Cyber Security Unit V
Cyber Security Unit V
To make cyber security measures explicit, the written norms are required. These
norms are known as cyber security standards: the generic sets of prescriptions for
an ideal execution of certain measures. The standards may involve methods,
guidelines, reference frameworks, etc. It ensures efficiency of security, facilitates
integration and interoperability, enables meaningful comparison of measures,
reduces complexity, and provide the structure for new developments.
Security standards are generally provided for all organizations regardless of their
size or the industry and sector in which they operate. This section includes
information about each standard that is usually recognized as an essential
component of any cyber security strategy.
1. ISO
The need of ISO 27000 series arises because of the risk of cyber-attacks which the
organization face. The cyber-attacks are growing day by day making hackers a
constant threat to any industry that uses technology.
The ISO 27000 series can be categorized into many types. They are-
ISO 27001- This standard allows us to prove the clients and stakeholders of any
organization to managing the best security of their confidential data and
information. This standard involves a process-based approach for establishing,
implementing, operating, monitoring, maintaining, and improving our ISMS.
ISO 27005- This standard supports the general concepts specified in 27001. It is
designed to provide the guidelines for implementation of information security
based on a risk management approach. To completely understand the ISO/IEC
27005, the knowledge of the concepts, models, processes, and terminologies
described in ISO/IEC 27001 and ISO/IEC 27002 is required. This standard is
capable for all kind of organizations such as non-government organization,
government agencies, and commercial enterprises.
2. IT Act
The Information Technology Act also known as ITA-2000, or the IT Act main
aims is to provide the legal infrastructure in India which deal with cybercrime and
e-commerce. The IT Act is based on the United Nations Model Law on E-
Commerce 1996 recommended by the General Assembly of United Nations. This
act is also used to check misuse of cyber network and computer in India. It was
officially passed in 2000 and amended in 2008. It has been designed to give the
boost to Electronic commerce, e-transactions and related activities associated with
commerce and trade. It also facilitate electronic governance by means of reliable
electronic records.
IT Act 2000 has 13 chapters, 94 sections and 4 schedules. The first 14 sections
concerning digital signatures and other sections deal with the certifying authorities
who are licenced to issue digital signature certificates, sections 43 to 47 provides
penalties and compensation, section 48 to 64 deal with appeal to high court,
sections 65 to 79 deal with offences, and the remaining section 80 to 94 deal with
miscellaneous of the act.
3. Copyright Act
The Copyright Act 1957 amended by the Copyright Amendment Act 2012 governs
the subject of copyright law in India. This Act is applicable from 21 January 1958.
Copyright is a legal term which describes the ownership of control of the rights to
the authors of "original works of authorship" that are fixed in a tangible form of
expression. An original work of authorship is a distribution of certain works of
creative expression including books, video, movies, music, and computer
programs. The copyright law has been enacted to balance the use and reuse of
creative works against the desire of the creators of art, literature, music and
monetize their work by controlling who can make and sell copies of the work.
4. Patent Law
Patent law is a law that deals with new inventions. Traditional patent law protect
tangible scientific inventions, such as circuit boards, heating coils, car engines, or
zippers. As time increases patent law have been used to protect a broader variety of
inventions such as business practices, coding algorithms, or genetically modified
organisms. It is the right to exclude others from making, using, selling, importing,
inducing others to infringe, and offering a product specially adapted for practice of
the patent.
5. IPR
What is cybercrime?
Cybercrime is any criminal activity that involves a computer, networked device or
a network.
While most cybercrimes are carried out in order to generate profit for the
cybercriminals, some cybercrimes are carried out against computers or devices
directly to damage or disable them. Others use computers or networks to
spread malware, illegal information, images or other materials. Some cybercrimes
do both -- i.e., target computers to infect them with a computer virus, which is then
spread to other machines and, sometimes, entire networks.
Defining cybercrime
The U.S. Department of Justice (DOJ) divides cybercrime into three categories:
1. crimes in which the computing device is the target -- for example, to gain
network access;
The necessity of internet connectivity has enabled an increase in the volume and
pace of cybercrime activities because the criminal no longer needs to be physically
present when committing a crime. The internet's speed, convenience, anonymity
and lack of borders make computer-based variations of financial crimes -- such as
ransomware, fraud and money laundering, as well as crimes such
as stalking and bullying -- easier to carry out.
Cybercriminals often carry out their activities using malware and other types of
software, but social engineering is often an important component for executing
most types of cybercrime. Phishing emails are another important component to
many types of cybercrime but especially so for targeted attacks, like business email
compromise (BEC), in which the attacker attempts to impersonate, via email, a
business owner in order to convince employees to pay out bogus invoices.
Credit card fraud: An attack that occurs when hackers infiltrate retailers'
systems to get the credit card and/or banking information of their customers.
Stolen payment cards can be bought and sold in bulk on darknet markets,
where hacking groups that have stolen mass quantities of credit cards profit by
selling to lower-level cybercriminals who profit through credit card fraud
against individual accounts.
Exit scam:The dark web, not surprisingly, has given rise to the digital version
of an old crime known as the exit scam. In today's form, dark web
administrators divert virtual currency held in marketplace escrow accounts to
their own accounts -- essentially, criminals stealing from other criminals.
Common examples of cybercrime
Some of the more commonly seen cybercrime attacks include distributed DoS
(DDoS) attacks, which are often used to shut down systems and networks. This
type of attack uses a network's own communications protocol against it by
overwhelming its ability to respond to connection requests. DDoS attacks are
sometimes carried out simply for malicious reasons or as part of a cyberextortion
scheme, but they may also be used to distract the victim organization from some
other attack or exploit carried out at the same time.
Other common examples of cybercrime include illegal gambling, the sale of illegal
items -- like weapons, drugs or counterfeit goods -- and the solicitation,
production, possession or distribution of child pornography.
While the financial losses due to cybercrime can be significant, businesses can also
suffer other disastrous consequences as a result of criminal cyberattacks, including
the following:
Damage to investor perception after a security breach can cause a drop in the
value of a company.
In addition to potential share price drops, businesses may also face increased
costs for borrowing and greater difficulty in raising more capital as a result of
a cyber attack.
Loss of sensitive customer data can result in fines and penalties for companies
that have failed to protect their customers' data. Businesses may also be sued
over the data breach.
Businesses may also incur direct costs from a criminal cyberattack, including
increased insurance premium costs and the cost of hiring cybersecurity
companies to do incident response and remediation, as well as public relations
(PR) and other services related to an attack.
Effects of cybercrime on national defense
Cybercrimes may have public health and national security implications, making
computer crime one of DOJ's top priorities. In the U.S., at the federal level, the
Federal Bureau of Investigation's (FBI) Cyber Division is the agency within DOJ
that is charged with combating cybercrime. The Department of Homeland Security
(DHS) sees strengthening the security and resilience of cyberspace as an important
homeland security mission. Agencies such as the U.S. Secret Service (USSS) and
U.S. Immigration and Customs Enforcement (ICE) have special divisions
dedicated to combating cybercrime.
USSS's Electronic Crimes Task Force (ECTF) investigates cases that involve
electronic crimes, particularly attacks on the nation's financial and critical
infrastructures. USSS also runs the National Computer Forensics Institute (NCFI),
which provides state and local law enforcement, judges and prosecutors with
training in computer forensics.
The Internet Crime Complaint Center (IC3), a partnership among the FBI, the
National White Collar Crime Center (NW3C) and the Bureau of Justice Assistance
(BJA), accepts online complaints from victims of internet crimes or interested third
parties.
develop clear policies and procedures for the business and employees;
outline the security measures that are in place about how to protect systems
and corporate data;
create intrusion detection system (IDS) rules that flag emails with extensions
similar to company emails;
carefully scrutinize all email requests for transfer of funds to determine if the
requests are out of the ordinary;
2. Copyright:
The internet has made copyright violations easier. In early days of online
communication, copyright violations was too easy. Both companies and
individuals need lawyers to bring actions to impose copyright protections.
Copyright violation is an area of cyber law that protects the rights of
individuals and companies to profit from their own creative works.
3. Defamation:
Several personnel use the internet to speak their mind. When people use the
internet to say things that are not true, it can cross the line into defamation.
Defamation laws are civil laws that save individuals from fake public
statements that can harm a business or someone’s personal reputation. When
people use the internet to make statements that violate civil laws, that is called
Defamation law.
5. Freedom of Speech:
Freedom of speech is an important area of cyber law. Even though cyber laws
forbid certain behaviors online, freedom of speech laws also allow people to
speak their minds. Cyber lawyers must advise their clients on the limits of free
speech including laws that prohibit obscenity. Cyber lawyers may also defend
their clients when there is a debate about whether their actions consist of
permissible free speech.
6. Trade Secrets:
Companies doing businesses online often depend on cyber laws to protect their
trade secrets. For example, Google and other online search engines spend lots
of time developing the algorithms that produce search results. They also spend
a great deal of time developing other features like maps, intelligent assistance
and flight search services to name a few. Cyber laws help these companies to
take legal action as necessary in order to protect their trade secrets.
Digital signatures have been given legal validity and sanction in the Act.
It has opened the doors for the entry of corporate companies for issuing Digital
Signatures Certificates in the business of being Certifying Authorities.
The IT Act also addresses the important issues of security, which are so critical
to the success of electronic transactions.
IT Act, 2000
The Information Technology Act, 2000 was enacted by the Indian Parliament in
2000. It is the primary law in India for matters related to cybercrime and e-
commerce.
The act was enacted to give legal sanction to electronic commerce and
electronic transactions, to enable e-governance, and also to
prevent cybercrime.
Under this law, for any crime involving a computer or a network located in
India, foreign nationals can also be charged.
The law prescribes penalties for various cybercrimes and fraud through
digital/electronic format.
It also gives legal recognition to digital signatures.
The IT Act also amended certain provisions of the Indian Penal Code (IPC),
the Banker’s Book Evidence Act, 1891, the Indian Evidence Act, 1872 and
the Reserve Bank of India Act, 1934 to modify these laws to make them
compliant with new digital technologies.
In the wake of the recent Indo-China border clash, the Government of India
banned various Chinese apps under the Information Technology Act. Read
more about this in an RSTV titled, ‘TikTok, Other Chinese Apps Banned’.
Given below are the links of relevant topics that will help aspirants prepare for
their UPS C examination-
Related Links
Section 66A gave authorities the power to arrest anyone accused of posting
content on social media that could be deemed ‘offensive’.
This amendment was passed in the Parliament without any debate.
As per the said section, a person could be convicted if proved on the charges
of sending any ‘information that is grossly offensive or has menacing
character’.
It also made it an offence to send any information that the sender knows to
be false, but for the purpose of annoyance, inconvenience, danger,
obstruction, insult, injury, criminal intimidation, enmity, hatred or ill-will,
through a computer or electronic device.
The penalty prescribed for the above was up to three years’ imprisonment
with fine.
Arguments against Section 66A
Experts stated that the terms ‘offensive’, ‘menacing’, ‘annoyance’, etc. were
vague and ill-defined or not defined at all.
Anything could be construed as offensive by anybody.
There was a lot of scope for abuse of power using this provision to
intimidate people working in the media.
This also curbed the freedom of speech and expression enshrined as a
fundamental right in the Constitution.
The section was used most notably to arrest persons who made any
uncharitable remarks or criticisms against politicians.
The government contended that the section did not violate any fundamental right
and that only certain words were restricted. It stated that as the number of internet
users mushroomed in the country, there was a need to regulate the content on the
internet just like print and electronic media. The Supreme Court, however, in 2015,
struck down this section of the IT Act saying it was unconstitutional as it violated
Article 19(1)(a) of the Constitution. This was in the famous Shreya Singhal v
Union of India case (2015).
Section 69A
Section 79(2)(c) of the Act states that intermediaries must observe due
diligence while discharging their duties, and also observe such other
guidelines as prescribed by the Central Government.
Online Intermediaries:
Intellectual property law deals with the rules for securing and enforcing legal rights
to inventions, designs, and artistic works. Just as the law protects ownership of
personal property and real estate, so too does it protect the exclusive control of
intangible assets. The purpose of these laws is to give an incentive for people to
develop creative works that benefit society, by ensuring they can profit from their
works without fear of misappropriation by others.
Patents give inventors the right to use their product in the marketplace, or to profit
by transferring that right to someone else. Depending on the type of invention,
patent rights are valid for up to 20 years. Qualifying items include new machines,
technological improvements, and manufactured goods, including the "look" of a
product. Patent protection will be denied if an invention is found to be obvious in
design, not useful, or morally offensive.
Trademarks protect symbols, names, and slogans used to identify goods and
services. The purpose is to avoid confusion, deter misleading advertising, and help
consumers distinguish one brand from another. Since the goal is to distinguish,
generic or purely descriptive marks may not qualify. Rights can potentially last
forever, and they are obtained by simply using a mark. While not required, owners
can register their marks for additional protection.
Inventors can give notice of their rights by marking their product with the patent
number assigned to it by the Patent and Trademark Office. The label "patent
pending" can also be used to discourage others from copying the design before the
patent is awarded. Notice of trademarks and copyrights is given by placing the
appropriate symbol (™, ©, etc.) on the material, and then registering the mark or
copyright, so it can be added to the government's database.
In the event an owner of intellectual property does sue, and the lawsuit is
successful, a number of remedies will be available. The court can order an
injunction, meaning the infringer must stop what it is doing. Substantial money
damages may also be available. In addition, once the owner's rights are established
in court, the infringer may agree to a license agreement. This allows use of the
intellectual property to continue, with payments going to the owner.
Framing
Linking
Caching
Public Display of the Right by transferring on the Internet
Archiving
Framing
is the process of permitting a client to view the content of one site while it is
outlined by data of another site, like the "image in-picture" highlight offered on
certain TVs. In Future Dontics, Inc versus Applied Anagramics Inc, the plaintiff
was granted the exclusive use of a telephone number and a service mark of a
business. The plaintiff later built up a site to publicize the business. The defendant
imitated the Future Dontic webpage on a different frame in the defendant's site.
The Court held that it adds up to the infringement of Copyright.
Linking
Linking is connecting the user from the original site to a linked site. The client is
provided with access to a website through the original site. The Universal Resource
Locator (URL) need not be typed separately. Linking, for research purposes, gives
ease to the client. Tragically, it ascends a few legal issues. Linking might be of
different types, for example, Surface linking, profound linking, and in-line linking.
Shetland Times, Ltd. v. Jonathan Wills and others are viewed as the first "linking"
case" the issue introduced in Shetland Times was whether the Shetland ("News")
"deep link" to inserted pages of the Shetland ("Times") the site, using Times site's
news headlines, was a demonstration of copyright infringement under British law.
The matter settled on the day of trial, shortly after the court had issued a
preliminary injunction precluding the deep link.
Caching
Caching is the process in which material is duplicated from a unique source to the
cache. Such material would be accessible to the user for a temporary timeframe.
Caching may be executed in three ways; Firstly, replicating of the record itself
which is shown on the computer screen while getting to the web. Secondly, the
record that is being shown is duplicated and held alongside the reports evaluated
by the user in the past. Thirdly, the archives are not stored on a personal computer
but on an ISP (Internet Service Provider) or on a website.
Archiving:
In Archiving, the process involves downloading and putting away the material of
another site and incorporating the same. Regardless of whether there exists a
hyperlink, the connection will take the client to another region of a similar site
where the material of another site has been stored. Archiving without the
authorization of the copyright proprietor may add up to infringement.
As indicated by Section 14 of the Copyright Act, 1957 a creator of a work has the
sole and exclusive option to enjoy and abuse a few rights given by the Act for
literary, dramatic, musical, or artistic work, cinematographic film, and sound
recording. Rights referenced under Section 14 incorporate the option to imitate the
work, to give its duplicates, perform it in public, make transformations,
interpretations, selling, or rental rights in regard to various categories of work.
Term of copyright is a lifetime of the author and sixty years from the beginning of
the calendar year next following the year in which the author dies.
Multimedia works by their inclination are works combining different databases, for
example, text, sound, pictures, and moving images. It is difficult to determine
which provisions ought to apply to a multimedia work in as it may be an
amalgamation of distinct works such as sound recording, artistic work, and literary
work or software wherein separate copyrights vest in the author conferring
differing rights with respect to a category of work as per Copyright Act.
As registration is not compulsory, suits for infringement can be filed even if the
plaintiff has secured no registration of the work. Civil remedies available to the
owner of copyright are also available to the exclusive licensee. Electronic contracts
are considered legally valid in most jurisdictions such as India and electronic
licensing or assignment is also legally valid.
On second and subsequent conviction imprisonment is for a term not less than one
year but which may extend to three years and a fine which will not be less than one
lac but may extend to 2 lacs.
Punishment may be reduced if infringements are not made for commercial gain.
According to Section 63 B, the use of an infringing duplicate of a computer
program is culpable with imprisonment for a term of at least 7 days and it may
extend to three years and a fine of at least Rs. 50,000 yet which may reach out to
Rs. 2 lacs. Punishment might be decreased if encroachments are not made for
benefit or profits.
Risk Management is the process of identifying risk, assessing risk, and taking steps
to reduce risk to an acceptable level. Organisations use risk assessment, the first
step in the risk management methodology, to determine the extent of the potential
threat, vulnerabilities and the risk associated with the IT system.
Cyber crimes can involve criminal activities that are traditional in nature, such as
theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian
Penal Code. The abuse of computers has also given birth to a gamut of new age
crimes that are addressed by the Information Technology Act, 2000.
Patent law is the branch of intellectual property law that deals with new inventions.
Traditional patents protect tangible scientific inventions, such as circuit boards, car
engines, heating coils, or zippers. Once granted, a patent gives the inventors the
exclusive right to sell their invention for 20 years.
Mask Works are defined in the Act as: a series of related images, however fixed or
encoded (1) having or representing the predetermined three-dimensional pattern of
metallic, insulating, or semiconductor material present or removed from the layers
of a semiconductor chip product; and (2) in which series the relation of …
What is the chip shortage? The chip shortage is a result of the COVID-19
pandemic, which increased demand for the personal electronics such as cell phones
and laptops that the chips are used in to the point where production could not keep
pace with demand.
An act to amend title 28, United States Code, with respect to the places where
court shall be held in certain judicial districts, and for other purposes.
Chip protection is acquired under the SCPA by filing with the US Copyright Office
an application for “mask work” registration under the SCPA, together with a filing
fee.
Why is it important to protect the semiconductor industry?
Definition
The word patent originates from the Latin patere, which means "to lay open"
(i.e., to make available for public inspection). It is a shortened version of the
term letters patent, which was an open document or instrument issued by a
monarch or government granting exclusive rights to a person, predating the
modern patent system. Similar grants included land patents, which were land
grants by early state governments in the US, and printing patents, a precursor
of modern copyright.
In modern usage, the term patent usually refers to the right granted to anyone who
invents something new, useful and non-obvious. A patent is often referred to as a
form of intellectual property right,[7][8] an expression which is also used to refer
to trademarks and copyrights,[8] and which has proponents and detractors (see
also Intellectual property § The term "intellectual property"). Some other types of
intellectual property rights are also called patents in some jurisdictions: industrial
design rights are called design patents in the US,[9] plant breeders' rights are
sometimes called plant patents,[10] and utility models and Gebrauchsmuster are
sometimes called petty patents or innovation patents.
The additional qualification utility patent is sometimes used (primarily in the US)
to distinguish the primary meaning from these other types of patents. Particular
species of patents for inventions include biological patents, business method
patents, chemical patents and software patents.
Effects
A patent does not give a right to make or use or sell an invention. [1] Rather, a patent
provides, from a legal standpoint, the right to exclude others[1] from making, using,
selling, offering for sale, or importing the patented invention for the term of the
patent, which is usually 20 years from the filing date [6] subject to the payment
of maintenance fees. From an economic and practical standpoint however, a patent
is better and perhaps more precisely regarded as conferring upon its proprietor "a
right to try to exclude by asserting the patent in court", for many granted patents
turn out to be invalid once their proprietors attempt to assert them in court. [4] A
patent is a limited property right the government gives inventors in exchange for
their agreement to share details of their inventions with the public. Like any other
property right, it may be sold, licensed, mortgaged, assigned or transferred, given
away, or simply abandoned.
A patent, being an exclusionary right, does not necessarily give the patent owner
the right to exploit the invention subject to the patent. For example, many
inventions are improvements of prior inventions that may still be covered by
someone else's patent.[1] If an inventor obtains a patent on improvements to an
existing invention which is still under patent, they can only legally use the
improved invention if the patent holder of the original invention gives permission,
which they may refuse.
Some countries have "working provisions" that require the invention be exploited
in the jurisdiction it covers. Consequences of not working an invention vary from
one country to another, ranging from revocation of the patent rights to the
awarding of a compulsory license awarded by the courts to a party wishing to
exploit a patented invention. The patentee has the opportunity to challenge the
revocation or license, but is usually required to provide evidence that the
reasonable requirements of the public have been met by the working of invention.
Challenges[edit]
In most jurisdictions, there are ways for third parties to challenge the validity of an
allowed or issued patent at the national patent office; these are called opposition
proceedings. It is also possible to challenge the validity of a patent in court. In
either case, the challenging party tries to prove that the patent should never have
been granted. There are several grounds for challenges: the claimed subject matter
is not patentable subject matter at all; the claimed subject matter was actually not
new, or was obvious to the person skilled in the art, at the time the application was
filed; or that some kind of fraud was committed during prosecution with regard to
listing of inventors, representations about when discoveries were made, etc. Patents
can be found to be invalid in whole or in part for any of these reasons.[30][31]
Infringement[edit]
Main article: Patent infringement
Patent infringement occurs when a third party, without authorization from the
patentee, makes, uses, or sells a patented invention. Patents, however, are enforced
on a national basis. The making of an item in China, for example, that would
infringe a US patent, would not constitute infringement under US patent law unless
the item were imported into the US.[32]
Infringement includes literal infringement of a patent, meaning they are performing
a prohibited act that is protected against by the patent. There is also the Doctrine of
Equivalents. This doctrine protects from someone creating a product that is
basically, by all rights, the same product that is protected with just a few
modifications.[33] In some countries, like the United States, there is liability for
another two forms of infringement. One is contributory infringement, which is
participating in another’s infringement. This could be a company helping another
company to create a patented product or selling the patented product which is
created by another company.[34] There is also inducement to infringement, which is
when a party induces or assists another party in violating a patent. An example of
this would be a company paying another party to create a patented product in order
to reduce their competitor’s market share.[35] This is important when it comes to
gray market goods, which is when a patent owner sells a product in country A,
wherein they have the product patented, then another party buys and sells it,
without the owner’s permission, in country B, wherein the owner also has a patent
for the product. With either national or regional exhaustion being the law the in
country B, the owner may still be able to enforce their patent rights; however, if
country B has a policy of international exhaustion, then the patent owner will have
no legal grounds for enforcing the patent in country B as it was already sold in a
different country.[36]
Enforcement[edit]
Patents can generally only be enforced through civil lawsuits (for example, for a
US patent, by an action for patent infringement in a United States federal district
court), although some countries (such as France and Austria) have criminal
penalties for wanton infringement.[37] Typically, the patent owner seeks monetary
compensation (damages) for past infringement, and seeks an injunction that
prohibits the defendant from engaging in future acts of infringement, or seeks
either damages or injunction. To prove infringement, the patent owner must
establish that the accused infringer practises all the requirements of at least one of
the claims of the patent. (In many jurisdictions the scope of the patent may not be
limited to what is literally stated in the claims, for example due to the doctrine of
equivalents.)
An accused infringer has the right to challenge the validity of the patent allegedly
being infringed in a counterclaim. A patent can be found invalid on grounds
described in the relevant patent laws, which vary between countries. Often, the
grounds are a subset of requirements for patentability in the relevant country.
Although an infringer is generally free to rely on any available ground of invalidity
(such as a prior publication, for example), some countries have sanctions to
prevent the same validity questions being relitigated. An example is the
UK Certificate of contested validity.
Patent licensing agreements are contracts in which the patent owner (the licensor)
agrees to grant the licensee the right to make, use, sell, or import the claimed
invention, usually in return for a royalty or other compensation. [38][39] It is common
for companies engaged in complex technical fields to enter into multiple license
agreements associated with the production of a single product. Moreover, it is
equally common for competitors in such fields to license patents to each other
under cross-licensing agreements in order to share the benefits of using each
other's patented inventions. Freedom Licenses like the Apache 2.0 License are a
hybrid of copyright/trademark/patent license/contract due to the bundling nature of
the three intellectual properties in one central license. This can make it difficult to
enforce because patent licenses cannot be granted this way under copyright and
would have to be considered a contract.[40]
Ownership[edit]
In most countries, both natural persons and corporate entities may apply for a
patent. In the United States, however, only the inventor(s) may apply for a patent,
although it may be assigned to a corporate entity subsequently [41] and inventors
may be required to assign inventions to their employers under an employment
contract. In most European countries, ownership of an invention may pass from the
inventor to their employer by rule of law if the invention was made in the course of
the inventor's normal or specifically assigned employment duties, where an
invention might reasonably be expected to result from carrying out those duties, or
if the inventor had a special obligation to further the interests of the employer's
company.[42] Applications by artificial intelligence systems, such as DABUS, have
been rejected in the US, the UK, and at the European Patent Office on the grounds
they are not natural persons.[43]
The plate of the Martin ejector seat of a military aircraft, stating that the product is
covered by multiple patents in the UK, South Africa, Canada and pending in
"other" jurisdictions. Dübendorf Museum of Military Aviation.
The inventors, their successors or their assignees become the proprietors of the
patent when and if it is granted. If a patent is granted to more than one proprietor,
the laws of the country in question and any agreement between the proprietors may
affect the extent to which each proprietor can exploit the patent. For example, in
some countries, each proprietor may freely license or assign their rights in the
patent to another person while the law in other countries prohibits such actions
without the permission of the other proprietor(s).
The ability to assign ownership rights increases the liquidity of a patent as
property. Inventors can obtain patents and then sell them to third parties. [44] The
third parties then own the patents and have the same rights to prevent others from
exploiting the claimed inventions, as if they had originally made the inventions
themselves.
Governing laws
The grant and enforcement of patents are governed by national laws, and also by
international treaties, where those treaties have been given effect in national laws.
Patents are granted by national or regional patent offices. [45] A given patent is
therefore only useful for protecting an invention in the country in which that patent
is granted. In other words, patent law is territorial in nature. When a patent
application is published, the invention disclosed in the application becomes prior
art and enters the public domain (if not protected by other patents) in countries
where a patent applicant does not seek protection, the application thus generally
becoming prior art against anyone (including the applicant) who might seek patent
protection for the invention in those countries.
Commonly, a nation or a group of nations forms a patent office with responsibility
for operating that nation's patent system, within the relevant patent laws. The
patent office generally has responsibility for the grant of patents, with infringement
being the remit of national courts.
The authority for patent statutes in different countries varies. In the UK,
substantive patent law is contained in the Patents Act 1977 as amended. [46] In the
United States, the Constitution empowers Congress to make laws to "promote the
Progress of Science and useful Arts ...". The laws Congress passed are codified
in Title 35 of the United States Code and created the United States Patent and
Trademark Office.
There is a trend towards global harmonization of patent laws, with the World
Trade Organization (WTO) being particularly active in this area. [citation
needed]
The TRIPS Agreement has been largely successful in providing a forum for
nations to agree on an aligned set of patent laws. Conformity with the TRIPS
agreement is a requirement of admission to the WTO and so compliance is seen by
many nations as important. This has also led to many developing nations, which
may historically have developed different laws to aid their development, enforcing
patents laws in line with global practice.
Internationally, there are international treaty procedures, such as the procedures
under the European Patent Convention (EPC) [constituting the European Patent
Organisation (EPOrg)], that centralize some portion of the filing and examination
procedure. Similar arrangements exist among the member states
of ARIPO and OAPI, the analogous treaties among African countries, and the
nine CIS member states that have formed the Eurasian Patent Organization. A key
international convention relating to patents is the Paris Convention for the
Protection of Industrial Property, initially signed in 1883. The Paris Convention
sets out a range of basic rules relating to patents, and although the convention does
not have direct legal effect in all national jurisdictions, the principles of the
convention are incorporated into all notable current patent systems. The Paris
Convention set a minimum patent protection of 20 years, but the most significant
aspect of the convention is the provision of the right to claim priority: filing an
application in any one member state of the Paris Convention preserves the right for
one year to file in any other member state, and receive the benefit of the original
filing date. Another key treaty is the Patent Cooperation Treaty (PCT),
administered by the World Intellectual Property Organization (WIPO) and
covering more than 150 countries. The Patent Cooperation Treaty provides a
unified procedure for filing patent applications to protect inventions in each of its
contracting states along with giving owners a 30 month priority for applications as
opposed to the standard 12 the Paris Convention granted. A patent application filed
under the PCT is called an international application, or PCT application. The steps
for PCT applications are as follows:
1. Filing the PCT patent application
2. Examination during the international phase
3. Examination during the national phase.[47]
Alongside these international agreements for patents there was the Patent Law
Treaty (PLT). This treaty standardized the filing date requirements, standardized
the application and forms, allows for electronic communication and filing, and
avoids unintentional loss of rights, and simplifies patent office procedures.[48]
Sometimes, nations grant others, other than the patent owner, permissions to create
a patented product based on different situations that align with public policy or
public interest. These may include compulsory licenses, scientific research, and in
transit in country.[49]
Application and prosecution
Before filing for an application, which must be paid for whether a patent is granted
or not, a person will want to ensure that their material is patentable. A big part of
this is that patentable material must be man-made, meaning that anything natural
cannot be patented. For example, minerals, materials, genes, facts, organisms, and
biological processes cannot be patented, but if someone were to take this and
utilize and inventive, non-obvious, step with it to create something man-
made, that, the end result, could be patentable. That includes man-made strains of
bacteria, as was decided in Diamond v. Chakrabarty. [50] Patentability is also
dependent on public policy, if it goes against public policy, it will not be
patentable. An example of this is patent a man-modified higher life-form, such as a
mouse as seen in Harvard College v. Canada. [51] Additionally, patentable materials
must be novel, useful, and a non-obvious inventive step.[52]
A patent is requested by filing a written application at the relevant patent office.
The person or company filing the application is referred to as "the applicant". The
applicant may be the inventor or its assignee. The application contains a
description of how to make and use the invention that must provide sufficient
detail for a person skilled in the art (i.e., the relevant area of technology) to make
and use the invention. In some countries there are requirements for providing
specific information such as the usefulness of the invention, the best mode of
performing the invention known to the inventor, or the technical problem or
problems solved by the invention. Drawings illustrating the invention may also be
provided.
The application also includes one or more claims that define what a patent covers
or the "scope of protection".
After filing, an application is often referred to as "patent pending". While this term
does not confer legal protection, and a patent cannot be enforced until granted, it
serves to provide warning to potential infringers that if the patent is issued, they
may be liable for damages.[53][54][55]
Once filed, a patent application is "prosecuted". A patent examiner reviews the
patent application to determine if it meets the patentability requirements of that
country. If the application does not comply, objections are communicated to the
applicant or their patent agent or attorney through an Office action, to which the
applicant may respond. The number of Office actions and responses that may occur
vary from country to country, but eventually a final rejection is sent by the patent
office, or the patent application is granted, which after the payment of additional
fees, leads to an issued, enforceable patent. In some jurisdictions, there are
opportunities for third parties to bring an opposition proceeding between grant and
issuance, or post-issuance.
Once granted the patent is subject in most countries to renewal fees to keep the
patent in force. These fees are generally payable on a yearly basis. Some countries
or regional patent offices (e.g. the European Patent Office) also require annual
renewal fees to be paid for a patent application before it is granted.
Software Piracy
Software Piracy is the illegal approach of copying, distributing, modifying,
selling, or using the software which is legally protected. So in a simple term, we
can say Software piracy is the act of stealing legal software in an illegal way. This
software piracy refers to the unauthorized copy and use of legal software. And now
this critical problem has turned into a global issue.
Regulation for Software Piracy :
Software piracy is illegal and there are strict laws for these illegal activities. So
monetary penalties are also there for this lawbreaker who breaks these copyright
laws and creates copyright violation.
End-User License Agreement(EULA) is a license agreement which is mostly used
for software to protect its legality. It is a contract between the manufacturer and the
end-user. This rule defines the rules for legal software. One common rule in EULA
is that it prevents the user from sharing the software with others.
Types of Software Piracy :
There are mainly 5 types of Software Piracy. Each type of software piracy is
explained well below:
1. Softlifting-
It is the most common type of software piracy. In this piracy, the legal owner
of the software is one, but the users are multiple. For instance, someone
purchases the genuine software, and others will illegally use that software by
downloading the software to their computer.
For example, many times we borrow the software from our colleague and
install a copy of that on our computer just to save the money which rises to
softlifting one type of software piracy.
2. Hard-disk Loading-
It is the most common type of software piracy which mainly happens in PC
resell shops. The shop owner buys a legal copy of the software and reproduces
its copies in multiple computers by installing it. Most of the time customers/PC
users are not aware of these things and get the pirated version of the software
in the original S/W price or less than the original price. It is one type of
Commercial software piracy.
3. Counterfeiting-
In counterfeiting the duplicates are created of genuine/legal software programs
with the appearance of authenticity. Then these duplicate software are sold out
at less price.
4. Client-Server overuse –
In client-server overuse, more copies of the software are installed than it has
licensed for. Mainly it has seen in local business sectors when they work under
a local area n/w and install the software in all the computers for use by a
number of employees which is an unauthorized practice.
5. Online Piracy-
In online piracy, the illegal software is acquired from online auction sites and
blogs which is mainly achieved through the P2P(Peer to Peer) file-sharing
system. As it is acquired by means of the Internet, often it is called Internet
Piracy.
Software Piracy is a danger because:
Many times it fails or malfunction.
No warranty of the product as it is acquired by illegal way.
Risk of security issues.
No upgrade and improvement in features and functionality
High risk of virus and malware infection to the computer.
Software piracy may be easily avail the pirated software in a cheaper price, but
users should aware about its bad effects on the system, data, security point of view
as well as users should be aware about the strict consequences for offenders
breaking the law.
Software Licenses Types Explained
This tutorial explains the software licensing model in detail. Learn how many types
of software licenses are there and what are the differences between different types
of software licenses.
A software license is a legal agreement between the developer and end-user that
defines how the end-user can use or redistribute the software. There are mainly two
types of software: open source and proprietary. Both types use different types of
licensing models. Let's discuss both types and their license models.
Open-source software
In this type of software, the source code of the software is provided with the
software to the end-user. The end-user can view, edit and modify the source code.
The user can also redistribute the modified version of the software. There are
different models of open source licenses offering more or less freedom of
redistribution rights.
Public domain
This is the most flexible license. It grants almost all rights to the end-user. The
end-user can modify and redistribute the modified code without any restrictions.
The end-user can redistribute the modified code under his license.
Permissive
In the flexibility, this license type stands on the second number. Besides the
redistribution right, this license also grants all rights to the end-user. The end-user
can view and modify the source code. The end-user can also redistribute the
modified code but under the same license type. To redistribute the modified code,
the end-user cannot use the different license type.
Copyleft or Restrictive
In the flexibility, this license stands on the third number. It adds an additional
restriction on redistribution. This license does not allow the end-user to modify the
original license. To redistribute the modified code, the end-user has to use the
original license. Besides the redistribution right, this license does not put any other
restriction on the source code.
GNU/LGPL
This license allows the end-user to link or use open source libraries in his project
or software. If the end-user only links open source libraries, the end-user can
release his project under any license type. But if the end-user copies the open-
source libraries in his project, the end-user has to release his project under the same
GNU license.
This license model allows the publishers or developers of the software to decide
what rights they want to reserve and what rights they want to grant the end-users.
This license type uses the simplest form of terms and conditions. This license type
is mostly used by the publishers who want to release their project or software
application under an open-source license but at the same time also want to reserve
some rights.
Proprietary software
In this type of software, ownership of the software remains with the software
publisher. The software publisher neither shares nor allows the end-user to view
and modify the source code of the software. The publisher only grants the use of
one or more copies of software under a license agreement, known as EULA (End
User License Agreement). A EULA contains the terms and conditions that define
what the user can and cannot do. To use the software, the end-user must accept the
EULA of the software.
To create a EULA, the software publisher can use a pre-defined licensing model or
can create a custom license for the software. The most popular proprietary
licensing models are the following.
Perpetual License
Floating License
In this model, a license is used to define the number of users who can use the
software application simultaneously. This license works on a "first come first
served basis". Once all defined licenses are used, no additional user is allowed to
access the application. If an additional user wants to use the application, either he
has to purchase an additional license or has to request a license holder user to
release his license. Let take an example. Suppose a company has 10 users. The
company purchased a software application with 5 floating licenses. Now, any 5
users can use the application at a time. The company can rotate users in the pool.
For example, it can exclude a user to include another user but it can't include more
than five users at a time.
Subscription License
In this model, a license is used to define the time frame in which the user is
allowed to use the software application. The time frame could be 7 days (a weekly
subscription), 30 days (a monthly subscription), 365 days (a yearly subscription),
or a custom duration. Once the subscription period is expired, the user has to renew
the subscription. Netflix and Amazon prime are examples of subscription-based
services.
Use-time license
In this model, a license is used to provide time-based access to the application. The
license expires after a specific time duration. Once the license is expired, the user
is not allowed to access the application. To access the application again, the user
has to renew the license. Usually, the application notifies the user ahead of time
that the license will expire soon. Notifications help the user to renew the license
before it expires.
Academic License
Software companies use this type of license to provide their software to students or
engineers free of cost or at a minimal cost for educational or learning purposes.
The main idea behind this marketing stagey is that if a student becomes familiar
with an application during his academic courses, he is more likely to use the same
application during his job. For example, Microsoft and Adobe offer huge discounts
for students. To take advantage of the discount, students are required to verify their
academic status at the time of purchase or registration.
Metered License
Feature license
The software vendor uses this license to control the features of the software that
the end-user can use. This license is also used to limit the number of times a
specific feature can use.
Trial license
In this model, a license is used to allow access to all features or certain features of
the application software for a specific time duration. During this period, a user can
test the application. If the user wants to use the application after the trial, he has to
purchase a regular license.