Online Intellectual Property

download Online Intellectual Property

of 7

Transcript of Online Intellectual Property

  • 8/13/2019 Online Intellectual Property

    1/7

    Online Intellectual Property Protection Rights 1

    Online Intellectual Property Protection Rights

    A.O. Aliyu and Adedayo Stephen

    Energy Commission of Nigeria, Abuja. Nigeria

    Abstract

    Intellectual property IP protection is a way producing encouragements to create. According to

    Lemley (2005), Intellectual property rights are an exception to that norm, and they are granted

    only when and only to the extent that they are necessary to encourage invention (Lemley, 2005).

    Free competition is normal. IP rights has been limited in time, scope, and granted only to authors

    and inventors who met certain least requirements. As stated by (Moringiello & Fleming, 2008),

    there are many IP cases on trademark, patent, and copyright law. Various approaches to

    intellectual property protection rights are copyrights, patents, and trade secrets.

    Keywords: intellectual property, protection rights, copyrights, patents, and trade secrets

  • 8/13/2019 Online Intellectual Property

    2/7

    Online Intellectual Property Protection Rights 2

    Intellectual Property

    Intellectual property (IP) is a term referring to a number of different types of creations of

    the mind for which property rights are recognized and the corresponding fields of law (Raysman,

    Pisacreta, Adler, & Ostrow, 1999). The intellectual property law grants owner special rights to a

    variety of assets, such as musical, literary, and artistic works; discoveries and inventions; and

    words, phrases, symbols, and designs. Examples of common intellectual property are copyrights,

    trademarks, patents, industrial design rights and trade secrets in some jurisdictions.

    Copyright

    This is a right given to authors of original works, such as books, articles, movies, and

    computer programs. It gives the exclusive permission to reproduce the work, make copied works,

    or to present the work freely and also protect the form or expression of ideas (Kinsella, 2001).

    International copyright law does not provide satisfactory resolution for international IP cases

    since copyright law application is nationally limited (Frohlich, 2009). A copyright may not be

    registered to obtain legal advantages but it comes automatically the moment the work is produce

    in a physical medium of expression, and lasts for the life of the author or for a total of ninety-five

    years in cases in which the employer owns the copyright (Kinsella, 2001).

    Patent

    A new or improved computer game is an example of a type of device which may be

    patented. Patent is a property right in origination, that is, in devices or processes that perform a

    useful function.It is permits the inventor a limited control on the manufacture, use, or sale of the

    invention. It only grants to the patentee the right to prevent others from practicing the patented

    invention. In most cases, not every innovation or discovery is patentable. Kinsella (2001) stated

    that the U.S. Supreme Court has, for example, identified three categories of subject matter that

    are not patentable, namely laws of nature, natural phenomena, and abstract ideas.

  • 8/13/2019 Online Intellectual Property

    3/7

    Online Intellectual Property Protection Rights 3

    Trade Secret

    This entails any private recipe, device, or piece of information which gives its holder an

    economical advantage so long as it remains secret (Kinsella, 2001). Trade secret laws are used

    to check misuses of the trade secret. It is gotten by stating that the details of subject that is

    secret. Trade secret theoretically may last indefinitely, although disclosure or independent

    discovery may destroy it. Its major disadvantage is that a competitor who independently

    invents the subject of anothers trade secret can obtain a patent on the device or process and

    actually prevent the original inventor from using the invention (Kinsella, 2001).

    Trademark

    The word, phrase, symbol, or design is used to identifythe basis of goods or services

    sold, and to differentiate them from other goods or services. According to Kinsella (2001),

    trademark law prevents others from infringing upon the trademark by using confusingly or

    similar marks to identify their own goods and services. Distinct from copyrights and patents,

    trademark rights is permanent as long as the owner continues to use the mark. Common ethical

    problem reported at second Life are intellectual property and trademark infringements

    (Moringiello & Fleming, 2008, p. 9).

    Schleimers (2001) Approaches to IP Protection

    There are many copyright infringements crimes committed all over the internet through

    file sharing system among strangers, the peer-to-peer file exchanges are the virus agents for

    computer systems. As a result, electronic countermeasures are necessary to jam, inhibit, block,

    investigate, and document online copyright infringement. (Schleimer, 2001). Release of viruses

    on the file-sharing systems is a way of preventing infringement but innocent internet users would

    be negatively affected. And such a malicious computer virus release to the Internet is acrime

    under both state and federal law so this method cannot be effectively used (The computer fraud

  • 8/13/2019 Online Intellectual Property

    4/7

    Online Intellectual Property Protection Rights 4

    and abuse act , n.d).

    Cease and Desist Programs

    The purpose of a cease-and-desist software package is just to convey an electronic message

    to virtual copyright offenders as a warning. According to Schleimer (2001),

    These files would be posted on the peer-to-peer indices masquerading as desirable

    content, such as a current hit song. The file contains an authoritarian voice that accuses

    the downloader of criminal and civil copyright infringement and demands that he or she

    immediately cease and desist.

    Snitch Programs

    A snitch program also could be distributed as a decoy file. Once inside the downloaders

    system, it would gather personal details, such as the infringers name and address, a list of

    infringed material found on the local hard drive, and the IP addresses of recipients of infringing

    uploads (Schleimer, 2001). The snitched information could be retrieved each time the infringer

    logs onto a file-sharing system and thereby posts the decoy file back onto the system (Schleimer,

    2001).

    Electronic Tags

    It is possible for copyright owners to publish decoy files which contain unique a tag. If a

    tag is in the file it proves that it had, at some point, been copied from an illegal file-sharing

    system. The owner of a copyright has a statutory privilege to insert identification information in

    digital copies to monitor infringement. (Schleimer, 2001)

    Mass Decoy Postings

    Web sites with high tendency of copyright infringement could be loaded with decoy files.

    When decoys are posted, a long series effect of the file-sharing system would replicate and the

    decoys could ultimately bury the real files. The infringers are being constantly bombarded with

  • 8/13/2019 Online Intellectual Property

    5/7

    Online Intellectual Property Protection Rights 5

    annoying cease and desist messages and drive infringers away from the illegal sites (Schleimer,

    2001).

    Handshake Programs

    Another good countermeasure would be to identify specific infringing files posted on a file-

    sharing system, initiate an upload of those particular files, and during the handshake that is when

    the publishers computer is introducing itself. A program is insert into the publishers computer

    so that blocks copying of the infringing file, deletes it, or replaces it with a cease-and-desist or

    decoy program. The technological feasibility of such an offensive measure depends on the

    existence of vulnerabilities in the receiving system (Schleimer, 2001).

    Frohlichs (2009) Approaches

    Frohlish considered IP protection from the International copyright law and conflicts of law

    approaches. According to Frohlich (2009),

    The exclusive rights granted to a copyright owner can only be exercised within the borders of

    a given country. This national limitation of copyrights is in pronounced contrast to the

    universal validity of other rights. This national limitation of copyrights is in pronounced

    contrast to the universal validity of other rights (Frohlich, 2009, p. 853).

    Since the main pillar of intellectual property law is territorially limited it applies to the application of

    copyright law it does not provide enough and satisfactory resolution to international IP case

    (Frohlich, 2009).

    Choice-of-law Rules

    Various laws apply to internet copyright infringement cases, these are; lex fori, lex loci delicti,

    andlex protectionisrule. The lex forirule assumes application of the law of the country where

    the court deciding the violation case is located. In contrast, the lex loci delictirule postulates

    application of the law of the country where the infringing conduct has occurred. The lex

    protectionisrule applies the law of the country for which IP protection is sought (Frohlich, 2009)

  • 8/13/2019 Online Intellectual Property

    6/7

    Online Intellectual Property Protection Rights 6

    Moringiello and Flemings (2008) Approaches.

    As businesses continue to move to and grow in the electronic environment over the years,

    courts are now adapting the common law and the existing statutes to the new Internet and

    electronic communications transactions. New laws are passed on electronic transactions and

    cyberspace to regulate the new ways of doing business and the courts, legislators, and regulators

    are finding the electronic payment systems issues interesting (Moringiello & Fleming, 2008).

    Most commonly apply Cyberspace laws to protect the online intellectual property are the

    Digital Millennium Copyright Act and the Anti-cybersquatting Consumer Protection Act.

    Contract law is an area in which courts are applying the common law to new challenges in the

    electronic and online contracts (Moringiello & Fleming, 2008).

    Conclusion

    Intellectual property is a wide theory that covers several types of legally accepted rights

    arising from some type of intellectual creativity, or that are otherwise related to ideas.

    Frohlich

    (2009)considered IP protection from the International copyright lawand conflicts of lawapproachesthat

    is from the legal view. Similar, Moringiello and Fleming (2008) approaches is from the

    electronic communication and cyberspace legal view. In contrast Schleimer (2001) considered

    IP using electronic countermeasure technology to protect IP. There is therefore an urgent need to

    pay more attention to the international and cyberspace Intellectual Property protection to

    encourage and protect global innovations.

  • 8/13/2019 Online Intellectual Property

    7/7

    Online Intellectual Property Protection Rights 7

    References

    Botterbusch, H. R., & Talab, R. S. (2008). Copyright and you: Ethical issues in Second Life.

    TechTrends, 53 (1) 9-12. .Retrieved from

    http://proquest.umi.com.proxy1.ncu.edu/pqdweb?did=1680515621&sid=4&Fmt=6&clien

    tId=52110&RQT=309&VName=PQD

    Frohlich, A. (2009). Copyright infringement in the Internet age primetime for harmonized

    conflict of laws rules. Berkley Technology Law Journal, 24 (2) 851-896. Retrieved from

    http://www.btlj.org/data/articles/24-2-d-Frohlich.pdf

    Kinsella, N. S. (2001).Against intellectual property.Retrieved from

    http://mises.org/journals/jls/15_2/15_2_1.pdf

    Lemley, M. A. (2005). Property, Intellectual Property, and Free Riding. .Retrieved from

    http://www.utexas.edu/law/journals/tlr/abstracts/83/83Lemley.pdf

    Moringiello, J. M., & Fleming, M. F. (2008).More electronic communication, more challenges:

    Introduction to the 2008 survey of the law of cyberspace.Retrieved from

    http://proquest.umi.com.proxy1.ncu.edu/pqdweb?did=1623361341&sid=5&Fmt=3&clien

    tId=52110&RQT=309&VName=PQD

    The Computer Fraud and Abuse Act (as amended 1994 and 1996).(n.d). Retrieved from

    http://www.panix.com/~eck/computer-fraud-act.html

    Raysman, R., Pisacreta, E. A., Adler, K. A., & Ostrow, S. H. (1999).Intellectual Property

    Licensing: Forms and Analysis.New York: Law Journal Press.

    Schleimer, J. D. (2001).Electronic countermeasures to copyright infringement on the Internet:

    Law & technology. Journal of Internet Law, 5 (5) 1-5.Retrieved from

    http://proxy1.ncu.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=

    buh&AN=9472848&site=ehost-live