IPR Min
IPR Min
UNIT I
Intellectual property Right (IPR) is a term used for various legal entitlements which
attach to certain types of information, ideas, or other intangibles in their expressed form. The
holder of this legal entitlement is generally entitled to exercise various exclusive rights in
relation to the subject matter of the Intellectual Property. The term intellectual property reflects
the idea that this subject matter is the product of the mind or the intellect, and that Intellectual
Property rights may be protected at law in the same way as any other form of property.
Intellectual property laws vary from jurisdiction to jurisdiction, such that the acquisition,
registration or enforcement of IP rights must be pursued or obtained separately in each territory
of interest. Intellectual property rights (IPR) can be defined as the rights given to people over
the creation of their minds. They usually give the creator an exclusive right over the use of
his/her creations for a certain period of time.
Intellectual Property
Intellectual property is an intangible creation of the human mind, usually expressed or
translated into a tangible form that is assigned certain rights of property. Examples of
intellectual property include an author's copyright on a book or article, a distinctive logo design
representing a soft drink company and its products, unique design elements of a web site, or a
patent on the process to manufacture chewing gum.
Intellectual property rights (IPR) can be defined as the rights given to people over the
creation of their minds. They usually give the creator an exclusive right over the use of
his/her creations for a certain period of time. Intellectual property (IP) refers to creations of the
mind: inventions, literary and artistic works, and symbols, names, images, and designs used in
commerce.
1
Dr.SARIKA.G Assistant Professor AITS KADAPA
One can broadly classify the various forms of IPRs into two categories:
IPRs that stimulate inventive and creative activities (patents, utility models, industrial
designs, copyright, plant breeders’ rights and layout designs for integrated circuits) and
IPRs that offer information to consumers (trademarks and geographical indications)
IPRs in both categories seek to address certain failures of private markets to provide for an
efficient allocation of resources
1. Industrial Property
2. Copyright
Industrial property, which includes inventions (patents), trademarks, industrial designs, and
geographic indications of source; and
Copyright, which includes literary and artistic works such as novels, poems and plays, films,
musical works, artistic works such as drawings, paintings, photographs and sculptures, and
architectural designs. Rights related to copyright include those of performing artists in their
performances, producers of phonograms in their recordings, and those of broadcasters in their
radio and television programs
What is a property?
Property designates those things that are commonly recognized as being the possessions
2
Dr.SARIKA.G Assistant Professor AITS KADAPA
Properties are of two types - tangible property and intangible property i.e. one that is
physically present and the other which is not in any physical form. Building, land, house, cash,
jewellery are few examples of tangible properties which can be seen and felt physically. On the
other hand there is a kind of valuable property that cannot be felt physically as it does not have
a physical form. Intellectual property is one of the forms of intangible property which
commands a material value which can also be higher than the value of a tangible asset or
property.
Patents
Copyrights
Trademarks
Industrial designs
Geographical indications of goods
Trade Secrets
Out of the different types of Intellectual Property Rights the following are the most important
species of IPR
TRADEMARKS
According to section 2, sub-section (1) of the Trade Marks Act 1999, ”Trade Mark”
means a mark capable of being represented graphically and which is capable ofdistinguishing
the goods or services of one person from those of others and may include shape of goods, their
packaging and combination of colours.
Trade mark registration is an effective and economic way of ensuring your brand is
protected.Registration provides a safeguard against third party infringement and often acts as
3
Dr.SARIKA.G Assistant Professor AITS KADAPA
Genericide is the term used to describe the death of a trademark that results from the brand
name becoming the name of the object itself.
COPYRIGHTS
1847 is the First Copyright law Enactment in India during British Regime. The term of
copyright was for the lifetime of the author and 60 years counted from the year following the
death of the author
Copyright law is designed to protect interests and balance the rights of the following stake
holders
Authors/ Creators
Publishers/ Entrepreneurs
Users /Audiences
Indian Copyright Act is the one of the best Copyright enactment in the world.
The Copyright Act 1911, while repealing earlier statues on the subject, was also made
applicable to all the British colonies including India. In 1914, the Indian Copyright Act was
enacted which modified some of the provisions of Copyright Act 1911 and added some new
provisions to it to make it applicable in India. Copyright Act, 1911 was in existence in India
till the new Copyright Act, 1957 was introduced in India Post Independence. In India, the
Copyright Act, 1957 (as amended in 1999), the Rules made there under and the International
Copyright Order, 1999 govern Copyright and neighbouring rights. This Act has been amended
five times i.e 1983,1984,1992,1999 and most recently in 2012.
4
Dr.SARIKA.G Assistant Professor AITS KADAPA
works.
Literary works such as novels, poems, plays, reference works, newspapers and
computer programs; databases; films, musical compositions, and choreography; artistic works
such as paintings, drawings, photographs and sculpture; architecture; and advertisements, maps
and technical drawings.
PATENTS
Patent is a grant for an invention by the Government to the inventor in exchange for
full disclosure of the invention. A patent is an exclusive right granted by law to applicants /
assignees to make use of and exploit their inventions for a limited period of time (generally
20 years from filing). The patent holder has the legal right to exclude others from commercially
exploiting his invention for the duration of this period. In return for exclusive rights, the
applicant is obliged to disclose the invention to the public in a manner that enables others,
skilled in the art, to replicate the invention. The patent system is designed to balance the
interests of applicants / assignees (exclusive rights) and the interests of society (disclosure of
invention).
Law Sec.2(1)(J) - Invention” means a new product or process involving an inventive step and
capable of industrial application
Utility patents may be granted to anyone who invents or discovers any new and useful process,
machine, article of manufacture, or composition of matter, or any new and useful improvement
thereof;
Design patents may be granted to anyone who invents a new, original, and ornamental design
for an article of manufacture; and
Plant patents may be granted to anyone who invents or discovers and asexually reproduces
any distinct and new variety of plant
5
Dr.SARIKA.G Assistant Professor AITS KADAPA
IPR is a significant tool in today's era. The risk of an innovation getting infringed
without the knowledge of the inventor stands very high. With the increase in the importance of
IP, instances of IP crimes have become the part and parcel of the digitized era sometimes even
leading to failure of businesses. Companies rely on adequate protection of their patents,
trademarks, and copyrights, while customers make use of IP to ensure that they purchase
secure, assured goods. An IP asset is like any other physical property offering commercial
benefits to businesses. In a web-based world, IP protection is much more relevant as it is
comparatively simpler than ever to reproduce any specific template, logo, or functionality.
Hence, strong IP laws give protection to IP and contribute to the economy of the respective
state. IPR is one of the sources of security for intangible properties which are still open to the
public and which can be quickly replicated by anyone.
Intellectual property rights are more important because today we are highly-connected
to digital landscape. With all of the good the rise of the internet has done for the sharing of
information and ideas, it has unfortunately become easier for ideas and works to be stolen,
which can be damaging to both national economies and innovation.
Intellectual property protection varies from country to country, but countries that have
strong IP laws recognize the important impact original works, designs, inventions, etc. have on
the overall economy. Almost every country that has a dependence on international trade takes
strong measures to protect their intellectual property rights.3
With the rise of intangible assets that are shared across the internet, it is easy for people
to unlawfully copy and share books, music, movies, and more. Copyrights, patents, trademarks,
and trade secrets and the laws around these protections are all intended to encourage innovation
and creativity and are essential to the practice of IP law to help curb illegal activities.
The evolution of international IP acts through different treaties and the formation of World
Intellectual Property Organization (WIPO) is given below in brief.
The Paris Convention for the Protection of Industrial Property is born. This international
agreement is the first major step taken to help creators ensure that their intellectual works are
protected in other countries. The need for international protection of intellectual property (IP)
6
Dr.SARIKA.G Assistant Professor AITS KADAPA
became evident when foreign exhibitors refused to attend the International Exhibition of
Inventions in Vienna, Austria in 1873 because they were afraid their ideas would be stolen and
exploited commercially in other countries. The Paris Convention covers:
• Inventions (patents)
• Trademarks
• Industrial designs
Following a campaign by French writer Victor Hugo the Berne Convention for the
Protection of Literary and Artistic Works is agreed. The aim is to give creators the right to
control and receive payment for their creative works on an international level. Works protected
include:
With the adoption of the Madrid Agreement, the first international IP filing service is
launched: the Madrid System for the international registration of marks. In the decades that
follow, a full spectrum of international IP services will emerge under the auspices of what will
later become WIPO.
The two secretariats set up to administer the Paris and Berne Conventions combine to
form WIPO's immediate predecessor, the United International Bureaux for the Protection of
Intellectual Property – best known by its French acronym, BIRPI. The organization, with a
staff of seven, is based in Berne, Switzerland.
comes into force and BIRPI is thus transformed to become WIPO. The newly established
WIPO is a member state-led, intergovernmental organization, with its headquarters in Geneva,
Switzerland.
WIPO joins the United Nations (UN) family of organizations, becoming a specialized
agency of the UN. All member states of the UN are entitled, though not obliged, to become
members of the specialized agencies.
WIPO joins the United Nations (UN) family of organizations, becoming a specialized
agency of the UN. All member states of the UN are entitled, though not obliged, to become
members of the specialized agencies.
The PCT international patent system begins operation. The PCT expands rapidly to
become WIPO's largest international IP filing system today.
The Patent Cooperation Treaty (PCT) makes it possible to seek patent protection for
an invention simultaneously in each of a large number of countries by filing an "international"
patent application.
TRIPS Agreement
India along with other emerging nations graced a signatory to the Treaty of TRIPS of
the World Trade Organisation (WTO) in 1995 with a matter that agreement will allow free
flow of trade, investment and eliminate the restrictions enduring in the norm of Intellectual
Property.
8
Dr.SARIKA.G Assistant Professor AITS KADAPA
The TRIPS Agreement aims for the transfer of technology and requires developed
country members to provide incentives for their companies to promote the transfer of
technology to least-developed countries in order to enable them to create a sound and viable
technological base
The office of the Controller General of Patents, Designs and trademarks (CGPDTM), a
subordinate Office under The Department for Promotion of Industry and Internal Trade
(DPIIT), carries out statutory functions related to grant of Patents and registration of
Trademarks, Designs and Geographical Indications. The registration of copyrights is
administered by the Registrar of Copyright Office, working under the CGPDTM. It functions
out of offices situated in Delhi, Kolkata, Mumbai, Chennai and Ahmadabad, while theCentral
IP Training Academy is at Nagpur.
The appropriate office of the patent office shall be the head office of the patent office or the
branch office as the case may be within whose territorial limits. Residence of applicant or
Domicile; or their place of business; or the place where the invention actually originated.
Patent Office Branch, The States of Telangana, Andhra Pradesh, Karnataka, Kerala, Tamil
Chennai Nadu and the Union Territories of Pondicherry and Lakshadweep
9
Dr.SARIKA.G Assistant Professor AITS KADAPA
Patent Office Branch, The States of Maharashtra, Gujarat, Madhya Pradesh, Goa and
Mumbai Chhattisgarh and the Union Territories of Daman and Diu & Dadra
and Nagar Haveli.
Patent Office Branch, The States of Haryana, Himachal Pradesh, Jammu and Kashmir,
New Delhi Punjab, Rajasthan, Uttar Pradesh, Uttaranchal, Delhi and the Union
Territory of Chandigarh.
Intellectual Property Appellate Board (IPAB) has been established in the year 2003,
under Section 84 of the Trade Marks Act, 1999. The Board hears appeals against the decision
of Controller of Patents (under the Patents Act, 1970), Registrar of Trade Marks (under the
Trade Marks Act, 1999) and Geographical Indication cases (under the Geographical Indication
& Protection Act, 1999). The Copyright Board and Plant Varieties Protection Appellate
Tribunal function under the ambit of IPAB in accordance with their respective Acts and Rules.
There are a number of International organizations and agencies that promote the use and
protection of intellectual propertyInternational Trademark Association (INTA)
process of making laws), and to give aid and encouragement to all efforts for the advancement
and observance of trademark rights.
WIPO was founded in 1883 and is specialized agency of the United Nations whose purposes
are to promote intellectual property throughout the world and to administer 23 treaties(Present
26 treaties) dealing with intellectual property. WIPO is one of the 17 specialized agencies of
the United Nations. It was created in 1967, to encourage creative activity, to promote the
protection of Intellectual Property throughout the world. Around 193 nations are members of
WIPO. Its headquarters in Geneva, Switzerland, current Director General of WIPO is Francis
Gurry took charge on October 1, 2008.
Intellectual property rights (IP rights) are not inherently valuable. Their value is the strategic
advantage gained by excluding others from using the intellectual property. To be valuable,
your exclusionary rights should be strategically aligned with your business objectives.
The recognition of intellectual property rights is an important key to converting creativity into
a marketable product with positive cash flow. Creativity is essential to economic growth.
Consumer sales depend on attractive, efficient, safe, innovative, and dependable products and
services, and these qualities are built on intellectual property. The IP rights of a business are
among its most valuable assets. The protection of those IP rights can promote creativity,
distinguish a business and its products or services, and increase its profitability and endurance.
To understand the role of IP rights in practical terms, you must first appreciate the purpose of
IP laws. Although IP laws will differ in detail from country to country, they have the same
basic purpose, which is also reflected in international and regional agreements. In broad terms,
exclusive rights in intellectual property are usually granted pursuant to laws that are intended
to do the following:
Define the monopolistic rights, namely, exclusive ownership rights that belong to the
holder of the IP and are transferable to another holder in certain situations.
Define the limitations on the monopoly, such as by restricting the application of
exclusive rights to an invention, presentation, or specific goods only, by making
exceptions to exclusive use for permitted acts (e.g., authorizing single copies for
11
Dr.SARIKA.G Assistant Professor AITS KADAPA
In other words, IP laws create affirmative rights, but not an absolute defensive shield against
infringement. They give the owner of the IP the right to stop other persons from using the IP
in a manner that is not permitted by the law. Unless the IP owner takes affirmative action, an
infringement of IP rights may continue unchecked by any other authority. This concept is
extremely significant: mere registration of IP rights is not alone sufficient to protect those rights
against unauthorized use. If you are going to spend the money and labor to register your IP
claim, you must be also willing to spend the money and labor to enforce your claim.
Your IP can be one of your most useful and most used business tools. If you own patents,
copyrights, designs, or similar IP, you will realize value from utilizing them in your own
exclusive manufacture or production. If you own marks, you will use them to distinguish your
business and your products or services, to grow its customer base, and to promote its goodwill
and reputation. If you own trade secrets, specialized mailing lists, secret recipes or processes,
and similar IP, your business can provide distinctively unique services in contrast to your
competition.
12
Dr.SARIKA.G Assistant Professor AITS KADAPA
National Route
The Patent Cooperation Treaty (PCT) is an international patent law treaty, concluded
in 1970. It provides a unified procedure for filing patent applications to protect inventions
in each of its contracting states. A patent application filed under the PCT is called an
international application, or PCT application. In this the filing of an international application is
done from the applicant's national Office
Analyzing FTO is to evaluate whether you are in any way infringing the patents, designs
or trademarks of others. Such a evaluation is usually done by conducting a search in patent,
trademark and design databases for patent applications, granted patents, registered trademarks
or designs As patents, trademarks and designs are granted to particular territories an FTO
search may reveal that the particular IP in question is not protected in the territory of interest.
Reason for conducting searches: are
Same or confusingly similar trademark may already exist in the export market
Technology not patented in one country may be patented elsewhere
Respect Deadlines
Priority Period -Once an application for a patent or design right has been made
domestically (priority date) an international application has to be made within the “priority
period.” The international application will benefit from the priority date. A filing after the
priority period has lapsed would mean you can’t benefit from the earlier priority date and
novelty will be lost.
Patents: 12 months
Designs: 6 months
Patents and designs are required to be novel to merit protection If a product needs to be
disclosed it should be done in a Non-disclosure Agreement. If not, the novelty could be lost
and an application for registration be rejected. This is particularly important in disclosing
products that embody inventions and/or designs to potential partners before protection has been
obtained
14
Dr.SARIKA.G Assistant Professor AITS KADAPA
UNIT - II
Copyrights: Fundamentals of copyright law, originality of material,right of reproduction,
right to perform the work publicly,copy right ownership issues, notice of copyright.
Patents: Foundation of patent law, patent searching process, Basic Criteria of Patentability
Industrial Designs: Kind of protection provided in Industrial design
Introduction:
In ancient days creative persons like artists, musicians and writers made, composed or wrote
their works for fame and recognition rather than to earn a living, thus, the question of copyright
never arose.The importance of copyright was recognized only after the invention of printing
press which enabled the reproduction of books in large quantity practicable.
Copyright –Definition:
Copyright is a right of use given by the law to the creator of literary, dramatic, musical,
artistic work , software etc for a limited period of time
In India all the law related to copyright is regulated by the copyright Act 1957. Its latest
amendment was brought in 2012
A copyright is an exclusionary right. It conveys to its owner the right to prevent others from
copying, selling, performing, displaying, or making derivative versions of a work of
authorship.
The entire bundle of rights that a copyright owner is exclusively entitled toexercise under the
copyright laws. These rights consists of:
15
Dr.SARIKA.G Assistant Professor AITS KADAPA
COPYRIGHT ACT, 1957: Copyright Act refers to laws that regulate the use of the work of
a creator, such as an artist or author.
This includes copying, distributing, altering and displaying creative, literary and other types
of work. Unless otherwise stated in a contract, the author or creator of a work retains the
copyright.
Copyright does not ordinarily protect titles by themselves or names, short word combinations,
slogans, short phrases, methods, plots or factual information.
Literary, dramatic, musical or artistic work (other than a photograph), when published
during the lifetime of the author, copyright subsists during the lifetime of the author,
plus 60 years.
In the case of photographs, cinematograph films and sounds recordings; the term is
60 years from the date of publication.
When the first owner of copyright is the government or a public undertaking, the term
of copyright is 60 years from the date of publication.
Copyright is a right given by the law to creators of literary, dramatic, musical and artistic works
and producers of cinematograph films and sound recordings. In fact, it is a bundle of rights
including, inter alia, rights of reproduction, communication to the public, adaptation
16
Dr.SARIKA.G Assistant Professor AITS KADAPA
and translation of the work. It means the sole right to produce or reproduce the work or any
substantial part thereof in any material form whatsoever (Kartar Singh Giani v. Ladha Singh &
Others AIR 1934 Lah 777). Section 14 of the Act defines the term Copyright as to mean the
exclusive right to do or authorise the doing of the following acts in respect of a work or any
substantial part thereof, namely
(i) reproducing the work in any material form which includes storing of it in any
medium by electronic means;
(ii) issuing copies of the work to the public which are not already in circulation;
(iv) making any cinematograph film or sound recording in respect of the work; making
any translation or adaptation of the work. Further any of the above mentioned acts
in relation to work can be done in the case of translation or adaptation of the work.
(i) to do any of the acts specified in respect of a literary, dramatic or musical work; and
(ii) to sell or give on commercial rental or offer for sale or for commercial rental any
copy of the computer programme. However, such commercial rental does not apply
in respect of computer programmes where the programme itself is not the essential
object of the rental.
(i) reproducing the work in any material form including depiction in three dimensions
of a two dimensional work or in two dimensions of a three dimensional work;
(iii) issuing copies of work to the public which are not already in existence;
(iv) including work in any cinematograph film; making adaptation of the work, and to
do any of the above acts in relation to an adaptation of the work.
17
Dr.SARIKA.G Assistant Professor AITS KADAPA
(i) making a copy of the film including a photograph of any image or making any other
sound recording embodying it;
(ii) selling or giving on hire or offer for sale or hire any copy of the film/sound recording
even if such copy has been sold or given on hire on earlier occasions; and
(ii) To sell or give on hire, or offer for sale or hire, any copy of the sound recording
ORIGINALITYOFMATERIAL
Originality does not signify novelty; a work may be original even though it closely resembles
other works so long as the similarity is fortuitous, not the result of copying.
To illustrate, assume that two poets, each ignorant of the other, compose identical poems.
Neither work is novel, yet both are original, and, hence, copyrightable. “Originality” thus
Fixation of Material:
The Copyright Act protects works of authorship that are “fixed in any tangible medium of
expression.” A work is “fixed” when it is embodied in a copy or phonorecord and is sufficiently
18
Dr.SARIKA.G Assistant Professor AITS KADAPA
There are thus two categories of tangible expression in which works can be fixed: “copies”
and “ phonorecords.”
A phonorecord is a material object in which sounds are fixed and from which the sounds
can be perceived, reproduced, or communicated either directly by human perception or
with the help of a machine.
The copyright act provides that copyright protection subsists [support oneself]in
original works of authorship fixed in any tangible medium of expression, now
known or
hereafterdeveloped,fromwhichtheycanbeperceived,reproducedorotherwise
communicated either directly or with the aid of a machine.
17 U.S.C. § 102. Section 102 then lists eight categories of protectable works. The
list is preceded by the phrase that works of authorship “include” those categories,
demonstrating that the listed categories are not the only types of works that can be
protected, but are illustrative only.
19
Dr.SARIKA.G Assistant Professor AITS KADAPA
Rights of Reproduction:
Themostfundamentaloftherightsgrantedtocopyrightownersistherighttoreproducethe
work
Aviolationofthecopyrightactoccurswhetherornottheviolatorprofitsbythereproduction
Only the owner has the right to reproduce the work
Secretly taping a concert, taking pictures at a performance, or recording all
violate the owner’s right to reproduce
Section 106 of the copyright Act provides that the owner of a copyright has the
exclusive right to prepare derivative works based upon the copyrighted work
This right I often referred to as the right to adapt the original work
20
Dr.SARIKA.G Assistant Professor AITS KADAPA
Definition:
Section 106 (3) of the copyright act provides that the owner of a copyright has the
exclusive right to distribute copies or phonorecords of the work to the public by
sale or other transfer of ownership
A violation of the distribution right can arise solely from the act of distribution itself
The distributor did not make an unlawful copy or the copy being distributed was
unauthorized
Thus, blockbuster videos to recanbeliableforviolatinganowner’srighttodistribute
Oncetheauthorhaspartedwithownershipofcopyrightedmaterial,thenewownerofala
wfullymadecopycantreattheobjectashisorher own
The new owner the right to lend the book or movie to a friend, resell the work at a
garage sale,orevendestroyit.
Thefirstsaledoctrinedoesnotapplytoorlimittheauthor’sexclusiverightstopreparederi
vative works or rights of public performance and
Without permission of authorship the goods are not permitted to imported into the
U.S.
21
Dr.SARIKA.G Assistant Professor AITS KADAPA
Adisplayis“public”underthesamecircumstancesinwhichaperformanceis“public”.
Copyright Ownership Issues [17U.S.C. §201(a)]:
Copyright in a work protected under the copyright activists [provide with power
and authority] in the author or authors of the work
Issues about ownership arise when more than one person creates a work
Unless copyright has been explicitly conveyed with those physical articles,
the original authors generally retain all other rights associated with the
works.
A joint work is a work prepared by two or more authors with the intention that their
contributions be merged into inseparable or interdependent parts of a unitarywhole.
One copyright exists in the created works
Joint authors are those who “mastermind” or “supermind” the creative effort.
If individual are authors of a joint work, each owns an equal undivided interest in
the copyright as a tenant in common, [each has the right to use the work, prepare
derivative works, display it without seeking the other coauthor’s permission].
If profits arise out of such use, an accounting must be made so, that each author
shares in the benefits or proceeds.
The death of a coauthor, his or her rights pass to heirs who then own the rights in
common with the other coauthor.
22
Dr.SARIKA.G Assistant Professor AITS KADAPA
Copyright Registration
To register a work, the applicant must sent the following three elements to the
Copyright Office: a properly completed application form, a filing fee, and a deposit
of the work being registered.
Registration may be made at any time within the life of the copyright
THEAPPLICATIONFORCOPYRIGHTREGISTRATION
the author (either the person who actually created the work or, if the work is one
made for hire, the employer or commissioning party)
the copyright claimant (either the author or a person or organization that has
obtained ownership of all of the rights under the copyright originally belonging to
the author, such as a transferee)
the owner of exclusive right, such as the transferee of any of the exclusive rights of
copyright ownership (for example, one who prepares a movie based on an earlier
book may file an application for the newly created derivative work, the movie); and
the duly authorized agent of the author, claimant, or owner of exclusive rights (such
as an attorney, trustee, or any one authorized to act on behalf of suchparties)
23
Dr.SARIKA.G Assistant Professor AITS KADAPA
Application Forms
The Copyright Office provides forms for application for copyright registration.
Eachformisone8½by11”(inchs) sheet, printed front and back.
An applicant may use photocopies of forms
The Copyright Office receives morethan 6,00,000 applications each year, each
application must use a similar format to ease the burden of examination.
The type of form used is dictated by the type of work that is the subject of copyright.
For example: One form is used for literary works, while another is used for sound
recording. Following are the forms used for copyright application.
Notice of copyright
Since March 1, 1989 (the date of adherence by the United States to the Berne
Convention),use of a notice of copyright (usually the symbol © together with the
year of first publication and copyright owner’s name) is no longer mandatory,
although it is recommended and offers some advantages.
Works published before January 1, 1978, are governed by the 1909 copyright Act.
Under that act, if a work was published under the copyright owner’s authority
without a proper notice of copyright, all copyright protection for that work was
permanently lost in the United States.
With regard to works published between January 1, 1978, and March 1, 1989,
omission of a notice was generally excused if the notice was omitted from a smaller
24
Dr.SARIKA.G Assistant Professor AITS KADAPA
and a reasonable effort was made to add the notice after discovery of its omission.
PATENTS
A patent is a government granted right for a fixed time period to exclude others from making,
selling, using, and importing an invention, product, process or design, or improvements on such
items. These exclusive, monopoly rights are powerful, and in return the inventor is required to
describe the invention in writing. The end result is simply a written description, accompanied
by diagrams and drawings, that explains the invention. The public benefits because anyone can
read the details of the invention and improve upon it. Importantly, the patent not only allows
the public to gain an understanding of the invention, but also defines its limits. Once the patent
term expires (generally 20 years from the application filing date), the technology covered by
the patent becomes a part of the public domain and is essentially free to use by the public.
Types of Patents
Generally, there are three main types of patents: utility patents, design patents and plant patents.
1) Utility Patent – When most people think of patents, they are referring mainly to utility
patents. A utility patent is a patent that covers inventions, whether it’s an innovative software
process, a new product that is distinct from prior art, or an improvement to a car engine. A
25
Dr.SARIKA.G Assistant Professor AITS KADAPA
utility patent can be granted for any new, useful, and non-obvious process or product.
2) Design Patent – A design patent covers a new and original ornamental design of a product.
In other words, a design patent protects the look of a product. Examples of products protected
by design patents include jewelry and watches, electronic devices, computer icons, and
beverage containers. A design patent consists of numerous drawings that show a product
from various angles and contains very little written description, if any.
3) Plant Patents - Plant patents were first created by the Patent Act of 1930, which had been
proposed by Luther Burbank to protect new species of asexually reproduced plants, mostly
flowers. These are different than the utility patents granted to bioengineered plants used in
agriculture. The United States was the first country in the world to grant plant patents, and even
today many countries continue to deny protection for plants. Indeed, even some signatories to
the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) administered
by the World Trade Organization (WTO) reserve the right to deny patents for plants.
To be patentable, plants must be cultivated rather than found in the wild, and plant patents are
granted only to protect a new, distinct, and non-obvious variety of asexually reproduced
plant—i.e., those grown not with seeds but by grafting, budding, or cutting. A plant need not
be useful to qualify for a patent, but it must be distinctive in its color, habit, soil, flavor,
productivity, form, or other aspects.
The main motive behind patent was to encourage scientific research, new technology and
industrial progress. Patent law grants a monopoly to the inventor to use their patented product
and allow the use of the same to someone with prior permission against certain consideration.
Patent confers the right to manufacture, use, offer for sale, sell or import the invention for the prescribed
period to the inventor. In short, the patent owner has the exclusive right to prevent or stop others from
commercially exploiting the patented invention. Patent protection means that the invention cannot be
commercially made, used, distributed, imported or sold by others without the patent owner’s consent. It protects
against infringement of the patent i.e. if someone tries to replicate the invention or invents against an existing
patent the original inventor can enforce their right against such duplicate product
There is no cost for doing a patent search in India. A patent search can be done through the
Patent database of India available at: http://ipindiaservices.gov.in/publicsearch.
Depending on the status of a patent application, a patent search can be done under two
26
Dr.SARIKA.G Assistant Professor AITS KADAPA
publication types: published or granted. The user can choose the desired publication type by
clicking on the checkbox. The user can view many categories like
Application Date
Title
Abstract
Complete Specification
Application Number
Patent Number
Applicant Number
Patent Number
Applicant number
Applicant Name
Inventor Name
Inventor Country
Inventor Address
Filing office
PCT Application Number
PCT Publication number
The entire category has a drop down box from which the user has access to change the category.
There is a search box next to every category where the user can enter the keyword of the patent
that he wants to view. By entering a query in more than one box, the applicant can run very
precise patent searches. Once the required keywords are entered in the respective boxes, there
is a captcha code the user has to clear.
Patent Information
Once the code is entered, there are a number of relevant patent results for the patent search
query that the user has entered. On selecting an application, the document opens with the
Application Number, Title, Application Date and Status. The user can get further details
about the patent by clicking on the Application Number, Title, Application Date and Status.
Through patent search, the applicant can find the following information about the patent:
Invention title
27
Dr.SARIKA.G Assistant Professor AITS KADAPA
Publication Number
Publication Date
Publication Type
Application Number
Application Filing Date
Priority Number
Priority Country
Priority Date
Field of Invention
Classification
When each column is selected, the patent application’s details about that section can be known
by the user. When a user selects application number details like Invention Title, Publication
number, date, type, etc. There are separate columns that give the user the inventor’s and the
applicant’s Name, Address, Country, and Nationality.
Patent Status
There is an Abstract column which has a summary of the patent application that the user can
view. Under this, there is a complete specification that gives the details about the specification
if the user has mentioned any. At the end, there is an option through which the user can view
the application status. When it is opened, the user can get the application details.
i. It should be novel.
ii. It should have inventive step or it must be non-obvious
28
Dr.SARIKA.G Assistant Professor AITS KADAPA
An invention may satisfy the condition of novelty, inventiveness and usefulness but it may
not qualify for a patent under the following situations:
29
Dr.SARIKA.G Assistant Professor AITS KADAPA
4) The mere discovery of a new form of a known substance which does not result in
enhancement of the known efficacy of that substance or the mere discovery of any new property
or new use for a known substance or of the mere use of a known process, machine or apparatus
unless such known process results in a new product or employs at least one new reactant;
Explanation: For the purposes of this clause, salts, esters, ethers, polymorphs, metabolites, pure
form, particle size, isomers, mixtures of isomers, complexes, combinations and other
derivatives of known substance shall be considered to be the same substance, unless they differ
significantly in properties with regards to efficacy;
5) A substance obtained by mere admixture resulting only in the aggregation of the properties
of the components thereof or a process for producing such substance;
8) Any process for medicinal, surgical, curative, prophylactic (diagnostic, therapeutic) or other
treatment of human beings or any process for a similar treatment of animals to render them free
of disease or to increase their economic value or that of their products;
9) Plants and animals in whole or any part thereof other than microorganisms but including
seeds, varieties and species and essentially biological processes for production or propagation
of plants and animals;
11) Literary, dramatic, musical or artistic work or any other aesthetic creation whatsoever
including cinematographic works and television productions;
12) A mere scheme or rule or method of performing mental act or method of playing game;
30
Dr.SARIKA.G Assistant Professor AITS KADAPA
INDUSTRAIL DESIGNS
Among the different kinds of intellectual property rights (IPR), one of the most important ones
is industrial design. Companies go enormous lengths to protect industrial design because it
gives them a competitive edge in the market and a lot of energy and resources goes into
developing them. If competitors are allowed to copy the industrial design without the owner’s
consent, there would be little incentive to develop new ways of improving things. It will act
as a dampener to innovation.
So naturally, industrial design intellectual property rights are critical for a modern economy.
According to the World Intellectual Property Rights Organization (WIPO), it is a composition
of lines and colors or any three-dimensional form, which leaves a unique impression on a
product. They maintain the essence of the ornamental or aesthetic aspect of a useful article,
which usually appeals to sight and touch senses, and can be reproduced in significant quantities.
Industrial design protection applies to several products, including packaging, lighting, jewelry,
electronic goods, textiles and even logos.
There are many benefits of IPR in industrial design. It would be wise to understand them –
31
Dr.SARIKA.G Assistant Professor AITS KADAPA
Monetary gain: The biggest benefit would be the financial gain that would accrue to the owner
of the design right. As we mentioned earlier, companies spend a lot of resources togain an
edge over competitors, and good design can help them make a lot of money.
Unique selling proposition: In a competitive market, companies can get an edge by having a
product that looks and feels different/unique. Often consumers make purchase decisions
based on the appearance. Industrial design protection enables companies to protect their USP
and set their product distinctly apart.
Selling designs: If a company cannot profit directly from the design developed, they can sell
it to third parties and make a profit from its design capabilities.
Image: Design protection helps build a positive image of a company. Industrial designs are
considered critical business assets and can even increase the share price of a company that, in
turn, helps sell their products.
The law offers high-level protection for IPR in industrial design. However, infringement of design rights is quite
common in India more often than not because of weak enforcement. As competition heightens, the temptation to
steal designs is stronger. Hence, it is crucial for the authorities to be more stringent in enforcing design rights.
Companies, for their part, should be vigilant about their rights and take proactive measures to protect them
32
Dr.SARIKA.G Assistant Professor AITS KADAPA
33
Dr.SARIKA.G Assistant Professor AITS KADAPA
34
Dr.SARIKA.G Assistant Professor AITS KADAPA
35
Dr.SARIKA.G Assistant Professor AITS KADAPA
36
Dr.SARIKA.G Assistant Professor AITS KADAPA
37
Dr.SARIKA.G Assistant Professor AITS KADAPA
38
Dr.SARIKA.G Assistant Professor AITS KADAPA
39
Dr.SARIKA.G Assistant Professor AITS KADAPA
40
Dr.SARIKA.G Assistant Professor AITS KADAPA
41
Dr.SARIKA.G Assistant Professor AITS KADAPA
1
Dr.SARIKA.G Assistant Professor AITS
KADAPA
2
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
UNIT-III
There are three primary scenarios for the ownership of intellectual property rights: (1) the
university owns the intellectual property; (2) the sponsor owns the intellectual property; and (3)
the university and sponsor jointly own the intellectual property. As a matter of policy, universities
Intellectual property arising from industry-sponsored university research should not take the
form of trade secrets as this form prohibits publication or presentation of research results.
Trade secrets require a level of guardianship that universities are not set up to provide.
Especially a state institution that must comply with a Freedom of Information Act.
Companies from some industrial sectors take the position that the sponsor has a right to own
Authorized User:
I recently saw few of the e-commerce & payment gateway sites using device authorization system
based on IP address, browser etc. I was also working on a same for my client's web app recently
so wanted to share a detailed post with the community people.
Allow the user to enter login credentials, if the login credentials are valid, also verify if
the user's device is authorized with the current IP address assigned to the user's device.
If the user's device is not authorized to access the protected pages, like the dashboard, the
application will send an email to the recently logged in user's email to ask for authorizing
the device before proceeding.
After sending the email, the page will redirect to wait for email authorization, and that will
keep refreshing on certain time interval to check if the user is authorized, so it can redirect
to the dashboard.
1
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
If the user is not active and did not authorize the device within next 15 min after email is
sent, it will log out the user as a reason for a timeout with a certain message.
Licensee:
The word license simply means permission – one person grants permission to another to
the circumstances under which a promise shall be legally binding on the person making it.
There are at least two essential parties: the licensor, the party who owns the IP and is
agreeing to let it be used, and the licensee, the party who receives rights to use the IP in
owner (licensor) and another who is authorized to use such rights (licensee) under certain
conditions, usually for a monetary compensation in the form of a flat fee or running royalty
that is often a percentage or share of the revenues gained from use of the invention. Simply
put, a license grants the licensee rights in property without transferring ownership of the
property. page 2 6. For a license of IP to be effective, four basic conditions must be met:
the licensor must have ownership of relevant IP or authority from the owner to grant a
license; the IP must be protected by law or at least eligible for protection; the license must
specify what rights with respect to IP it grants to the licensee; and the payment or other
There are many different types of IP licenses suchas technology licenses, publishing and
2
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
A patent attorney is a lawyer with expertise in intellectual property law pertaining to securing
and protecting an inventor’s property rights. Patent attorneys have passed a federal exam
referred to as the “patent bar exam” that grants them a license to represent clients before the United
States Patent and Trademark Office (USPTO). They have also passed the state bar exam that all
attorneys must pass. Patents are granted to inventors of unique useful and no obvious inventions.
Other countries may have different certifications or qualifications for patent attorneys or have
patent processes that may require no more than an individual with general legal credentials.
One of the things that I wish I’d known when I started out as a business analyst was I would need
to take deliberate steps to ensure my stakeholders truly got what they wanted and needed out of
the requirements.
As requirements authors and analyzers, it’s really easy to get so wrapped up in the process that
you take on more ownership than is prudent. However, when stakeholders do not buy into the
requirements, you can expect change requests late in the development cycle and a longer process
to put the solution to use.
By methodically seeking feedback at each stage of the requirements process and using email
correctly as part of this process, you’ll get critical input on your documentation and ensure your
stakeholders embrace the upcoming changes to their processes.
(This is the third installment of a 4-part series going into a little more detail on the things I would
have liked to have known before I started my business analyst career.)
Here’s a quick visual map you can use to remember what pieces of communication to consider
sending on a project when it comes to the 4 steps to finalize a requirements document.
3
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
Click here to download this visual map in PDF format and save it for future use. You also might
want to check out our Email Communication Templates for copy-and-paste email templates
covering each of the scenarios discussed here.
Now, let’s take a closer look at how we can get the input we need on a requirements document.
To create a first draft, the business analyst may do independent research or meet with stakeholders
to seek their high-level input.
Either way, the first draft is not the final draft – ever. Yet it is sensible to send an early draft out
for review, as this can help get questions answered and move the requirements process along.
The important thing when sending out an early draft for review is to emphasize that this is indeed
a working draft and that stakeholder input is still required. Highlighting specific questions you
have and identifying next steps can help manage stakeholder expectations.
Once the first draft is complete, you’ll need to obtain additional input and get questions answered.
Most often, you’ll conduct a requirements walk-through.
4
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
On occasion, it may be more efficient to receive answers to key questions via email. In this case,
send an email with the specific questions you have and attach the draft copy of your deliverable
for more background information.
Once a requirements document has been reviewed and key questions resolved, you will have a
document that’s ready for final review and approval. Email is a great way to manage this kind of
task.
Simply attach the document to your email, explain what’s expected of your stakeholders,
communicate a deadline by which you need their feedback or approval, and hit send.
Since stakeholders are busy, plan to remind them before the deadline. Including a description of
how their approval helps move the project forward can help them carve out time for this task.
Once you go through the above steps, sometimes multiple times, you’ll have your approved
document. This is a step to communicate (and celebrate)!
Send the final deliverable out to anyone who needs to know about the final document, including
those involved in implementing and testing against the specification.
use rights.
intellectual property rights. A right that is had by a person or by a company to have exclusive
rights to use its own plans, ideas, or other intangible assets without the worry of competition, at
least for a specific period of time. These rights can include copyrights, patents, trademarks, and
trade secrets.
5
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
UNIT-IV
6
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
To prevail in a civil action under ACPA, a plaintiff must prove three thing:
The plaintiff’s mark is a distinctive or famous mark deserving of protection
The alleged cyber squatter’s infringing domain name is identical to or confusingly similar to the
plaintiff mark
The cyber squatter registered the domain name is bad faith
Resolving Disputes through the Uniform Domain Name Dispute Resolution Policy: [UDRP]
1999
The allegedly wrongful domain name is identical or confusingly similar to the complainants’
trademark;
The domain name registrant has no legitimate interest in the domain name and
The domain name is being used in bad faith
While acknowledging that clothing is a useful article and thus not subject to copyright protection,
a New York Federal court ruled that lace design, copyrighted as writing and incorporated into
wedding dresses, were protectable and enjoined another maker of wedding dresses from making
or marketing copies. Similarly, detailed embroiders or some other two dimensional drawing or
graphic work affixed to a portion of a garment may be copyrightable.
A federal court in California recently held that while type fonts themselves are not protectable
under copyright law, a software program that generated and created the typefaces was protectable.
As soon as Stephen King sold his book riding the Bullet exclusively in an Internet format, an
individual cracked the copyright protection software and posted free copies of the book on the
Internet. The publishers responded by adopting stronger encryption technology. Similarly, in
2000, Mr. King suspended online publication of a serial novel because too many individuals were
downloading the work without paying it.
It late 1997 President Clinton signed into law the No Electronic Theft [NET] Act [amending 18
U.S.C §2319] to enhance criminal penalties for copyright infringement, even if the infringer does
not profit from the transaction. The act also extends the statutes of limitations for criminal
copyright infringement from three to five years, and allows law enforcement officers to use
federal copyright law against online copyright violation, thereby extending the same copyright
protection to the Internet that is provided to other media.
In September 1999, the Clinton administration relaxed government restrictions on the export of
encryption products and simultaneously introduced new legislation to give law enforcement
agencies greater authority to combat the use of computers by terrorists and criminals and to create
a new code cracking unit within the FBI [Foreign Bureau of Investigation] .
In mid-2000, president Clinton signed the Electronic signatures in Global and National
Commerce Act, making digital execution, called e-signatures, as legally binding as their paper
7
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
counterparts.
In 2000, federal prosecutors in Chicago indicted seventeen people who called themselves “Pirates
with Attitude” for pirating thousands of software programs. The case was brought under the NET
Act. Some of the individuals were former employees of Intel and Microsoft.
The copyright office has recommended that congress amend section 110 of the copyright Act to
grant educators the right to transmit copyrighted works for distance learning if certain conditions
are met.
The AIPA was signed into law in 1999 and represents the most significant changes to patent law
in twenty years. Although some of the provisions of AIPA have been discussed earlier, its key
subtitles are as follows:
The rights granted by a U.S Patent extend only throughout the U.S and have no effect in a foreign
country. Therefore, an inventor who desires patent protection in other countries must apply for a
patent in each of the other countries or in regional patent office.
The Paris convention (already it is in previous units)
The European patent organization
8
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
9
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
UNIT-V
Cyber Law:
Cyber law is the area of law that deals with the Internet's relationship to technological and
electronic elements, including computers, software, hardware and information systems (IS).
Cyber law is also known as Cyber Law or Internet Law.
Cyber laws prevent or reduce large scale damage from cybercriminal activities by protecting
information access, privacy, communications, intellectual property (IP) and freedom of speech
related to the use of the Internet, websites, email, computers, cell phones, software and hardware,
such as data storage devices.
The increase in Internet traffic has led to a higher proportion of legal issues worldwide. Because
cyber laws vary by jurisdiction and country, enforcement is challenging, and restitution ranges
from fines to imprisonment.
In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool
or a target or both
Cyber crimes can involve criminal activities that are traditional in nature, such as theft,
fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code.
The abuse of computers has also given birth to a gamut of new age crimes that are addressed
by the Information Technology Act, 2000.
India’s Information Technology Act, 2000 or IT Act, is a subject of contention and controversy.
As it is amended, it contains some of the most stringent privacy requirements in theworld and has
the unfortunate impact of holding intermediaries liable for illegal content. The Information
Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian
Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India
dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law
on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of
United Nations by a resolution dated 30 January 1997.
10
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
The IT Act of 2000 passed in a budget session of parliament and signed by President K.R.
Narayanan in 2000. It underwent further finalization by India’s Minister of Information
Technology, Pramod Mahajan.
The original act addressed electronic documents, e-signatures, and authentication of those
records. It also enacted penalties for security breach offenses including damaging computer
systems or committing cyber terrorism. Regulating authorities received power to monitor these
situations and draft rules as situations arose.
The IT Act underwent changes as Internet technology grew. In 2008, additions expanded the
definition of “communication device” to include mobile devices and placed owners of given IP
addresses responsible for distributed and accessed content.
Privacy was addressed in 2011 when stringent requirements for collecting personal information
came into effect.
he most controversial change in this act involves section 66A. It makes “offensive messages”
illegal and holds the owners of servers responsible for the content.
That means if an IP address with pornographic images is traced to your servers, you can be held
liable for it even if you did not authorize its access.
Penalties arrange from imprisonment of three years to life and fines. Offenses that occur in a
corporate setting can result in further administrative penalties and bureaucratic monitoring that
can prove burdensome to doing business.
11
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
12
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
The IT Act 2000 applies to companies that do business in India. This includes entities
registered in India, outsource there, and maintain servers within the country’s borders.
The act covers all activity involving online exchanges and electronic documents.
If your only connection with India is having customers there, you are not held to the IT Act.
The only way that can occur is if you run a service or sell a product and also maintain servers
there.
For example, Instagram is popular in India with many people participating in that social media
app. However, Instagram is a U.S. company and does not need policies complying with the IT
Act.
However, Snapdeal, an online shopping source in India, is an Indian company that conducts
transactions in India. It is held to the stipulations in the IT Act 2 — and that is addressed in its
Privacy Policy page.
Cyber Crime:
13
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
from the perspective of gender and defined 'cybercrime against women' as "Crimes targeted
against women with a motive to intentionally harm the victim psychologically and physically,
using modern telecommunication networks such as internet and mobilephones".[3]
Internationally, both governmental and non-state actors engage in cybercrimes, including
espionage, financial theft, and other cross-border crimes. Cybercrimes crossing international
borders and involving the actions of at least one nation state is sometimes referred to as cyber
warfare.
A report (sponsored by McAfee), published in 2014, estimated that the annual damage to the
global economy was $445 billion.[5] Approximately $1.5 billion was lost in 2012 to online credit
and debit card fraud in the US.[6] In 2018, a study by Center for Strategic and International Studies
(CSIS), in partnership with McAfee, concludes that close to $600 billion, nearly one percent of
global GDP, is lost to cybercrime each year
Computer Fraud is any dishonest misrepresentation of fact intended to let another to do or refrain
from doing something which causes loss. In this context, the fraud will result in obtaining a
benefit by:
Altering in an unauthorized way. This requires little technical expertise and is common form
of theft by employees altering the data before entry or entering false data, or by entering
unauthorized instructions or using unauthorized processes;
Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized
transactions. This is difficult to detect;
Altering or deleting stored data;
Other forms of fraud may be facilitated using computer systems, including bank fraud,
carding, identity theft, extortion, and theft of classified information.
A variety of internet scams, many based on phishing and social engineering, target consumers and
businesses.
Cyber terrorism:
14
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
significant increase in Internet problems and server scans since early 2001. But there is a growing
concern among government agencies such as the Federal Bureau of Investigations (FBI)
and the Central Intelligence Agency (CIA) that such intrusions are part of an organized effort by
cyber terrorists, foreign intelligence services, or other groups to map potential security holes in
critical systems.[9] A cyber terrorist is someone who intimidates or coerces a government or an
organization to advance his or her political or social objectives by launching a computer-based
attack against computers, networks, or the information stored on them.
Cyber terrorism in general can be defined as an act of terrorism committed through the use of
cyberspace or computer resources (Parker 1983). As such, a simple propaganda piece in the
Internet that there will be bomb attacks during the holidays can be considered cyber terrorism.
There are also hacking activities directed towards individuals, families, organized by groups
within networks, tending to cause fear among people, demonstrate power, collecting information
relevant for ruining peoples' lives, robberies, blackmailing etc.
Cyber extortion:
The U.S. Department of Defense (DoD) notes that the cyberspace has emerged as a national- level
concern through several recent events of geostrategic significance. Among those are included, the
attack on Estonia's infrastructure in 2007, allegedly by Russian hackers. "In August 2008, Russia
again allegedly conducted cyber attacks, this time in a coordinated and synchronized kinetic and
non-kinetic campaign against the country of Georgia. The December 2015 Ukraine power grid
cyber attack has also been attributed to Russia and is considered the first successful cyber attack
on a power grid. Fearing that such attacks may become the norm in future warfare among nation-
states, the concept of cyberspace operations impacts and will be adapted by war fighting military
commanders in the future.
E-commerce:
E-commerce is the activity of buying or selling of products on online services or over the
Internet. Electronic commerce draws on technologies such as mobile commerce, electronic funds
transfer, supply chain management, Internet marketing, online transaction processing,
electronic data interchange (EDI), inventory management systems, and automated data
collection systems.
Modern electronic commerce typically uses the World Wide Web for at least one part of the
transaction's life cycle although it may also use other technologies such as e-mail. Typical e-
15
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
commerce transactions include the purchase of online books (such as Amazon) and music
purchases (music download in the form of digital distribution such as iTunes Store), and to a less
extent, customized/personalized online liquor store inventory services.[1] There are threeareas of
e-commerce: online retailing, electric markets, and online auctions. E-commerce is supported by
electronic business.[2]
E-commerce businesses may also employ some or all of the followings:
Online shopping for retail sales direct to consumers via Web sites and mobile apps,
and conversational commerce via live chat, chat bots, and voice assistants
Providing or participating in online marketplaces, which process third-party business-to-
consumer or consumer-to-consumer sales
Business-to-business buying and selling;
Gathering and using demographic data through web contacts and social media
Business-to-business (B2B) electronic data interchange
Marketing to prospective and established customers by e-mail or fax (for example,
with newsletters)
Engaging in pretail for launching new products and services
Online financial exchanges for currency exchanges or trading purposes.
Data Security:
Data security refers to the process of protecting data from unauthorized access and data corruption
throughout its lifecycle. Data security includes data encryption, tokenization, and key management
practices that protect data across all applications and platforms.
Organizations around the globe are investing heavily in information technology (IT) cyber
defense capabilities to protect their critical assets. Whether an enterprise needs to protect a brand,
intellectual capital, and customer information or provide controls for critical infrastructure, the
means for incident detection and response to protecting organizational interests have three
common elements: people, processes, and technology.
16
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
Micro Focus drives leadership in data security solutions with over 80 patents and 51 years of
expertise. With advanced data encryption, tokenization, and key management to protect data
across applications, transactions, storage, and big data platforms, Micro Focus simplifies the
protection of sensitive data in even the most complex use cases.
Cloud access security – Protection platform that allows you to move to the cloud securely while
protecting data in cloud applications.
Data encryption – Data-centric and tokenization security solutions that protect data across
enterprise, cloud, mobile and big data environments.
Hardware security module -- Hardware security module that guards financial data and meets
industry security and compliance requirements.
Key management -- Solution that protects data and enables industry regulation compliance.
Enterprise Data Protection – Solution that provides an end-to-end data-centric approach to
enterprise data protection.
Payments Security – Solution provides complete point-to-point encryption and tokenization for
retail payment transactions, enabling PCI scope reduction.
Big Data, Hadoop and IofT data protection – Solution that protects sensitive data in the Data
Lake – including Hadoop, Teradata, Micro Focus Vertica, and other Big Data platforms.
Mobile App Security - Protecting sensitive data in native mobile apps while safeguarding the
data end-to-end.
Web Browser Security - Protects sensitive data captured at the browser, from the point the
customer enters cardholder or personal data, and keeps it protected through the ecosystem to the
trusted host destination.
Email Security – Solution that provides end-to-end encryption for email and mobile messaging,
keeping Personally Identifiable Information and Personal Health Information secure and private.
17
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
Confidentiality:
Sometimes safeguarding data confidentiality may involve special training for that privacy to such
documents. Such training would typically include security risks that could threaten this
information. Training can help familiarize authorized people with risk factors and how to guard
against them. Further aspects of training can include strong passwords and password-related best
practices and information about social engineering methods, to prevent them from bending data-
handling rules with good intentions and potentially disastrous results.
Information Privacy:
Information privacy, also known as data privacy or data protection, is the relationship
between the collection and dissemination of data, technology, the public expectation of privacy,
legal and political issues surrounding them.
Privacy concerns exist wherever personally identifiable information or other sensitive
18
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
information is collected, stored, used, and finally destroyed or deleted – in digital form or
otherwise. Improper or non-existent disclosure control can be the root cause for privacy issues.
Data privacy issues may arise in response to information from a wide range of sources,
such as:
Healthcare records
Criminal justice investigations and proceedings
Financial institutions and transactions
Biological traits, such as genetic material
Residence and geographic records
Privacy breach
Location-based service and geo location
Web surfing behavior or user preferences using persistent cookies
Academic research
The challenge of data privacy is to use data while protecting an individual's privacy preferences
and their personally identifiable information. The fields of computer security, data security, and
information security design and use software, hardware, and human resources to address this
issue. Since the laws and regulations related to Privacy and Data Protection are constantly
changing, it is important to keep abreast of any changes in the law and to continually reassess
compliance with data privacy and security regulations. Within academia, Institutional Review
Boards function to assure that adequate measures are taken to ensure both the privacy and
confidentiality of human subjects in research.
19
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
international cooperation. Various organizations and governments have already made joint efforts
in establishing global standards of legislation and law enforcement both on a regional and on an
international scale. China–United States cooperation is one of the most striking progresses
recently, because they are the top two source countries of cybercrime.
Information and communication technology (ICT) plays an important role in helping ensure
interoperability and security based on global standards. General countermeasures have been
adopted in cracking down cybercrime, such as legal measures in perfecting legislation and
technical measures in tracking down crimes over the network, Internet content control, using
public or private proxy and computer forensics, encryption and plausible deniability, etc.[2] Due
to the heterogeneity of law enforcement and technical countermeasures of different countries, this
article will mainly focus on legislative and regulatory initiatives of international cooperation.
Internet Crime
Internet crime is any crime or illegal online activity committed on the Internet, through the
Internet or using the Internet. The widespread Internet crime phenomenon encompasses multiple
global levels of legislation and oversight. In the demanding and continuously changing IT field,
security experts are committed to combating Internet crime through preventative technologies,
such as intrusion detection networks and packet sniffers.
Internet crime is a strong branch of cybercrime. Identity theft, Internet scams and cabers talking
are the primary types of Internet crime. Because Internet crimes usually engage people from
various geographic areas, finding and penalizing guilty participants is complicate
Internet crimes, such as the Nigerian 419 fraud ring, are a constant threat to Internet users. The
U.S. Federal Bureau of Investigation (FBI) and Federal Trade Commission (FCC) have
dedicated and appointed IT and law enforcement experts charged with ending the far-reaching
and damaging effects of Internet crime.
U.S. Computer Fraud and Abuse Act, Section 1030: Amended in 2001 through the U.S.
20
Dr. SARIKA.G
Assistant Professor
AITS, KADAPA
Patriot Act
CAN SPAM Act of 2003
Preventing Real Online Threats to Economic Creativity and Theft of
IntellectualProperty Act of 2011
As the U.S. works to combat Internet crime, other countries are experiencing
increased cybercriminal activity. In 2001, Web sense (an organization focused on
network abuse research)reported the alarming spread of Internet crime in Canada.
This global shift is under review by the Canadian government.
To prevent becoming an Internet crime, online vigilance and common sense are critical. Under no
circumstances should a user share personal information (like full name, address, birth date and Social
Security number) to unknown recipients. Moreover, while online, a user should remain suspicious
about exaggerated or unverifiable claims
21