against self-incrimination.
• The Ninth Amendment claims that just because a particular right
isn’t mentioned, that doesn’t imply it should be denied.
• The Fourteenth Amendment guarantees that no one shall be
deprived of liberty without due process.
Weaknesses of
Constitutional Privacy
Of course, the government does violate our privacy in a
multitude of ways.
In terms of decisional privacy, there are laws against taking
certain drugs, against gambling, against euthanasia, and many
other activities that might be deemed private decisions.
In terms of spatial (and, in the Internet age, also
informational) privacy, search and seizure restrictions have
been relaxed according to the open view doctrine and the
Patriot Act.
Legality vs. Morality
This lecture has concentrated on the legal landscape
associated with intellectual property (and with personal
information not considered intellectual property, via privacy).
In contrast, the articles for this week—Himma, Stallman, and
Friedman, et al—concentrate on morality, or ethics (in other
words, on how people should address issues of intellectual
property and personal information, as opposed to what the
law says). Himma emphasizes that it’s important to
differentiate between larger ethical questions and the current
legal means of addressing those questions.
To get at this, we are going play some puzzles (and then make
some puzzles to play!)
Download