Unit-6
Unit-6
Structure
6.0 Introduction
6.1 Objectives
6.2 Basic Concept: IPRs
6.2.1 Forms of IPR
6.3 Copyright issues in digital- medium, music and goods
6.4 Patent misuse
6.5 Linking, In-lining and framing
6.6 Trade Mark Issues
6.7 Domain Name Disputes – Cyber squatting
6.8 Search Engines and their Abuse
6.9 Regulatory Frame Work- National and International Scenario.
6.9.1 Legal Protection in India
6.9.2 International scenario
6.10 Summary
6.11 Answer / solutions
6.12 References /further readings
6.0 INTRODUCTION
The traditional laws for protecting intellectual property have been also
applicable to the infringements taking place in digital media. However, due to
inherent nature of the internet, the relative anonymity afforded to the digital
transactions , jurisdiction issues, the ease of copying and distribution of copies,
several pertinent issues have emerged in recognizing various forms of online
infringements and resolving conflicts of owner of the right holders, of authors,
publishers, film producers, music creators and software developers exploring
ways to make their products available online, while protecting their rights and
recouping their investment.
1
IPR Issues in Cyber
Space
One cannot deny that the Information Technology Act, 2000 has proven to be
successful in setting down the framework of laws and regulation in cyber space
and addresses numerous concerns related to the misuse of technology, but at
the same time the particular Information Technology Act, 2000 suffers from
some of the serious lacunae which all have not been primarily discussed,
known as intellectual property issues. Further, Intellectual property is
considered as an intangible asset therefore, there has to be specific penal
provisions under Information Technology Act, 2000, as the infringement of the
intellectual property is very easy in the cyberspace.
6.1 OBJECTIVES
There are basically seven forms of intellectual property: copyright and related
rights; trademarks, patent, industrial design, geographical indications, trade
secrets and plant variety. (https://www.wipo.int).
2
I. Copyright and related rights Cyber Laws
a. A copyright is used to protect creative literary, musical, dramatic, or
other artistic works like cinematographs films and sound recordings
inclusive of musical compositions, audio recordings, paintings, photos,
sculptures, books, articles, diagrams, movies, website content and even
computer software and programmes though the inventions related to
software are protected under patent law.
b. Rights Granted: provides economic and moral rights. The copyright
owner has exclusive rights pertaining to reproduction and distribution
of their literary and artistic work; Public performance of the work;
Broadcasting of the work; communicating the work to public by wire or
wireless means; Commercial rental of the work.
c. Copyright protection is available if the work is original and exists in
some tangible form based on the national laws. It does not necessarily
require registration except for evidence that establishes ownership. The
right is granted for specific period and may vary from country to
country and from aparticular class of work to another class of work.
II. Patents
a) A patent is an exclusive right granted to protect an invention which is a
product or a process and can also be applicable to newly engineered
plant species or strain however a discovery, scientific theory or
mathematical method is excluded from patentability, but its application
or use can be patentable.
b) Rights Granted: are territorial in nature and patent protection is
granted for a limited period.
c) Patentable and non-patentable inventions -An invention is
patentable, if it is Novel, has Inventive step (non- obvious) and capable
of industrially application. However, the methods of doing
somethinglike book keeping, trading of stocks; Diagnostic, therapeutic
and surgical methods for the treatment of humans and animals;
Inventions contrary to humanity, public order, morality, public health,
environment and safety are not patentable. For example, process of
cloning.
d) There are certain products or process which are Novel and have
Industrial application and are protected as Utility Model not as patent,
for a shorter period, generally 10 years and do not require inventive
step as the protection requirement like patents.
III. Trademarks
a) A trademark is a distinctive sign, word, symbol or mark used in trade to
distinguish the goods or services. Trademarks help consumers to identify
the source of products or services.It could be name, signature, logo, brand
label, phrase, slogan, letter, a numeral or any combination of them.
b) For registration of trademark, it should be (i) distinctive in nature
(distinguishable from other goods and service). Registration of trade mark
is valid for specific period and needs to be renewed.
3
IPR Issues in Cyber c) Registered trademark owner has exclusive right to use and is also
Space
entitled to complete or partial assignments of rights in relation to the mark
to another person, including the right to earn royalties.Trade mark owner
can also permit restricted use of trademark by way of trademark licensing.
IV. Industrial designs
a) Consists of appearance of a product/logo; the shape of an object;
composition of design, pattern of cloth. The industrial design may have
three-dimensional features, such as the shape or surface of an article, or
two-dimensional features, such as patterns, lines or color.
b) For protection, an industrial design must be (i) new or original and (ii)
aesthetic and requires mandatory registration.
V. Geographical Indication (GI)–
a) It is a name or sign used on certain products which corresponds to a
specific geographical location or origin (e.g. a region, or country).
A Geographical Indication should have special quality or
reputation.
b) Geographical indications are typically used for agricultural
products, foodstuffs, wine and spirit drinks, handicrafts, and
industrial products. Examples: Basmati rice, Swiss watches,
Ethiopian coffee, Tequila for spirits produced in Mexico, Electrical
appliance Made in UK.
c) In order to function as a GI, a sign must identify a product as
originating in a given place and the qualities, characteristics or
reputation of the product should essentially be due to the place of
origin.
VI. Trade Secrets
a) A trade secret is any confidential secret information having inherent
economic advantage to company and is used in business that gives a
competitive edgeby reason of it being secret. Examples include
formulae, practice,program, process, recipes, pattern, technique,
compilation, method, and device or product mechanism.
Among all the intellectual properties copyright, trademark and patent are three
of the most commonly considered intellectual property, but nowadays
Geographical indication is also gaining a lot of attention as it is related to
specific region or any specific nature of work and by protecting those specific
regional work the intellectual rights of those regional people are protected and
this protection is promoting the work of all these regional people.
4
The Information Technology Act, 2000 does not mention any thing about Cyber Laws
intellectual property rights. On the other hand, it can be taken into
consideration that infringement of intellectual property rights is a very
common practice in the cyberspace and it is very easy to practice any kind of
infringement over cyberspace. There are some categories of intellectual
property that needs lawto regulate the protection of intellectual works in
cyberspace. They are:
1. What is trademark?
The global usage of Internet makes it feasible for any user to share information
in cyberspace through various social media means leading to various concerns
and issues related to piracy and counterfeited goods leading to huge monetary
losses and as a result fake and pirated products in market. Gulla, R. K., 2007
has rightly pointed out that “the Internet in a way presents a troublesome
situation for copyright holders as the users become mass disseminators of
others copyright material and creates disequilibrium between the authors and
users”.
The copyrights owner has certain rights as discussed above but the
reproduction right is considered as very important and a very fundamental right
5
IPR Issues in Cyber that grants the copyright owner the right to exclusive right to control the
Space
making of a copy of the work or to grant permission for its reproduction. The
right to communication to public is also the right of copyright owner however
growth in digital technology, use of computer system and networks that allows
easy access and transmission of work makes the copyrighted work less distinct
and is communicated to the public may lead to infringement of right of the
copyright owner.
In cases where the defendant copies cd’s onto its servers and do not create any
new form of aesthetics, expression but rather to repackage and retransmit the
same expression through another medium leads to infringement of copyright as
held in Books, Inc. V. Kinko's Graphics Corp,1991 that repetition of
copyrighted material that "merely repackages or republishes the original" is
unlikely to be deemed a fair use. It was retreated in Infinity Broadcast Corp.
V. Kirkwood, 2d Cir.1998, where court rejecting the fair use defense by
operator of a service that retransmitted copyrighted radio broadcasts over
telephone lines as cited in the case UMG Recordings, Inc 2000, in this case
Utilizing the technology "MP3" which permits rapid and efficient conversion
of compact disc recordings ("CDs") to computer files easily accessed over the
Internet the defendant or around in January 2000, launched its
"My.MP3.com" service, which is advertised as permitting subscribers to store,
customize and listen to the recordings contained on their CDs from any place
where they have an Internet connection. To make good on this offer, defendant
purchased tens of thousands of popular CDs in which plaintiffs held the
copyrights, and, without authorization, copied their recordings onto its
computer servers so as to be able to replay the recordings for its subscribers. In
this case court held that “defendant's "fair use" defense is indefensible and
must be denied as a matter of law”. Further other affirmative defenses, such as
copyright misuse, abandonment, unclean hands-on part of plaintiff, and
estoppel, are considered to be essentially frivolous and accordingly disposed
of. (UMG Recordings, Inc. v. MP3.Com, Inc. (harvard.edu)).
A patent ensures total protection of the patented invention under the legal
system of a country under the legislation of which it is obtained.
A patent represents monopoly to the patentee that they have the exclusive right
to presents to the public the knowledge they have and the patented
invention can't be commercially used by any one, or made, distributed or sold
without the consent of patent holder. The object of the grant of Patent is to
encourage research and development, new innovation and industrial progress.
Any kind of practical application in the computer device is known to be
patentable but not all software’s are patentable but devices like pacemakers are
very much patentable, but a computer program is authorized for patenting only
6
when it contributes to a particular art or a computer program creates a value Cyber Laws
edition within the existing program and enhances the speed and efficiency of
the existing program. In the Indian Patent Law, there is no specific provision
pertaining to the protection of software. The United States of America has
though recognises the patents for businesses like online stock trading,
gambling, e-commerce. Patent can also be misused by patent holder which
means an illegal behavior of patentee that leads to violations of the antitrust
law or when he tries to expand his product with the actual patent by getting
into other licensing agreements. When a patent misuse has been constituted,
the patent would be deemed useless. With the advent of digitized media, the
various patent infringements are seen in technology industries as given below:
“Amazon tried to patent its one-click payment option. However, the court
decided it was too obvious an idea to patent.
The file-sharing company Napster settled a lawsuit accusing it of
unauthorized distribution of music. It later filed bankruptcy.
Nintendo was forced to pay a large sum to Tomita Technologies
International, Inc. for its 3DS gaming-system technology.
Microsoft and Google dueled for five years over patent issues involving the
Xbox gaming system and Motorola smartphones”. (Famous Patent
Infringement Cases (upcounsel.com)).
The Linking, In-lining and framing have become so common since in linking
person is providing link and is not making any copies of material available
online but the link here allows visitors to bypass information and
advertisements at the relevant home page, inlining allows display of graphics
on other website and framing often used in conjunction with inlining give
picture to picture image and the user can surf directly to the information
contained in another site without visiting its home page that may leads to
copyright or trademark infringement since it may cause loss of income to
businesses; create confusion among the users that the sites endorse each other
or are associated with each other which might not be correct and lead to
confusion as to original source and loss of reputation and goodwill of the
original information holder/ businesses.
“"Linking" allows a Web site user to visit another location on the Internet. By
simply clicking on a "live" word or image in one Web page, the user can view
another Web page elsewhere in the world, or simply elsewhere on the same
server as the original page. This technique is what gives the Web its unique
communicative power. At the same time, however, linking may undermine the
rights or interests of the owner of the page that is linked to. Suppose, for
example, that X sets up a homepage for her site. On the homepage she places
some advertisements, from which she hopes to make some money. The
7
IPR Issues in Cyber homepage also contains links to various subordinate pages, which contain
Space
content that X believes consumers wish to see. Y then creates his own Web
site, which contains links to X's subordinate pages. The net result is that
visitors to Y's site will be able to gain access to X's material, without ever
seeing X's advertisements. This type of activity is called "deep linking.””
(Intellectual Property in Cyberspace (harvard.edu)).
Inlining
“"Inlining" is the process of displaying a graphic file on one website that
originates at another. For example, inlining occurs if a user at site A can,
without leaving site A, view a "cartoon of the day" featured on site B. IMG
links -- a special type of link -- can be used to display graphic files on one site
that are stored on another”. (Playboy Enterprises v - NYU Law)
Kelly v. Arriba Soft Corp,2003, a federal court of appeals ruled that it was not
an infringement to provide inlined links to "thumbnail" reproductions (here an
image search engine called ditto.com used inline links to reproduce full-size
photographic images from a photographer’s website) based on fair use
principlesbut there was no clarity as to whether inlined links to full-sized
reproductions constitute an infringement and are not automatically excused as
a fair use. In Perfect 10, Inc. v. Amazon.com, Inc ,2007, a federal court of
appeal again permitted the use of inlined links (reproductions of images from
an adult men’s magazine website) for thumbnail reproductions.
Framing
“"Framing" is the process of allowing a user to view the contents of one
website while it is framed by information from another site, similar to the
"picture-in-picture" feature offered on some televisions. Framing may trigger a
dispute under copyright and trademark law theories, because a framed site
arguably alters the appearance of the content and creates the impression that its
owner endorses or voluntarily chooses to associate with the framer”. (Playboy
Enterprises v - NYU Law).
Trademark infringement issues arise when some other party uses the trademark
having deceptive similarity with the registered trademark of popular brand
with intent to confuse consumers as to the producer or manufactures of goods
or services. In cases of linking, framing apart from copyright infringement
trademark issues also arises. “Attempted enforcement of trademark rights
against persons who use marks or content to divert traffic from a trademark
owner’s site, whether the troublesome use is by friend or foe, requires careful
consideration of First Amendment (freedom of speech) concerns as well as of
trademark principles of fair use. The public relations nightmare that could
result from a misstep in this area should be balanced against both the perceived
need to police trademark rights and the proposed policing method.” (Sally M.
Abel,1999, p127)
In a famous case, Yahoo! Inc. v. Akash Arora, 1999, the defendant created and
registered a similar website on domain name “YahooIndia.com” and started
providing similar services under the name“Yahoo India” as a trade mark. It
9
IPR Issues in Cyber was deceptively identical to the plaintiff’s website Yahoo. Inc. which is based
Space
in U.S.The High Court of Delhi held that the defendant is liable for deceptively
using Yahoo as a domain name and passed an injunction order to restraint the
defendant from misusing the trade mark. Thus, trademarks or domain names
are equally protected in cyberspace. InTata Sons Ltd v. MonuKosuri and
others,2001, the defendant registered the domain name which was deceptively
identical to the plaintiff’s trademark, “Tata”. The court passed an ad interim
injunction in favour of the plaintiff. In Acqua Minerals Ltd. v. Pramod Borse
and others, 2001, the defendant knowingly registered “Bisleri.com” as its
domain name who was not the real owner of the trademark. When the real
owner came to know about it, they filed an action against the defendant. The
court passed an injunction order against the defendant to protect the domain
name. (Seth, 2012,259-260).
It is clear that the ranking over cyberspace can be manipulated and distorted
with the help of some illegitimate tricks. Therefore, a proper legal recourse is
necessary to overcome all such issues related to the search engine manipulation
and the consumers have to remain aware and be conscious at all times about
the fact that the information they are getting by using any search engine can be
misleading.
12
person.The Copyright expires after 60 years from the end of the calendar year Cyber Laws
in which the author diesLiterary, dramatic, musical or artistic works; The
Copyright shall subsist until 60 years from the beginning of the calendar year
following the year in which the film/sound recording /photographs/computer
programs is made available or first published as the case may be to the public.
The act provides economic rights under sec 14 of act to commercially exploit
his creationand also grants moral rights as envisaged under Section 57 of the
Act which are special rights of the author of the work viz., (i) Right to claim
authorship of the work; and (ii) Right to restrain or claim damages in respect of
any distortion, mutilation, modification or other act in relation to the said work
if such distortion, mutilation, modification or other act would be prejudicial to
his honor or reputation (“Right Against Distortion”). The moral rights can also
be exercised by legal representatives post death of the author. As per the
Amendment, the right against distortion is available even after the expiry of the
term of copyright.
Patent- It is governed by the Patents Act 1970; Patents Rules 1972. Section
2(m) of the Patent Act, 1970 provides for the definition of Patent which states
that: - “Patent means patent for any invention granted under this Act”.
To strengthen the patent law, India became signatory to many international
agreements like Trade Related Intellectual Property Rights (TRIPS), Paris
Convention and the Patent Cooperation Treaty and Budapest Treaty. The Act
provides for period of 20 years for every patent from the from the date of
application of patent irrespective of whether it is filed with provisional or
complete specification. However, in case of applications filed under PCT the
term of 20 years begins from the International filing date accorded under
PCT.Under the Patent Act, both processes and products are entitled to qualify
as inventions if they are new, involve an inventive step and are capable of
industrial application. however before grant of patent, Act allows both pre-
grant and postgrant opposition. Section 48 of the Indian Patents Act 1970,
confers exclusive rights upon the patentee to exclude third parties from
making, importing, using, offering for sale or selling the patented invention,
patented product or patented process and use of patented invention without the
13
IPR Issues in Cyber prior permission from the patent holder may amount to infringement. the
Space
patent owner can however grant permission in the form of a license.
It is interesting to note that in some countries Industrial design is also protected
under patent, because these designs are created with some specific purpose and
they impact consumers’ choice between products. According to World
Intellectual Property Organization (WIPO), industrial designs impact
marketability and commercial value of product
14
detrimental to its distinctive character; or (c) is against the reputation of the Cyber Laws
trade mark. (www.indiankanoon.org).
The following laws govern other form of IPR for ex: Designs Act, 2000 deals
with laws relating to Industrial Designs; The geographical Indications of
(Registration and Protection) Act, 1999 for Laws relating to Geographical
Indication; Information Technology Act, 2000 deals with electronic records.
The purpose of making these treaties is to create uniformity in dealing with the
disputes related to the Intellectual Property Rights, because copyright is
governed within the country according to the internal laws of the country and
with the help of these treaties, uniform protection is given to all member
15
IPR Issues in Cyber countries of that particular treaty. It is an important remedy against
Space
infringements and provides protection to copyright internationally. India is a
member country to these treaties and has given protection against all member
countries if any infringement of the copyright takes place. However, the
registration process of the copyright may differ from one member country to
another member country.
The Universal Copyright Convention (UCC) -was adopted in 1952 under the
support and protection of United Nations Educational, Scientific and Cultural
Organization (UNESCO) with a view to extend international copyright
protection universally. After the entry into force of the Revision Act, in 1971,
the members have to strictly comply in accordance to the revised version. The
Intergovernmental Copyright Committee has been also established in
compliance with Art. 11 of the UCC consisting of the representatives of 18
Contracting States. (Universal Copyright Convention. United Nations
Educational, Scientific and Cultural Organization (unesco.org))
Berne Convention-
The Berne Convention deals with the protection of works and the rights of
their authors. It is based on three basic principles: (1)Works originating in one
of the Contracting States (that is, works the author of which is a national of
such a State or works first published in such a State) must be given the same
protection in each of the other Contracting States as the latter grants to the
works of its own nationals (principle of "National treatment"), (2)
Protection must not be conditional upon compliance with any formality
(principle of "Automatic" protection),(3) Protection is independent of the
existence of protection in the country of origin of the work (principle of
"Independence" of protection). If, however, a Contracting State provides for
a longer term of protection than the minimum prescribed by the Convention
and the work ceases to be protected in the country of origin, protection may be
denied once protection in the country-of-originceases. Berne convention
contains a series of provisions determining the minimum protection to be
granted, as well as special provisions available to developing countries that
want to make use of them. The Berne Convention allows certain limitations
and exceptions on economic rights, that is, cases in which protected works may
be used without the authorization of the owner of the copyright, and without
payment of compensation. These limitations are commonly referred to as "free
uses" of protected works, and are set forth in Articles 9(2) (reproduction in
certain special cases), 10 (quotations and use of works by way of illustration
for teaching purposes), 10bis (reproduction of newspaper or similar articles
and use of works for the purpose of reporting current events) and 11bis(3)
(ephemeral recordings for broadcasting purposes).As to the duration of
protection, the general rule is that protection must be granted until the
expiration of the 50th year after the author's death. There are, however,
exceptions to this general rule. In the case of anonymous or pseudonymous
16
works, the term of protection expires 50 years after the work has been lawfully Cyber Laws
made available to the public, except if the pseudonym leaves no doubt as to the
author's identity or if the author discloses his or her identity during that period;
in the latter case, the general rule applies. In the case of audiovisual
(cinematographic) works, the minimum term of protection is 50 years after the
making available of the work to the public ("release") or – failing such an
event – from the creation of the work. In the case of works of applied art and
photographic works, the minimum term is 25 years from the creation of the
work. (https://www.wipo.int/treaties/en/ip/berne/summary_berne.html).
The U.S. Copyright Act states that a copyright exists once an “original work
of authorship [is] fixed in any tangible medium of expression . . . from which
[it] can be perceived, reproduced or otherwise communicated.”17 U.S.C.
102(a).Copyright owners (or their assignees) have the right to carry out or
authorize reproduction and distribution of their work; preparation of derivative
works; and, for literary, musical, and various visually based works, the public
performance or display of their work. Copyright law also imposes limitations
on the exclusive rights that copyright owners enjoy during the life of a
copyright. Some of those limitations apply to the use of a particular product,
such as consumers’ ability to make an archival copy of a computer program
without authorization of the copyright owner(17 U.S.C. 117).
17
IPR Issues in Cyber their work from infringing uses and to identify and prosecute those users found
Space
to be infringing copyright. The DMCA makes it illegal to circumvent a
technology that controls access to copyrighted materials—for example, an
encryption program that prevents unauthorized viewing of a movie on the
Internet.”[ 17 U.S.C. 1201(a)(1).]. The DMCA further prohibits manufacturing
or trafficking in products “primarily designed or produced for the purpose of
circumventing” technologies that are designed either to control access to
copyrighted material (as in the previous example of a movie distributed via the
Internet) or to prevent the use of such material in an infringing way. [ 17
U.S.C. 1201(a)(2) and (b)].In contrast, the DMCA does permit some
circumvention activities or products that do not infringe copyright. For
example, copyright law explicitly recognizes copying a computer program for
archival purposes as a limitation on the exclusive rights of owners of copyright
on computer programs. Hence, if a manufacturer of computer programs
applied a copy-control technology to prevent unauthorized copying of its
product, a lawful purchaser could legally circumvent that technology to make
an archival copy. The example of software copying illustrates a central
principle of copyright law: copyright owners have no legal obligation to
facilitate any activity that qualifies either as a limitation on their exclusive
rights or as fair use generally. At the same time, if the DMCA’s prohibitions
are to be effective legal instruments for deterring infringement, copyright
owners must take measures to protect their intellectual property from
unauthorized access and use. Thus, the fair use and other consumer concerns,
such as personal privacy on the Internet was taken into account while crafting
the anticircumvention provisions. However, technological progress is placing
growing strains on whatever balance had previously been achieved between
the rights of copyright owners and the interests of consumers.’ (Copyright
Issues in Digital Media, Aug2004).
18
applications though an inventor still needs to file a separate application in each Cyber Laws
country that has signed the Convention, but each country will use the U.S.
filing date for the application and to get advantage of this protection, a U.S.
inventor must file their application in the foreign country within a year of filing
in the U.S and the inventors of design patents must file application within six
months of the U.S. filing.However, filing for multiple patents to enforce one’s
patent rights in foreign countries by way of infringementsuits is very expensive
including hiring of lawyer fee.(International Patent Law and Protection.
Justia)
6.10 SUMMARY
6.11 SOLUTION/ANSWERS
20
disputes including domain Name Disputes – Cybersquatting and abuse Cyber Laws
of Search Engines.
4. As per section 2(1)(m) of Patent Act, 1970 patent means a patent for
any invention granted under this Act.
5. Civil Remedies- injunctions, damages, rendition of accounts, exparte
order, seizure, destruction or forfeiture of infringing goods. 2. Criminal
remedies- section 63 of the Copyright Act, 1957 deals with Offences of
infringement of copyright and Chapter XII of the Trademarks Act,
1999 deals with offences, penalties and procedures pertaining to
trademark infringement. 3. Administrative Remedies- import/ export of
goods including protection of patents, trademarks and copyrights under
Indian Customs Act, 1962; Confiscation of infringing material by
Custom Authorities; Restrictions against parallel importation of goods.
Acqua Minerals Ltd. v. Pramod Borse and others (2001 PTC 619).
Ahuja V. K (2017).Law related to Intellectual property rights. 3rd ed.
LexisNexis.
21
IPR Issues in Cyber International Patent Law and Protection. Retrieved from
Space
https://www.justia.com/intellectual-property/patents/international-
patent-protection/.
Kelly v. Arriba Soft Corp., 336 F.3d 811 (9th Cir. 2003).
Linking, Framing, Meta Tags, and Caching. Retrieved from
https://cyber.harvard.edu/property00/metatags/main.html
22
Universal Copyright Convention. United Nations Educational, Cyber Laws
Scientific and Cultural Organization. Retrieved from
http://www.unesco.org/new/en/culture/themes/creativity/creative-
industries/copyright/universal-copyright-convention/.
WIPO. Retrieved from
https://www.wipo.int/edocs/mdocs/africa/en/wipo_tiscs_kla_17/wipo_t
iscs_kla_17_t_4.pdf
Yahoo! Inc. v. Akash Arora, (78(1999) DLT 285).
23